Skip to main content

Performance Modelling of Optimistic Fair Exchange

  • Conference paper
  • First Online:
Analytical and Stochastic Modelling Techniques and Applications (ASMTA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9845))

Abstract

In this paper we explore the overhead introduced by secure functions in considering a case study in non-repudiation. We present a model of an optimistic fair exchange protocol specified using the Markovian process algebra PEPA and present results derived using a fluid approximation and stochastic simulation. This system poses an interesting performance problem in that the degree of overhead of the protocol is depended on the degree of misbehaviour by the participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bodei, C., Buchholtz, M., Curti, M., Degano, P., Nielson, F., Nielson, H., Priami, C.: Performance evaluation of security protocols specified in LySa. Electron. Notes Theor. Comput. Sci. 112, 167–189 (2005)

    Article  MATH  Google Scholar 

  2. Bradley, J., Gilmore, S., Hillston, J.: Analysing distributed internet worm attacks using continuous state-space approximation of process algebra models. J. Comput. Syst. Sci. 74(6), 1013–1032 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bradley, J., Gilmore, S., Thomas, N.: Performance analysis of stochastic process algebra models using stochastic simulation. In: Proceedings of 20th IEEE International Parallel and Distributed Processing Symposium. IEEE (2006)

    Google Scholar 

  4. Buchholtz, M., Gilmore, S., Hillston, J., Nielson, F.: Securing statically-verified communications protocols against timing attacks. Electron. Notes Theor. Comput. Sci. 128(4), 123–143 (2005)

    Article  Google Scholar 

  5. Cho, J., Chen, I., Feng, P.: Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile Ad Hoc networks. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications. IEEE (2008)

    Google Scholar 

  6. El-Hadidi, M., Hegazi, N., Aslan, H.: Performance analysis of the Kerberos protocol in a distributed environment. In: Proceedings of the 2nd IEEE Symposium on Computers and Communications. IEEE (1997)

    Google Scholar 

  7. El-Hadidi, M., Hegazi, N., Aslan, H.: Performance evaluation of a new hybrid encryption protocol for authentication and key distribution. In: Proceedings of the International Symposium on Computers and Communications. IEEE (1999)

    Google Scholar 

  8. Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1996)

    Book  MATH  Google Scholar 

  9. Hillston, J.: Fluid flow approximation of PEPA models. In: Second International Conference on the Quantitative Evaluaiton of Systems, pp. 33–43. IEEE Computer Society (2005)

    Google Scholar 

  10. Liu, W., Yang, L., Li, Q., Dai, H., Hou, B.: Performance analytic model for authentication mechanism. In: Proceedings of the International Conference on Networking, Sensing and Control, pp. 1097–1102 (2008)

    Google Scholar 

  11. Meng, T., Wang, Q., Wolter, K.: Security and performance tradeoff analysis of mobile offloading systems under timing attacks. In: Beltran, M., Knottenbelt, W., Bradley, J. (eds.) EPEW 2015. LNCS, vol. 9272, pp. 32–46. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  12. Ray, I., Ray, I.: An optimistic fair exchange E-commerce protocol with automated dispute resolution. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 84–93. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston (2000)

    Google Scholar 

  14. Thomas, N.: Performability of a secure electronic voting algorithm. Electron. Notes Theor. Comput. Sci. 128(4), 45–58 (2005)

    Article  Google Scholar 

  15. Thomas, N., Zhao, Y.: Fluid flow analysis of a model of a secure key distribution centre. In: Proceedings 24th Annual UK Performance Engineering Workshop. Imperial College (2008)

    Google Scholar 

  16. Wang, Y., Lin, C., Li, Q.: Performance analysis of email systems under three types of attacks. Perform. Eval. 67(6), 485–499 (2010)

    Article  MathSciNet  Google Scholar 

  17. Wolter, K., Reinecke, P.: Performance and security tradeoff. In: Aldini, A., Bernardo, M., Di Pierro, A., Wiklicky, H. (eds.) SFM 2010. LNCS, vol. 6154, pp. 135–167. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Zhao, Y., Thomas, N.: Approximate solution of a PEPA model of a key distribution centre. In: Kounev, S., Gorton, I., Sachs, K. (eds.) SIPEW 2008. LNCS, vol. 5119, pp. 44–57. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Zhao, Y., Thomas, N.: Comparing methods for the efficient analysis of PEPA models of non-repudiation protocols. In: Proceedings of the 15th International Conference on Parallel and Distributed Systems, pp. 821–827. IEEE (2009)

    Google Scholar 

  20. Zhao, Y., Thomas, N.: Efficient solutions of a PEPA model of a key distribution centre. Perform. Eval. 67(8), 740–756 (2010)

    Article  Google Scholar 

Download references

Acknowledgements

Dr Zhao was supported by the Fundamental Research Funds for the Central Universities, China University of Geosciences (Wuhan), CUGL150840.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nigel Thomas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhao, Y., Thomas, N. (2016). Performance Modelling of Optimistic Fair Exchange. In: Wittevrongel, S., Phung-Duc, T. (eds) Analytical and Stochastic Modelling Techniques and Applications. ASMTA 2016. Lecture Notes in Computer Science(), vol 9845. Springer, Cham. https://doi.org/10.1007/978-3-319-43904-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43904-4_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-43903-7

  • Online ISBN: 978-3-319-43904-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics