rows et al., 1990) is wanted. These considerations
are based on time influences on chosen security at-
tributes; strictly on their level (value). Time influ-
ences may refer only to specific attributes, such as:
keys, nonces, secrets. The investigation consists in
finding the typical actions, being directly connected
with attributes, in protocol operations and defining the
way of their influences on the attribute value. So, for
each message the time state will be defined as a set of
pair(l
i
,v
j
), where i- the number of a node (operation
in a run), j- the code of attribute. The location l
i
will
be referred to an automaton node which is equivalent
a number of the realized protocol operation (strict op-
eration in communication run). On this stage the com-
munication run is defined.
Definition 3. The time sequence of protocols op-
erations whose elements e
i
are represented by actions
set A
i
= {a
1
,a
2
,..., a
lac(i)
}
i
correcting node attributes
At
i
= {at
1
,at
2
,..., at
la
}
i
(where i - the number of op-
eration in communication run, j- the number of se-
curity attribute, lac(i)- the number of actions, la - the
number of security attributes), which is equivalent au-
tomaton steps (nodes) and can belong to different pro-
tocols and messages is named the communication run:
oi(k, s) → At
i
(k, m), (1)
where:
o(k, s) - s-th operation in k-th protocol,
k - protocol number,
s - operation number in protocol,
m - message code.
It can be noticed that e
i
= {o(k,s)|k = 1,2,..., l p, s =
1,2, ...,ls(k)}, where l p - the number of protocols,
ls(k) - the number of operations in k protocol, and
∀
k
∀e
j>i
(s
j,k
> s
i,k
), i.e. for given k protocol oper-
ations should save a given order. For different pro-
tocols k 6= h∀e
j>i
((s
j,k
> s
i,h
) ∨ (s
j,k
< s
i,h
) ∨ (s
j,k
=
s
i,h
)). Each operation consist of actions a
α(r,s)
r
, where
α(r,s) ∈ {0, 1}, r - the code of action. It can be said
that α(r,s) refers to the present (activation) concrete
action in s-th operation: if α(r, s) = 0 action a
r
is not
present in s-th operation, otherwise r-th action is acti-
vated in this operation.
o(k, s) = {a
α(r(1),s)
r(1)
a
α(r(2),s)
r(2)
,..., a
α(r(1),s)
r(la(s))
}, (2)
where:
r(1), r(2),..., r(la(s)) - the sequence of action codes
in s-th operation,
la(s) - the number of actions in s-th operation.
Generally, a number of actions cannot be ordered in
different operations because only after the operation
is finished the values of state security attributes will
be modified. Therefore, it is proposed to create a sta-
ble list of actions which will be activated for a partic-
ular operation. Transition to new automaton node is
realized by correction node attributes with the help of
the action set of the current ended operation.
4 PARALLEL PROCESS OF
CORRECTION
COMMUNICATION SECURITY
ATTRIBUTES
The corrections of attributes can be realized simulta-
neously. The new recognized action is used with the
help of communication logic rules to activate the set
of attributes. At this moment adequate processor units
start to correct the clock and value of attributes. After
the correction, the medicated attribute is sent to dif-
ferent processors analyzing communication security
level in accordance with particular main factors. The
estimation of acceleration inferring from paralleliza-
tion can be defined as acc = la ∗ (1 + lm f )/2, where
lm f - the number of main factors. The number of
main factors is the sum of number of selected proto-
cols, messages, keys, users, nonce’s (see fig.3). The
main security factor(s) is (are) declared for the current
action. Action usually influences one or several at-
tributes. Analyzing security situation in network sev-
eral (their number is e.g. equal lac) processors can
serve set of communication actions. Therefore, the
acceleration parameter will be estimated as interval
in following way:
accn = [la ∗(1 + lm f )/2;lac ∗la ∗(1+ lm f )/2]. (3)
The upper bound of acceleration (fig.11) is achieved
when the sets of attributes, evoked by actions, are mu-
tually independent: set
a
t(i) ∪ set
a
t( j) = , i, j - the
number of actions (Tudruj and Masko, 2005).
Figure 5: The upper bound of acceleration accn in parallel
security checking variant.
The stages of this algorithm are as follows:
SIMULTECH2014-4thInternationalConferenceonSimulationandModelingMethodologies,Technologiesand
Applications
240