GSPN-based model to evaluate the performance and securi tytradeoff in Ad-hoc network

被引:0
|
作者
Deng J.-Y. [1 ]
Liu Y.-H. [1 ,2 ]
Feng S. [1 ]
Zhao R.-C. [3 ]
Wang J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun
[3] Baidu International Technology (Shenzhen) Co. Ltd., Shenzhen
关键词
Ad-hoc network; Computer application; GSPN model; Performance and security tradeoff; Performance evaluation;
D O I
10.13229/j.cnki.jdxbgxb20181286
中图分类号
学科分类号
摘要
The tradeoff between performance and security has always been a key issue in ad-hoc network research, and many optimization schemes have been proposed by the researchers. However, there has been no a unified quantitative criterion to compare the performance and benefits of these schemes. This paper proposes a widely used method to evaluate performance and security tradeoff in ad-hoc networks. Firstly, GSPN was used to construct the data transmission model within and between nodes. Then the model is abstracted and refined by Petri net. Finally, combining with Continuous-time Markov Chain (CTMC) the method calculates the performance, security and benefits. In this way, the different strategies can be incorporated into the unified evaluation framework, the optimal equilibrium solution can be selected according to the different environments and requirements. Simulations are carried out on data encryption algorithms, key size and strategy selections, which provides theoretical basis and data support to this model for the effective utilization of network resources. © 2020, Jilin University Press. All right reserved.
引用
收藏
页码:255 / 261
页数:6
相关论文
共 15 条
  • [1] Al-Sultan S., Al-Doori M.M., Al-Bayatti A.H., Et al., A comprehensive survey on vehicular Ad Hoc network, Journal of Network & Computer Applications, 37, 1, pp. 380-392, (2014)
  • [2] Deepak, Kumar R., Rishi R., Routing and security analysis in vehicular ad-hoc networks(VANETs), IEEE International Conference on Power Electronics Intelligent Control and Energy Systems (ICPEICES), (2017)
  • [3] Qiu T., Chen N., Li K., Et al., Heterogeneous ad hoc networks: architectures, advances and challenges, Ad Hoc Networks, 55, pp. 143-152, (2016)
  • [4] Wolter K., Reinecke P., Performance and security tradeoff, pp. 135-167, (2010)
  • [5] Zhao Y., Thomas N., Efficient solutions of a PEPA model of a key distribution centre, Performance Evaluation, 67, 8, pp. 740-756, (2010)
  • [6] Aldini A., Trade-off between performance and security, (2011)
  • [7] Kumar N., Chilamkurti N., Collaborative trust aware intelligent intrusion detection in VANETs, Computers & Electrical Engineering, 40, 6, pp. 1981-1996, (2014)
  • [8] Liu Z.C., Xiong L., Peng T., Et al., A realistic distributed conditional privacy-preserving authentication scheme for vehicular Ad-hoc networks, IEEE Access, 6, pp. 26307-26317, (2018)
  • [9] Marsan M.A., Balbo G., Conte G., Et al., Modelling with generalized stochastic petri nets, ACM Sigmetrics Performance Evaluation Review, 26, 2, (1998)
  • [10] Huaizhou Y., Li Z., Web service composition and performance analysis based on GSPN, Computer Engineering, 35, 22, pp. 1-3, (2009)