Hardware-in-the-loop network simulation method for cryptographic protocols

Shuqin Dong,Mingqing Zhang,Zhe Fang,Qiangjun Chen,Jian Cheng
DOI: https://doi.org/10.3969/j.issn.1001-3695.2016.10.043
2016-01-01
Abstract:In order to solve the problems of interfaces unsupported,resource deficiencies,and the inability of processing cryptographic protocols when doing cryptographic protocols oriented hardware-in-the-loop (HIL)network simulation,this pa-per proposed an HIL network simulation method for cryptographic protocols.By formally analyzing the modeling environment of HIL network simulation of cryptographic protocols,it gave the key technologies that were used in the process of cryptographic protocols oriented HIL network simulation,and established an HIL network simulation model based on OMNeT++.After that,it analyzed the key questions appeared in the process of simulating cryptographic protocols,and gave effective solutions. At last,taking the application of Internet control message protocol (ICMP)in testing hosts’connectivity as an example,it tested the HIL network simulation method for cryptographic protocols based on encapsulate security payload (ESP)protocol. The simulation results show that,compared with the current HIL network simulation methods,the method for cryptographic protocols can respond the ICMP inquiry messages which are processed by ESP protocol,and effectively make virtual and real hosts do secure communications based on cryptographic protocols.
What problem does this paper attempt to address?