Analysis of Secure Authentication Protocol WSN AVISPA HLPSL

Analysis of Secure Authentication Protocol WSN AVISPA HLPSL

Performance Analysis of Secure Authentication Protocol for WSN AVISPA HLPSL

Implementation Plan:
——————————-
Step 1: Initially, We define the HLPSL roles for Server, Tag, and Reader, specifying initial states and variables such as identifiers and secret keys.

Step 2: Next, We Implement HLPSL functions for generating unique identifiers (IDT and IDR) and secret keys (KST, KRS, KRT), define message formats for transmitting them between entities, and synchronize timers between the reader and server.

Step 3: Next, We work with the HLPSL roles and functions for generating random numbers and computing ‘s’, specify message formats for transmitting ‘s’ and identifiers during registration, model the storage of ‘s’ and identifiers in the tag, reader, and server, and implement transitions for storing and transmitting data during the registration process.

Step 4: Next, We define the HLPSL roles for generating messages with random numbers and current time, implement message verification steps for mutual authentication using Elliptic Curve Diffie-Hellman, specify message formats for communication between entities, model steps for checking message integrity and authenticity with Elliptic Curve Diffie-Hellman, and define transitions for verifying messages and updating states accordingly.

Step 5: Finally, We plot the metrics such as
5.1: Execution Cost
5.2: Communication Cost
5.3: Storage Cost

Software Requirement:
——————————-
1. Development Tool : AVISPA with HLPSL Tool
2. Development OS : Ubuntu 10.10 LTS

Note:
——-
1) If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
2) Please note that this implementation plan does not include any further steps after it is put into implementation.
3) This project is only based on simulations. Not a real time project.
4) If the above plan satisfies your requirement please confirm with us.

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics