Cryptographic Protocols' Performance and Network Layer Security of RSMAD

被引:0
|
作者
Sokol, Marcin [1 ]
Gajewski, Slawomir [1 ]
Gajewska, Malgorzata [1 ]
机构
[1] Gdansk Univ Technol, Fac Elect Telecommun & Informat, Dept Radiocommun Syst & Networks, PL-80233 Gdansk, Poland
关键词
AES; AH; ESP; IPsec; RSMAD; Triple-DES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper discusses in a system view the security architecture of network layer of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The safety of this layer of the system is provided basing primarily on Virtual Private Networks (in short VPN). Two protocols have been used for their implementation: IPsec (in tunnel mode of ESP protocol) and L2TP. Applied cryptography data protection mechanisms, including the type and parameters of the VPNs have been selected on the basis of carried out tests and measurements, which results are presented and discussed in this paper. The study presents also detailed comparative analysis in terms of performance AES-128 and Triple-DES algorithms carried out in RSMAD.
引用
收藏
页码:9 / 13
页数:5
相关论文
共 50 条
  • [31] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
  • [32] A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Jha, NK
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 128 - 143
  • [33] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57
  • [34] Analysis of security requirements for cryptographic voting protocols (extended abstract)
    Cetinkaya, Orhan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
  • [35] Security and Network Performance Evaluation of KK' Cryptographic Technique in Mobile Adhoc Networks
    Singh, Yudhvir
    Chaba, Yogesh
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1151 - 1156
  • [36] Security protocols and performance
    deCarmo, L
    DR DOBBS JOURNAL, 2000, 25 (11): : 40 - +
  • [37] Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
    Edris, Ed Kamya Kiyemba
    Aiash, Mahdi
    Khoshkholghi, Mohammad Ali
    Naha, Ranesh
    Chowdhury, Abdullahi
    Loo, Jonathan
    INTERNET OF THINGS, 2023, 24
  • [38] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [39] Security Mechanisms in Network Protocols
    Kolodziejczyk, Marcin
    Ogiela, Marek R.
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 427 - 430
  • [40] Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions
    Fattahi, Jaouhar
    Mejri, Mohamed
    Pricop, Emil
    2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, : 1189 - 1196