Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:6
|
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
来源
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
  • [1] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [2] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [3] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [4] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [5] Improoved MANET security using Elliptic Curve Cryptography and EAACK
    Nikam, Pranjali Deepak
    Raut, Vanita
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1125 - 1129
  • [6] On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 88 - 91
  • [7] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    [J]. TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [8] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    [J]. Telecommunication Systems, 2005, 29 : 165 - 180
  • [9] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [10] The advantages of elliptic curve cryptography for wireless security
    Lauter, K
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67