SciELO - Scientific Electronic Library Online

 
vol.18 número41Calibration of weather radar imagesImprovement of the ATPM technique for interference reduction in systems of broadband by power line in residences índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Journal

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Não possue artigos similaresSimilares em SciELO
  • Em processo de indexaçãoSimilares em Google

Compartilhar


Tecnura

versão impressa ISSN 0123-921X

Resumo

VERA PARRA, Nelson Enrique; ALFONSO LOPEZ, Danilo  e  MANTA CARO, Héctor Cristyan. Simulation test-bed for the evaluation of elliptic curve cryptography on next generation wireless IPv6-enabled networks. Tecnura [online]. 2014, vol.18, n.41, pp.27-37. ISSN 0123-921X.

Currently, mobile networks and next generation wireless networks such as, IPv6 low-power Wireless Personal Area networks 6LoWPAN, wireless sensor networks and hierarchical mobile networks in IPv6, are under rigorous research and development, thereforethose networks represent the next step in the evolution of the Machine-to-Machine M2M networks, while supporting broadband access for the next generation of intelligent systems, technologies and future Internet. These next generation networks impose restrictions on the processing power, bandwidth and energy resources, which represents a major constraint in the implementation of security mechanisms. In this regard, in recent years there have been various proposals for key management, digital signature procedures and data encryption based on elliptic and hyper-elliptic curves, to achieve levels of safety equivalent to conventional algorithms based on Diffie-Hellman and Rivest-Shamir-Adleman RSA, but reducing the key length and thus the computational and network resources. This paper reviews algorithms based on Elliptic Curves Cryptography ECC and their application to IPv6-enabled new generation wireless networks. This paper also describes a simulation test-bed for the evaluation of ECC, where we compare computational resources required and limitations for lightweight security mechanisms in secure neighbor discovery, and DNS security extensions.

Palavras-chave : Cryptography; elliptic curves; information security; wireless networks.

        · resumo em Espanhol     · texto em Espanhol     · Espanhol ( pdf )