350 rub
Journal Radioengineering №10 for 2017 г.
Article in number:
Packet loss control method during network nodes and connections overload
Type of article: scientific article
UDC: 621.3
Authors:

N.N. Vasin – Dr. Sc. (Eng.), Professor, Head of Department of Communication Systems, Volga State University of Telecommunications and Informatics (Samara)

E-mail: vasin@psati.ru

E.A. Ivanova – Post-graduate Student, Master, Engineer, Department of Communication Systems, Volga State University of Telecommunications and Informatics (Samara)

E-mail: e.ivanova@psuti.ru

R.V. Chigir – Post-graduate Student, Department of Communication Systems, Volga State University of Telecommunications and Informatics (Samara)

E-mail: rwch63@mail.ru

Abstract:

Issue of packets loss on time of overload on network nodes and connection can be resolved on account of translate an part of traffic at secondary line thru unloaded nodes and connections. Packet loss is increase at increase time of authentication. A method for shortening the execution time of the authentication procedure is proposed. The experiment and the comparative analysis of the performance, existing and proposed algorithms of authentication has been carried out. The advantage of the proposed method has been revealed. It possible to shorten the authentication time by more than 7 times.

Pages: 133-138
References
  1. Kartashevskij V.G. Osnovy’ teorii massovogo obsluzhivaniya. M.: Goryachaya liniya - Telekom. 2013. 130 s.
  2. Uxobotov V.I. Izbranny’e glavy’ teorii nechetkix mnozhestv. Chelyabinsk: Izd-vo Chelyabinskogo gos-nogo un-ta. 2011. 245 s.
  3. Olifer V.G., Olifer N.A. Komp’yuterny’e seti. Princzipy’, texnologii, protokoly’. SPb.: Piter. 2014. 944 s.
  4. Kuan Zh., Chunming T., Ksiangxan Zh., Chunming R. Bezopasny’j protokol autentifikaczii pol’zovatelej dlya seti datchikov pri zaxvate danny’x // Zhurnal oblachny’x komp’yuterny’x vy’chislenij, sistem i prilozhenij. 2015. № 4.
  5. N’yang Dae-Xan, Li Mun-Kyu. Sovershenstvovanie dvuxfaktornogo protokola autentifikaczii Dasa v bezprovodny’x sensorny’x setyax. Arxiv po kriptologii ePrint. Doklad № 631. 21 dekabrya 2009. http://eprint.iacr.org/2009/631.pdf.
  6. Xan M.K., Al’xazbar X. Kriptoanaliz i uluchshenie bezopasnosti «dvuxfaktornoj autentifikaczii pol’zovatelej v besprovodny’x sensorny’x setyax» // Sensory’. 2010. № 10. S. 2450−2459.
  7. Syu-Lyan’ Je, Tyan’-Xo Chen, Pin’-Chuan’ Lyu, Taj-Xu Kim, Sin’-Ue’n Vej. Protokol obespecheniya autentifikaczii v besprovodny’x sensorny’x setyax na osnove kriptografii e’llipticheskix krivy’x // Sensory’. 2011. № 11. S. 4767−4779.
  8. Xan V. Uyazvimosti zashhishhennogo protokola autentifikaczii v besprovodny’x sensorny’x setyax na osnove kriptografii e’llipticheskix krivy’x. Arxiv po kriptologii ePrint. Doklad № 293. 15 maya 2014. http://eprint.iacr.org/2011/293.
Date of receipt: 12 сентября 2017 г.