Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Sciences
Extending The Quality Of Secure Service Model To Multi-Hop Networks, Paul M. Simon, Scott R. Graham
Extending The Quality Of Secure Service Model To Multi-Hop Networks, Paul M. Simon, Scott R. Graham
Faculty Publications
Rarely are communications networks point-to-point. In most cases, transceiver relay stations exist between transmitter and receiver end-points. These relay stations, while essential for controlling cost and adding flexibility to network architectures, reduce the overall security of the respective network. In an effort to quantify that reduction, we extend the Quality of Secure Service (QoSS) model to these complex networks, specifically multi-hop networks. In this approach, the quantification of security is based upon probabilities that adversarial listeners and disruptors gain access to or manipulate transmitted data on one or more of these multi-hop channels. Message fragmentation and duplication across available channels …
Model For Quantifying The Quality Of Secure Service, Paul M. Simon, Scott R. Graham, Christopher Talbot, Micah J. Hayden
Model For Quantifying The Quality Of Secure Service, Paul M. Simon, Scott R. Graham, Christopher Talbot, Micah J. Hayden
Faculty Publications
Although not common today, communications networks could adjust security postures based on changing mission security requirements, environmental conditions, or adversarial capability, through the coordinated use of multiple channels. This will require the ability to measure the security of communications networks in a meaningful way. To address this need, in this paper, we introduce the Quality of Secure Service (QoSS) model, a methodology to evaluate how well a system meets its security requirements. This construct enables a repeatable and quantifiable measure of security in a single- or multi-channel network under static configurations. In this approach, the quantification of security is based …