Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 10
Abstract
In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public-key cryptography used in wireless communication provides equivalent level of security like other existing public–key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.[u][/u]
Authors and Affiliations
Arindam Sarkar, J. Mandal
Web Unique Method (WUM): An Open Source Blackbox Scanner for Detecting Web Vulnerabilities
The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also...
Machine Learning Approaches for Predicting the Severity Level of Software Bug Reports in Closed Source Projects
In Software Development Life Cycle, fixing defect bugs is one of the essential activities of the software maintenance phase. Bug severity indicates how major or minor the bug impacts on the execution of the system and ho...
On the Probability of Detection Ability in Observing Dynamic Environmental Phenomena using Wireless Sensor Networks
Wireless Sensor Network (WSN) is being utilised for several purposes in military and civil domains, including surveillance, monitoring, and management, where networked sensors monitor and detect an event of interest and...
Image Compression using Approximate Matching and Run Length
Image compression is currently a prominent topic for both military and commercial researchers. Due to rapid growth of digital media and the subsequent need for reduced storage and to transmit the image in an effective m...
How Volunteering Affects the Offender’s Behavior
Agent Based modelling is widely used for presenting and evaluating a social phenomenon. Agent based modelling helps the researcher to analyze and evaluate a social model and its related hypothetical theories by simulatin...