European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals


An Energy-Efficient ECC Scheme for Wireless Sensor Networks (Published)

The field of wireless sensor networks (WSNs) combines sensing, computation, and communication into a single tiny device called a sensor. Sensors are equipped with RF radio, processor, memory and hardware. They are also battery powered and therefore have severe energy, bandwidths and memory constraints, and low computational capability. Communication over WSNs is still known to be attack-prone because the constraints of sensors hinder the development of secure modern cryptographic solutions. The Elliptic Curve Cryptography (ECC) technique and the Rivest Shamir Adleman (RSA) algorithm are the two most popular public key cryptographic schemes deployed over wireless networks. The effectiveness of the ECC technique over RSA has been demonstrated in this research. While ECC with very large key sizes is thought to be computationally expensive, it is possible to use smaller primes, or smaller finite fields, with elliptic curves and achieve a level of security comparable to that for much larger integer mod n. Measurements have been made to prove that ECC algorithms can be executed within the memory limits of sensor nodes. An enhanced ECC scheme with collision resistant hash functions is proposed in this research.

Keywords: ECC, RSA, Security, Wireless Sensor Networks, communication, sensors

A Framework for Security of Data in Telemedicine (Published)

One of the challenges of telemedicine as observed in the literature is the issue of insecurity of data. This has come with its attendant lack of confidentiality and data integrity, the attributes most needed in medical records. An attempt to proffer solution to this problem is in the design of a framework comprising Rivest, Shamir and Adleman (RSA) cipher combined with the F4 frequency domain steganography algorithm. The framework is demonstrated with a simulated scenario. Complicated though this integration seems to be, the foolproof security offered outweighs the computational complexity.

Keywords: Confidentiality, Cryptography, F4, Integrity, RSA, Security, Steganography, telemedicine


Wireless Sensor Network (WSN) assists to communicate with limited frequency and bandwidth through the group of independent nodes. WSN has an extensive application in both industrial and commercial areas to manage peril environments incorporating nuclear power plants and wilderness areas. Cryptography is used for writing secret code and it is an ancient technique. Moreover Cryptography is required in data and telecommunications in order to communicate with unreliable medium especially in the internet. Cryptography technique is classified in several ways but for this paper, the technique will be classified on the basis of number of keys used for decryption and encryption. Elliptic Curve Cryptography is an efficient technique in providing security solution for wireless networks. As compared with traditional public key cryptography such as RSA, eclipse curve cryptography attains better result in providing security services. The findings reported that the newly developed protocol was more scalable, less weight and required less memory compared to symmetric based cryptography. This paper concludes that Cryptography is one such technique to confront security problems in WSN. However cryptography alone is not enough to confront WSN problems. It is essential to use the key management process carefully in order to achieve higher security system networks

Keywords: Cryptography, Elliptic Curve Cryptography, RSA, Wireless Sensor Network, system networks

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.