Performance Analysis of Secure Authentication Protocol for WSN AVISPA HLPSL
Implementation Plan:
——————————-
Step 1: Initially, We define the HLPSL roles for Server, Tag, and Reader, specifying initial states and variables such as identifiers and secret keys.
Step 2: Next, We Implement HLPSL functions for generating unique identifiers (IDT and IDR) and secret keys (KST, KRS, KRT), define message formats for transmitting them between entities, and synchronize timers between the reader and server.
Step 3: Next, We work with the HLPSL roles and functions for generating random numbers and computing ‘s’, specify message formats for transmitting ‘s’ and identifiers during registration, model the storage of ‘s’ and identifiers in the tag, reader, and server, and implement transitions for storing and transmitting data during the registration process.
Step 4: Next, We define the HLPSL roles for generating messages with random numbers and current time, implement message verification steps for mutual authentication using Elliptic Curve Diffie-Hellman, specify message formats for communication between entities, model steps for checking message integrity and authenticity with Elliptic Curve Diffie-Hellman, and define transitions for verifying messages and updating states accordingly.
Step 5: Finally, We plot the metrics such as
5.1: Execution Cost
5.2: Communication Cost
5.3: Storage Cost
Software Requirement:
——————————-
1. Development Tool : AVISPA with HLPSL Tool
2. Development OS : Ubuntu 10.10 LTS
Note:
——-
1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
2) Please note that this implementation plan does not include any further steps after it is put into implementation.
3) This project is only based on simulations. Not a real time project.
4) If the above plan satisfies your requirement please confirm with us.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |