Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Article
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
Type | Article |
---|---|
Title | Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain |
Authors | Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. |
Abstract | The development of cryptographic protocols goes through two stages, namely, security verification and performance analysis. The verification of the protocol’s security properties could be analytically achieved using threat modelling, or formally using formal methods and model checkers. The performance analysis could be mathematical or simulation-based. However, mathematical modelling is complicated and does not reflect the actual deployment environment of the protocol in the current state of the art. Simulation software provides scalability and can simulate complicated scenarios, however, there are times when it is not possible to use simulations due to a lack of support for new technologies or simulation scenarios. Therefore, this paper proposes a formal method and analytical model for evaluating the performance of security protocols using applied pi-calculus and Markov Chain processes. It interprets algebraic processes and associates cryptographic operatives with quantitative measures to estimate and evaluate cryptographic costs. With this approach, the protocols are presented as processes using applied pi-calculus, and their security properties are an approximate abstraction of protocol equivalence based on the verification from ProVerif and evaluated using analytical and simulation models for quantitative measures. The interpretation of the quantities is associated with process transitions, rates, and measures as a cost of using cryptographic primitives. This method supports users’ input in analysing the protocol’s activities and performance. As a proof of concept, we deploy this approach to assess the performance of security protocols designed to protect large-scale, 5G-based Device-to-Device communications. We also conducted a performance evaluation of the protocols based on analytical and network simulator results to compare the effectiveness of the proposed approach. |
Keywords | Security protocols; Formal methods; Formal verification; Applied pi calculus; Performance evaluation; 5G; Edge computing |
Sustainable Development Goals | 9 Industry, innovation and infrastructure |
Middlesex University Theme | Sustainability |
Publisher | Elsevier |
Journal | Internet of Things |
ISSN | 2543-1536 |
Electronic | 2542-6605 |
Publication dates | |
Online | 07 Sep 2023 |
Dec 2023 | |
Publication process dates | |
Submitted | 14 Apr 2023 |
Accepted | 14 Aug 2023 |
Deposited | 25 Sep 2023 |
Output status | Published |
Publisher's version | License File Access Level Open |
Digital Object Identifier (DOI) | https://doi.org/10.1016/j.iot.2023.100913 |
Web of Science identifier | WOS:001106587000001 |
Language | English |
https://repository.mdx.ac.uk/item/qy256
Download files
113
total views29
total downloads3
views this month1
downloads this month