Elliptic Curve Cryptography Enabled Security for Wireless Communication

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6

Abstract

Neal Koblitz and Victor Miller independently proposed elliptic curve cryptography (ECC). This is an efficient technique, which provides security for wireless communication. Earlier we were using wired equivalent privacy (WEP) protocol and Rivest- hamir-Adleman (RSA) scheme, which largely stimulated the research and development of security protocols for wireless ommunication. The efficient technique elliptic curve yptography overcomes the disadvantages of WEP and RSA. Here we are proposing a mutually authenticated key greement protocol that employs elliptic curve digital signature algorithm (ECDSA) exchange used for mutual authentication and key exchange respectively. The principal attraction of ECC, ompared to RSA, is that it appears to offer equal security for a far smaller key size thereby reducing processing overhead. The proposed protocol can be implemented in both basic service set (BSS) and extended service set (ESS).

Authors and Affiliations

C. SAJEEV , G. JAI ARUL JOSE

Keywords

Related Articles

Fingerprint Identification System in library and Information Center

AFIS is dramatically improving in the last decade. It can use in Library and Information Center for providing better security. The application of AFIS in Library and Information Center will protect from thief, mutilation...

HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers...

Conditioned slicing-Based Pre-Reduction Technique for efficient MDG Model-checker

Integrating formal verification techniques into the hardware design process provides the means to rigorously prove critical properties. However, most automatic verification techniques, such as model checking, are only ef...

Efficient Storage Reduction of Frequency of Items in Vertical Data Layout

The digital databases are immersed with large amount of data. The explosive growth of massive amounts of data leads to space complexity, performance degradation, scalability and time complexity. We cannot stop the incomi...

A Fuzzy Logic Based Improved Keyword Extraction From Meeting Transcripts

Keyword Extraction is the process of assigning keywords to a document where the important words are selected by the system automatically. This proposed frame work is used to extract the keywords using Fuzzy logic method...

Download PDF file
  • EP ID EP144997
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

C. SAJEEV, G. JAI ARUL JOSE (2010). Elliptic Curve Cryptography Enabled Security for Wireless Communication. International Journal on Computer Science and Engineering, 2(6), 2187-2189. https://europub.co.uk/articles/-A-144997