期刊文献+

An Analysis of HB-MAP Based on OPNET Simulation 被引量:1

An Analysis of HB-MAP Based on OPNET Simulation
原文传递
导出
摘要 HB-MAP (HB-mutual authentication protocol) is a mutual ultra-light-weight authentication protocol we have pro- posed before. In this paper, we present an HB-MAP simulation model. This model is based on the OPNET modeler and includes three parts, namely, the network model, the node model, and the process model. The simulation results are obtained mainly in the aspects of running time, queuing delay, throughput, and channel utilization. To show the performance of HB-MAP, simulation of two other protocols HB and LCAP (load-based concurrent access protocol) is also executed, and comparative analysis is carried out on the results. At the end of the paper, we show a simple process of the attacks and identify that the HB-MAP can defend against some attacks. HB-MAP (HB-mutual authentication protocol) is a mutual ultra-light-weight authentication protocol we have pro- posed before. In this paper, we present an HB-MAP simulation model. This model is based on the OPNET modeler and includes three parts, namely, the network model, the node model, and the process model. The simulation results are obtained mainly in the aspects of running time, queuing delay, throughput, and channel utilization. To show the performance of HB-MAP, simulation of two other protocols HB and LCAP (load-based concurrent access protocol) is also executed, and comparative analysis is carried out on the results. At the end of the paper, we show a simple process of the attacks and identify that the HB-MAP can defend against some attacks.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第1期49-54,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Nature Science Foundation of China(60902061) the National Key Technology R&D Program (2008BAH28B06-05,2012BAH17F01) the National Culture S&T Promotion Program (WHB1002) the National High Iechnology Research and Development Drogram of China(863 Program) (2012AA011702)
关键词 HB-MAP (HB-mutual authentication protocol) OPNET modeler simulation results analytical model HB-MAP (HB-mutual authentication protocol) OPNET modeler simulation results analytical model
  • 相关文献

参考文献11

  • 1Hopper N J, Blum M. Secure human identification protocols [C]// Advances in Cryptology-Asiacrypt'O1, Lecture Notes in Computer Science. Berlin, Heidelberg: Springer-Verlag, 2001 : 52-66.
  • 2Juels A, Weis S A. Authenticating pervasive devices with human protocols [C]// Advances in Cryptology-Crypto 05, Lecture Notes in Computer Science. Berlin, Heidelberg: Springer-Verlag, 2005: 293-308.
  • 3Gilbert H, Robshaw M, Sibert H. Active attack against HB+: a provably secure lightweight authentication protocol [J]. Electronic Letters, 2005, 41:1169-1170.
  • 4Bringer J. HB++: A lightweight authentication protocol se- cure against some attacks [C]// Proc of IEEE Int'l Conf Pervasive Service, Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Berlin, Heidelberg:Springer-Verlag, 2006: 28-33.
  • 5Gilbert H, Matthew J B, Robshaw Y S. HB#: Increasing the security and efficiency of HB+ [C]// Advances in Cryptology EUROCRYPT 2008. Berlin, Heidelberg: Springer-Ver- lag, 2008: 564.
  • 6Hou Fangtian. HB-MAP protocol: A new secure bidirec- tional light-weight authentication protocol of HB [C]//Paper Presented at the Meeting of the 9th IEEE International Con- ference on e-Business. Hangzhou: IEEE Press, 2012.
  • 7Peris-Lopez P, Hemandez-Castro J C, Estevez- Tapiador J, et al. M2AP: A minimalist mutulauthentication protocol for low-cost RFID tags [C]//Proc of International Conference on Ubiquitous Intelligence and Computing - UIC'06. Berlin, Heidelberg: Springer-Verlag, 2006: 912-923.
  • 8Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags proc [C]//Proc of the 2nd Workshop on RFID Security. Washington D C: IEEE Press, 2006.
  • 9Chen Ming. Network Simulation with OPNET [M]. Beijing: The Publishing House of Tsinghua University, 2004(Ch).
  • 10Li Qin, Ye Ming. Network Modeling and Simulation with OPNETModeler [M]. Xi'an: The Publishing House of Xi'an Electronic and Science University, 2006(Ch).

同被引文献4

  • 1Perkins C E.Ad hoc networking[M] .Addison-Wesley Professional, 2008.
  • 2Chakeres I D , Klein-Bemdt L.AODVjr , AODV simplified[J] .ACM SIGMOBILE Mobile Computing and Communications Review, 2002, 6 (3) : 100-101.
  • 3Gao L, Griffin T G, Rexford J.Inherently safe backup routing with BGP[C]//INFOCOM 2001.Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies.Proceedings.IEEE.IEEE, 2001, 1: 547-556.
  • 4ZHANG Qin-juan,WU Mu-qing,ZHEN Yan,SHANG Cui-li School of Telecommunication Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China.AODV routing overhead analysis based on link failure probability in MANET[J].The Journal of China Universities of Posts and Telecommunications,2010,17(5):109-115. 被引量:2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部