Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 6
Abstract
In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor applications. Here both computing resources and power availability are limiting factors. Thus, it is expecting to have cryptographic algorithms for low power consuming, less computing, and highly secure for mobile sensor networks. Elliptic curve cryptography ( ECC) is a n emerging favorite because requires less computational power, communication bandwidth, and memory when compared to other cryptosystems. In this paper we present our new design, a hidden generator point, which offers an improvement in protection from the man-in- middle attack which is a major vulnerability for the sensor networks. Even though there are other ways to implement hidden generator point.
Authors and Affiliations
Brajesh Patel and Neha Jha
Office Romance: Legal Challenges and Strategic Implications
Office romance is a reality of the modern workplace as more and more employees meet their best friends and life-partners through their professional connections. Over 40% of today’s employees have had personal and roman...
Influencing Factors in Determining Credit Terms
Setting credit terms in compliance with stated credit policy of the company before taking a credit granting decision is very much essential for every business firm. Credit terms are the arrangements between buyer and s...
slugA STUDY OF SOCIO-ECONOMIC AND ENTREPRENEURIAL CHARACTERISTICS OF TRIBALS OF MAYURBHANJ DISTRICT IN SABAI GRASS ENTERPRISE
Entrepreneurship is considered as tactical development interference to speed up the process of economic development. The promotion of entrepreneurship is directly related to the socio-economic development of the poor t...
slugA Comparative study of the Relationships between Multiple Intelligences and General Self Efficacy among Public and Private Organizations in Maragheh
Multiple Intelligences is closely related to the organizational affairs. By developing Multiple Intelligences and studying its effects on General Self-Efficacy we will have employees more compatible in every sophistica...
slugAn Integrated Cryptographic Algorithm based on Biometric Features
Biometric cryptography is a technique using biometric features to encrypt the data which can improve the security of the encrypted data and can overcome the shortcomings of the traditional cryptography. Biometric featu...