Fuzzy Controlling Window for Elliptic Curve Cryptography in Wireless Sensor Networks

Research output: A Conference proceeding or a Chapter in BookConference contribution

6 Citations (Scopus)


Elliptic curve cryptosystem (ECC) has been becoming very popular in wireless sensor networks after proposed by Miller [10] and Koblitz [9] that relies on the difficulty of elliptic curve discrete logarithmic problem (ECDLP). It is gaining wide acceptance as an alternative to the conventional public key cryptosystem such as RSA [24], DSA [25], DH [26]. However, the security of the WSN becomes one of the major concerns in its applications. Even ECC prominently offers great potential benefits for WSN security there is still a lot of work needs to be done due to WSN has very restraint running conditions such as limited energy source, capability of computing, etc. As we know that scalar multiplication operation in ECC accounts for about 80% of key calculation time on wireless sensor network motes. In this paper we present an optimized dynamic window based on our previous research works. The whole quality of service (QoS) has been improved under this algorism in particularly the power consuming is more efficiently. The simulation results showed that the average calculation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whole the calculation time, decreased by approximately 18.5% in comparison to our previous algorithms in an ECC wireless sensor network [23].
Original languageEnglish
Title of host publicationProceeding of the International Conference on Information Networking 2012 (ICOIN 2012)
EditorsKI-Hyung Kim, Myungsik Yoo
Place of PublicationKorea
PublisherICOIN 2012
Number of pages6
ISBN (Print)9781467302494
Publication statusPublished - 2012
EventInternational Conference on Information Networking 2012 - Bali, Bali, Indonesia
Duration: 1 Feb 20123 Feb 2012


ConferenceInternational Conference on Information Networking 2012
Abbreviated titleICOIN 2012


Dive into the research topics of 'Fuzzy Controlling Window for Elliptic Curve Cryptography in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this