Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain

Edris, E.K.K., Aiash, M., Khoshkholghi, M.A., Naha, R., Chowdhury, A. and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2023) Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things, 24. pp. 1-20. ISSN 2542-6605

[thumbnail of PDF/A]
Preview
PDF (PDF/A)
A.crypto_evaluation.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

The development of cryptographic protocols goes through two stages, namely, security verification and performance analysis. The verification of the protocol’s security properties could be analytically achieved using threat modelling, or formally using formal methods and model checkers. The performance analysis could be mathematical or simulation-based. However, mathematical modelling is complicated and does not reflect the actual deployment environment of the protocol in the current state of the art. Simulation software provides scalability and can simulate complicated scenarios, however, there are times when it is not possible to use simulations due to a lack of support for new technologies or simulation scenarios. Therefore, this paper proposes a formal method and analytical model for evaluating the performance of security protocols using applied pi-calculus and Markov Chain processes. It interprets algebraic processes and associates cryptographic operatives with quantitative measures to estimate and evaluate cryptographic costs. With this approach, the protocols are presented as processes using applied pi-calculus, and their security properties are an approximate abstraction of protocol equivalence based on the verification from ProVerif and evaluated using analytical and simulation models for quantitative measures. The interpretation of the quantities is associated with process transitions, rates, and measures as a cost of using cryptographic primitives. This method supports users’ input in analysing the protocol’s activities and performance. As a proof of concept, we deploy this approach to assess the performance of security protocols designed to protect large-scale, 5G-based Device-to-Device communications. We also conducted a performance evaluation of the protocols based on analytical and network simulator results to compare the effectiveness of the proposed approach.

Item Type: Article
Identifier: 10.1016/j.iot.2023.100913
Additional Information: Gold OA - Read and Publish
Keywords: Security protocols, Formal methods, Formal verification, Applied pi calculus, Performance evaluation, 5G, Edge computing
Subjects: Computing
Depositing User: Jonathan Loo
Date Deposited: 27 Sep 2023 10:36
Last Modified: 04 Nov 2024 11:26
URI: https://repository.uwl.ac.uk/id/eprint/10394

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu