Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication

被引:3
|
作者
Huang, Xu [1 ]
Sharma, Dharmendra [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
关键词
Elliptic curve cryptography (ECC); scalar multiplication; non-adjacent form; slide window; fuzzy controller;
D O I
10.1109/APCC.2010.5679992
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid progress of wireless communications and embedded micro-electro-mechanical systems technologies has made wireless sensor networks (WSN) possible. However, the security of the WSN becomes one of the major concerns in its applications. Elliptic curve cryptography (ECC) prominently provides solid potential for wireless sensor network security due to its small key size and its high security strength. However, there is a urgent need to reduce key calculation time to satisfy the full range of potential applications, in particularly for those applications involved wireless sensor networks (WSN). It is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present a fuzzy controller for a dynamic window sizing to allow the calculation processing to run under optimum conditions by balanced case allocating available RAM and ROM at the sensor node within a wireless sensor network. The whole quality of Service (QoS) is improved, in particular the power consuming is more efficiently. The simulation results showed that the average calculation time decreased by approximately 15% in comparison to traditional algorithms in an ECC wireless sensor network
引用
收藏
页码:458 / 463
页数:6
相关论文
共 50 条
  • [31] Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks
    Vijayalakshmi, V.
    Palanivelu, T. G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 255 - 261
  • [32] Low-cost elliptic curve cryptography for wireless sensor networks
    Batina, Lejla
    Mentens, Nele
    Sakiyama, Kazuo
    Preneel, Bart
    Verbauwhede, Ingrid
    [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 6 - +
  • [33] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
    Jiang, Kun
    Zhao, Bing
    Shan, Weijun
    Wang, Lihui
    Liu, Jing
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236
  • [34] Efficient multiplication in GF(pk) for elliptic curve cryptography
    Bajard, JC
    Imbert, L
    Nègre, C
    Plantard, T
    [J]. 16TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC, PROCEEDINGS, 2003, : 181 - 187
  • [35] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [36] Hardware Design and Implementation of Scalar Multiplication in Elliptic Curve Cryptography (ECC) over GF (2163) on FPGA
    Imran, Malik
    Kashif, Muhammad
    Rashid, Muhammad
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [37] Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography
    Nogami, Yasuyuki
    Sakemi, Yumi
    Okimoto, Takumi
    Nekado, Kenta
    Akane, Masataka
    Morikawa, Yoshitaka
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 182 - 189
  • [38] Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography
    Menandas, Josepha J.
    Christo, Mary Subaja
    [J]. 2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [39] Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip
    Wang, Xiang
    Wang, Liping
    Bai, Yuanchen
    He, Zhenxue
    Wang, Tao
    Xu, Bin
    Zhang, He
    Wang, Xiaocui
    Zhou, Cheng
    Wang, Weike
    Du, Pei
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1397 - 1401
  • [40] The advantages of elliptic curve cryptography for wireless security
    Lauter, K
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67