Providing Availability in Secure Routing with Multi-Objective Model

Seyed Mahmood Hashemi

Abstract


Notwithstanding to the previous works on the secure routing, this paper presents a new approach base on two features: at first, presented approach is simple, so all users can understand the process of routing in the network and secondly, the given approach considers different variables independently. The primary concept of security in the presented method is ‘availability,' but the used formula able to include other aspects of the network security. We use links' bandwidth and energy consuming for the route the data packets in nodes for ‘availability’.

Keywords


Security, bandwidth, energy consuming, multi-objective model

Full Text:

PDF

References


Parv Venkitasubramaniam, Parth Pradhan, “Information-Theoretic Security in Stochastic Control Systems”, IEEE, Vol. 103, No. 10, October 2015

Pedro C. Pinto, João Barros, Moe Z.Win,” Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

Pedro C. Pinto, João Barros, Moe Z.Win,” Secure Communication in Stochastic Wireless Networks—Part I: Connectivity”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

Xiaohu Li, Timothy Paul Parker, Shouhuai Xu, “A Stochastic Model for Quantitative Security Analyses of Networked Systems”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 1, JANUARY-FEBRUARY 2011

Stephan Bohacek, Joa˜o P. Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka, “Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 9, SEPTEMBER 2007

VINCENT C.S. LEE, LINYI SHAO, “Estimating Potential IT Security Losses”, IEEE SECURITY & PRIVACY, 2006

Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu, “Modeling and Predicting Cyber Hacking Breaches”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 13, NO. 11, NOVEMBER 2018

Haihui Ge, Lize Gu, Yixian Yang, Kewei Liu, “An Attack Graph Based Network Security Evaluation Model for Hierarchical Network”, 978-1-4244-6943-7/10/$26.00 ©2010 IEEE

Long Gan,Jiming Liu, Xiaolong Jin, “Agent –Based Energy Efficient Routing in Sensor Networks”, AAMAS’04, July 19-23,2004,New York, USA

Cheng Weifang, Liao Xiangke, Shen Changxiang, Li Shanshan, “A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks”, WASA 2006, LNCS 4138,pp.478-489,2006.

Xuanxia yao, Xuefeng Zheng, “A Secure Routing Scheme Based on Multi Objective Optimization in Wireless Sensor Networks”, IEEE, 2008 International Conference on Computational Intelligence and Security

David Airehrour, JairoGutierrez, SayanKumarRay, “Secure routing for internet of things: A survey”, ELSEVIER, Journal of Network and Computer Applications, 2016

Huanlai Xing, Zhaoyuan Wang, Tianrui Li, Hui Li, Rong Qu, “An improved MOEA/D algorithm for multi-objective multicast routingwith network coding”, ELSEVIER, Applied Soft Computing, 2017




DOI: https://doi.org/10.24203/ajas.v7i2.5796

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.