Dynamic Window with Fuzzy Controller in Wireless Sensor Networks for Elliptic Curve Cryptography

被引:0
|
作者
Huang, Xu [1 ]
Sharma, Dharmendra [1 ]
Shah, Pritam Gajkumar [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
关键词
Elliptic curve cryptography (ECC); scalar multiplication; non-adjacent form; slide window; fuzzy control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Elliptic curve cryptosystem (ECC) was proposed by Miller [10] and Koblitz [9] which relies on the difficulty of elliptic curve discrete logarithmic problem (ECDLP). It is gaining wide acceptance as an alternative to the conventional public key cryptosystem such as RSA [24], DSA [25], DH [26]. Also it is noted that the wireless sensor networks (WSN) based on the rapid progress of wireless communications and embedded micro electro mechanical systems technologies are becoming important part in our daily life. The security of the WSN becomes one of the major concerns in its applications. Even ECC prominently offers great potential benefits for WSN security there is still a lot of work needs to be done due to WSN has very restraint running conditions such as limited energy source, capability of computing, etc. It is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 18% in comparison to our previous algorithms in an ECC wireless sensor network [23].
引用
收藏
页码:2342 / 2349
页数:8
相关论文
共 50 条
  • [41] A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Liu, Pin-Chuan
    Kim, Tai-Hoo
    Wei, Hsin-Wen
    SENSORS, 2011, 11 (05) : 4767 - 4779
  • [42] Centralised conference key mechanism with elliptic curve cryptography and Lagrange interpolation for sensor networks
    Deng, D. -J.
    Guo, M. -H.
    IET COMMUNICATIONS, 2011, 5 (12) : 1727 - 1731
  • [43] A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography
    Dai, Cong
    Xu, Zhongwei
    AD HOC NETWORKS, 2022, 127
  • [44] Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes
    Liu, Zhe
    Seo, Hwajeong
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3301 - 3310
  • [45] Elliptic-curve cryptography for wireless sensor network nodes without hardware multiplier support
    Gulen, Utku
    Baktir, Selcuk
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4992 - 5002
  • [46] A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks
    Boumerzoug, Hayette
    Bensaber, Boucif Amar
    Biskri, Ismail
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1831 - 1847
  • [47] Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography
    Khajuria, Samant
    Tange, Henrik
    2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 713 - +
  • [48] Sensor data cryptography in wireless sensor networks
    Aysal, Tuncer Can
    Barner, Kenneth E.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) : 273 - 289
  • [49] Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things
    Maurya A.K.
    Sastry V.N.
    Information (Switzerland), 2017, 8 (04)
  • [50] A Novel Fast η-Adapt Slide Window Elliptic Curve Cryptography Algorithm
    Shi, Hongxia
    Ouyang, Yi
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 56 - +