Title :
Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks
Author :
Huang, Xu ; Sharma, Dharmendra ; Cui, Hongyan
Author_Institution :
Fac. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT, Australia
Abstract :
Elliptic curve cryptosystem (ECC) has been becoming very popular in wireless sensor networks after proposed by Miller [10] and Koblitz [9] that relies on the difficulty of elliptic curve discrete logarithmic problem (ECDLP). It is gaining wide acceptance as an alternative to the conventional public key cryptosystem such as RSA [24], DSA [25], DH [26]. However, the security of the WSN becomes one of the major concerns in its applications. Even ECC prominently offers great potential benefits for WSN security there is still a lot of work needs to be done due to WSN has very restraint running conditions such as limited energy source, capability of computing, etc. As we know that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 18.5% in comparison to our previous algorithms in an ECC wireless sensor network [23].
Keywords :
fuzzy control; public key cryptography; quality of service; telecommunication security; wireless sensor networks; elliptic curve cryptography; elliptic curve cryptosystem; elliptic curve discrete logarithmic problem; fuzzy controlling window; public key cryptosystem; quality of service; scalar multiplication operation; wireless sensor network motes; wireless sensor networks; Elliptic curve cryptography; Elliptic curves; Equations; Hamming weight; Quality of service; Wireless sensor networks; Elliptic curve cryptography (ECC); fuzzy control; non-adjacent form; scalar multiplication; slide window;
Conference_Titel :
Information Networking (ICOIN), 2012 International Conference on
Conference_Location :
Bali
Print_ISBN :
978-1-4673-0251-7
DOI :
10.1109/ICOIN.2012.6164416