Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 6

Abstract

In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor applications. Here both computing resources and power availability are limiting factors. Thus, it is expecting to have cryptographic algorithms for low power consuming, less computing, and highly secure for mobile sensor networks. Elliptic curve cryptography ( ECC) is a n emerging favorite because requires less computational power, communication bandwidth, and memory when compared to other cryptosystems. In this paper we present our new design, a hidden generator point, which offers an improvement in protection from the man-in- middle attack which is a major vulnerability for the sensor networks. Even though there are other ways to implement hidden generator point.

Authors and Affiliations

Brajesh Patel and Neha Jha

Keywords

Related Articles

An Adaptive Classification approach to filter spam E-mail using Vector Space Model

The majority of previous studies of data mining have been concentrate on structured data, such as relational, transactional and data warehouse data. But, in actuality, an important section of the available information...

Empowerment of Women in Bangladesh: A Study

Bangladesh is an over populated developing country. But it is a small country. Shailkupa Pouroshova is in south western Bangladesh. It is a part of the Jhenaidah District. This study was based on the primary data. Stat...

slugAn Efficient Centroid Selection Algorithm for K-means Clustering

This paper, we proposes an algorithm for performing data partitioning along the data axis with the highest variance to improve the accuracy. The data partitioning tries to divide data space into small cells or clusters...

Remuneration Challenge:An obstacle to conducive employment relationsand a trigger for poor service delivery in a Local authority in Zimbabwe

Zimbabwe‟s major local authorities are failing to remunerate their workers as per agreed contracts of employment. This has often seen a lot of work stoppages by council workers as they embark on industrial action or th...

Scope Of Stress Management In Hotel Industry

Like any other tourism product or service the hotel product is not storable and in case of non use, it is perishable. The hotel business is highly competitive. For organizational effectiveness that is quality maintena...

Download PDF file
  • EP ID EP18373
  • DOI -
  • Views 314
  • Downloads 10

How To Cite

Brajesh Patel and Neha Jha (2012). Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication. International Journal of Management, IT and Engineering, 2(6), -. https://europub.co.uk/articles/-A-18373