Open Access Open Access  Restricted Access Subscription or Fee Access

An Novel Key Cryptography for Signature Depreciation in Wireless Sensor Networks

P. Prema, J. Preethi

Abstract


Koblitz introduced a family of curves which admit especially fast elliptic scalar multiplication. A Koblitz curve is an elliptic curve has convenient features for efficient implementation of elliptic curve cryptography. In order to enable faster computations, scalars need to be reduced and represented using a special base -expansion. Hence an efficient conversion algorithm is indeed which utilize only simple operations such as additions and shifts. It is an attractive class of elliptic curves because they offer faster scalar multiplications. It is also the most demanding operation due to its efficient computation which is widely used in practical cryptosystems.

Keywords


Koblitz Curve, Elliptic Curves, Public-Key Cryptography, Scalar Multiplications, Broadcast Authentication

Full Text:

PDF

References


Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, 2002.

C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed diffusion for wireless sensor networking,” IEEE/ACM Trans. Networking, vol. 11, no. 1, pp. 2–16, 2003.

J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in Proc. 2004 ACM SenSys, pp. 81–94.

W. Heinzelman, A. Chandrakasan, and H. Balakrihnan, “Energyefficient communication protocol for wireless microsensor networks,” in Proc. 2000 Hawaii International Conference on System Sciences, vol. 2, 2000.

R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology,” in Proc. 2004 ACM SASN, pp. 59–64.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003.

Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002.

D. Liu and P. Ning, “Multilevel μTESLA: broadcast authentication for distributed sensor networks,” ACM Trans. Embeded Computing Syst., vol. 3, no. 4, pp. 800–836, 2004.

Y. Zhou and Y. Fang, “BABRA: batch-based broadcast authentication in wireless sensor networks,” in Proc. 2006 IEEE GLOBECOM.

P. Ning, A. Liu, and W. Du, “Mitigating DoS attacks against broadcast authentication in wireless sensor networks,” ACM Trans. Sensor Networking, vol. 4, no. 1, pp. 1–35, 2008.

T. Kwon and J. Hong, “Secure and efficient broadcast authentication in wireless sensor networks,” IEEE Trans. Computers, vol. 59, no. 8, pp. 1120–1133, 2010.

K. Ren, W. Lou, K. Zeng, and P. Moran, “On broadcast authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136–4144, 2007.

X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, “Defending DoS attacks on broadcast authentication in wireless sensor networks,” in Proc. 2008 IEEE ICC, pp. 1653–1657.

R. Gennaro and P. Rohatgi, “How to sign digital streams,” in Advances in Cryptology-CRYPTO, Lecture Notes in Computer Science, 1997, vol. 1294, pp. 180–197.

C. K. Wong and S. Lam, “Digital signatures for flows and multicasts,” IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 502–513, 1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.