The Empirical Evaluation of a Security-Oriented Datagram Protocol

David P. Anderson, Domenico Ferrari, P. Venkat Rangan and B. Sartirana

EECS Department
University of California, Berkeley
Technical Report No. UCB/CSD-87-350
April 1987

http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/CSD-87-350.pdf

Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based study of ADP intended to determine the actual effects of each of those features on the protocol's performance. The experiments were trace-driven, and took place between two workstations in a laboratory setting. The results in every case demonstrated the usefulness of the features in question, but not always for the reasons that motivated their introduction into the design.


BibTeX citation:

@techreport{Anderson:CSD-87-350,
    Author = {Anderson, David P. and Ferrari, Domenico and Rangan, P. Venkat and Sartirana, B.},
    Title = {The Empirical Evaluation of a Security-Oriented Datagram Protocol},
    Institution = {EECS Department, University of California, Berkeley},
    Year = {1987},
    Month = {Apr},
    URL = {http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/5205.html},
    Number = {UCB/CSD-87-350},
    Abstract = {Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based study of ADP intended to determine the actual effects of each of those features on the protocol's performance. The experiments were trace-driven, and took place between two workstations in a laboratory setting. The results in every case demonstrated the usefulness of the features in question, but not always for the reasons that motivated their introduction into the design.}
}

EndNote citation:

%0 Report
%A Anderson, David P.
%A Ferrari, Domenico
%A Rangan, P. Venkat
%A Sartirana, B.
%T The Empirical Evaluation of a Security-Oriented Datagram Protocol
%I EECS Department, University of California, Berkeley
%D 1987
%@ UCB/CSD-87-350
%U http://www2.eecs.berkeley.edu/Pubs/TechRpts/1987/5205.html
%F Anderson:CSD-87-350