Dynamic Window with Fuzzy Controller in Wireless Sensor Networks for Elliptic Curve Cryptography

被引:0
|
作者
Huang, Xu [1 ]
Sharma, Dharmendra [1 ]
Shah, Pritam Gajkumar [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
关键词
Elliptic curve cryptography (ECC); scalar multiplication; non-adjacent form; slide window; fuzzy control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Elliptic curve cryptosystem (ECC) was proposed by Miller [10] and Koblitz [9] which relies on the difficulty of elliptic curve discrete logarithmic problem (ECDLP). It is gaining wide acceptance as an alternative to the conventional public key cryptosystem such as RSA [24], DSA [25], DH [26]. Also it is noted that the wireless sensor networks (WSN) based on the rapid progress of wireless communications and embedded micro electro mechanical systems technologies are becoming important part in our daily life. The security of the WSN becomes one of the major concerns in its applications. Even ECC prominently offers great potential benefits for WSN security there is still a lot of work needs to be done due to WSN has very restraint running conditions such as limited energy source, capability of computing, etc. It is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 18% in comparison to our previous algorithms in an ECC wireless sensor network [23].
引用
收藏
页码:2342 / 2349
页数:8
相关论文
共 50 条
  • [1] Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication
    Huang, Xu
    Sharma, Dharmendra
    [J]. 2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 2010, : 458 - 463
  • [2] Optimized Elliptic Curve Cryptography for Wireless Sensor Networks
    Bala, Suman
    Sharma, Gaurav
    Verma, Anil K.
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 89 - 94
  • [3] Elliptic Curve Cryptography with Security System in Wireless Sensor Networks
    Huang, Xu
    Sharma, Dharmendra
    [J]. IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES, VOL 5, 2010, 1285 : 519 - 531
  • [4] A Fast Window-based Scalar Multiplication Algorithm for Elliptic Curve Cryptography in Wireless Sensor Networks
    Ye, Hung-Nan
    Wang, Kuochen
    Jan, Rong-Hong
    Hu, Yuh-Jyh
    Tseng, Yu-Chee
    Hsu, Yi-Huai
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1646 - 1655
  • [5] Security approaches based on elliptic curve cryptography in wireless sensor networks
    Salah, Mohammed Said
    Maizate, Abderrahim
    Ouzzif, Mohammed
    [J]. 2015 27TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2015, : 35 - 38
  • [6] TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    Liu, An
    Ning, Peng
    [J]. 2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2008, : 245 - 256
  • [7] Performance Evaluation of RSA and Elliptic Curve Cryptography in Wireless Sensor Networks
    Kardi, Amine
    Zagrouba, Rachid
    Alqahtani, Mohammed
    [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [8] Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks
    Vijayalakshmi, V.
    Palanivelu, T. G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 255 - 261
  • [9] Low-cost elliptic curve cryptography for wireless sensor networks
    Batina, Lejla
    Mentens, Nele
    Sakiyama, Kazuo
    Preneel, Bart
    Verbauwhede, Ingrid
    [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 6 - +
  • [10] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    [J]. 2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170