2010
DOI: 10.5120/1615-2171
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment

Abstract: In today"s era of the ubiquitous computing, the Internet has become the main mode of data communication. Most of the devices used in wireless/mobile environments, that form wireless networks, ad-hoc networks and wireless sensor networks etc., have low computational power, memory and limited battery power. In such a Pervasive Computing environment, providing security to data becomes a complex task. Elliptic Curve Cryptography (ECC) has become the preferred choice for the pervasive computing environment because … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…ECC does not need pre-computation time, it can create the key pair in a higher speed, providing less storage area and less bandwidth, as well as efficiency and high-speed, as shown in Figure 2. All these features make ECC scalable for implementations of network security protocols and useful in areas such as wireless transactions, cellular phones, electronic cash, handheld computing and smart card applications [12].…”
Section: Efficiency Analysismentioning
confidence: 99%
“…ECC does not need pre-computation time, it can create the key pair in a higher speed, providing less storage area and less bandwidth, as well as efficiency and high-speed, as shown in Figure 2. All these features make ECC scalable for implementations of network security protocols and useful in areas such as wireless transactions, cellular phones, electronic cash, handheld computing and smart card applications [12].…”
Section: Efficiency Analysismentioning
confidence: 99%
“…In our paper, we adopt Elliptic Curve Cryptography (ECC) [12] based on the binary finite field F 2 m . Assume each node n i in the network has a pair of keys (k i , k i .B) where B is a base parameter of ECC and public to all over the network, k i is the private key, and k i .B is the public key.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%
“…More precisely, and not to affect the desired goal of increasing the network capacity aimed from COPE, we adopt the additive homomorphic Elliptic Curve Cryptography (ECC) [12] that, in addition to providing the needed security requirements, is also lightweight and fits our considered scenarios for secure and still good performing network coding using COPE. Our experimental results demonstrate that the performance cost of SCOPE is negligible.…”
Section: Introductionmentioning
confidence: 99%
“…al. [12] have discussed a technique about use of Elliptical Curve Cryptography (ECC) and have presented a review on the current deployment of ECC in the pervasive computing environment.…”
Section: Related Workmentioning
confidence: 99%