Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication.

Abstract

In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor applications. Here both computing resources and power availability are limiting factors. Thus, it is expecting to have cryptographic algorithms for low power consuming, less computing, and highly secure for mobile sensor networks. Elliptic curve cryptography ( ECC) is a n emerging favorite because requires less computational power, communication bandwidth, and memory when compared to other cryptosystems. In this paper we present our new design, a hidden generator point, which offers an improvement in protection from the man-in- middle attack which is a major vulnerability for the sensor networks. Even though there are other ways to implement hidden generator point.

Authors and Affiliations

Brajesh Patel and Neha Jha

Keywords

Related Articles

Artificial Intelligence Applied to digital Email for forensic Application

The number of computer security incidents is growing exponentially and society’s collective ability to respond to this crisis is constrained by the lack of trained professionals. The increased use of the Internet and c...

Role of Online Education in Indian Rural Area

Online education courses follow the same principles of teaching and testing as classes and books, they offer more features to enhance the retention of the material, often at a less expensive cost. Online education is a...

Establishment Of The Relationship Between Occupational/ Job Stress And Occupational Anxiety-A Study Of Marketing Managers Of Selected Indian Private Banks At Nagpur.

Management Facilitator Peter Drucker wrote “Marketing is the distinguishing unique function of the business.” In 1991, Marketing expert Regis Mckenna expressed a viewpoint in Harvard Business Review Article as –“Market...

Executive Development in Bangladesh: A Conceptual Framework

In view of the importance of developing executives’ skills for organizations in both developed and developing nations, this study addresses how organizations help develop and effectively utilize their members, especial...

IMPLIMENTATION OF WIRELESS AD-HOC NETWORK USING AURDINO CONTROLLER

The main aim of the paper is to explain the working of a robot with the use of an Ad-Hoc network. This paper explains major features of the Ad –Hoc network along with the wheel rotational analysis and the DC motor spec...

Download PDF file
  • EP ID EP26681
  • DOI -
  • Views 369
  • Downloads 4

How To Cite

Brajesh Patel and Neha Jha (2012). Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication.. International Journal of Engineering, Science and Mathematics, 2(6), -. https://europub.co.uk/articles/-A-26681