Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
Comparison of inter-area rekeying algorithms for secure wireless group communications
Performance Evaluation
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Secure Broadcast Communication in Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks
A method for modeling and quantifying the security attributes of intrusion tolerant systems
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Model-Based Validation of an Intrusion-Tolerant Information System
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Security analysis of SITAR intrusion tolerance system
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
While security is of prime concern in secure group communicating systems in wireless networks, security mechanisms employed often have implication on the performance of the system. Recently model-based qualitative evaluation has been used for the evaluation of security protocols to quantify security properties in terms of intrusion tolerance using quantitative modeling techniques. However, most of the prior work focused only on measuring security properties, largely ignoring the performance impact of the security mechanisms introduced into the system. In this paper, we analyze the tradeoff between security and performance properties of an intrusion detection system (IDS) in a wireless group communicating setting. In particular, we analyze how often the IDS should perform intrusion detection to effectively trade security off for performance, or vice versa, for the system to satisfy the application security and performance requirements. Given the mean time to security failure (MTTSF) for the system to reach a failure state, and the response time per rekey operation for the wireless group communicating system as metrics, we identify the optimal intrusion detection rate under which the MTTSF metric can be best traded off for the response time metric.