Loose Security Protocol Algorithm Design and Performance Analysis Method

被引:0
|
作者
Liu, Kaifen [1 ]
bin Shamsudin, Muhd Amirul Najhan [2 ]
机构
[1] Chongqing Creat Vocat Coll, Chongqing, Peoples R China
[2] Natl Def Univ, Kuala Lumpur, Malaysia
关键词
loose security protocol; algorithm design; performance analysis method;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For the network security problem, this paper proposes a kind of loose security protocol algorithm. The protocol includes two parts: authentication and encryption, which are respectively used for authentication and encryption for the network applications. This paper also adopts OPNET to customize the application modeling method in order to analyze the network performance of the protocol algorithm. The simulation shows that, after analysis and optimization of the algorithm performance through customizing the application model by using OPNET in the design of the loose security protocol algorithm, the algorithm performance has a significant improvement.
引用
收藏
页码:100 / 106
页数:7
相关论文
共 50 条
  • [31] Implementation of Efficient Security Algorithm and Performance Improvement Through ODMRP Protocol in VANET Environment
    Prabhat Sharma
    Sagar Pandey
    Swapnil Jain
    Wireless Personal Communications, 2022, 123 : 2555 - 2579
  • [32] A modified algorithm to improve security and performance of AODV protocol against black hole attack
    Sina Shahabi
    Mahdieh Ghazvini
    Mehdi Bakhtiarian
    Wireless Networks, 2016, 22 : 1505 - 1511
  • [33] Design and analysis of key scheduling algorithm for symmetric cipher security
    Tiwari V.
    Kameswari U.S.
    Singh A.
    Saxena A.
    International Journal of Information Technology, 2024, 16 (6) : 3991 - 3997
  • [34] Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
    Addas, Rima
    Zhang, Ning
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 500 - 510
  • [35] A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
    Le Fessant, Fabrice
    Papadimitriou, Antonis
    Viana, Aline Carneiro
    Sengul, Cigdem
    Palomar, Esther
    COMPUTER COMMUNICATIONS, 2012, 35 (02) : 234 - 248
  • [36] Security aspects of wireless heterogeneous databases - Protocol, performance, and energy analysis
    Haridas, H
    Hurson, AR
    Jiao, Y
    2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, : 417 - 424
  • [37] Design of Security Neighbor Discovery Protocol
    Liu, Hua Chun
    Dai, Qing Guang
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 538 - 541
  • [38] Design of an Efficient Security Protocol Analyzer
    Kiyomoto, Shinsaku
    Ota, Haruki
    Tanaka, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (06): : 69 - 82
  • [39] Design of Mobile Agents Security protocol
    Ali, Abdul Razak
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 604 - 606
  • [40] Design and Performance Analysis of Cognitive WLAN MAC Protocol
    Dappuri, Bhasker
    Venkatesh, T. G.
    IEEE SYSTEMS JOURNAL, 2018, 12 (03): : 2261 - 2272