ON THE USE OF OPTIMUM CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. A...
Saved in:
Published in | Journal of Theoretical and Applied Information Technology Vol. 79; no. 2; p. 236 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Islamabad
Journal of Theoretical and Applied Information
01.09.2015
|
Subjects | |
Online Access | Get full text |
ISSN | 1817-3195 |
Cover
Loading…
Abstract | Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field F^sub p^, whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves .The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected. |
---|---|
AbstractList | Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field F sub( p), whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves .The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected. |
Author | Bakhtiari, Saeid Ibrahim, Subariah Sharifi, Mahdi Salleh, Mazleena |
Author_xml | – sequence: 1 givenname: Saeid surname: Bakhtiari fullname: Bakhtiari, Saeid – sequence: 2 givenname: Subariah surname: Ibrahim fullname: Ibrahim, Subariah – sequence: 3 givenname: Mazleena surname: Salleh fullname: Salleh, Mazleena – sequence: 4 givenname: Mahdi surname: Sharifi fullname: Sharifi, Mahdi |
BookMark | eNpdjkFrgzAAhXPoYG23_xDYZRfBJMYkxyKxyqyRRNf1JGoUVpx2tf7_Ct1pp8f3-Hi8DVgN49CuwBpxxByCBH0Gm2k6u66PPUHX4EulMI8kLIyEKoQqy-NDcYBBoT-lgXEKZZLESxk8KhjoU5arvd5l0QmGSsNjrGUijYFGpmbhVOZHpT_MC3jqqn5qX_9yC4pQ5kHkJGofB7vEuSCCbg7xRcMRt5SxzvVr4VmfEYu7Cjfcsta3lDeW1cRDolrA-rhGHaHcxbjCrMNkC94fu5fr-Du30638-Z6atu-roR3nqUScUsIEQWhR3_6p53G-Dsu7EjEmBBHYdckd4q1UEw |
ContentType | Journal Article |
Copyright | Copyright Journal of Theoretical and Applied Information Sep 2015 |
Copyright_xml | – notice: Copyright Journal of Theoretical and Applied Information Sep 2015 |
DBID | 7SC 8FD JQ2 L7M L~C L~D |
DatabaseName | Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 236 |
ExternalDocumentID | 4017445901 |
Genre | Feature |
GroupedDBID | .DC 29L 2WC 5GY 5VS 7SC 8FD ALMA_UNASSIGNED_HOLDINGS E3Z JQ2 KQ8 L7M L~C L~D OK1 OVT P2P RNS TR2 |
ID | FETCH-LOGICAL-p131t-369c818d577f06b94d673d2fa2c8d7e6d58cd7b3419a6d5d62b1f358022a27f23 |
ISSN | 1817-3195 |
IngestDate | Fri Jul 11 02:34:09 EDT 2025 Mon Jun 30 03:53:40 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 2 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p131t-369c818d577f06b94d673d2fa2c8d7e6d58cd7b3419a6d5d62b1f358022a27f23 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
PQID | 1779939200 |
PQPubID | 2040122 |
PageCount | 1 |
ParticipantIDs | proquest_miscellaneous_1855379311 proquest_journals_1779939200 |
PublicationCentury | 2000 |
PublicationDate | 20150901 |
PublicationDateYYYYMMDD | 2015-09-01 |
PublicationDate_xml | – month: 09 year: 2015 text: 20150901 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Islamabad |
PublicationPlace_xml | – name: Islamabad |
PublicationTitle | Journal of Theoretical and Applied Information Technology |
PublicationYear | 2015 |
Publisher | Journal of Theoretical and Applied Information |
Publisher_xml | – name: Journal of Theoretical and Applied Information |
SSID | ssj0062495 |
Score | 1.9672809 |
Snippet | Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy... |
SourceID | proquest |
SourceType | Aggregation Database |
StartPage | 236 |
SubjectTerms | Computer information security Constraints Cryptography Devices Mathematical models Remote sensors Security Wireless networks |
Title | ON THE USE OF OPTIMUM CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS |
URI | https://www.proquest.com/docview/1779939200 https://www.proquest.com/docview/1855379311 |
Volume | 79 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6lPcEB8RSFghaJW2TUXXt3nWOJHFKa2MEPSE-R92ElQkoRJJf-Dn4ws17bNWpBlItlz1rW2vN5Xjuzg9BbBVpZccm8gFXGC8Ai9UoZUO_Edj9SaqR4aauR5zGfFsHHJVsOBj97WUv7nXynrm6tK_kfrgIN-GqrZO_A2e6hQIBz4C8cgcNw_CceJ3GdsVNkkU3eSRb52byYD8dF-jmylcHDCDx1II4daThOLxZ58iE9XUwvhuD9gfeeRrO66UYUZ3AdR_mXJD3P_mCx5r2iRxtvby3YpqSpRtLNUP378usaxIiraM9K06bQAxzBU1-7bs4gv-CO69h0Zlu8rF0x0ZXN9ui0h91helNt3NBab_phC8K6vKxGpdxp8j0BHRIbV3WNOVsJ7trRNEilfXHs37LNdpysJsVstsqjZf77aK3WweEUQWBLcg_QgU-s7Dz_1K1Mcdur2zrx7Txu6PDaMMkfogfNK-JTB49HaGC2j9H93j6TT9AyiTEABQNQcDLBDVCwAwo-i3ELFEfCfaBgAApugYIdUHALlKeomET5eOo1LTW8b8QnO8_nIwUmmmZCVCdcjgLNha9pVVIVamG4ZqHSQtpN_kq40JxKUtmVckpLKirqP0OH28uteY4wWIZESmEMo34gSx0GlSltdzKtmFCMH6Hj9sOsmn_mx4oIAQbxCH7iI_SmGwaJZpepyq253MM9IWM-qA1CXvz9ES_RvWtkHaPD3fe9eQUm4k6-rnn2C_yYY8Y |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ON+THE+USE+OF+OPTIMUM+CURVES+IN+ELLIPTIC+CURVE+CRYPTOGRAPHY+FOR+WIRELESS+SENSOR+NETWORKS&rft.jtitle=Journal+of+Theoretical+and+Applied+Information+Technology&rft.au=Bakhtiari%2C+Saeid&rft.au=Ibrahim%2C+Subariah&rft.au=Salleh%2C+Mazleena&rft.au=Sharifi%2C+Mahdi&rft.date=2015-09-01&rft.pub=Journal+of+Theoretical+and+Applied+Information&rft.issn=1817-3195&rft.volume=79&rft.issue=2&rft.spage=236&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=4017445901 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1817-3195&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1817-3195&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1817-3195&client=summon |