On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. A...
Main Authors: | , , , |
---|---|
Format: | Article |
Published: |
Asian Research Publishing Network
2015
|
Subjects: |
_version_ | 1796860558213906432 |
---|---|
author | Bakhtiari, Saeid Ibrahim, Subariah Salleh, Mazleena Sharifi, Mahdi |
author_facet | Bakhtiari, Saeid Ibrahim, Subariah Salleh, Mazleena Sharifi, Mahdi |
author_sort | Bakhtiari, Saeid |
collection | ePrints |
description | Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field Fp, whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves.The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected. |
first_indexed | 2024-03-05T19:43:09Z |
format | Article |
id | utm.eprints-58688 |
institution | Universiti Teknologi Malaysia - ePrints |
last_indexed | 2024-03-05T19:43:09Z |
publishDate | 2015 |
publisher | Asian Research Publishing Network |
record_format | dspace |
spelling | utm.eprints-586882021-12-13T04:06:18Z http://eprints.utm.my/58688/ On the use of optimum curves in elliptic curve cryptography for wireless sensor networks Bakhtiari, Saeid Ibrahim, Subariah Salleh, Mazleena Sharifi, Mahdi QA75 Electronic computers. Computer science Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field Fp, whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves.The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected. Asian Research Publishing Network 2015 Article PeerReviewed Bakhtiari, Saeid and Ibrahim, Subariah and Salleh, Mazleena and Sharifi, Mahdi (2015) On the use of optimum curves in elliptic curve cryptography for wireless sensor networks. Journal of Theoretical and Applied Information Technology, 79 (2). pp. 236-253. ISSN 1992-8645 http://www.jatit.org/volumes/seventynine2.php |
spellingShingle | QA75 Electronic computers. Computer science Bakhtiari, Saeid Ibrahim, Subariah Salleh, Mazleena Sharifi, Mahdi On the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
title | On the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
title_full | On the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
title_fullStr | On the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
title_full_unstemmed | On the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
title_short | On the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
title_sort | on the use of optimum curves in elliptic curve cryptography for wireless sensor networks |
topic | QA75 Electronic computers. Computer science |
work_keys_str_mv | AT bakhtiarisaeid ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks AT ibrahimsubariah ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks AT sallehmazleena ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks AT sharifimahdi ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks |