SciELO - Scientific Electronic Library Online

 
vol.18 issue41Calibration of weather radar imagesImprovement of the ATPM technique for interference reduction in systems of broadband by power line in residences author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • On index processCited by Google
  • Have no similar articlesSimilars in SciELO
  • On index processSimilars in Google

Share


Tecnura

Print version ISSN 0123-921X

Abstract

VERA PARRA, Nelson Enrique; ALFONSO LOPEZ, Danilo  and  MANTA CARO, Héctor Cristyan. Simulation test-bed for the evaluation of elliptic curve cryptography on next generation wireless IPv6-enabled networks. Tecnura [online]. 2014, vol.18, n.41, pp.27-37. ISSN 0123-921X.

Currently, mobile networks and next generation wireless networks such as, IPv6 low-power Wireless Personal Area networks 6LoWPAN, wireless sensor networks and hierarchical mobile networks in IPv6, are under rigorous research and development, thereforethose networks represent the next step in the evolution of the Machine-to-Machine M2M networks, while supporting broadband access for the next generation of intelligent systems, technologies and future Internet. These next generation networks impose restrictions on the processing power, bandwidth and energy resources, which represents a major constraint in the implementation of security mechanisms. In this regard, in recent years there have been various proposals for key management, digital signature procedures and data encryption based on elliptic and hyper-elliptic curves, to achieve levels of safety equivalent to conventional algorithms based on Diffie-Hellman and Rivest-Shamir-Adleman RSA, but reducing the key length and thus the computational and network resources. This paper reviews algorithms based on Elliptic Curves Cryptography ECC and their application to IPv6-enabled new generation wireless networks. This paper also describes a simulation test-bed for the evaluation of ECC, where we compare computational resources required and limitations for lightweight security mechanisms in secure neighbor discovery, and DNS security extensions.

Keywords : Cryptography; elliptic curves; information security; wireless networks.

        · abstract in Spanish     · text in Spanish     · Spanish ( pdf )