Efficiently Fuzzy Controlling with Dynamic Window in Elliptic Curve Cryptography Sensor Networks

(WSN) based on the rapid progress of wireless communications and embedded micro electro mechanical systems technologies are becoming important part in our daily life. However, the security of the WSN becomes one of the major concerns in its applications. Even elliptic curve cryptography (ECC) prominently offers great potential benefits for WSN security there is still a lot of work needs to be done due to WSN has very restraint running conditions such as limited energy source, capability of computing, etc. Also it is well known that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In our current paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 17% in comparison to our previous algorithms in an ECC wireless sensor network.

[1]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[2]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[3]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[4]  Pavan Sikka,et al.  Wireless ad hoc sensor and actuator networks on the farm , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[5]  Alfred Menezes,et al.  Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.

[6]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[7]  Chung-Kuo Chang,et al.  An application of sensor networks for syndromic surveillance , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[8]  Angelo C. Gilli Binary arithmetic and Boolean algebra , 1965 .

[9]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[10]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[11]  Feng Zhao Wireless sensor networks: a new computing platform for tomorrow's Internet , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[12]  Oscar Castillo,et al.  Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, March 21-23, 2007, Hong Kong, China , 2007, IMECS.

[13]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[14]  Anju Vyas Print , 2003 .

[15]  D. Stephens,et al.  Detection of moving radioactive sources using sensor networks , 2004, IEEE Transactions on Nuclear Science.

[16]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[17]  Kiyomichi Araki,et al.  Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.

[18]  H. C. Williams,et al.  Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.

[19]  Richard Bellman,et al.  Decision-making in fuzzy environment , 2012 .

[20]  Pritam Gajkumar Shah,et al.  Multi-Agent System Protecting from Attacking with Elliptic Curve Cryptography , 2010 .

[21]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[22]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[23]  Xu Huang,et al.  Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.