On the use of optimum curves in elliptic curve cryptography for wireless sensor networks

Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. A...

Full description

Bibliographic Details
Main Authors: Bakhtiari, Saeid, Ibrahim, Subariah, Salleh, Mazleena, Sharifi, Mahdi
Format: Article
Published: Asian Research Publishing Network 2015
Subjects:
_version_ 1796860558213906432
author Bakhtiari, Saeid
Ibrahim, Subariah
Salleh, Mazleena
Sharifi, Mahdi
author_facet Bakhtiari, Saeid
Ibrahim, Subariah
Salleh, Mazleena
Sharifi, Mahdi
author_sort Bakhtiari, Saeid
collection ePrints
description Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field Fp, whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves.The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected.
first_indexed 2024-03-05T19:43:09Z
format Article
id utm.eprints-58688
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T19:43:09Z
publishDate 2015
publisher Asian Research Publishing Network
record_format dspace
spelling utm.eprints-586882021-12-13T04:06:18Z http://eprints.utm.my/58688/ On the use of optimum curves in elliptic curve cryptography for wireless sensor networks Bakhtiari, Saeid Ibrahim, Subariah Salleh, Mazleena Sharifi, Mahdi QA75 Electronic computers. Computer science Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge because it provides high security in spite of a smaller key size. In addition, ECC was subject to many recent studies to optimize the time needed for base point selection and point multiplication operations. In this paper, the points on elliptic curves are analyzed, and an efficient implementation of ECC base point selection is proposed. The proposed implementation can be utilized by extremely constrained devices. We prefer to utilize projective coordinate representations of field elements than to utilize affine coordinates over prime finite field Fp, whereas projective coordinates reduce computational complexity by eliminating the multiplicative inverse in point additions and point doubling. This paper further analyzes non-prime order elliptic curves.The analysis results show that the order of the elliptic curve plays a critical role in determining how fast a base point can be selected. Asian Research Publishing Network 2015 Article PeerReviewed Bakhtiari, Saeid and Ibrahim, Subariah and Salleh, Mazleena and Sharifi, Mahdi (2015) On the use of optimum curves in elliptic curve cryptography for wireless sensor networks. Journal of Theoretical and Applied Information Technology, 79 (2). pp. 236-253. ISSN 1992-8645 http://www.jatit.org/volumes/seventynine2.php
spellingShingle QA75 Electronic computers. Computer science
Bakhtiari, Saeid
Ibrahim, Subariah
Salleh, Mazleena
Sharifi, Mahdi
On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
title On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
title_full On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
title_fullStr On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
title_full_unstemmed On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
title_short On the use of optimum curves in elliptic curve cryptography for wireless sensor networks
title_sort on the use of optimum curves in elliptic curve cryptography for wireless sensor networks
topic QA75 Electronic computers. Computer science
work_keys_str_mv AT bakhtiarisaeid ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks
AT ibrahimsubariah ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks
AT sallehmazleena ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks
AT sharifimahdi ontheuseofoptimumcurvesinellipticcurvecryptographyforwirelesssensornetworks