INTERNATIONAL JOURNAL OF ENGINEERING, SCIENCE AND - Volume 6, Issue 6, October 2017
Pages: 125-130
Print Article
Download XML Download PDF
ECC Algorithm for WSN
Author: Vivek Soi, B.S Dhaliwal, Mahinder Kumar
Category: Engineering, Science and Mathematics
Abstract:
Elliptic curve cryptography (ECC) has been attractive to the people who are working in the field of the network security due to its good potential for wireless sensor network security due to its smaller key size and its high strength of security. But there is a room to reduce the key calculation time to meet the potential applications, in particular for wireless sensor networks (WSN). It is well known that scalar multiplication is the operation in elliptical curve cryptography which takes 80% of key calculation time on wireless sensor network motes. In this paper, the research proposes algorithm based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency of scalar multiplication.
Index Terms—Elliptic curve cryptography, Scalar multiplication, Non-adjacent form, Hamming weight, one’s complement subtraction, ROM, wireless sensor networks
Keywords: Elliptic curve cryptography, Scalar multiplication, Non-adjacent form, Hamming weight, one’s complement subtraction, ROM, wireless sensor networks
References:
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.
- C. Chung-Kuo, J. M. Overhage, and J. Huang, "An application of sensor networks for syndromic surveillance," 2005, pp. 191-196.
- G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, and M. Welsh, "Deploying a wireless sensor network on an active volcano," IEEE Internet Computing, vol. 10, pp. 18-25, 2006.
- B. Sinopoli, C. Sharp, L. Schenato, S. Schaffert, and S. S. Sastry, "Distributed control applications within sensor networks," Proceedings of the IEEE, vol. 91, pp. 1235-1246, 2003.
- D. L. Stephens, Jr. and A. J. Peurrung, "Detection of moving radioactive sources using sensor networks," Nuclear Science, IEEE Transactions on, vol. 51, pp. 2273-2278, 2004.
- P. Sikka, P. Corke, P. Valencia, C. Crossman, D. Swain, and G. Bishop-Hurley, "Wireless ad hoc sensor and actuator networks on the farm," 2006, pp. 492-499.
- Z. Feng, "Wireless sensor networks: a new computing platform for tomorrow's Internet," 2004, pp. I-27 Vol.1.
- I. F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks” in IEEE Communication Magazine. vol. 40, August 2002, pp. 102-116.
- V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology - CRYPTO '85: Proceedings. vol. 218: Springer-Verlag, 1986, pp. 417-426.
- N.Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
- J. Lopez and R. Dahab., " An overview of elliptic curve cryptography," Technical report ,Institute of Computing, Sate University of Campinas, Sao Paulo, Brazil, May 2000.
- K. Lauter, "The advantages of elliptic curve cryptography for wireless security," Wireless Communications, IEEE [see also IEEE Personal Communications], vol. 11, pp. 62-67, 2004.
- H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," Int. J. Security and Networks,, vol. 1, pp. 127-137, 2006.
- N. Gura, A. Patel, and A. Wander, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES) August 2004.
- Cryptographic
Toolkit: http://csrc.nist.gov/groups/ST/toolkit/index.html
- D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004)2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), 2004, pp. 71-80.
- I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography vol. 265, 1999.
- D. Hankerson, J. L. Hernandez, and A. Menezes, "Software Implementation of Elliptic Curve Cryptography over Binary Fields, CHES," 2000.
- Angelo C Gillie, “Binary Arithmetic and Boolean algebra,” McGRAW-HILL Book Company, 1965. pp53.
|