M. Franeková, P. Holecko, E. Bubeníková, A. Kanáliková
{"title":"Transport scenarios analysis within C2C communications focusing on security aspects","authors":"M. Franeková, P. Holecko, E. Bubeníková, A. Kanáliková","doi":"10.1109/SAMI.2017.7880354","DOIUrl":null,"url":null,"abstract":"In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined according to several selected EC curves and the efficiency of a PC. For the worst case transport scenario, the parameters throughput of network and delay between transmitted and received messages were analysed according to the number of nodes and message lengths.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAMI.2017.7880354","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined according to several selected EC curves and the efficiency of a PC. For the worst case transport scenario, the parameters throughput of network and delay between transmitted and received messages were analysed according to the number of nodes and message lengths.