Cryptographic Protocols' Performance and Network Layer Security of RSMAD

被引:0
|
作者
Sokol, Marcin [1 ]
Gajewski, Slawomir [1 ]
Gajewska, Malgorzata [1 ]
机构
[1] Gdansk Univ Technol, Fac Elect Telecommun & Informat, Dept Radiocommun Syst & Networks, PL-80233 Gdansk, Poland
关键词
AES; AH; ESP; IPsec; RSMAD; Triple-DES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper discusses in a system view the security architecture of network layer of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The safety of this layer of the system is provided basing primarily on Virtual Private Networks (in short VPN). Two protocols have been used for their implementation: IPsec (in tunnel mode of ESP protocol) and L2TP. Applied cryptography data protection mechanisms, including the type and parameters of the VPNs have been selected on the basis of carried out tests and measurements, which results are presented and discussed in this paper. The study presents also detailed comparative analysis in terms of performance AES-128 and Triple-DES algorithms carried out in RSMAD.
引用
收藏
页码:9 / 13
页数:5
相关论文
共 50 条
  • [21] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694
  • [22] A Performance Analysis Model for Cryptographic Protocols
    Olagunju, Amos
    Soenneker, Jake
    ICSIT 2011: THE 2ND INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES, 2011, : 80 - 85
  • [23] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
  • [24] Analyzing cryptographic protocols to strengthen HR information security
    Priya, R.
    Selvakumari, R.
    Chandrakala, K. R.
    Krithika, S.
    Rai, Hemangine
    Muthukrishnan, K. Binith
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (08): : 2495 - 2509
  • [25] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
    Samanth, Snehal
    Prema, K. V.
    Balachandra, Mamatha
    IEEE ACCESS, 2024, 12 : 183792 - 183808
  • [26] Using SPIN to verify security properties of cryptographic protocols
    Maggi, P
    Sisto, R
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2002, 2318 : 187 - 204
  • [27] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [28] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [29] Performance analysis of cryptographic protocols on handheld devices
    Argyroudis, PG
    Verma, R
    Tewari, H
    O'Mahony, D
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
  • [30] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
    Piatkowski, Jacek
    Szymoniak, Sabina
    APPLIED SCIENCES-BASEL, 2023, 13 (23):