Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.9.06Keywords:
Digital Signature Algorithms, Energy-aware security, Network Security, Internet-of-Things.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Ensuring security, integrity, and energy efficiency in Internet of Things (IoT) networks is a critical challenge due to the resource constraints of IoT devices. Traditional digital signature algorithms such as RSA, ECDSA, and EdDSA provide security but often lack energy optimization, making them inefficient for large-scale IoT deployments. To address these challenges, this research proposes an Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm (EECDSA) for universal IoT networks. EECDSA enhances conventional ECDSA by integrating three novel functional modules: Lightweight Context Sensitivity Imposer (LCSI), Adaptive Computational Complexity Overseer (ACCO), and Energy-aware ECDSA Signer (EAES). These modules dynamically adjust security parameters based on contextual sensitivity, optimize computational complexity to balance security and resource consumption, and ensure energy-efficient digital signing in IoT environments. The proposed method is evaluated using OPNET simulations, measuring both security and network performance metrics, including Accuracy, Precision, Sensitivity, Specificity, F-Score, Throughput, Latency, Jitter, Energy Consumption, Packet Delivery Ratio, and Security Levels. Experimental results demonstrate that EECDSA outperforms existing security solutions, achieving higher security resilience (99.55%), reduced energy consumption (511.6mJ), and improved network performance. These findings validate EECDSA as an efficient and scalable security mechanism for IoT ecosystems.Abstract
How to Cite
Downloads
Similar Articles
- P S Renjeni, B Senthilkumaran, Ramalingam Sugumar, L. Jaya Singh Dhas, Gaussian kernelized transformer learning model for brain tumor risk factor identification and disease diagnosis , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- K Sreenivasulu, Sameer Yadav, G Pushpalatha, R Sethumadhavan, Anup Ingle, Romala Vijaya, Investigating environmental sustainability applications using advanced monitoring systems , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sharanya Unnikrishnan, Eldhose Thomas, Arunima Dey, AI-Powered NLP in Vernacular Public Relations: Opportunities, Challenges, and Ethical Implications for India’s Multilingual Landscape , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- K. Gokulkannan, M. Parthiban, Jayanthi S, Manoj Kumar T, Cost effective cloud-based data storage scheme with enhanced privacy preserving principles , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Thilagavathi K, Thankamani K., P. Shunmugapriya, D. Prema, Navigating fake reviews in online marketing: Innovative strategies for authenticity and trust in the digital age , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Bayelign A. Zelalem, Ayalew A. Abebe, Evaluating supply chain management practice among micro and small manufacturing enterprise in southwest, Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- A. Jabeen, A. R. M. Shanavas, Hazard regressive multipoint elitist spiral search optimization for resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 3 4 5 6 7 8 9 10 11 12 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper

