ON THE USE OF OPTIMUM CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS

Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. A...

Full description

Saved in:
Bibliographic Details
Published inJournal of Theoretical and Applied Information Technology Vol. 79; no. 2; p. 236
Main Authors Bakhtiari, Saeid, Ibrahim, Subariah, Salleh, Mazleena, Sharifi, Mahdi
Format Journal Article
LanguageEnglish
Published Islamabad Journal of Theoretical and Applied Information 01.09.2015
Subjects
Online AccessGet full text
ISSN1817-3195

Cover

Loading…
Abstract Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field F^sub p^, whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves .The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected.
AbstractList Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field F sub( p), whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves .The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected.
Author Bakhtiari, Saeid
Ibrahim, Subariah
Sharifi, Mahdi
Salleh, Mazleena
Author_xml – sequence: 1
  givenname: Saeid
  surname: Bakhtiari
  fullname: Bakhtiari, Saeid
– sequence: 2
  givenname: Subariah
  surname: Ibrahim
  fullname: Ibrahim, Subariah
– sequence: 3
  givenname: Mazleena
  surname: Salleh
  fullname: Salleh, Mazleena
– sequence: 4
  givenname: Mahdi
  surname: Sharifi
  fullname: Sharifi, Mahdi
BookMark eNpdjkFrgzAAhXPoYG23_xDYZRfBJMYkxyKxyqyRRNf1JGoUVpx2tf7_Ct1pp8f3-Hi8DVgN49CuwBpxxByCBH0Gm2k6u66PPUHX4EulMI8kLIyEKoQqy-NDcYBBoT-lgXEKZZLESxk8KhjoU5arvd5l0QmGSsNjrGUijYFGpmbhVOZHpT_MC3jqqn5qX_9yC4pQ5kHkJGofB7vEuSCCbg7xRcMRt5SxzvVr4VmfEYu7Cjfcsta3lDeW1cRDolrA-rhGHaHcxbjCrMNkC94fu5fr-Du30638-Z6atu-roR3nqUScUsIEQWhR3_6p53G-Dsu7EjEmBBHYdckd4q1UEw
ContentType Journal Article
Copyright Copyright Journal of Theoretical and Applied Information Sep 2015
Copyright_xml – notice: Copyright Journal of Theoretical and Applied Information Sep 2015
DBID 7SC
8FD
JQ2
L7M
L~C
L~D
DatabaseName Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 236
ExternalDocumentID 4017445901
Genre Feature
GroupedDBID .DC
29L
2WC
5GY
5VS
7SC
8FD
ALMA_UNASSIGNED_HOLDINGS
E3Z
JQ2
KQ8
L7M
L~C
L~D
OK1
OVT
P2P
RNS
TR2
ID FETCH-LOGICAL-p131t-369c818d577f06b94d673d2fa2c8d7e6d58cd7b3419a6d5d62b1f358022a27f23
ISSN 1817-3195
IngestDate Fri Jul 11 02:34:09 EDT 2025
Mon Jun 30 03:53:40 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p131t-369c818d577f06b94d673d2fa2c8d7e6d58cd7b3419a6d5d62b1f358022a27f23
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
PQID 1779939200
PQPubID 2040122
PageCount 1
ParticipantIDs proquest_miscellaneous_1855379311
proquest_journals_1779939200
PublicationCentury 2000
PublicationDate 20150901
PublicationDateYYYYMMDD 2015-09-01
PublicationDate_xml – month: 09
  year: 2015
  text: 20150901
  day: 01
PublicationDecade 2010
PublicationPlace Islamabad
PublicationPlace_xml – name: Islamabad
PublicationTitle Journal of Theoretical and Applied Information Technology
PublicationYear 2015
Publisher Journal of Theoretical and Applied Information
Publisher_xml – name: Journal of Theoretical and Applied Information
SSID ssj0062495
Score 1.9672809
Snippet Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy...
SourceID proquest
SourceType Aggregation Database
StartPage 236
SubjectTerms Computer information security
Constraints
Cryptography
Devices
Mathematical models
Remote sensors
Security
Wireless networks
Title ON THE USE OF OPTIMUM CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
URI https://www.proquest.com/docview/1779939200
https://www.proquest.com/docview/1855379311
Volume 79
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6lPcEB8RSFghaJW2TUXXt3nWOJHFKa2MEPSE-R92ElQkoRJJf-Dn4ws17bNWpBlItlz1rW2vN5Xjuzg9BbBVpZccm8gFXGC8Ai9UoZUO_Edj9SaqR4aauR5zGfFsHHJVsOBj97WUv7nXynrm6tK_kfrgIN-GqrZO_A2e6hQIBz4C8cgcNw_CceJ3GdsVNkkU3eSRb52byYD8dF-jmylcHDCDx1II4daThOLxZ58iE9XUwvhuD9gfeeRrO66UYUZ3AdR_mXJD3P_mCx5r2iRxtvby3YpqSpRtLNUP378usaxIiraM9K06bQAxzBU1-7bs4gv-CO69h0Zlu8rF0x0ZXN9ui0h91helNt3NBab_phC8K6vKxGpdxp8j0BHRIbV3WNOVsJ7trRNEilfXHs37LNdpysJsVstsqjZf77aK3WweEUQWBLcg_QgU-s7Dz_1K1Mcdur2zrx7Txu6PDaMMkfogfNK-JTB49HaGC2j9H93j6TT9AyiTEABQNQcDLBDVCwAwo-i3ELFEfCfaBgAApugYIdUHALlKeomET5eOo1LTW8b8QnO8_nIwUmmmZCVCdcjgLNha9pVVIVamG4ZqHSQtpN_kq40JxKUtmVckpLKirqP0OH28uteY4wWIZESmEMo34gSx0GlSltdzKtmFCMH6Hj9sOsmn_mx4oIAQbxCH7iI_SmGwaJZpepyq253MM9IWM-qA1CXvz9ES_RvWtkHaPD3fe9eQUm4k6-rnn2C_yYY8Y
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=ON+THE+USE+OF+OPTIMUM+CURVES+IN+ELLIPTIC+CURVE+CRYPTOGRAPHY+FOR+WIRELESS+SENSOR+NETWORKS&rft.jtitle=Journal+of+Theoretical+and+Applied+Information+Technology&rft.au=Bakhtiari%2C+Saeid&rft.au=Ibrahim%2C+Subariah&rft.au=Salleh%2C+Mazleena&rft.au=Sharifi%2C+Mahdi&rft.date=2015-09-01&rft.pub=Journal+of+Theoretical+and+Applied+Information&rft.issn=1817-3195&rft.volume=79&rft.issue=2&rft.spage=236&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=4017445901
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1817-3195&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1817-3195&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1817-3195&client=summon