音が流れない場合、再生を一時停止してもう一度再生してみて下さい。
ツール 
画像
VERILOG COURSE TEAM-MATLAB PROJECT
177回再生
ELLIPTIC CURVE CRYPTOGRAPHY AND HYPER ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS

DESIGN DETAILS
A sensor network consists of many small, inexpensive, and self-powered devices that can sense, compute, and communicate with other devices. Nodes act as information sources, and sense and collect data samples from their environment. Wireless sensor networks (WSNs) have a wide range of civil and military applications. One of the important applications of a WSN is area monitoring, where nodes are deployed over a region to monitor an event or phenomenon. For example, in military applications, to detect intrusion in a battlefield, large quantities of sensor nodes are required along with high security. Similarly, WSNs can use different types of sensors to detect the presence or intrusion of vehicles ranging from motorcycles to armored fighting vehicles like tanks. Sensor networks are typically characterized by limited power supplies, low bandwidth, limited memory, and limited energy. When sensor networks are deployed, security becomes important because they are subject to different types of attacks. This leads to a very demanding environment to provide security. Although secure communication in a WSN is often an essential system requirement, it is a challenging task due to limited resources, lack of infrastructure, unknown topology, and wireless nature of transmission.

This Matlab design is to solve the security issues by making use of elliptic curve cryptography (ECC) and Hyper elliptic curve cryptography (HECC). In this design a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture.

REFERENCES
Reference Paper-1: A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
Author’s Name: Kishore Rajendiran, Radha Sankararajan, and Ramasamy Palaniappan
Source: ETRI Journal
Year: 2011

Reference Paper-2: Comparative Study of Hyperelliptic Curve Cryptosystem over Prime Field and Its Survey
Author’s Name: P. Vijayakumar, V. Vijayalakshmi and G. Zayaraz
Source: International Journal of Hybrid Information Technology
Year: 2014

Request source code for academic purpose, fill REQUEST FORM below,
www.verilogcourseteam.com/request-form

You may contact +91 7904568456 by WhatsApp Chat, for paid services.
We are available on Telegram and Signal.

Visit Website: www.verilogcourseteam.com/

Visit Our Social Media
Like our Facebook Page: www.facebook.com/VerilogCourseTeam/
Subscribe: youtube.com/verilogcourseteamelectricalprojects
Subscribe: youtube.com/verilogcourseteammatlabproject
Subscribe: youtube.com/verilogcourseteam

コメント