Cryptographic Protocols' Performance and Network Layer Security of RSMAD

被引:0
|
作者
Sokol, Marcin [1 ]
Gajewski, Slawomir [1 ]
Gajewska, Malgorzata [1 ]
机构
[1] Gdansk Univ Technol, Fac Elect Telecommun & Informat, Dept Radiocommun Syst & Networks, PL-80233 Gdansk, Poland
关键词
AES; AH; ESP; IPsec; RSMAD; Triple-DES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper discusses in a system view the security architecture of network layer of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The safety of this layer of the system is provided basing primarily on Virtual Private Networks (in short VPN). Two protocols have been used for their implementation: IPsec (in tunnel mode of ESP protocol) and L2TP. Applied cryptography data protection mechanisms, including the type and parameters of the VPNs have been selected on the basis of carried out tests and measurements, which results are presented and discussed in this paper. The study presents also detailed comparative analysis in terms of performance AES-128 and Triple-DES algorithms carried out in RSMAD.
引用
收藏
页码:9 / 13
页数:5
相关论文
共 50 条
  • [21] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    [J]. ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [22] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    [J]. 2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
  • [23] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    [J]. MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [24] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [25] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [26] Performance analysis of cryptographic protocols on handheld devices
    Argyroudis, PG
    Verma, R
    Tewari, H
    O'Mahony, D
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
  • [27] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [28] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
    Piatkowski, Jacek
    Szymoniak, Sabina
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (23):
  • [29] A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 128 - 143
  • [30] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57