{"title":"安全网络中Internet密钥交换协议HAIPE仿真","authors":"Chuanfu Zhang, Jiang Yu, Wanzhong Sun, Jinhai Su","doi":"10.1109/CYBERC.2010.52","DOIUrl":null,"url":null,"abstract":"The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Internet Key Exchange (IKE), HAIPEs can establish automated security associations (SA) for this device instead of manually establishing. The additional HAIPEs have an effect upon the network performance to some extent when the security of network is enhanced. In order to quantify the impact of HAIPEs on the end-to-end performance of networks, we designed a cryptographic key agreement protocol simulation scenario to emulate the process of dynamic negotiating security information to establish SAs, and some typical application was configured to execute simulation. This paper describes the HAIPE IKE model and presents a IKE protocol simulation. The simulation results show the process of HAIPEs IKE protocol and the impact of HAIPEs on network performance, and validate the correctness these models.","PeriodicalId":315132,"journal":{"name":"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Internet Key Exchange Protocol Simulation of HAIPE in Security Network\",\"authors\":\"Chuanfu Zhang, Jiang Yu, Wanzhong Sun, Jinhai Su\",\"doi\":\"10.1109/CYBERC.2010.52\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Internet Key Exchange (IKE), HAIPEs can establish automated security associations (SA) for this device instead of manually establishing. The additional HAIPEs have an effect upon the network performance to some extent when the security of network is enhanced. In order to quantify the impact of HAIPEs on the end-to-end performance of networks, we designed a cryptographic key agreement protocol simulation scenario to emulate the process of dynamic negotiating security information to establish SAs, and some typical application was configured to execute simulation. This paper describes the HAIPE IKE model and presents a IKE protocol simulation. The simulation results show the process of HAIPEs IKE protocol and the impact of HAIPEs on network performance, and validate the correctness these models.\",\"PeriodicalId\":315132,\"journal\":{\"name\":\"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERC.2010.52\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2010.52","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet Key Exchange Protocol Simulation of HAIPE in Security Network
The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Internet Key Exchange (IKE), HAIPEs can establish automated security associations (SA) for this device instead of manually establishing. The additional HAIPEs have an effect upon the network performance to some extent when the security of network is enhanced. In order to quantify the impact of HAIPEs on the end-to-end performance of networks, we designed a cryptographic key agreement protocol simulation scenario to emulate the process of dynamic negotiating security information to establish SAs, and some typical application was configured to execute simulation. This paper describes the HAIPE IKE model and presents a IKE protocol simulation. The simulation results show the process of HAIPEs IKE protocol and the impact of HAIPEs on network performance, and validate the correctness these models.