MODEL IMPROVEMENT OF MESSAGE SECURE ROUTING WITH OPTIMAL BALANCING ITS FRAGMENTS NUMBER TRANSMITTED OVER NON OVERLAPPING PATHS
DOI:
https://doi.org/10.18372/2410-7840.17.8776Keywords:
secure routing, MANET, probability of compromise, number of fragments balancing, path.Abstract
The given work is devoted to improvement andinvestigation of secure routing model with optimalbalancing of message fragments number in mobile selforganizingnetworks. Within the work it was explored theconcept of threshold secret sharing scheme in relation tosecure routing using non overlapping paths for themessage frag-ments transmission. Based on analysis ofdisadvantages of existing mechanism SPREAD it wasproposed the im-provement of fragments allocationmodel which had been reduced to the optimal balancingof message fragments number transmitted over the nonoverlapping paths. It was proposed several optimalitycriterions related to the so-lution of balancing problem.In a comparative analysis it is justified to use on practiceoptimality criterion, providing on the one handminimizing dynamically managed upper bound number offragments transmitted over separate non overlappingpaths in the network, and from the other hand – to adaptto security parameters (probability of compromise) ofindividual network elements: nodes, links and paths.Numerical examples of models with different optimalitycriterion of the solutions obtained, and their comparativeanalysis represented. The comparison results confirmed the effectiveness of the proposed model, when by theworst path in terms of the probability of com-promisetransmitted the minimum number of fragments, and bythe best path – their maximum number.References
Alouneh S. A Multiple LSPs Approach to Secure Data in MPLS Networks / S. Alouneh, A. En-Nouaary, A. Agarwal // Journal of Networks. –2007. – Vol. 2, Issue 4. – PP. 51 – 58.
Alouneh S. A Novel Path Protection Scheme for MPLS Networks using Multi-path Routing / S.Alouneh, A. Agarwal, A. En-Nouaary // Computer
Networks: The International Journal of Computer and Telecommunications Networking. – 2009. –Vol. 53, Issue 9. – PP. 1530 – 1545.
ITU-T X-805. Security architecture for systems providing end-to-end communications, 2003.
Lou W. H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks / W. Lou, Y. Kwon // Vehicular Technology, IEEE Transactions on. – 2006. – Vol. 55, Issue 4. – PP. 1320 – 1330.
Lou W. SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks / W. Lou, W. Liu, Y. Fang // INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications
Societies, IEEE. – 2004. – Vol. 4. – PP. 2404 – 2413.
Manikandan K.P. A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad Hoc Networks / K.P. Manikandan, Dr.R. Satyaprasad, Dr.K. Rajasekhararao // (IJACSA) International Journal of Advanced Computer Science and Applications. – 2011. – Vol. 2, No. 3. – PP. 7 – 12.
Pant R. A Novel Holistic Grading for Network Security / R. Pant, C.N. Khairnar // International Journal of Application or Innovation in Engineering & Management (IJAIEM). – 2014. – Vol. 3, Issue 2. – PP. 41-45.
RFC 2501. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, 1999.
Кулаков Ю.А. Безопасная многопутевая маршрутизация в беспроводных сетях большой размерности. / Ю.А. Кулаков, В.В. Лукашенко, А.В. Левчук // Науково-технічний журнал «Захист інформації». – 2011. – Том 13, №2 (51). – С. 5 – 10.
Чевардін В.Є. Модель загроз безпеки інформації в сучасних телекомунікаційних мережах з динамічною топологією / В.Є. Чевардін, В.А. Романюк, В.С. Шевченко // Збірник наукових праць ВІТІ НТУУ «КПІ». – 2012. – №2. – С. 90 – 95.
Alouneh S., En-Nouaary A., Agarwal A. (2007), “A Multiple LSPs Approach to Secure Data in MPLS Networks”, Journal of Networks, Vol. 2, Issue 4, pp. 51-58.
Alouneh S., Agarwal A., En-Nouaary A. (2009), “A Novel Path Protection Scheme for MPLS Networks using Multi-path Routing”, Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 53, Issue 9, pp. 1530-1545.
ITU-T X-805. Security architecture for systems providing end-to-end communications (2003).
Lou W., Kwon Y. (2006), “H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks”, Vehicular Technology, IEEE Transactions on, Vol. 55, Issue 4, pp. 1320-1330.
Lou W., Liu W., Fang Y. (2004), “SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks”, INFOCOM 2004, Twenty-third Annual
Joint Conference of the IEEE Computer and Communications Societies, IEEE, Vol. 4, pp. 2404-2413.
Manikandan K.P., Satyaprasad Dr.R., Rajasekhararao Dr.K. (2011), “A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad Hoc Networks”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 3, pp. 7-12.
Pant R., Khairnar C.N. (2014), “A Novel Holistic Grading for Network Security”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 3, Issue 2, pp. 41-45.
RFC 2501. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations (1999).
Kulakov Yu.A., Lukashenko V.V., Levchuk A.V. (2011), Secure Multipath Routing in Wireless Networks of large Dimension, Ukrainian Information
Security Research Journal, Vol. 13, №2
(51), pp. 5-10.
Chevardin V.E., Romanyuk V.A., Shevchenko V.S. (2012), Model of Information Security Threats in Modern Telecommunication Networks with Dynamic Topology, Zbirnyk naukovykh prats VITI NTUU
“KPI”, №2, pp. 90-95.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).