Journal of Information & Computational Science 11:17 (2014) 6221–6228 Available at http://www.joics.com November 20, 2014 A Data-encrypted Distributed Simulation Framework ? Hongqian Chen a,b , Fengxia Li b,∗, Yuehong Sun a , Li Liu a a School of Computer and Information Engineering, Beijing Technology and Business University Beijing 100048, China b Beijing Key Laboratory of Intelligent Information Technology, Beijing Institute of Technology Beijing 100081, China Abstract To add the feature of data security for the distributed simulation system, the paper propose an dataencrypted distributed simulation framework. The framework introduces the encryption module into the HLA simulation system. The framework adds an encryption module in every federator to obtain more security in data transportation. The encrypt module adopt the chaotic key and the composite discrete chaotic system as encryption scheme. The chaotic system can produce continuous acyclic encrypt key for every data transportation during the whole of simulation. The encryption algorithm can achieve self-synchronization due to its own feature. This framework provides data-protected service for each group of federators with different authority. This framework has been proved feasible and effective. Keywords: Distributed Simulation; Data Security; Composite Discrete Chaotic System; Distributed Network 1 Introduction With the development of the scale and complexity in distributed simulation system, the security of the data transportation processing in the simulation system is one of the most important topics [1]. Encryption is the popular method to achieve the security purpose currently [2]. The simulation system set different key which used to decrypt the cipher data within its authority for each member. But the number of key rises rapidly with the members in simulation system increase [3]. It will be very difficulty to manage huge number of keys. The Chaotic system provides a platform for producing infinite erratic output stream. The chaos system is suit for creating continuous acyclic encrypt key in distributed simulation because of its complex kinetics feature. ? Project supported by the Science and Technology Project of Beijing Municipal Commission of Education (No. PXM2014-014213-000004). Twelfth Five-Year National Science and Technology Support Project (No. 2012BAD29B01-2) and Funding Project for Innovation on Science, Technology and Graduate Education in Institutions of Higher Learning under the Jurisdiction of Beijing Municipality (No. PXM2013-014213-00003000042300). ∗ Corresponding author. Email address: lfx [email protected] (Fengxia Li). 1548–7741 / Copyright © 2014 Binary Information Press DOI: 10.12733/jics20104952 6222 H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 We focus on introducing the chaos-encryption system to the High Level Architecture (HLA). The framework designs an encrypted module for federators, which encrypt any input or output stream for its host. The security of the simulator is obtained via logic and flexible federation construction. The framework can encrypt the data using a synchronous updating stream key while simulation processing. All interfaces used in the framework comply with the standard HLA interface specification. The remainder of this paper is organized as follows: In Section 2, an overview of the HLA architecture, the encryption and related work is given. Section 3 describes in detail this distributed simulation framework design and technical issues arising from this approach. Section 4 presents the analysis of the simulation framework. Finally, Section 5 summarizes the framework. 2 Related Work Data exchange and other services in the HLA framework are realized by the Runtime Infrastructure (RTI). The RTI provides lots of services to support simulations and to carry out federateto-federate interactions. Each of federator in the federation can access the transferring data via RTI services. But it can not prevent data from being revealed in the public network. The data could be exposited un-secretly to non-authority federator in the HLA architecture. Wang [4] designed a distributed simulation architecture based on mobile agents in the existing distributed simulation architecture based on HLA. A new message-oriented active communication mechanism is adopted to ensure the communication among mobile agents reliably and efficiently. Iazeolla [5] introduces a new distributed simulation environment and a new distributed simulation language to help implement the wireless distributed system. The security is one of the most important topics in communication in network. Anagnostou [6] presents a distributed hybrid agent-based discrete event simulation model for the distributed system. Both the ABS and the DES models were developed to achieve communication between models. Ceccarelli [7] apply the biometrics in the management of sessions via a secure protocol for perpetual authentication through continuous user verification. Park [8] replace transport layer of HLA-based distributed simulation system using Data Distribution Service. The wrapper API is adopted to achieve the network control mechanism for data transmission in distributed system. Nouman [9] developed an agent-based model of an ambulance service based on the high level architecture technology. Brito [10] proposes a solution for embedded modeling and simulation of heterogeneous models of computation in a distributed way. Pfeifer [11] presents an expression-level distributed simulation system to observe a decrease the transient analysis time. Duan [12] proposes some management and control techniques for the building and executing to enhance the efficiency of HLA-based distributed simulation system. Chaos is one form of nonlinear dynamic system [13]. It is pseudo-random phenomena between certainty and randomness. It has some interesting features as following. A) It is extremely sensitive to initial condition and parameters. B) It has topological transitivity, which means high randomness. C) The nonlinear system where chaos located is a certain system, which states the system has strong certainty and regularity. The features of chaos are match closely to the requirement in cryptology. H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 6223 The paper proposed a framework for distributed simulation system. The framework has the following feature comparing to the traditional one. A) This framework can achieve the accesscontrolling by authority for members. The encryption function can integrate into the federators as a module. B) The chaos system automatic reproduces the stream encrypt key along with advancing of simulation, while the traditional encryption scheme need to the management and distribution of encrypt key. C) The chaos-based encryption algorithm works on the continuous real numbers set, while the traditional algorithm works on the discrete integer number set. 3 Distributed Simulation Framework with Data-encrypted Transport Module Encryption is the popular method of preventing illegal accessing to data. The fitting encryption method in simulation should achieve the following features: A) The encrypt algorithm is suitable with various block size data. B) The algorithm is efficient to avoid affect the simulation processing. The real time interaction is required generally among federators in simulation. C) The algorithm has special encryption key mechanism to prevent being decoded during the simulation. According to the requirement in the encryption in distributed simulation system, this paper proposes the chaos-based encryption method. The method generates the chaos sequence which can be transformed into binary value via chaos iteration. The binary value sequence was combined into chaos key. The chaos key can be synchronously updated during simulation via chaos iteration. The chaosbased algorithm can achieve the aim of one-time pad encryption because of the updating chaos key [14]. Each federator can obtain the same chaos key at the same time by the time-synchronization in the simulation framework. The procedure of the chaos-based encryption method can be described as Fig. 1. Initial condition Chaotic iteration Clipper data Key XOR Chaos key Fig. 1: The sketch map of chaos-based encryption method The chaos system accomplishes its initialization according to user’s setting. The chaos-based algorithm encrypts data using the chaos key in each data transportation processing. The chaos system rebuilds the encryption key when the simulation system advanced. 3.1 Generating the Logistic-based Encryption Key Logistic mapping equation can be expressed as Eq. (1) xn+1 = µ · xn (1 − xn ) (1) 6224 H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 The equation has the certainly form and includes none of randomness. The iterate result is extremely sensitive to the mapping parameter u. When 3.5699456 . . . ≤ µ ≤ 4, the result of each iteration will be various extremely, which is the irregular chaos phenomenon. The distributed function ρ(x) of the Logistic sequence xi can be expressed as Eq. (2) ρ(x) = √ π 1 x(1−x) 0<x<1 0 other (2) The average x of the sequence xi can be calculated by Eq. (3) Z 1 N −1 1 X x¯ = lim xi = xρ(x)dx N →∞ N 0 i=0 (3) In the Eq. (3), N states the length of the selected sequence produced by Logistic iteration. The stream encryption key in our simulation framework can be obtained via combining binary sequence value. The binary value can be calculated by Eq. (4) ( λi = 3.2 1 xi ≥ x¯ (4) 0 xi < x¯ Composite Discrete Chaotic-based Encryption The iteration in the composite discrete chaotic system [16] depends on both the frontier iteration result and the plain data. The theory of the composite discrete chaotic can be described as Fig. 2. Plain data Composite discrete chaotic Chaos key Encryption algorithm Clipper data Fig. 2: The encryption based on the composite discrete chaotic system There are two iteration equations f0 (x) and f1 (x) in one composite discrete chaotic system. It select one equation f0 (x) or f1 (x) to execute depends on the plain data and the frontier iteration result in each step of iteration. The executing of composite discrete chaotic iteration n depends on the plain data mn−1 and the frontier iteration xn−1 . In the other word, the Ciphers data can not be decrypted if have not the frontier part of the data. The feature can take more security when transport. H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 6225 The iteration formula of the composite discrete chaotic can be described as Eq. (5). ( xn+1 = f0 (xn ), m = 0 (5) f1 (xn ), m = 1 In Eq. (5), m is the current bit of plain data, f0 (x) is the corresponding iteration equation for the current bit 0, while f1 (x) is corresponding to the current bit 1. They can show respectively as Eq. (6) and Eq. (7). ( √ 1 − 1 − 2x, 0 ≤ x < 21 f0 (x) = (6) √ 1 2x − 1, ≤ x < 1 2 ( √ 1 − 2x, 0 ≤ x < 21 f1 (x) = (7) √ 1 − 2x − 1, 21 ≤ x < 1 3.3 Chaos Synchronization Among Federators In the distributed simulation system, the chaos key should be consistent between sender and receiver. If they hold different key, the receiver can not decode the data receiving from the sender. The chaos keys are generated on their own federator. As a result, they must have the same iteration sequence among federators at the same time. There are two discrete chaotic systems in sender federator and receiver federator. The system executed in sender federator can be expressed as Eq. (8) (8) X(k + 1) = F (X(k)) In the Eq. (8), the function X and function F can be processed by Eq. (9) X(k) = (x1 (k), x2 (k), . . . xn (k))T ∈ Rn F (X(k)) = (f1 (X(k)), f2 (X(k)), . . . fn (X(k)))T (9) The system executed in receiver federator can be expressed as Eq. (10) (10) Y (k + 1) = G(Y (k), Xm (k)) In the Eq. (10), the function Y and function G can be processed by Eq. (11) Y (k) ∈ Rm g1 (Y (k), Xm (k)) g2 (Y (k), Xm (k)) G (Y (k), Xm (k)) = ··· gm (Y (k), Xm (k)) (11) 6226 H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 There is one mapping H : Rn → Rm and one number set B = Bx × By ⊂ Rn × Rm . The two systems have the initial condition (X(0), Y (0)) ∈ B . The system in Eq. (10) has the solution (X(k), Y (k)). If the solution can satisfy Eq. (12), the two systems can reach the chaotic selfsynchronization. ° ° lim °Xm (k) − H −1 (Y (k))° = 0 (12) k→∞ The chaotic encryption algorithm based on self-synchronization is unsymmetrical encryption system. It adopts two difference chaotic systems between sender and receiver. The sender federator and the receiver federator can adopt difference encryption key, which obtain higher security than symmetrical encryption system. The sender federator can encrypts the plain text using x(k) sequence, and the receiver federator should use the corresponding v(Y (k)) sequence to decrypt the cryptograph text. 3.4 Distributed Simulation Framework with Data-encrypted Transportation The encryption function is designed to integrate into the federators as a module. In the encryption module-based framework, the federator modifies its source code to add the encryption module on basis of original simulation system. All of the data are encrypted by the module when federator sends data. And all the receiving data also are decrypted by this module before using by the federator. The structure of module-based framework can be described as Fig. 3. Synchronization mechanism Federator Federator Chaos iteration Chaos key Chaos iteration Encryption Encryption Chaos key RTI Fig. 3: The structure of encryption module-based framework The framework based on encryption module has high security and have not to modify the logical relation among the federators. The path of data transferring also has not to be redesigned. The OMT (Object Model Template) files should be modified before simulation. 4 Application and Analysis We realize a small distributed simulation system base on the framework proposed in this paper. The federators in the system have the chaos encryption module. The system encrypts the sim- H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 6227 ulation data using the chaos key. The experimental environment includes Intel Core2 3.0 GHz CPU, 4 GB RAM, Windows 7 OS. The analysis result of the chaos encryption and decryption processing can be shown as Table 1. The analysis includes the average time cost, the key space and the key distribution. Table 1: The analysis result of distributed simulation Cost Time Key Space Key Distribution 35.827 ns 1016+15 0.57 The result demonstrates that the framework can qualified the encryption requirement in the distributed simulation system. The simulation data can be accurately encrypted and decrypted at sender and receiver respectively. The time cost of chaos encryption and decryption is less than 100 ns. 5 Conclusions This paper proposes a distributed simulation framework with data encryption function. The framework obtain more security in data transportation via adding a encrypt module in every federator. The framework has some advantages as following. 1) The encryption Scheme is designed according to the feature of the data security in the system. The Logistic-based algorithm can suit for encrypting any length simulation data. 2) The encryption algorithm can achieve selfsynchronization due to adopting the composite discrete chaotic-based system. The continuous acyclic encrypt key can provide higher security than symmetrical encryption system. 3) The encrypted module integrated into the federator can keep the original logical relation among the federators and data transferring path. This framework has been proved utility and feasible and can provides data-protected service for each group of federators. References [1] Richard M. Fujimoto, Parallel simulation: Parallel and distributed simulation systems, Proceedings of the 33rd Conference on Winter Simulation, Arlington, Virginia, 2001, 147-157 [2] N. Smaoui, A. Karouma, M. Zribi, Secure communications based on the synchronization of the hyperchaotic Chen and the unified chaotic systems, Communications in Nonlinear Science and Numerical Simulation, 16(8), 2011, 3279-3293 [3] R. Ewald, J. Himmelspach, A. M. Uhrmacher, An algorithm selection approach for simulation systems, 22nd Workshop on Principles of Advanced and Distributed Simulation, PADS’08, 2008, 91-98 [4] Cheng Wang, Hua Wu, Xiyu Pang, Guangyuan Zhang, The application research of mobile agent to distributed simulation, International Conference on Computer Science and Service System (CSSS), Nanjing, 2012, 1158-1161 [5] G. Iazeolla, A. Pieroni, D’Ambrogio Andrea et al., A distributed approach to wireless system simulation, Sixth Advanced International Conference on Telecommunications (AICT), Barcelona, 2010, 252-262 6228 H. Chen et al. / Journal of Information & Computational Science 11:17 (2014) 6221–6228 [6] A. Anagnostou, A. Nouman, S. J. E. Taylor, Distributed hybrid agent-based discrete event emergency medical services simulation, Simulation Conference (WSC), Washington, D. C., 2013, 16251636 [7] A. Ceccarelli, L. Montecchi, F. Brancati et al., Continuous and transparent user identity verification for secure internet services, IEEE Transactions on Dependable and Secure Computing, V(PP), Issue 99, 2014, 1-2 [8] Yunjung Park, Dugki Min, Development of HLA-DDS wrapper API for network-controllable distributed simulation, The 7th International Conference on Application of Information and Communication Technologies (AICT), Baku, 2013, 1-5 [9] A. Nouman, A. Anagnostou, S. J. E. Taylor, Developing a distributed agent-based and des simulation using portico and repast, IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Delft, 2013, 97-104 [10] A. V. Brito, A. V. Negreiros, C. Roth et al., Development and evaluation of distributed simulation of embedded systems using ptolemy and HLA, IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Delft, 2013, 189-196 [11] D. Pfeifer, A. Gerstlauer, Expression-level parallelism for distributed spice circuit simulation, IEEE/ACM 15th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Salford, 2011, 12-17 [12] Wei Duan, Yuanzheng Ge, Xiaogang Qiu, Management and control techniques for distributed simulation system, Fifth International Conference on Frontier of Computer Science and Technology (FCST), Changchun, Jilin Province, 2010, 9-16 [13] M. Eisencraft, R. D. Fanganiello, J. M. V. Grzybowski, D. C. Soriano et al., Chaos-based communication systems in non-ideal channels, Communications in Nonlinear Science and Numerical Simulation, 17(12), 2012, 4707-4718 [14] Qiyuan Liu, Youxin Luo, Bin Zeng, The research of composite nonlinear discrete chaos dynamical systems to mechanism synthesis, Advanced Materials Research, 2011, 204-210 [15] Ashraf A. Zaher, Abdulnasser Abu-Rezq, On the design of chaos-based secure communication systems, Communications in Nonlinear Science and Numerical Simulation, 16(9), 2011, 3721-3737
© Copyright 2025