Loose Security Protocol Algorithm Design and Performance Analysis Method

被引:0
|
作者
Liu, Kaifen [1 ]
bin Shamsudin, Muhd Amirul Najhan [2 ]
机构
[1] Chongqing Creat Vocat Coll, Chongqing, Peoples R China
[2] Natl Def Univ, Kuala Lumpur, Malaysia
关键词
loose security protocol; algorithm design; performance analysis method;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
For the network security problem, this paper proposes a kind of loose security protocol algorithm. The protocol includes two parts: authentication and encryption, which are respectively used for authentication and encryption for the network applications. This paper also adopts OPNET to customize the application modeling method in order to analyze the network performance of the protocol algorithm. The simulation shows that, after analysis and optimization of the algorithm performance through customizing the application model by using OPNET in the design of the loose security protocol algorithm, the algorithm performance has a significant improvement.
引用
收藏
页码:100 / 106
页数:7
相关论文
共 50 条
  • [41] PROTOCOL FOR THE DESIGN, CONDUCT AND INTERPRETATION OF METHOD-PERFORMANCE STUDIES
    HORWITZ, W
    PURE AND APPLIED CHEMISTRY, 1995, 67 (02) : 331 - 343
  • [42] Security research of OSPF protocol by NTRU algorithm
    Yang, Mingxi
    Weng, Jianfeng
    Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2007, 31 (02): : 273 - 276
  • [43] AES Algorithm Applied on Security Protocol of RFID
    Han, Liquan
    Yuan, Fang
    Jiang, Yuqiang
    3RD AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS (CIB 2015), 2015, : 1 - 5
  • [44] THE INTERROGATOR - PROTOCOL SECURITY ANALYSIS
    MILLEN, JK
    CLARK, SC
    FREEDMAN, SB
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 274 - 288
  • [45] Security Analysis of the SASI Protocol
    Cao, Tianjie
    Bertino, Elisa
    Lei, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 73 - 77
  • [46] A security analysis of the OAuth protocol
    Yang, Feng
    Manoharan, Sathiamoorthy
    2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 271 - 276
  • [47] Security Analysis of SKI Protocol
    Babvey, Pouria
    Yajam, Habib Allah
    Eghlidos, Taraneh
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 199 - 203
  • [48] Analysis of a security protocol in μCRL
    Pang, J
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2002, 2495 : 396 - 400
  • [49] Security analysis of the MPOA protocol
    Rampal, S
    Wang, CX
    IEEE SOUTHEASTCON '99, PROCEEDINGS, 1999, : 102 - 105
  • [50] A method for security enhancements in AODV protocol
    Du, XJ
    Ying, W
    Ge, JH
    Wang, YM
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 237 - 240