Title :
Internet Key Exchange Protocol Simulation of HAIPE in Security Network
Author :
Zhang Chuan-fu ; Yu Jiang ; Sun Wan-zhong ; Su Jin-hai
Author_Institution :
Inst. of Electron. Technol., PLA Inf. Eng. Univ., Zhengzhou, China
Abstract :
The High Assurance Internet Protocol Encrypt or (HAIPE) Interoperability Specification is developed by the US Department of Defense to permit enclaves equipped with compliant gateways to communicate securely over un-trusted networks. Using Internet Key Exchange (IKE), HAIPEs can establish automated security associations (SA) for this device instead of manually establishing. The additional HAIPEs have an effect upon the network performance to some extent when the security of network is enhanced. In order to quantify the impact of HAIPEs on the end-to-end performance of networks, we designed a cryptographic key agreement protocol simulation scenario to emulate the process of dynamic negotiating security information to establish SAs, and some typical application was configured to execute simulation. This paper describes the HAIPE IKE model and presents a IKE protocol simulation. The simulation results show the process of HAIPEs IKE protocol and the impact of HAIPEs on network performance, and validate the correctness these models.
Keywords :
Internet; computer network security; cryptographic protocols; internetworking; open systems; HAIPE IKE protocol model; Internet key exchange protocol simulation; automated security associations; cryptographic key agreement protocol simulation; dynamic negotiating security information process; gateways; high assurance Internet protocol encrypt; interoperability specification; security network; Encryption; IP networks; Internet; Peer to peer computing; Protocols; Cryptographic key agreement; HAIPE; IKE; simulation;
Conference_Titel :
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2010 International Conference on
Conference_Location :
Huangshan
Print_ISBN :
978-1-4244-8434-8
Electronic_ISBN :
978-0-7695-4235-5
DOI :
10.1109/CyberC.2010.52