Dynamic Window with Fuzzy Controller in Wireless Sensor Networks for Elliptic Curve Cryptography

被引:0
|
作者
Huang, Xu [1 ]
Sharma, Dharmendra [1 ]
Shah, Pritam Gajkumar [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
关键词
Elliptic curve cryptography (ECC); scalar multiplication; non-adjacent form; slide window; fuzzy control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Elliptic curve cryptosystem (ECC) was proposed by Miller [10] and Koblitz [9] which relies on the difficulty of elliptic curve discrete logarithmic problem (ECDLP). It is gaining wide acceptance as an alternative to the conventional public key cryptosystem such as RSA [24], DSA [25], DH [26]. Also it is noted that the wireless sensor networks (WSN) based on the rapid progress of wireless communications and embedded micro electro mechanical systems technologies are becoming important part in our daily life. The security of the WSN becomes one of the major concerns in its applications. Even ECC prominently offers great potential benefits for WSN security there is still a lot of work needs to be done due to WSN has very restraint running conditions such as limited energy source, capability of computing, etc. It is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 18% in comparison to our previous algorithms in an ECC wireless sensor network [23].
引用
收藏
页码:2342 / 2349
页数:8
相关论文
共 50 条
  • [31] A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
    Zhang, Yuanyuan
    Kumar, Neeraj
    Chen, Jianhua
    Rodrigues, Joel J. P. C.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3944 - 3951
  • [32] Improved Energy-Efficient Access Control Scheme for Wireless Sensor Networks Based on Elliptic Curve Cryptography
    Chi, Ling
    Hu, Liang
    Li, Hong-Tu
    Sun, Yu
    Yuan, Wei
    Chu, Jian-Feng
    SENSOR LETTERS, 2013, 11 (05) : 953 - 957
  • [33] An Improved Two-Factor User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography
    Li, Chun-Ta
    Lee, Cheng-Chi
    Lee, Chin-Wen
    SENSOR LETTERS, 2013, 11 (05) : 958 - 965
  • [34] Efficient Prime-Field Arithmetic for Elliptic Curve Cryptography on Wireless Sensor Nodes
    Zhang, Yang
    Grossschaedl, Johann
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 459 - 466
  • [35] New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography
    Hamed, Amr I.
    El-Khamy, Said E.
    NRSC: 2009 NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2009, VOLS 1 AND 2, 2009, : 454 - 466
  • [36] A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
    Jiang, Qi
    Kumar, Neeraj
    Ma, Jianfeng
    Shen, Jian
    He, Debiao
    Chilamkurti, Naveen
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2017, 27 (03)
  • [37] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [38] EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN WIRELESS SENSORS
    Aranha, Diego F.
    Dahab, Richardo
    Lopez, Julio
    Oliveira, Leonardo B.
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (02) : 169 - 187
  • [39] Next generation security for wireless: elliptic curve cryptography
    Vanstone, SA
    COMPUTERS & SECURITY, 2003, 22 (05) : 412 - 415
  • [40] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998