ENCRYPTION SCHEME
Message to be encrypted and ECC curve generation using an ECC equation
Clustering of nodes by fuzzy c- means algorithm
Generation of key shares using
CRT
Routing of the message to find the efficient path and the constraint of
timestamp is added
Using the ASCII value of the character in the message, that has to be
embedded as the scalar quantity
Source node’s identity(key share) is multiplied with the scalar using
the optimized point
Character mapped to the point obtained is the encrypted text
The following section will give an explanation of the scheme using an
illustration.
VI. PROPOSED SCHEME: EXPLANATION AND ILLUSTRATION
The explanation of the proposed scheme with an illustration is given as
follows.