GSPN-based model to evaluate the performance and securi tytradeoff in Ad-hoc network

被引:0
|
作者
Deng J.-Y. [1 ]
Liu Y.-H. [1 ,2 ]
Feng S. [1 ]
Zhao R.-C. [3 ]
Wang J. [1 ,2 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun
[2] Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun
[3] Baidu International Technology (Shenzhen) Co. Ltd., Shenzhen
关键词
Ad-hoc network; Computer application; GSPN model; Performance and security tradeoff; Performance evaluation;
D O I
10.13229/j.cnki.jdxbgxb20181286
中图分类号
学科分类号
摘要
The tradeoff between performance and security has always been a key issue in ad-hoc network research, and many optimization schemes have been proposed by the researchers. However, there has been no a unified quantitative criterion to compare the performance and benefits of these schemes. This paper proposes a widely used method to evaluate performance and security tradeoff in ad-hoc networks. Firstly, GSPN was used to construct the data transmission model within and between nodes. Then the model is abstracted and refined by Petri net. Finally, combining with Continuous-time Markov Chain (CTMC) the method calculates the performance, security and benefits. In this way, the different strategies can be incorporated into the unified evaluation framework, the optimal equilibrium solution can be selected according to the different environments and requirements. Simulations are carried out on data encryption algorithms, key size and strategy selections, which provides theoretical basis and data support to this model for the effective utilization of network resources. © 2020, Jilin University Press. All right reserved.
引用
收藏
页码:255 / 261
页数:6
相关论文
共 15 条
  • [11] Shi Z.S., Wang C.F., Zheng P., Et al., An energy consumption prediction model based on GSPN for wireless sensor networks, International Conference on Computational & Information Sciences, (2011)
  • [12] Zhao X., Malasse O., Buchheit G., Verification of safety integrity level of high demand system based on Stochastic Petri Nets and Monte Carlo simulation, Reliability Engineering & System Safety, 184, pp. 258-265, (2019)
  • [13] Ma X., Chen X., Saturation Performance of IEEE 802.11 broadcast networks, IEEE Communications Letters, 11, 8, pp. 686-688, (2007)
  • [14] Ma X., Chen X., Performance Analysis of IEEE 802.11 broadcast scheme in Ad Hoc wireless LANs, IEEE Transactions on Vehicular Technology, 57, 6, pp. 3757-3768, (2008)
  • [15] Al Tamimi A.K., Performance analysis of data encryption algorithms