Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

T. Vanek, M. Rohlik
2011 Radioengineering  
This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment. Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors network). Authentication of every packet seems to be very effective way to mitigate an attack, however
more » ... ulting in increase of end-to-end delay. To mitigate this drawback, the broadcast authentication protocols have been proposed. Concept of optimization of the broadcast authentication protocol DREAM parameters in a special case of fully N-ary tree and general random topology containing the same amount of nodes with regard to delay and energy consumption minimization is showed in the paper. Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a fully functional model of the protocol.
doaj:773e62b8538a45ed821d09adbc7e364a fatcat:nex7odwsrjah5h6gf3rvk5ggki