Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 6

Abstract

In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor applications. Here both computing resources and power availability are limiting factors. Thus, it is expecting to have cryptographic algorithms for low power consuming, less computing, and highly secure for mobile sensor networks. Elliptic curve cryptography ( ECC) is a n emerging favorite because requires less computational power, communication bandwidth, and memory when compared to other cryptosystems. In this paper we present our new design, a hidden generator point, which offers an improvement in protection from the man-in- middle attack which is a major vulnerability for the sensor networks. Even though there are other ways to implement hidden generator point.

Authors and Affiliations

Brajesh Patel and Neha Jha

Keywords

Related Articles

Bicriteria in n×2 Flow Shop Scheduling under Specified Rental Policy with Uncertain Processing Time

This paper is an attempt to obtain an optimal solution for optimizing the bicriteria taken as minimization of the total rental cost of the machines taken on rent under a specified rental policy subject to obtain the mi...

WR DISPATCHING APPROACHES IN DISTRIBUTED WEB SERVER SYSTEMS

Once the web site becomes a popular then single web server may not be able to handle high volume of incoming traffic. In order to achieve web server scalability, more servers need to be added to distribute the load amo...

slugMicro finance – Role of Banking intermediaries in Inclusive Economic Growth

Micro finance is most challenging financial act of modern banks in India. It is a scaleable antipoverty solution to rural credit barriers. The main objective of this study is to conceptualize the operational methodologi...

slugDetermination of Lot Size in the Construction of Six sigma based Link Sampling Plans

The term ‘Six Sigma’ originated from the terminology associated with the statistical modeling of manufacturing processes. A six-sigma process is one in which 99.99999% of the products manufactured are statistically exp...

PERFORMANCE OF VARIOUS ALGORITHMS USED IN CRYPTOGRAPHY

Performance of cryptosystems is a very important process in measuring the performance of Cryptosystems. Communication is the basic process of exchanging information. The effectiveness of computer communication is mainl...

Download PDF file
  • EP ID EP18373
  • DOI -
  • Views 295
  • Downloads 10

How To Cite

Brajesh Patel and Neha Jha (2012). Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication. International Journal of Management, IT and Engineering, 2(6), -. https://europub.co.uk/articles/-A-18373