Nowadays, the usage of resource constrained devices is increasing and these devices are primarily working with sensitive data. Consequently, data security has become crucial for both producers and users. Limitation of resources is deemed as the major issue that makes these devices vulnerable. Attackers might exploit these limitations to get access to the valuable data. Therefore, carefully chosen and practically tested encryption algorithm must be applied to increase the device efficiency and mitigate the risk of sensitive data loss. This study will compare elliptic curve cryptography (ECC) algorithm with Key size of 160-bit and Rivest-Shamir-Adleman (RSA) algorithm with Key size of 1024-bit. As a result of this study utilizing ECC in resource constrained devices has advantages over RSA but ECC needs continues enhancement to satisfy the limitations of newly designed chips.
The most expensive and time-consuming operation in Elliptic curve cryptosystem is scalar multiplication operation. Optimization of scalar multiplication will substantially enhance the ECC performance. Scalar multiplication can be improved by using an enhanced scalar recoding algorithm that can decrease the number of operations in the scalar representation process. The objective of this research is to introduce an efficient design and implementation of {0,1,3}-NAF scalar recoding algorithm by applying block method technique. The base algorithm has a complex look up table. With block method application on base algorithm, a complex look up table is undesired. Instead a fix look up table is introduced with less computation required for recoding. The Big-O notation is used to measure the complexity and (µs) used to evaluate the running time of base and proposed algorithm.
Abstracts: This paper shows how ubiquitous computing can be applied to intensify the security system of vehicles. Some ubiquitous elements are being discuss which include communication technologies such as Bluetooth, Infrared, Wi-Fi and UWB, automatic Identification and data capture (AIDC) such as RFID, virtual barcodes, biometric, smart cards and OCR, authentication methods such as passwords, one time passwords etc and ubiquitous system devices such as tabs, pads and boards.The key features which affect the decision for choosing the best communication method and technology are also discussed.
Because of nodes mobility, one of important and fundamental issues in mobile sensor networks is how to cluster the nodes in network. The clustering is a method for best managing nodes energies, data collectting and sending information to base station and increasing network lifetime. In a wireless mobile network, the created clusters change continually and the nodes move from one cluster to another, constantly. Therefore, using fault tolerant methods capable to creating new clusters while the moving of nodes between clusters, will be necessary. One of clustering methods in mobile Ad-Hoc networks is based on neighborhood benchmark in which, the cluster heads are selected based on maximum connection degree and minimum fault in a specific time period. In this paper, the improvement of mentioned method in term of increasing network lifetime, based on its combination with minimum hop number to cluster head, will be considered. With using this new method, having symmetric and balanced-sized clusters with cluster heads that have most communications and least faults, will be possible.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.