Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

View/ Open
Date
2011-04Alternative metrics PlumX
http://hdl.handle.net/11012/56812Altmetrics
http://hdl.handle.net/11012/56812
http://hdl.handle.net/11012/56812
Metadata
Show full item recordAbstract
This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment. Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors network). Authentication of every packet seems to be very effective way to mitigate an attack, however resulting in increase of end-to-end delay. To mitigate this drawback, the broadcast authentication protocols have been proposed. Concept of optimization of the broadcast authentication protocol DREAM parameters in a special case of fully N-ary tree and general random topology containing the same amount of nodes with regard to delay and energy consumption minimization is showed in the paper. Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a fully functional model of the protocol.
Keywords
Authentication, protocol, security, DoS, DREAM, N-ary treePersistent identifier
http://hdl.handle.net/11012/56812Document type
Peer reviewedDocument version
Final PDFSource
Radioengineering. 2011, vol. 20, č. 1, s. 167-173. ISSN 1210-2512http://www.radioeng.cz/fulltexts/2011/11_01_167_173.pdf
Collections
- 2011/1 [55]