Providing Availability in Secure Routing with Multi-Objective Model

Authors

  • Seyed Mahmood Hashemi Beijing University of Technology Chaoyang, Beijing

DOI:

https://doi.org/10.24203/ajas.v7i2.5796

Keywords:

Security, bandwidth, energy consuming, multi-objective model

Abstract

Notwithstanding to the previous works on the secure routing, this paper presents a new approach base on two features: at first, presented approach is simple, so all users can understand the process of routing in the network and secondly, the given approach considers different variables independently. The primary concept of security in the presented method is ‘availability,' but the used formula able to include other aspects of the network security. We use links' bandwidth and energy consuming for the route the data packets in nodes for ‘availability’.

References

Parv Venkitasubramaniam, Parth Pradhan, “Information-Theoretic Security in Stochastic Control Systemsâ€, IEEE, Vol. 103, No. 10, October 2015

Pedro C. Pinto, João Barros, Moe Z.Win,†Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusionâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

Pedro C. Pinto, João Barros, Moe Z.Win,†Secure Communication in Stochastic Wireless Networks—Part I: Connectivityâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012

Xiaohu Li, Timothy Paul Parker, Shouhuai Xu, “A Stochastic Model for Quantitative Security Analyses of Networked Systemsâ€, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 8, NO. 1, JANUARY-FEBRUARY 2011

Stephan Bohacek, JoaËœo P. Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka, “Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networksâ€, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 9, SEPTEMBER 2007

VINCENT C.S. LEE, LINYI SHAO, “Estimating Potential IT Security Lossesâ€, IEEE SECURITY & PRIVACY, 2006

Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu, “Modeling and Predicting Cyber Hacking Breachesâ€, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 13, NO. 11, NOVEMBER 2018

Haihui Ge, Lize Gu, Yixian Yang, Kewei Liu, “An Attack Graph Based Network Security Evaluation Model for Hierarchical Networkâ€, 978-1-4244-6943-7/10/$26.00 ©2010 IEEE

Long Gan,Jiming Liu, Xiaolong Jin, “Agent –Based Energy Efficient Routing in Sensor Networksâ€, AAMAS’04, July 19-23,2004,New York, USA

Cheng Weifang, Liao Xiangke, Shen Changxiang, Li Shanshan, “A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networksâ€, WASA 2006, LNCS 4138,pp.478-489,2006.

Xuanxia yao, Xuefeng Zheng, “A Secure Routing Scheme Based on Multi Objective Optimization in Wireless Sensor Networksâ€, IEEE, 2008 International Conference on Computational Intelligence and Security

David Airehrour, JairoGutierrez, SayanKumarRay, “Secure routing for internet of things: A surveyâ€, ELSEVIER, Journal of Network and Computer Applications, 2016

Huanlai Xing, Zhaoyuan Wang, Tianrui Li, Hui Li, Rong Qu, “An improved MOEA/D algorithm for multi-objective multicast routingwith network codingâ€, ELSEVIER, Applied Soft Computing, 2017

Downloads

Published

2019-04-30

How to Cite

Hashemi, S. M. (2019). Providing Availability in Secure Routing with Multi-Objective Model. Asian Journal of Applied Sciences, 7(2). https://doi.org/10.24203/ajas.v7i2.5796

Issue

Section

Articles