Providing Availability in Secure Routing with Multi-Objective Model
DOI:
https://doi.org/10.24203/ajas.v7i2.5796Keywords:
Security, bandwidth, energy consuming, multi-objective modelAbstract
Notwithstanding to the previous works on the secure routing, this paper presents a new approach base on two features: at first, presented approach is simple, so all users can understand the process of routing in the network and secondly, the given approach considers different variables independently. The primary concept of security in the presented method is ‘availability,' but the used formula able to include other aspects of the network security. We use links' bandwidth and energy consuming for the route the data packets in nodes for ‘availability’.References
Parv Venkitasubramaniam, Parth Pradhan, “Information-Theoretic Security in Stochastic Control Systemsâ€, IEEE, Vol. 103, No. 10, October 2015
Pedro C. Pinto, João Barros, Moe Z.Win,†Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusionâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012
Pedro C. Pinto, João Barros, Moe Z.Win,†Secure Communication in Stochastic Wireless Networks—Part I: Connectivityâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012
Xiaohu Li, Timothy Paul Parker, Shouhuai Xu, “A Stochastic Model for Quantitative Security Analyses of Networked Systemsâ€, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 1, JANUARY-FEBRUARY 2011
Stephan Bohacek, JoaËœo P. Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka, “Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networksâ€, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 9, SEPTEMBER 2007
VINCENT C.S. LEE, LINYI SHAO, “Estimating Potential IT Security Lossesâ€, IEEE SECURITY & PRIVACY, 2006
Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu, “Modeling and Predicting Cyber Hacking Breachesâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 13, NO. 11, NOVEMBER 2018
Haihui Ge, Lize Gu, Yixian Yang, Kewei Liu, “An Attack Graph Based Network Security Evaluation Model for Hierarchical Networkâ€, 978-1-4244-6943-7/10/$26.00 ©2010 IEEE
Long Gan,Jiming Liu, Xiaolong Jin, “Agent –Based Energy Efficient Routing in Sensor Networksâ€, AAMAS’04, July 19-23,2004,New York, USA
Cheng Weifang, Liao Xiangke, Shen Changxiang, Li Shanshan, “A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networksâ€, WASA 2006, LNCS 4138,pp.478-489,2006.
Xuanxia yao, Xuefeng Zheng, “A Secure Routing Scheme Based on Multi Objective Optimization in Wireless Sensor Networksâ€, IEEE, 2008 International Conference on Computational Intelligence and Security
David Airehrour, JairoGutierrez, SayanKumarRay, “Secure routing for internet of things: A surveyâ€, ELSEVIER, Journal of Network and Computer Applications, 2016
Huanlai Xing, Zhaoyuan Wang, Tianrui Li, Hui Li, Rong Qu, “An improved MOEA/D algorithm for multi-objective multicast routingwith network codingâ€, ELSEVIER, Applied Soft Computing, 2017
Downloads
Published
Issue
Section
License
Copyright © The Author(s). This article is published under the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.