<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>ijesm</PublisherName>
      <JournalTitle>International Journal of Engineering, Science and</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 6, Issue 6</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Multidisciplinary</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>October 2017</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>-0001</Year>
        <Month>11</Month>
        <Day>30</Day>
      </PubDate>
      <ArticleType>Engineering, Science and Mathematics</ArticleType>
      <ArticleTitle>ECC Algorithm for WSN</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>125</FirstPage>
      <LastPage>130</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Vivek</FirstName>
          <LastName>Soi</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
          <FirstName>B.S</FirstName>
          <LastName>Dhaliwal</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
          <FirstName>Mahinder</FirstName>
          <LastName>Kumar</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
        </Author>
      </AuthorList>
      <DOI/>
      <Abstract>Elliptic curve cryptography (ECC) has been attractive to the people who are working in the field of the network security due to its good potential for wireless sensor network security due to its smaller key size and its high strength of security. But there is a room to reduce the key calculation time to meet the potential applications, in particular for wireless sensor networks (WSN). It is well known that scalar multiplication is the operation in elliptical curve cryptography which takes 80% of key calculation time on wireless sensor network motes. In this paper, the research proposes algorithm based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency of scalar multiplication.&#13;
&#13;
&#13;
&#13;
Index Terms—Elliptic curve cryptography, Scalar multiplication, Non-adjacent form, Hamming weight, one’s complement subtraction, ROM, wireless sensor networks</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Elliptic curve cryptography, Scalar multiplication, Non-adjacent form, Hamming weight, one’s complement subtraction, ROM, wireless sensor networks</Keywords>
      <URLs>
        <Abstract>https://ijesm.co.in/ubijournal-v1copy/journals/abstract.php?article_id=3443&amp;title=ECC Algorithm for WSN</Abstract>
      </URLs>
      <References>
        <ReferencesarticleTitle>References</ReferencesarticleTitle>
        <ReferencesfirstPage>16</ReferencesfirstPage>
        <ReferenceslastPage>19</ReferenceslastPage>
        <References>I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	C. Chung-Kuo, J. M. Overhage, and J. Huang, "An application of sensor networks for syndromic surveillance," 2005, pp. 191-196.&#13;
	G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, and M. Welsh, "Deploying a wireless sensor network on an active volcano," IEEE Internet Computing, vol. 10, pp. 18-25, 2006.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	B. Sinopoli, C. Sharp, L. Schenato, S. Schaffert, and S. S. Sastry, "Distributed control applications within sensor networks," Proceedings of the IEEE, vol. 91, pp. 1235-1246, 2003.&#13;
	D. L. Stephens, Jr. and A. J. Peurrung, "Detection of moving radioactive sources using sensor networks," Nuclear Science, IEEE Transactions on, vol. 51, pp. 2273-2278, 2004.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	P. Sikka, P. Corke, P. Valencia, C. Crossman, D. Swain, and G. Bishop-Hurley, "Wireless ad hoc sensor and actuator networks on the farm," 2006, pp. 492-499.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	Z. Feng, "Wireless sensor networks: a new computing platform for tomorrowand;#39;s Internet," 2004, pp. I-27 Vol.1.&#13;
	I. F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks” in IEEE Communication Magazine. vol. 40, August 2002, pp. 102-116.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology - CRYPTO and;#39;85: Proceedings. vol. 218: Springer-Verlag, 1986, pp. 417-426.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	N.Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	J. Lopez and R. Dahab., " An overview of elliptic curve cryptography," Technical report ,Institute of Computing, Sate University of Campinas, Sao Paulo, Brazil, May 2000.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	K. Lauter, "The advantages of elliptic curve cryptography for wireless security," Wireless Communications, IEEE [see also IEEE Personal Communications], vol. 11, pp. 62-67, 2004.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," Int. J. Security and Networks,, vol. 1, pp. 127-137, 2006.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	N. Gura, A. Patel, and A. Wander, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES) August 2004.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	Cryptographic&#13;
&#13;
&#13;
&#13;
&#13;
Toolkit: http://csrc.nist.gov/groups/ST/toolkit/index.html&#13;
&#13;
&#13;
&#13;
&#13;
	D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004)2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), 2004, pp. 71-80.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography vol. 265, 1999.&#13;
&#13;
&#13;
&#13;
&#13;
&#13;
	D. Hankerson, J. L. Hernandez, and A. Menezes, "Software Implementation of Elliptic Curve Cryptography over Binary Fields, CHES," 2000.&#13;
	Angelo C Gillie, “Binary Arithmetic and Boolean algebra,” McGRAW-HILL Book Company, 1965. pp53.</References>
      </References>
    </Journal>
  </Article>
</ArticleSet>