Performance Evaluation of Security Protocols

نویسندگان

  • Béla Genge
  • Piroska Haller
چکیده

We propose a comparative performance evaluation of security protocols. The novelty of our approach lies in the use of a polynomial mathematical model that captures the performance of classes of cryptographic algorithms instead of capturing the performance of each algorithm separately, approach that is used in other papers. A major advantage of using such a model is that it does not require implementation-specific information, because the decision is based on comparing the estimated performances of protocols instead of actually evaluating them. The approach is validated by comparatively evaluating the performances of 1000 automatically generated security protocols against the performances of their actual implementations. Abstract În cadrul acestei lucrări propunem o metodă comparativă de evaluare a performanŃelor protocoalelor de securitate. Noutatea metodei constă în utilizarea unui model matematic polinomial ce capturează performanŃa claselor de algoritmi criptografici, faŃă de capturarea performanŃei fiecărui algoritm în parte, după cum s-a procedat în alte lucrări. Un avantaj major al acestui model este că nu necesită informaŃii legate de implementarea protocoalelor, întrucât decizia este luată prin compararea performanŃelor estimate şi nu prin compararea performanŃelor măsurate. Metoda propusă este validată prin evaluarea comparativă a 1000 de protocoale de securitate generate automat, raportat la performanŃele măsurate ale acestora.În cadrul acestei lucrări propunem o metodă comparativă de evaluare a performanŃelor protocoalelor de securitate. Noutatea metodei constă în utilizarea unui model matematic polinomial ce capturează performanŃa claselor de algoritmi criptografici, faŃă de capturarea performanŃei fiecărui algoritm în parte, după cum s-a procedat în alte lucrări. Un avantaj major al acestui model este că nu necesită informaŃii legate de implementarea protocoalelor, întrucât decizia este luată prin compararea performanŃelor estimate şi nu prin compararea performanŃelor măsurate. Metoda propusă este validată prin evaluarea comparativă a 1000 de protocoale de securitate generate automat, raportat la performanŃele măsurate ale acestora. Összefoglaló A dolgozatban egy új teljesítmény analízis módszert javasolunk adatbiztonsági protokollokra. Az eddig javasolt módszerek a megvalósítások teljesítményét mérték és nem vizsgálták külön az egyes algoritmusokat. A módszer újdonsága abban áll, hogy a protokollokban használt algoritmusok teljesítményét egy polinomiális közelítı függvény segítségével írjuk le a bennük szereplı paraméterek függvényében. A javasolt eljárás fı elınye, hogy nem szükséges információkat tudni a megvalósításról az algoritmusok vagy paramétereik kivalsztásánál, mert a döntés a becsült, összehasonlított teljesítmények alapján történik. A javasolt módszert 1000 generált adatbiztonsági protokoll teljesítmény analízisével érvényesítettük, összehasonlítva a megvalósított protokollok lemért teljesítményével.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Automated Comparative Performance Evaluation of Security Protocols

We propose a comparative performance evaluation method for security protocols. We start by constructing a security protocol model where we assign a cost functions for each cryptographic operation. For each class of cryptographic operations (e.g. symmetric encryption, asymmetric decryption), we construct a polynomial function based on an exhaustive performance evaluation of cryptographic combina...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Performance Evaluation of Distributed Security Protocols Using Discrete Event Simulation

The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in large networks, we need public key infrastructures (PKIs). Protocols that distribute and validate certificates introduce additional complexities and co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0910.3765  شماره 

صفحات  -

تاریخ انتشار 2009