Cryptographic Protocols' Performance and Network Layer Security of RSMAD

被引:0
|
作者
Sokol, Marcin [1 ]
Gajewski, Slawomir [1 ]
Gajewska, Malgorzata [1 ]
机构
[1] Gdansk Univ Technol, Fac Elect Telecommun & Informat, Dept Radiocommun Syst & Networks, PL-80233 Gdansk, Poland
关键词
AES; AH; ESP; IPsec; RSMAD; Triple-DES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper discusses in a system view the security architecture of network layer of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The safety of this layer of the system is provided basing primarily on Virtual Private Networks (in short VPN). Two protocols have been used for their implementation: IPsec (in tunnel mode of ESP protocol) and L2TP. Applied cryptography data protection mechanisms, including the type and parameters of the VPNs have been selected on the basis of carried out tests and measurements, which results are presented and discussed in this paper. The study presents also detailed comparative analysis in terms of performance AES-128 and Triple-DES algorithms carried out in RSMAD.
引用
收藏
页码:9 / 13
页数:5
相关论文
共 50 条
  • [1] Trust management and network layer security protocols
    Blaze, M
    Ioannidis, J
    Keromytis, AD
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
  • [2] Trust management and network layer security protocols
    Blaze, M
    Anderson, R
    Roe, M
    Lee, S
    Gligor, V
    Christianson, B
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
  • [3] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [4] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [5] Security and composition of multiparty cryptographic protocols
    Canetti, R
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202
  • [6] Security and Composition of Multiparty Cryptographic Protocols
    Ran Canetti
    [J]. Journal of Cryptology, 2000, 13 : 143 - 202
  • [7] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    Nesterenko, A. Yu
    Semenov, A. M.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82
  • [8] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 184 - 215
  • [9] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103
  • [10] Security issues in routing protocols in MANETs at network layer
    Joshi, Praveen
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3