https://jjcit.org/paper/154 ED25519: A NEW SECURE COMPATIBLE ELLIPTIC CURVE FOR MOBILE WIRELESS NETWORK SECURITY 10.5455/jjcit.71-1636268309 Mausam Das,Zenghui Wang Domain name system security extension (DNSSEC),Secure real-time transport protocol (SRTP),Secure/Multipurpose internet mail extension (S/MIME),Spectrum-aware degree-ranking-based energy-efficient clustering (SDEC),Advance virtual RISC (Reduced instruction set computing (AVR)),Twisted Edwards curve (TE),Weierstrass curve (WEI) 1 2911 667 7-Nov.-2021 9-Jan.-2022 24-Jan.-2022 Wireless Sensor Networks (WSNs) create various security threats, such as application variance in different sectors along with the model of cryptographic primitivity and necessity. Despite modernistic evolution, the skillful utilization of Elliptic Curve Cryptography (ECC) for WSNs is a very progressive investigation topic and approaches to reduce the time and intensity cost. Security of ECC commits on the hardness of the Elliptic Curve Discrete Logarithm Problem. Many elliptic curve standards are available, such as ANSI X9.62, NIST FIPS 186-2 …etc. Due to some drawbacks in NIST curves associated with security matters, it is important to investigate for secure alternatives. In our work, we will select ????????25519 (Edwards curve) at the 128-bit security level and contrast it with Weierstraß curve (also known as Weierstrass curve). To complete the field-calculation functions, we utilize a radix-24 , which illustrates the operands with MoTE-ECC for Memsic’s MICAz motes over Optimal Prime Fields (OPFs) of variable size; e.g. 160, 192, 224 and 225 bits. We take ECDH (Elliptic-curve Diffie–Hellman) key interchange among two nodes where every node needs two scalar multiplications to execute. The scalar multiplication over twisted Edwards curve utilizes a comb technique to establish base point and utilizes extended projective coordinates for point summation. Our implementation shows that an ECDH takes 18.20 mJ energy consumption over 160-bit OPF, which is performing better than AVR-based sensor node. The advantages of our proposed method will grant advance security and power consumption and diminish communication burden through key management.