“…The experiment is set up in two parts: the first part tests the security of the communication strategy on the CESNET2010 topology, as shown in Figure 2, that is, whether the certain points in the flooding network have an impact on the data acquisition, where the main evaluation index is the data correctness and the circled points are those used for flooding attack; The second part tests the key update speed, and the network scale is 100, 200, 300, 400, 500, 600, 700, 800, and 900 CRs. In addition, references 5,6 is selected as the comparison benchmarks, for short PPL and ABS respectively. The experiment assumes that the network nodes and transmission channels are insecure, and the connectivity between any two nodes in the network cannot be guaranteed, and the attack method is flood attack.…”