A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment

@article{Katiyar2010ASO,
  title={A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment},
  author={Vivek Katiyar and Kamlesh Dutta and Syona Gupta},
  journal={International Journal of Computer Applications},
  year={2010},
  volume={11},
  pages={24-28}
}
In today‟s era of the ubiquitous computing, the Internet has become the main mode of data communication. Most of the devices used in wireless/mobile environments, that form wireless networks, ad-hoc networks and wireless sensor networks etc., have low computational power, memory and limited battery power. In such a Pervasive Computing environment, providing security to data becomes a complex task. Elliptic Curve Cryptography (ECC) has become the preferred choice for the pervasive computing… 

Figures and Tables from this paper

A NOVEL ELLIPTIC CURVE CRYPTOGRAPHY BASED AODV FOR MOBILE AD-HOC NETWORKS FOR ENHANCED SECURITY
TLDR
A novel secured Elliptic Curve based Ad-hoc On-demand Distance Vector routing protocol that takes less memory provides great security and flawlessly suitable for low power devices like mobile nodes.
An Implementation Of Elliptic Curve Cryptography
TLDR
The objective of this paper is to propose an alternative algorithm for cryptography based on mathematical objects known as elliptic curves that provide a better security with shorter bit length than RSA thereby reducing the processing overhead.
Implementation of EAACK Scheme in MANETs with Hybrid Cryptography Algorithm-ECC
TLDR
A new IDS named EAACK with ECC algorithm is proposed to demonstrates more malicious mis -behavior detection in networks and it is not greatly affect the network performances.
An Elliptic Curve Cryptography approach for Digital Signature in PDA devices
TLDR
The problem is to find equation of polynomial such that it is too complex to design its elliptic curve, and use the concept of RSA and Elliptic curve Algorithm to implement Digital Signature.
Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments
TLDR
A novel scalar point-multiplication which gives low energy consumed snippet based on elliptic curve cryptography (ECC) that provides same level of security and also keeps low energy consumption by speeding up the computation time.
Secure Pervasive Computing Environment for Health Monitoring
TLDR
The goal of this paper is to monitor the remote patient's health status and provide a secure healthcare system using cryptography and securing biomedical data by cryptography via a remote agent.
Analysis of Cryptographic Algorithms for IoT Security
  • Varsha Raghav, Supriya Raheja
  • Computer Science
    2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
  • 2018
TLDR
The detailed description of Internet of things and its security challenges is discussed and an analysis and comparison of Asymmetric cryptographic algorithms (RSA, ECC) is presented.
A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing
TLDR
It is observed that the performance of ECC based approach is significantly better than RSA and DSA/DH based approaches because of the low memory and computational requirements, smaller key size, low power and timing consumptions.
Encryption and decryption using elliptic curves for public key cryptosystems
  • M. Srinivas, Sammulal Porika
  • Computer Science, Mathematics
    2017 International Conference on Intelligent Computing and Control Systems (ICICCS)
  • 2017
TLDR
A new approach for encryption and decryption using elliptic curves is discussed that results in faster encryption anddecryption speeds and minimizing the amount of memory required for computations at the same time offering the equal level of security as that of provided by popular public key cryptographic methods.
An enhanced Elliptic Curve Cryptography for biometric
  • O. Althobaiti, Hatim Aboalsamh
  • Computer Science, Mathematics
    2012 7th International Conference on Computing and Convergence Technology (ICCCT)
  • 2012
TLDR
The idea of biometric signature - a new method to combine biometrics with public key infrastructure (PKI), the security can be increased using the ECC inBiometric signature creation, because the private and public keys are produced without saving and sending any secret information anywhere.
...
...

References

SHOWING 1-10 OF 38 REFERENCES
Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks
TLDR
This paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves, running on Atmels 8Bit ATMEGA128 microcontroller, the heart of the MICA2 platform.
Fast algorithm in ECC for wireless sensor network
TLDR
The research proposes algorithm based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency of Scalar multiplication.
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
  • An Liu, P. Ning
  • Computer Science
    2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)
  • 2008
TLDR
TinyECC is presented, a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications and shows the impacts of individual optimizations on the execution time and resource consumptions.
Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs)
TLDR
This thesis investigates the different ways of implementing ECC on wireless devices such as personal digital assistants (PDAs) and finds that ECC over the field Fn2 using optimal normal basis representation gives the best results.
An Efficient General Purpose Elliptic Curve Cryptography Module for Ubiquitous Sensor Networks
TLDR
This article presents the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro-controller which are typically used in ubiquitous sensor networks (USN) and presents an optimized arithmetic algorithm which significantly speeds up ECC schemes.
Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks
TLDR
Against the popular belief that public key cryptographic schemes are not practical for sensors, an authentication technique which makes use of Elliptic Curve Cryptography (ECC) along with the TOA positioning scheme is implemented and results indicate that ECC is well suited for secure localization in sensor networks.
Performance analysis of elliptic curve cryptography for SSL
TLDR
This paper presents a first estimate of the performance improvements that can be expected in SSL (Secure Socket Layer), the dominant security protocol on the Web today, by adding ECC support.
Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC) Implementation for MANETs
TLDR
The implementation of Elliptic Curve Cryptography -based Threshold Cryptography (ECC-TC) is implemented, which explores three most-efficient ECC encryption algorithms and put forth possibility of using these ECC-TC algorithms in different scenarios in a MANET.
Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network
  • P. Shah, Xu Huang, D. Sharma
  • Computer Science
    2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
  • 2010
TLDR
This research proposes algorithm based on 1's complement subtraction to represent scalar in Scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency of scalar multiplication.
...
...