2012
DOI: 10.14569/ijacsa.2012.031023
|View full text |Cite
|
Sign up to set email alerts
|

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

Abstract: Abstract-In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes' inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public-key cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The measurement of the distance between weights using the rule of Euclidean is not even technically applicable. Sarkar and Mandal [34], Sarkar [33], Sarkar and Mandal [35], Mandal and Sarkar [19], Sarkar et al [36] proposed schemes that enhanced the security of the protocol by enhancing the synaptic depths of TPM and henceforth counteracting the attacks of the brute power of the attacker. It is found that the amount of security provided by the TPM synchronization also can be improved by introducing a large set of neurons and entries of each neuron in the hidden layers.…”
Section: Related Workmentioning
confidence: 99%
“…The measurement of the distance between weights using the rule of Euclidean is not even technically applicable. Sarkar and Mandal [34], Sarkar [33], Sarkar and Mandal [35], Mandal and Sarkar [19], Sarkar et al [36] proposed schemes that enhanced the security of the protocol by enhancing the synaptic depths of TPM and henceforth counteracting the attacks of the brute power of the attacker. It is found that the amount of security provided by the TPM synchronization also can be improved by introducing a large set of neurons and entries of each neuron in the hidden layers.…”
Section: Related Workmentioning
confidence: 99%
“…This approach took a long time to complete the synchronization process. Sarkar et al [14], [15], [16], [17], [18] suggested a framework that increased protocol security by improving the Tree Parity Machine's weight range (TPM). It was discovered that increasing the number of neurons in the secret layers increases the level of TPM synchronization security.…”
Section: Related Workmentioning
confidence: 99%
“…The fuzzification is the transformation of numerical data from the input to linguistic terms. The knowledge base provides necessary information for all the components of the fuzzy controller [9][10][11]. The fuzzy inference engine or the logical decision-making is the core (brain) of the controller.…”
Section: Fuzzy Logic Controllermentioning
confidence: 99%