Full metadata record
DC FieldValueLanguage
dc.contributor.authorDoerr, Laurin
dc.contributor.authorFiala, Dalibor
dc.contributor.authorHeigl, Michael
dc.contributor.authorSchramm, Martin
dc.contributor.editorPinker, Jiří
dc.date.accessioned2019-10-15T09:01:29Z
dc.date.available2019-10-15T09:01:29Z
dc.date.issued2017
dc.identifier.citation2017 International Conference on Applied Electronics: Pilsen, 5th – 6th September 2017, Czech Republic, p.45-48.en
dc.identifier.isbn978–80–261–0641–8 (Print)
dc.identifier.isbn978–80–261–0642–5 (Online)
dc.identifier.issn1803–7232 (Print)
dc.identifier.issn1805–9597 (Online)
dc.identifier.urihttp://hdl.handle.net/11025/35406
dc.format4 s.cs
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.publisherZápadočeská univerzita v Plznics
dc.rights© Západočeská univerzita v Plznics
dc.subjectšířka pásmacs
dc.subjectvýpočetní modelovánícs
dc.subjectměření fázecs
dc.subjectměření časucs
dc.subjectmatematický modelcs
dc.subjectautentizace zprávcs
dc.subjecthodnocení výkonnostics
dc.titleAssessment simulation model for uncoupled message authenticationen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedToday's trend of an increasing number of networked embedded devices pervades many areas. Ranging from home automation, industrial or automotive applications with a large number of different protocols, low resources and often high demands on real-time make it difficult to secure the communication of such systems. A concept of an uncoupled MAC which is able to ensure the authenticity and integrity of communication flows between two network parties can be used. This is in particular of advance for outdated legacy components still participating in the network. In this paper a assessment simulation model of the mechanism behind this technology is described. It outlines the probability of detecting an attack depending on the message authentication overhead. The model considers all control variables and performs measurements based on random data traffic. The results of the statistical analysis state that a high attack detection rate can be obtained even with a small communication overhead.en
dc.subject.translatedbandwidthen
dc.subject.translatedcomputational modelingen
dc.subject.translatedphase measurementen
dc.subject.translatedtime measurementen
dc.subject.translatedmathematical modelen
dc.subject.translatedmessage authenticationen
dc.subject.translatedperformance evaluationen
dc.type.statusPeer-revieweden
Appears in Collections:Applied Electronics 2017
Applied Electronics 2017

Files in This Item:
File Description SizeFormat 
Doerr.pdfPlný text1,59 MBAdobe PDFView/Open


Please use this identifier to cite or link to this item: http://hdl.handle.net/11025/35406

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.