Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication

被引:3
|
作者
Huang, Xu [1 ]
Sharma, Dharmendra [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
关键词
Elliptic curve cryptography (ECC); scalar multiplication; non-adjacent form; slide window; fuzzy controller;
D O I
10.1109/APCC.2010.5679992
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid progress of wireless communications and embedded micro-electro-mechanical systems technologies has made wireless sensor networks (WSN) possible. However, the security of the WSN becomes one of the major concerns in its applications. Elliptic curve cryptography (ECC) prominently provides solid potential for wireless sensor network security due to its small key size and its high security strength. However, there is a urgent need to reduce key calculation time to satisfy the full range of potential applications, in particularly for those applications involved wireless sensor networks (WSN). It is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present a fuzzy controller for a dynamic window sizing to allow the calculation processing to run under optimum conditions by balanced case allocating available RAM and ROM at the sensor node within a wireless sensor network. The whole quality of Service (QoS) is improved, in particular the power consuming is more efficiently. The simulation results showed that the average calculation time decreased by approximately 15% in comparison to traditional algorithms in an ECC wireless sensor network
引用
收藏
页码:458 / 463
页数:6
相关论文
共 50 条
  • [41] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    [J]. 2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170
  • [42] An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks
    Oladipupo, Esau Taiwo
    Abikoye, Oluwakemi Christiana
    Imoize, Agbotiname Lucky
    Awotunde, Joseph Bamidele
    Chang, Ting-Yi
    Lee, Cheng-Chi
    Do, Dinh-Thuan
    [J]. IEEE ACCESS, 2023, 11 : 1306 - 1323
  • [43] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [44] Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform
    Gulen, Utku
    Baktir, Selcuk
    [J]. SENSORS, 2020, 20 (05)
  • [45] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [46] Low-Latency Elliptic Curve Scalar Multiplication
    Bos, Joppe W.
    [J]. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2012, 40 (05) : 532 - 550
  • [47] Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
    Robert, Jean-Marc
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 445 - 462
  • [48] Elliptic Curve Scalar Multiplication with x-Coordinate
    ZHANG Ning1
    2. Ministry of Education Key Laboratory of Computer Networks and Information Security
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 163 - 166
  • [49] Analysis of Elliptic Curve Scalar Multiplication in Secure Communications
    Thomas, Christina
    Sheela, K. Gnana
    [J]. 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 611 - 615
  • [50] Pipelined computation of scalar multiplication in elliptic curve cryptosystems
    Mishra, PK
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 328 - 342