Abstract
In this paper we explore the overhead introduced by secure functions in considering a case study in non-repudiation. We present a model of an optimistic fair exchange protocol specified using the Markovian process algebra PEPA and present results derived using a fluid approximation and stochastic simulation. This system poses an interesting performance problem in that the degree of overhead of the protocol is depended on the degree of misbehaviour by the participants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bodei, C., Buchholtz, M., Curti, M., Degano, P., Nielson, F., Nielson, H., Priami, C.: Performance evaluation of security protocols specified in LySa. Electron. Notes Theor. Comput. Sci. 112, 167–189 (2005)
Bradley, J., Gilmore, S., Hillston, J.: Analysing distributed internet worm attacks using continuous state-space approximation of process algebra models. J. Comput. Syst. Sci. 74(6), 1013–1032 (2008)
Bradley, J., Gilmore, S., Thomas, N.: Performance analysis of stochastic process algebra models using stochastic simulation. In: Proceedings of 20th IEEE International Parallel and Distributed Processing Symposium. IEEE (2006)
Buchholtz, M., Gilmore, S., Hillston, J., Nielson, F.: Securing statically-verified communications protocols against timing attacks. Electron. Notes Theor. Comput. Sci. 128(4), 123–143 (2005)
Cho, J., Chen, I., Feng, P.: Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile Ad Hoc networks. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications. IEEE (2008)
El-Hadidi, M., Hegazi, N., Aslan, H.: Performance analysis of the Kerberos protocol in a distributed environment. In: Proceedings of the 2nd IEEE Symposium on Computers and Communications. IEEE (1997)
El-Hadidi, M., Hegazi, N., Aslan, H.: Performance evaluation of a new hybrid encryption protocol for authentication and key distribution. In: Proceedings of the International Symposium on Computers and Communications. IEEE (1999)
Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1996)
Hillston, J.: Fluid flow approximation of PEPA models. In: Second International Conference on the Quantitative Evaluaiton of Systems, pp. 33–43. IEEE Computer Society (2005)
Liu, W., Yang, L., Li, Q., Dai, H., Hou, B.: Performance analytic model for authentication mechanism. In: Proceedings of the International Conference on Networking, Sensing and Control, pp. 1097–1102 (2008)
Meng, T., Wang, Q., Wolter, K.: Security and performance tradeoff analysis of mobile offloading systems under timing attacks. In: Beltran, M., Knottenbelt, W., Bradley, J. (eds.) EPEW 2015. LNCS, vol. 9272, pp. 32–46. Springer, Heidelberg (2015)
Ray, I., Ray, I.: An optimistic fair exchange E-commerce protocol with automated dispute resolution. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 84–93. Springer, Heidelberg (2000)
Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison Wesley, Boston (2000)
Thomas, N.: Performability of a secure electronic voting algorithm. Electron. Notes Theor. Comput. Sci. 128(4), 45–58 (2005)
Thomas, N., Zhao, Y.: Fluid flow analysis of a model of a secure key distribution centre. In: Proceedings 24th Annual UK Performance Engineering Workshop. Imperial College (2008)
Wang, Y., Lin, C., Li, Q.: Performance analysis of email systems under three types of attacks. Perform. Eval. 67(6), 485–499 (2010)
Wolter, K., Reinecke, P.: Performance and security tradeoff. In: Aldini, A., Bernardo, M., Di Pierro, A., Wiklicky, H. (eds.) SFM 2010. LNCS, vol. 6154, pp. 135–167. Springer, Heidelberg (2010)
Zhao, Y., Thomas, N.: Approximate solution of a PEPA model of a key distribution centre. In: Kounev, S., Gorton, I., Sachs, K. (eds.) SIPEW 2008. LNCS, vol. 5119, pp. 44–57. Springer, Heidelberg (2008)
Zhao, Y., Thomas, N.: Comparing methods for the efficient analysis of PEPA models of non-repudiation protocols. In: Proceedings of the 15th International Conference on Parallel and Distributed Systems, pp. 821–827. IEEE (2009)
Zhao, Y., Thomas, N.: Efficient solutions of a PEPA model of a key distribution centre. Perform. Eval. 67(8), 740–756 (2010)
Acknowledgements
Dr Zhao was supported by the Fundamental Research Funds for the Central Universities, China University of Geosciences (Wuhan), CUGL150840.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhao, Y., Thomas, N. (2016). Performance Modelling of Optimistic Fair Exchange. In: Wittevrongel, S., Phung-Duc, T. (eds) Analytical and Stochastic Modelling Techniques and Applications. ASMTA 2016. Lecture Notes in Computer Science(), vol 9845. Springer, Cham. https://doi.org/10.1007/978-3-319-43904-4_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-43904-4_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-43903-7
Online ISBN: 978-3-319-43904-4
eBook Packages: Computer ScienceComputer Science (R0)