Loose Security Protocol Algorithm Design and Performance Analysis Method

被引:0
|
作者
Liu, Kaifen [1 ]
bin Shamsudin, Muhd Amirul Najhan [2 ]
机构
[1] Chongqing Creat Vocat Coll, Chongqing, Peoples R China
[2] Natl Def Univ, Kuala Lumpur, Malaysia
关键词
loose security protocol; algorithm design; performance analysis method;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For the network security problem, this paper proposes a kind of loose security protocol algorithm. The protocol includes two parts: authentication and encryption, which are respectively used for authentication and encryption for the network applications. This paper also adopts OPNET to customize the application modeling method in order to analyze the network performance of the protocol algorithm. The simulation shows that, after analysis and optimization of the algorithm performance through customizing the application model by using OPNET in the design of the loose security protocol algorithm, the algorithm performance has a significant improvement.
引用
收藏
页码:100 / 106
页数:7
相关论文
共 50 条
  • [21] ANALYSIS AND DESIGN OF ENHANCED RSA ALGORITHM TO IMPROVE THE SECURITY
    Mathur, Shikha
    Goar, Vishal
    Gupta, Deepika
    Kuri, Manoj
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [22] Belief-Based Security Protocol Message Block Design Method
    Liu, Simin
    Ye, Junyao
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 6 - 8
  • [23] Security and performance analysis of a secure clustering protocol for sensor networks
    Banerjee, Pubali
    Jacobson, Doug
    Lahiri, Soumendra Nath
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 145 - +
  • [24] Performance Analysis of Wireless Network Throughput and Security Protocol Integration
    Ochang, Paschal A.
    Irving, Phil
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 71 - 78
  • [25] Adaptive Integral Method Combined with the Loose GMRES Algorithm for Planar Structures Analysis
    Zhuang, W.
    Fan, Z. H.
    Hu, Y. Q.
    INTERNATIONAL JOURNAL OF RF AND MICROWAVE COMPUTER-AIDED ENGINEERING, 2009, 19 (01) : 24 - 32
  • [26] Performance analysis of the EDCC algorithm for IEEE 802.11 protocol
    He, H
    Li, JD
    Sheng, M
    5th World Wireless Congress, Proceedings, 2004, : 727 - 732
  • [27] Design and analysis of a third-party security protocol for storage system
    Huang Jian-zhong
    Xie Chang-sheng
    Zhu Guang-xi
    Zhou Gang
    Wu Wei
    NAS: 2006 INTERNATIONAL WORKSHOP ON NETWORKING, ARCHITECTURE, AND STORAGES, PROCEEDINGS, 2006, : 177 - +
  • [28] A modified algorithm to improve security and performance of AODV protocol against black hole attack
    Shahabi, Sina
    Ghazvini, Mahdieh
    Bakhtiarian, Mehdi
    WIRELESS NETWORKS, 2016, 22 (05) : 1505 - 1511
  • [29] Implementation of Efficient Security Algorithm and Performance Improvement Through ODMRP Protocol in VANET Environment
    Sharma, Prabhat
    Pandey, Sagar
    Jain, Swapnil
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) : 2555 - 2579
  • [30] Design and analysis of a scalable third-party storage security protocol
    Huang Jianzhong
    Xie Changsheng
    Zhong Haifeng
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 20 - 27