About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
8th International Conference on Performance Evaluation Methodologies and Tools

Research Article

Quantitative Safety and Security Analysis from a Communication Perspective

Download1318 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/icst.valuetools.2014.258185,
        author={Boris Malinowsky and Hans-Peter Schwefel and Oliver Jung},
        title={Quantitative Safety and Security Analysis from a Communication Perspective},
        proceedings={8th International Conference on Performance Evaluation Methodologies and Tools},
        publisher={EAI},
        proceedings_a={VALUETOOLS},
        year={2015},
        month={2},
        keywords={real-time protocol wireless communication authentication safety \& security},
        doi={10.4108/icst.valuetools.2014.258185}
    }
    
  • Boris Malinowsky
    Hans-Peter Schwefel
    Oliver Jung
    Year: 2015
    Quantitative Safety and Security Analysis from a Communication Perspective
    VALUETOOLS
    ICST
    DOI: 10.4108/icst.valuetools.2014.258185
Boris Malinowsky1,*, Hans-Peter Schwefel1, Oliver Jung1
  • 1: FTW
*Contact email: malinowsky@ftw.at

Abstract

This paper introduces and exemplifies a trade-off analysis of safety and security properties in distributed systems. The aim is to support analysis for real-time communication and authentication building blocks in a wireless communication scenario. By embedding an authentication scheme into a real-time communication protocol for safety-critical scenarios, we can rely on the protocol’s individual safety and security properties. The resulting communication protocol satisfies selected safety and security properties for deployment in safety-critical use-case scenarios with security requirements. We look at handover situations in a IEEE 802.11 wireless setup between mobile nodes and access points. The trade-offs involve application-layer data goodput, probability of completed handovers, and effect on usable protocol slots, to quantify the impact of security from a lower-layer communication perspective on the communication protocols. The results are obtained using the network simulator ns-3.

Keywords
real-time protocol wireless communication authentication safety & security
Published
2015-02-19
Publisher
EAI
Appears in
ACM Digital Library
http://dx.doi.org/10.4108/icst.valuetools.2014.258185
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL