Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.9.06Keywords:
Digital Signature Algorithms, Energy-aware security, Network Security, Internet-of-Things.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Ensuring security, integrity, and energy efficiency in Internet of Things (IoT) networks is a critical challenge due to the resource constraints of IoT devices. Traditional digital signature algorithms such as RSA, ECDSA, and EdDSA provide security but often lack energy optimization, making them inefficient for large-scale IoT deployments. To address these challenges, this research proposes an Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm (EECDSA) for universal IoT networks. EECDSA enhances conventional ECDSA by integrating three novel functional modules: Lightweight Context Sensitivity Imposer (LCSI), Adaptive Computational Complexity Overseer (ACCO), and Energy-aware ECDSA Signer (EAES). These modules dynamically adjust security parameters based on contextual sensitivity, optimize computational complexity to balance security and resource consumption, and ensure energy-efficient digital signing in IoT environments. The proposed method is evaluated using OPNET simulations, measuring both security and network performance metrics, including Accuracy, Precision, Sensitivity, Specificity, F-Score, Throughput, Latency, Jitter, Energy Consumption, Packet Delivery Ratio, and Security Levels. Experimental results demonstrate that EECDSA outperforms existing security solutions, achieving higher security resilience (99.55%), reduced energy consumption (511.6mJ), and improved network performance. These findings validate EECDSA as an efficient and scalable security mechanism for IoT ecosystems.Abstract
How to Cite
Downloads
Similar Articles
- Raja S, Nagarajan L., Hybridization of bio-inspired algorithms with machine learning models for predicting the risk of type 2 diabetes mellitus , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pravin P. P, J. Arunshankar, Development of digital twin for PMDC motor control loop , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Ratnakaram Raghavendra, Saila K. A. Reddy, Exploring cosmic ray energy loss mechanisms: Insights from Bethe-Bloch, modified bethe-bloch, and inverse compton scattering equations , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Prince Williams, Nilesh M. Patil, Allanki S. Rao, Chandra M. V. S. Akana, K. Soujanya, Aakansha M. Steele, Transformative effects of connectivity technologies on urban infrastructure and services in smart cities , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Aruljothi Rajasekaran, Jemima Priyadarsini R., ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- V Vijayaraj, M. Balamurugan, Monisha Oberai, Machine learning approaches to identify the data types in big data environment: An overview , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- A. Sandanasamy, P. Joseph Charles, Distributed SDN control for IoT networks: A federated meta reinforcement learning solution for load balancing , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper

