Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Air Force Institute of Technology

Series

2021

Communication model

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Extending The Quality Of Secure Service Model To Multi-Hop Networks, Paul M. Simon, Scott R. Graham Dec 2021

Extending The Quality Of Secure Service Model To Multi-Hop Networks, Paul M. Simon, Scott R. Graham

Faculty Publications

Rarely are communications networks point-to-point. In most cases, transceiver relay stations exist between transmitter and receiver end-points. These relay stations, while essential for controlling cost and adding flexibility to network architectures, reduce the overall security of the respective network. In an effort to quantify that reduction, we extend the Quality of Secure Service (QoSS) model to these complex networks, specifically multi-hop networks. In this approach, the quantification of security is based upon probabilities that adversarial listeners and disruptors gain access to or manipulate transmitted data on one or more of these multi-hop channels. Message fragmentation and duplication across available channels …


Model For Quantifying The Quality Of Secure Service, Paul M. Simon, Scott R. Graham, Christopher Talbot, Micah J. Hayden May 2021

Model For Quantifying The Quality Of Secure Service, Paul M. Simon, Scott R. Graham, Christopher Talbot, Micah J. Hayden

Faculty Publications

Although not common today, communications networks could adjust security postures based on changing mission security requirements, environmental conditions, or adversarial capability, through the coordinated use of multiple channels. This will require the ability to measure the security of communications networks in a meaningful way. To address this need, in this paper, we introduce the Quality of Secure Service (QoSS) model, a methodology to evaluate how well a system meets its security requirements. This construct enables a repeatable and quantifiable measure of security in a single- or multi-channel network under static configurations. In this approach, the quantification of security is based …