Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:7
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
[21]   Trading inversions for multiplications in elliptic curve cryptography [J].
Ciet, M ;
Joye, M ;
Lauter, K ;
Montgomery, PL .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 39 (02) :189-206
[22]   Trading Inversions for Multiplications in Elliptic Curve Cryptography [J].
Mathieu Ciet ;
Marc Joye ;
Kristin Lauter ;
Peter L. Montgomery .
Designs, Codes and Cryptography, 2006, 39 :189-206
[23]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[24]   Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography [J].
Li, Dongmei ;
Liu, Yan .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY, 2015, 17 :630-634
[25]   An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography [J].
Ahmad, Tohari ;
Hu, Jiankun ;
Han, Song .
NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, :474-+
[26]   A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks [J].
Louw, J. ;
Niezen, G. ;
Ramotsoela, T. D. ;
Abu-Mahfouz, A. M. .
2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, :1166-1170
[27]   Construction of elliptic curve cryptography-based authentication protocol for internet of things [J].
Chhikara, Deepak ;
Rana, Saurabh ;
Mishra, Ankita ;
Mishra, Dheerendra .
SECURITY AND PRIVACY, 2022, 5 (04)
[28]   Selection of Security Elliptic Curve Based on Evolution Algorithm [J].
Wang, Maocai ;
Dai, Guangming ;
Hu, Hanping ;
Pen, Lei .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL I, 2009, :55-+
[29]   On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography [J].
Bourreau, Hugo ;
Guichet, Emeric ;
Barrak, Amine ;
Simon, Benoit ;
Jaafar, Fehmi .
2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, :758-759
[30]   Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data Security During Data Transmission in MANET [J].
Pauline, D. Eben Angel .
COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 :245-254