Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication.

Abstract

In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor applications. Here both computing resources and power availability are limiting factors. Thus, it is expecting to have cryptographic algorithms for low power consuming, less computing, and highly secure for mobile sensor networks. Elliptic curve cryptography ( ECC) is a n emerging favorite because requires less computational power, communication bandwidth, and memory when compared to other cryptosystems. In this paper we present our new design, a hidden generator point, which offers an improvement in protection from the man-in- middle attack which is a major vulnerability for the sensor networks. Even though there are other ways to implement hidden generator point.

Authors and Affiliations

Brajesh Patel and Neha Jha

Keywords

Related Articles

Information Leakage Prevented by Data Encryption using Smartcard

Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high acc...

Deep web Data Integration Approach Based on Schema and Attributes Extraction of Query Interfaces

The deep web is becoming a collection of informative resource unlike the conventional web information that allow retrieval of the contents into the Deep Web only accessible through source query interfaces. However, the...

Design of Distributed System application on SOA, WPF, WF and WCF like new technologies: a Survey.

In this paper, a Survey of Latest Technologies used in the Software companies based on the latest Service Oriented Architecture (SOA) ,Windows Presentation Foundation (WPF), Windows communication foundation (WCF), Wind...

QUANTIFICATION OF AGILITY OF A SUPPLY CHAIN USING FUZZY LOGIC

We focus on the issue of performance evaluation in supply chains, in particular the concept of “Agility”. All parameters of agility can be qualitatively judged in linguistic terms. We specifically target the problem of...

Quality Improvement through SPC Techniques: A Case Study

Statistical process Control (SPC) can be applied most frequently to controlling manufacturing lines but it may be equally applied to any process with a measurable output. Key tools in SPC are control charts and cause &...

Download PDF file
  • EP ID EP26681
  • DOI -
  • Views 347
  • Downloads 4

How To Cite

Brajesh Patel and Neha Jha (2012). Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication.. International Journal of Engineering, Science and Mathematics, 2(6), -. https://europub.co.uk/articles/-A-26681