Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

Abstract

In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public-key cryptography used in wireless communication provides equivalent level of security like other existing public–key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.[u][/u]

Authors and Affiliations

Arindam Sarkar, J. Mandal

Keywords

Related Articles

Web Unique Method (WUM): An Open Source Blackbox Scanner for Detecting Web Vulnerabilities

The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also...

Machine Learning Approaches for Predicting the Severity Level of Software Bug Reports in Closed Source Projects

In Software Development Life Cycle, fixing defect bugs is one of the essential activities of the software maintenance phase. Bug severity indicates how major or minor the bug impacts on the execution of the system and ho...

On the Probability of Detection Ability in Observing Dynamic Environmental Phenomena using Wireless Sensor Networks

Wireless Sensor Network (WSN) is being utilised for several purposes in military and civil domains, including surveillance, monitoring, and management, where networked sensors monitor and detect an event of interest and...

Image Compression using Approximate Matching and Run Length

Image compression is currently a prominent topic for both military and commercial researchers. Due to rapid growth of digital media and the subsequent need for reduced storage and to transmit the image in an effective m...

How Volunteering Affects the Offender’s Behavior

Agent Based modelling is widely used for presenting and evaluating a social phenomenon. Agent based modelling helps the researcher to analyze and evaluate a social model and its related hypothetical theories by simulatin...

Download PDF file
  • EP ID EP151023
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Arindam Sarkar, J. Mandal (2012). Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC). International Journal of Advanced Computer Science & Applications, 3(10), 137-145. https://europub.co.uk/articles/-A-151023