Rajkumar, Sujatha

Link to this page

Authority KeyName Variants
5d484f78-38b9-411c-ac4e-b8684bfaf4a9
  • Rajkumar, Sujatha (1)
Projects
No records found.

Author's Bibliography

Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN

Radović, Vesela; Rajkumar, Sujatha

(Spreinger Wireless Personal Communications, 2023)

TY  - JOUR
AU  - Radović, Vesela
AU  - Rajkumar, Sujatha
PY  - 2023
UR  - http://rimsi.imsi.bg.ac.rs/handle/123456789/2702
AB  - For long-range communication, Long-Range Wide Area Network (LoRaWAN) is the appropriate media access layer protocol. This LoRaWAN protocol connects the end devices and the application server through the gateways. The end devices can join the LoRaWAN network by following two processes such as Over-The-Air-Activation (OTAA) and Activation-By-Personalization (ABP). The joining request from the end devices is unencrypted during the process of OTAA. So, to improve the joining process in OTAA, joining requests from the end devices are encrypted using the improved elliptic curve cryptography (ECC) in this paper. To enhance the performance of ECC, the private key is selected optimally using the Artificial Flora (AF) algorithm. AF algorithm solves some complex, non-linear, discrete optimization problems. The proposed novel method of AF-based ECC (AF-ECC) performance outperforms conventional ECC based on latency, timeout messages, and throughput, which is depicted in simulation results.
PB  - Spreinger Wireless Personal Communications
T2  - Wireless Personal Communications
T1  - Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN
EP  - 17
IS  - 3
SP  - 1
VL  - 129
DO  - 10.1007/s11277-022-10095-4
ER  - 
@article{
author = "Radović, Vesela and Rajkumar, Sujatha",
year = "2023",
abstract = "For long-range communication, Long-Range Wide Area Network (LoRaWAN) is the appropriate media access layer protocol. This LoRaWAN protocol connects the end devices and the application server through the gateways. The end devices can join the LoRaWAN network by following two processes such as Over-The-Air-Activation (OTAA) and Activation-By-Personalization (ABP). The joining request from the end devices is unencrypted during the process of OTAA. So, to improve the joining process in OTAA, joining requests from the end devices are encrypted using the improved elliptic curve cryptography (ECC) in this paper. To enhance the performance of ECC, the private key is selected optimally using the Artificial Flora (AF) algorithm. AF algorithm solves some complex, non-linear, discrete optimization problems. The proposed novel method of AF-based ECC (AF-ECC) performance outperforms conventional ECC based on latency, timeout messages, and throughput, which is depicted in simulation results.",
publisher = "Spreinger Wireless Personal Communications",
journal = "Wireless Personal Communications",
title = "Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN",
pages = "17-1",
number = "3",
volume = "129",
doi = "10.1007/s11277-022-10095-4"
}
Radović, V.,& Rajkumar, S.. (2023). Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN. in Wireless Personal Communications
Spreinger Wireless Personal Communications., 129(3), 1-17.
https://doi.org/10.1007/s11277-022-10095-4
Radović V, Rajkumar S. Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN. in Wireless Personal Communications. 2023;129(3):1-17.
doi:10.1007/s11277-022-10095-4 .
Radović, Vesela, Rajkumar, Sujatha, "Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN" in Wireless Personal Communications, 129, no. 3 (2023):1-17,
https://doi.org/10.1007/s11277-022-10095-4 . .
1