-
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Authors:
Kunal Abhishek,
E. George Dharma Prakash Raj
Abstract:
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems was widely used in Cryptographic applications. This paper introduces a new security notation 'trusted security' for computation methods of elliptic curves for cryptography. Three additional "trusted security acceptance criteria" is proposed to be met by the elliptic curves aimed for cryptography. Fu…
▽ More
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems was widely used in Cryptographic applications. This paper introduces a new security notation 'trusted security' for computation methods of elliptic curves for cryptography. Three additional "trusted security acceptance criteria" is proposed to be met by the elliptic curves aimed for cryptography. Further, two cryptographically secure elliptic curves over 256 bit and 384 bit prime fields are demonstrated which are secure from ECDLP, ECC as well as trust perspectives. The proposed elliptic curves are successfully subjected to thorough security analysis and performance evaluation with respect to key generation and signing/verification and hence, proven for their cryptographic suitability and great feasibility for acceptance by the community.
△ Less
Submitted 15 April, 2022;
originally announced August 2022.
-
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Authors:
Kunal Abhishek,
E. George Dharma Prakash Raj
Abstract:
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem and investigate their countermeasures to highlight the evolved selection criteria of cryptograp…
▽ More
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and non-standard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
△ Less
Submitted 15 April, 2022;
originally announced August 2022.
-
Reliable Fleet Analytics for Edge IoT Solutions
Authors:
Emmanuel Raj,
Magnus Westerlund,
Leonardo Espinosa-Leal
Abstract:
In recent years we have witnessed a boom in Internet of Things (IoT) device deployments, which has resulted in big data and demand for low-latency communication. This shift in the demand for infrastructure is also enabling real-time decision making using artificial intelligence for IoT applications. Artificial Intelligence of Things (AIoT) is the combination of Artificial Intelligence (AI) technol…
▽ More
In recent years we have witnessed a boom in Internet of Things (IoT) device deployments, which has resulted in big data and demand for low-latency communication. This shift in the demand for infrastructure is also enabling real-time decision making using artificial intelligence for IoT applications. Artificial Intelligence of Things (AIoT) is the combination of Artificial Intelligence (AI) technologies and the IoT infrastructure to provide robust and efficient operations and decision making. Edge computing is emerging to enable AIoT applications. Edge computing enables generating insights and making decisions at or near the data source, reducing the amount of data sent to the cloud or a central repository. In this paper, we propose a framework for facilitating machine learning at the edge for AIoT applications, to enable continuous delivery, deployment, and monitoring of machine learning models at the edge (Edge MLOps). The contribution is an architecture that includes services, tools, and methods for delivering fleet analytics at scale. We present a preliminary validation of the framework by performing experiments with IoT devices on a university campus's rooms. For the machine learning experiments, we forecast multivariate time series for predicting air quality in the respective rooms by using the models deployed in respective edge devices. By these experiments, we validate the proposed fleet analytics framework for efficiency and robustness.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff
Authors:
A. Bhuvaneswari,
E. George Dharma Prakash Raj,
V. Sinthu Janita Prakash
Abstract:
The process of Vertical handoff has become one of the major components of today's wireless environment due to the availability of the vast variety of signals. The decision for a handoff should be performed catering to the needs of the current transmission that is being carried out. Our paper describes a modified Ant Colony Optimization based handoff mechanism, that considers multiple criteria in i…
▽ More
The process of Vertical handoff has become one of the major components of today's wireless environment due to the availability of the vast variety of signals. The decision for a handoff should be performed catering to the needs of the current transmission that is being carried out. Our paper describes a modified Ant Colony Optimization based handoff mechanism, that considers multiple criteria in its decision making process rather than a single parameter (pheromone intensity). In general, ACO considers the pheromone intensity and the evaporation rates as the parameters for selecting a route. In this paper, we describe a mechanism that determines the evaporation rates of each path connected to the source using various criteria, which in turn reflects on the pheromone levels present in the path and hence the probability of selecting that route. Experiments show that our process exhibits better convergence rates, hence better usability.
△ Less
Submitted 7 May, 2014;
originally announced May 2014.
-
A Novel Cluster Validation Approach on Pso-Pac Mechanism in Ad Hoc Network
Authors:
S. Thirumurugan,
E. George Dharma Prakash Raj
Abstract:
The ad hoc network places a vital role in contemporary days communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters based on swarm intelligence by considering energy as crucial…
▽ More
The ad hoc network places a vital role in contemporary days communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters based on swarm intelligence by considering energy as crucial parameter. This optimized cluster helps to suits the applications where the energy parameter plays a key role. The clusters formed by this mechanism may not ascertain the compactness of the clusters. Thus, this paper proposes D-PAC as an index based validation mechanism to be handled on clusters formed using PSO-PAC. The cluster formation and validation mechanism have been implemented using OMNET++ simulator.
△ Less
Submitted 7 March, 2013;
originally announced April 2013.
-
An Extended Weighted Partitioning Around Cluster Head Mechanism for Ad Hoc Network
Authors:
S. Thirumurugan,
E. George Dharma Prakash Raj
Abstract:
The wireless network places vital role in the present day communication scenario. The ad hoc nature of wireless communication adds flavour to suit various real world applications. This improves the performance of the network tremendously while the clustering mechanism gets added to the ad hoc network. It has been found out that the existing WCA lacks in forming efficient clusters. Thus, this work…
▽ More
The wireless network places vital role in the present day communication scenario. The ad hoc nature of wireless communication adds flavour to suit various real world applications. This improves the performance of the network tremendously while the clustering mechanism gets added to the ad hoc network. It has been found out that the existing WCA lacks in forming efficient clusters. Thus, this work proposes an Extended weighted partitioning around cluster head mechanism by considering W-PAC as a base to form clusters. The cluster members are configured with IPv6 address. This IPv6 clusters formed through W-PAC will be taken further for validation to determine the perfectness of clusters. The cluster formation and maintenance have been implemented in C++ as a programming language. The cluster validation has been carried out using OMNET++ simulator.
△ Less
Submitted 12 January, 2013;
originally announced January 2013.