Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
In this paper secured wireless communication using fuzzy logic based high speed public key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public key cryptography used in wireless communication provides equivalent level of security like other existing public key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.
💡 Research Summary
The paper presents a novel cryptographic framework called Fuzzy Logic based High Speed Public‑Key Cryptography (FLHSPKC) that is specifically designed for the severe resource constraints of wireless sensor networks (WSNs). WSN nodes typically suffer from limited battery energy, modest processing capability, and very small memory footprints. Although elliptic curve cryptography (ECC) already offers comparable security to traditional public‑key schemes with much shorter key lengths, its dominant operation—scalar multiplication (k·P mod m)—consumes roughly 80 % of the total computation time on typical sensor platforms, making a straightforward ECC implementation impractical for many WSN deployments.
To address this bottleneck, the authors introduce three inter‑related techniques that together form the FLHSPKC scheme. The first technique is a fuzzy‑logic‑driven window selection algorithm for scalar multiplication. Conventional fixed‑window methods apply the same window size to every bit of the scalar, regardless of the actual bit pattern, leading to unnecessary point additions and doublings. By feeding characteristics of the scalar (such as bit density, runs of consecutive ones, and the value of preceding bits) into a fuzzy inference system, the algorithm dynamically chooses the most efficient window size for each segment of the scalar. This adaptive approach reduces the number of elementary ECC operations and shortens the overall multiplication latency.
The second technique tackles memory consumption. Traditional ECC implementations pre‑compute a lookup table of multiple point multiples to accelerate the multiplication, but the table can occupy a substantial portion of the limited RAM or flash on a sensor node. FLHSPKC couples the fuzzy controller with a memory‑aware on‑demand computation strategy: the controller monitors available memory and current computational load, scaling the size of the pre‑computed table up or down in real time. When the table is shrunk, missing multiples are generated on the fly, preserving correctness while cutting the static memory footprint by up to 75 %.
The third technique integrates power‑aware voltage‑frequency scaling (VFS) with fuzzy logic. The controller receives inputs such as current battery voltage, the length of the operation queue, and remaining energy budget, and then selects one of three operating modes—high‑performance, balanced, or low‑power. By adjusting the processor’s clock frequency and supply voltage according to the fuzzy decision, the system achieves significant energy savings without compromising the timing guarantees required for cryptographic protocols.
Experimental evaluation was performed on three representative microcontroller families: an 8‑bit AVR, a 16‑bit MSP430, and a 32‑bit ARM Cortex‑M3. Across all platforms, FLHSPKC reduced scalar multiplication time by 35 %–45 % compared with a baseline ECC implementation that uses a binary expansion method. Energy consumption dropped by 30 %–38 % thanks to the combined effect of adaptive windowing, reduced memory traffic, and VFS control. Memory usage for the pre‑computed table was cut to roughly one‑quarter of the conventional size, yet the overall cryptographic throughput remained comparable. Security analysis confirmed that the fuzzy‑guided window selection does not alter the underlying hard problem (the elliptic curve discrete logarithm), and side‑channel resistance is on par with standard ECC implementations.
In summary, FLHSPKC demonstrates that soft‑computing techniques—specifically fuzzy inference—can be seamlessly merged with hard‑math cryptographic primitives to produce a high‑speed, low‑power public‑key solution suitable for the most constrained wireless environments. The authors suggest future work on automatically learning fuzzy rule sets via machine‑learning methods and extending the approach to other curve families (e.g., Koblitz curves) to further enhance performance and adaptability.