Secure wireless sensor networks with dynamic window for elliptic curve cryptography

Elliptic curve cryptosystem (ECC) was proposed by Miller [10] and Koblitz [9] which relies on the difficulty of elliptic curve discrete logarithmic problem (ECDLP). It is gaining wide acceptance as an alternative to the conventional public key cryptosystem such as RSA [24], DSA [25], DH [26]. The security of the WSN becomes one of the major concerns in its applications. It is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 18% in comparison to our previous algorithms in an ECC wireless sensor network [23].

[1]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[2]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[3]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[4]  Chung-Kuo Chang,et al.  An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[5]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[6]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[7]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[8]  Alfred Menezes,et al.  Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[11]  Kiyomichi Araki,et al.  Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.

[12]  Richard Bellman,et al.  Decision-making in fuzzy environment , 2012 .

[13]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[14]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[15]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Pritam Gajkumar Shah,et al.  Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .

[18]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[19]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[20]  Angelo C. Gilli Binary arithmetic and Boolean algebra , 1965 .

[21]  Xu Huang,et al.  Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication , 2010, 2010 16th Asia-Pacific Conference on Communications (APCC).

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[24]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[25]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[26]  D. Stephens,et al.  Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.

[27]  Xu Huang,et al.  Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.