Cryptographic Protocols' Performance and Network Layer Security of RSMAD

被引:0
|
作者
Sokol, Marcin [1 ]
Gajewski, Slawomir [1 ]
Gajewska, Malgorzata [1 ]
机构
[1] Gdansk Univ Technol, Fac Elect Telecommun & Informat, Dept Radiocommun Syst & Networks, PL-80233 Gdansk, Poland
关键词
AES; AH; ESP; IPsec; RSMAD; Triple-DES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper discusses in a system view the security architecture of network layer of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The safety of this layer of the system is provided basing primarily on Virtual Private Networks (in short VPN). Two protocols have been used for their implementation: IPsec (in tunnel mode of ESP protocol) and L2TP. Applied cryptography data protection mechanisms, including the type and parameters of the VPNs have been selected on the basis of carried out tests and measurements, which results are presented and discussed in this paper. The study presents also detailed comparative analysis in terms of performance AES-128 and Triple-DES algorithms carried out in RSMAD.
引用
收藏
页码:9 / 13
页数:5
相关论文
共 50 条
  • [1] Trust management and network layer security protocols
    Blaze, M
    Ioannidis, J
    Keromytis, AD
    SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
  • [2] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [3] Security and composition of multiparty cryptographic protocols
    Canetti, R
    JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202
  • [4] Trust management and network layer security protocols
    Blaze, M
    Anderson, R
    Roe, M
    Lee, S
    Gligor, V
    Christianson, B
    SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
  • [5] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [6] Security and Composition of Multiparty Cryptographic Protocols
    Ran Canetti
    Journal of Cryptology, 2000, 13 : 143 - 202
  • [7] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    Nesterenko, A. Yu
    Semenov, A. M.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82
  • [8] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 184 - 215
  • [9] Security and composition of cryptographic protocols: A tutorial
    Canetti, R., 1600, IOS Press BV (10):
  • [10] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103