SciELO - Scientific Electronic Library Online

 
vol.18 número41Calibración de imágenes de radares meteorológicosMejoramiento de la técnica ATPM para reducción de interferencia en sistemas de banda ancha por línea de potencia en residencias índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • En proceso de indezaciónCitado por Google
  • No hay articulos similaresSimilares en SciELO
  • En proceso de indezaciónSimilares en Google

Compartir


Tecnura

versión impresa ISSN 0123-921X

Resumen

VERA PARRA, Nelson Enrique; ALFONSO LOPEZ, Danilo  y  MANTA CARO, Héctor Cristyan. Simulation test-bed for the evaluation of elliptic curve cryptography on next generation wireless IPv6-enabled networks. Tecnura [online]. 2014, vol.18, n.41, pp.27-37. ISSN 0123-921X.

Currently, mobile networks and next generation wireless networks such as, IPv6 low-power Wireless Personal Area networks 6LoWPAN, wireless sensor networks and hierarchical mobile networks in IPv6, are under rigorous research and development, thereforethose networks represent the next step in the evolution of the Machine-to-Machine M2M networks, while supporting broadband access for the next generation of intelligent systems, technologies and future Internet. These next generation networks impose restrictions on the processing power, bandwidth and energy resources, which represents a major constraint in the implementation of security mechanisms. In this regard, in recent years there have been various proposals for key management, digital signature procedures and data encryption based on elliptic and hyper-elliptic curves, to achieve levels of safety equivalent to conventional algorithms based on Diffie-Hellman and Rivest-Shamir-Adleman RSA, but reducing the key length and thus the computational and network resources. This paper reviews algorithms based on Elliptic Curves Cryptography ECC and their application to IPv6-enabled new generation wireless networks. This paper also describes a simulation test-bed for the evaluation of ECC, where we compare computational resources required and limitations for lightweight security mechanisms in secure neighbor discovery, and DNS security extensions.

Palabras clave : Cryptography; elliptic curves; information security; wireless networks.

        · resumen en Español     · texto en Español     · Español ( pdf )