Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.9.06Keywords:
Digital Signature Algorithms, Energy-aware security, Network Security, Internet-of-Things.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Ensuring security, integrity, and energy efficiency in Internet of Things (IoT) networks is a critical challenge due to the resource constraints of IoT devices. Traditional digital signature algorithms such as RSA, ECDSA, and EdDSA provide security but often lack energy optimization, making them inefficient for large-scale IoT deployments. To address these challenges, this research proposes an Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm (EECDSA) for universal IoT networks. EECDSA enhances conventional ECDSA by integrating three novel functional modules: Lightweight Context Sensitivity Imposer (LCSI), Adaptive Computational Complexity Overseer (ACCO), and Energy-aware ECDSA Signer (EAES). These modules dynamically adjust security parameters based on contextual sensitivity, optimize computational complexity to balance security and resource consumption, and ensure energy-efficient digital signing in IoT environments. The proposed method is evaluated using OPNET simulations, measuring both security and network performance metrics, including Accuracy, Precision, Sensitivity, Specificity, F-Score, Throughput, Latency, Jitter, Energy Consumption, Packet Delivery Ratio, and Security Levels. Experimental results demonstrate that EECDSA outperforms existing security solutions, achieving higher security resilience (99.55%), reduced energy consumption (511.6mJ), and improved network performance. These findings validate EECDSA as an efficient and scalable security mechanism for IoT ecosystems.Abstract
How to Cite
Downloads
Similar Articles
- V Vijayaraj, M. Balamurugan, Monisha Oberai, Machine learning approaches to identify the data types in big data environment: An overview , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Neeraj ., Anita Singhrova, Quantum Key Distribution-based Techniques in IoT , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- A. Sandanasamy, P. Joseph Charles, Distributed SDN control for IoT networks: A federated meta reinforcement learning solution for load balancing , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Mohamed Azharudheen A, Vijayalakshmi V, Improvement of data analysis and protection using novel privacy-preserving methods for big data application , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- P. Pattunnarajam, Janani G, A. Vijayaraj, Sathiya Priya S, Enhanced routing strategy of wireless sensor network based on fifth generation communication technology , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Josephine Theresa S, Graph Neural Network Ensemble with Particle Swarm Optimization for Privacy-Preserving Thermal Comfort Prediction , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper

