Fuzzy Controlling Window for Elliptic Curve Cryptography in Wireless Networks

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

4 Citations (Scopus)
38 Downloads (Pure)

Abstract

The rapidly developing wireless communications and embedded micro-electro systems has made wireless sensor networks (WSN) possible for extensive applications. However, the security of the WSN becomes one of the major concerns in those applications. Elliptic curve cryptography (ECC) prominently provides solid potential for WSN security with its small key size and its high security strength. However, in order to satisfy the full range of applications there is an urgent need to reduce key calculation time. Due to scalar multiplication operation in ECC takes about 80% of key calculation time on WSN, this paper we proposed a fuzzy controller for a dynamic window allowing the calculation processing to run under optimum conditions with the balanced for RAM and ROM at the sensor node within WSN. The whole quality of Service (QoS) is improved, in particular the power consuming is more efficiently. The simulation results showed that the average calculation time decreased by approximately 15% in comparison to traditional algorithms in an ECC WSN.
Original languageEnglish
Title of host publicationProceeding: ICCIT 2010 : The 5th International Conference on Computer Sciences and Convergence Information Technology
Place of PublicationWashington, DC, USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages521-526
Number of pages6
ISBN (Print)9788988678305
DOIs
Publication statusPublished - 2010
Event5th ICCIT: 2010 International Conference on Computer Sciences and Convergence Information Technology - Seoul, Korea, Republic of
Duration: 30 Nov 20102 Dec 2010

Conference

Conference5th ICCIT: 2010 International Conference on Computer Sciences and Convergence Information Technology
Country/TerritoryKorea, Republic of
CitySeoul
Period30/11/102/12/10

Fingerprint

Dive into the research topics of 'Fuzzy Controlling Window for Elliptic Curve Cryptography in Wireless Networks'. Together they form a unique fingerprint.

Cite this