In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined according to several selected EC curves and the efficiency of a PC. For the worst case transport scenario, the parameters throughput of network and delay between transmitted and received messages were analysed according to the number of nodes and message lengths.