Loose Security Protocol Algorithm Design and Performance Analysis Method

被引:0
|
作者
Liu, Kaifen [1 ]
bin Shamsudin, Muhd Amirul Najhan [2 ]
机构
[1] Chongqing Creat Vocat Coll, Chongqing, Peoples R China
[2] Natl Def Univ, Kuala Lumpur, Malaysia
关键词
loose security protocol; algorithm design; performance analysis method;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For the network security problem, this paper proposes a kind of loose security protocol algorithm. The protocol includes two parts: authentication and encryption, which are respectively used for authentication and encryption for the network applications. This paper also adopts OPNET to customize the application modeling method in order to analyze the network performance of the protocol algorithm. The simulation shows that, after analysis and optimization of the algorithm performance through customizing the application model by using OPNET in the design of the loose security protocol algorithm, the algorithm performance has a significant improvement.
引用
收藏
页码:100 / 106
页数:7
相关论文
共 50 条
  • [1] A measure and design method of security protocol
    Wang, T
    Guo, HQ
    Yao, ST
    DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 964 - 970
  • [2] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [3] Authentication-based security protocol design method
    Dept. of Electronic Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    Shanghai Jiaotong Daxue Xuebao, 2006, 3 (524-527):
  • [4] A security analysis method for routing protocol in MANET
    Wang, YL
    Wang, JZ
    Wang, MQ
    Gao, ZM
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 755 - 760
  • [5] A Security Analysis Method for Security Protocol Implementations Based on Message Construction
    Lu, Jintian
    Yao, Lili
    He, Xudong
    Huang, Chintser
    Wang, Dejun
    Meng, Bo
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [6] Formal modeling and security analysis method of security protocol based on CPN
    Gong X.
    Feng T.
    Du J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [7] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [8] The Analysis and Design of Security Protocol on Electrical Bussiness Platform
    Jia, Sumei
    Wang, Feng
    Wang, Wei
    Guo, Ying
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [9] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649
  • [10] Security and performance analysis of the SEAP authentication protocol in MANETs
    Maity, Soumyadev
    Hansdah, R. C.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 24 (03) : 183 - 203