scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A Novel Approach to Secured Network Selection

30 Jun 2012-International Journal of Computer Applications (Foundation of Computer Science (FCS))-Vol. 47, Iss: 3, pp 7-11
TL;DR: A security measurement framework for MANETS based on the five parameters CIANA (Confidentiality, Integrity, Authentication, Non-repudiation and Authorization) has been proposed and AHP and TOPSIS are then applied on the proposed models to select the most secure network amongst a set of heterogeneous networks.
Abstract: Mobile ad-hoc network) is a collection of mobile nodes that communicate over wireless links without having any pre-existing fixed underlying infrastructure. Their dynamically changing topology, lack of central administration and resource constraints makes them prone to security attacks. Quantifying security has always been a difficult task as there is no fixed measure of how secure is secure enough. Moreover, different people have different interpretations for security. In this paper, a security measurement framework for MANETS based on the five parameters CIANA (Confidentiality, Integrity, Authentication, Non-repudiation and Authorization) has been proposed. AHP (Analytic Hierarchy Process) and TOPSIS (Technique for order preference by similarity to Ideal solution) are then applied on the proposed models to select the most secure network amongst a set of heterogeneous networks.

Content maybe subject to copyright    Report

References
More filters
Book ChapterDOI
01 Jan 1985
TL;DR: Analytic Hierarchy Process (AHP) as mentioned in this paper is a systematic procedure for representing the elements of any problem hierarchically, which organizes the basic rationality by breaking down a problem into its smaller constituent parts and then guides decision makers through a series of pairwise comparison judgments to express the relative strength or intensity of impact of the elements in the hierarchy.
Abstract: This chapter provides an overview of Analytic Hierarchy Process (AHP), which is a systematic procedure for representing the elements of any problem hierarchically. It organizes the basic rationality by breaking down a problem into its smaller constituent parts and then guides decision makers through a series of pair-wise comparison judgments to express the relative strength or intensity of impact of the elements in the hierarchy. These judgments are then translated to numbers. The AHP includes procedures and principles used to synthesize the many judgments to derive priorities among criteria and subsequently for alternative solutions. It is useful to note that the numbers thus obtained are ratio scale estimates and correspond to so-called hard numbers. Problem solving is a process of setting priorities in steps. One step decides on the most important elements of a problem, another on how best to repair, replace, test, and evaluate the elements, and another on how to implement the solution and measure performance.

16,547 citations

Book
01 Mar 1981
TL;DR: In this paper, the authors present a classification of MADM methods by data type and propose a ranking method based on the degree of similarity of the MADM method to the original MADM algorithm.
Abstract: I. Introduction.- II. Multiple Attribute Decision Making - An Overview.- 2.1 Basics and Concepts.- 2.2 Classifications of MADM Methods.- 2.2.1 Classification by Information.- 2.2.2 Classification by Solution Aimed At.- 2.2.3 Classification by Data Type.- 2.3 Description of MADM Methods.- Method (1): DOMINANCE.- Method (2): MAXIMIN.- Method (3): MAXIMAX.- Method (4): CONJUNCTIVE METHOD.- Method (5): DISJUNCTIVE METHOD.- Method (6): LEXICOGRAPHIC METHOD.- Method (7): LEXICOGRAPHIC SEMIORDER METHOD.- Method (8): ELIMINATION BY ASPECTS (EBA).- Method (9): LINEAR ASSIGNMENT METHOD (LAM).- Method (10): SIMPLE ADDITIVE WEIGHTING METHOD (SAW).- Method (11): ELECTRE (Elimination et Choice Translating Reality).- Method (12): TOPSIS (Technique for Order Preference by Similarity to Ideal Solution).- Method (13): WEIGHTED PRODUCT METHOD.- Method (14): DISTANCE FROM TARGET METHOD.- III. Fuzzy Sets and their Operations.- 3.1 Introduction.- 3.2 Basics of Fuzzy Sets.- 3.2.1 Definition of a Fuzzy Set.- 3.2.2 Basic Concepts of Fuzzy Sets.- 3.2.2.1 Complement of a Fuzzy Set.- 3.2.2.2 Support of a Fuzzy Set.- 3.2.2.3 ?-cut of a Fuzzy Set.- 3.2.2.4 Convexity of a Fuzzy Set.- 3.2.2.5 Normality of a Fuzzy Set.- 3.2.2.6 Cardinality of a Fuzzy Set.- 3.2.2.7 The mth Power of a Fuzzy Set.- 3.3 Set-Theoretic Operations with Fuzzy Sets.- 3.3.1 No Compensation Operators.- 3.3.1.1 The Min Operator.- 3.3.2 Compensation-Min Operators.- 3.3.2.1 Algebraic Product.- 3.3.2.2 Bounded Product.- 3.3.2.3 Hamacher's Min Operator.- 3.3.2.4 Yager's Min Operator.- 3.3.2.5 Dubois and Prade's Min Operator.- 3.3.3 Full Compensation Operators.- 3.3.3.1 The Max Operator.- 3.3.4 Compensation-Max Operators.- 3.3.4.1 Algebraic Sum.- 3.3.4.2 Bounded Sum.- 3.3.4.3 Hamacher's Max Operator.- 3.3.4.4 Yager's Max Operator.- 3.3.4.5 Dubois and Prade's Max Operator.- 3.3.5 General Compensation Operators.- 3.3.5.1 Zimmermann and Zysno's ? Operator.- 3.3.6 Selecting Appropriate Operators.- 3.4 The Extension Principle and Fuzzy Arithmetics.- 3.4.1 The Extension Principle.- 3.4.2 Fuzzy Arithmetics.- 3.4.2.1 Fuzzy Number.- 3.4.2.2 Addition of Fuzzy Numbers.- 3.4.2.3 Subtraction of Fuzzy Numbers.- 3.4.2.4 Multiplication of Fuzzy Numbers.- 3.4.2.5 Division of Fuzzy Numbers.- 3.4.2.6 Fuzzy Max and Fuzzy Min.- 3.4.3 Special Fuzzy Numbers.- 3.4.3.1 L-R Fuzzy Number.- 3.4.3.2 Triangular (or Trapezoidal) Fuzzy Number.- 3.4.3.3 Proof of Formulas.- 3.4.3.3.1 The Image of Fuzzy Number N.- 3.4.3.3.2 The Inverse of Fuzzy Number N.- 3.4.3.3.3 Addition and Subtraction.- 3.4.3.3.4 Multiplication and Division.- 3.5 Conclusions.- IV. Fuzzy Ranking Methods.- 4.1 Introduction.- 4.2 Ranking Using Degree of Optimality.- 4.2.1 Baas and Kwakernaak's Approach.- 4.2.2 Watson et al.'s Approach.- 4.2.3 Baldwin and Guild's Approach.- 4.3 Ranking Using Hamming Distance.- 4.3.1 Yager's Approach.- 4.3.2 Kerre's Approach.- 4.3.3 Nakamura's Approach.- 4.3.4 Kolodziejczyk's Approach.- 4.4 Ranking Using ?-Cuts.- 4.4.1 Adamo's Approach.- 4.4.2 Buckley and Chanas' Approach.- 4.4.3 Mabuchi's Approach.- 4.5 Ranking Using Comparison Function.- 4.5.1 Dubois and Prade's Approach.- 4.5.2 Tsukamoto et al.'s Approach.- 4.5.3 Delgado et al.'s Approach.- 4.6 Ranking Using Fuzzy Mean and Spread.- 4.6.1 Lee and Li's Approach.- 4.7 Ranking Using Proportion to The Ideal.- 4.7.1 McCahone's Approach.- 4.8 Ranking Using Left and Right Scores.- 4.8.1 Jain's Approach.- 4.8.2 Chen's Approach.- 4.8.3 Chen and Hwang's Approach.- 4.9 Ranking with Centroid Index.- 4.9.1 Yager's Centroid Index.- 4.9.2 Murakami et al.'s Approach.- 4.10 Ranking Using Area Measurement.- 4.10.1 Yager's Approach.- 4.11 Linguistic Ranking Methods.- 4.11.1 Efstathiou and Tong's Approach.- 4.11.2 Tong and Bonissone's Approach.- V. Fuzzy Multiple Attribute Decision Making Methods.- 5.1 Introduction.- 5.2 Fuzzy Simple Additive Weighting Methods.- 5.2.1 Baas and Kwakernaak's Approach.- 5.2.2 Kwakernaak's Approach.- 5.2.3 Dubois and Prade's Approach.- 5.2.4 Cheng and McInnis's Approach.- 5.2.5 Bonissone's Approach.- 5.3 Analytic Hierarchical Process (AHP) Methods.- 5.3.1 Saaty's AHP Approach.- 5.3.2 Laarhoven and Pedrycz's Approach.- 5.3.3 Buckley's Approach.- 5.4 Fuzzy Conjunctive/Disjunctive Method.- 5.4.1 Dubois, Prade, and Testemale's Approach.- 5.5 Heuristic MAUF Approach.- 5.6 Negi's Approach.- 5.7 Fuzzy Outranking Methods.- 5.7.1 Roy's Approach.- 5.7.2 Siskos et al.'s Approach.- 5.7.3 Brans et al.'s Approach.- 5.7.4 Takeda's Approach.- 5.8 Maximin Methods.- 5.8.1 Gellman and Zadeh's Approach.- 5.8.2 Yager's Approach.- 5.9 A New Approach to Fuzzy MADM Problems.- 5.9.1 Converting Linguistic Terms to Fuzzy Numbers.- 5.9.2 Converting Fuzzy Numbers to Crisp Scores.- 5.9.3 The Algorithm.- VI. Concluding Remarks.- 6.1 MADM Problems and Fuzzy Sets.- 6.2 On Existing MADM Solution Methods.- 6.2.1 Classical Methods for MADM Problems.- 6.2.2 Fuzzy Methods for MADM Problems.- 6.2.2.1 Fuzzy Ranking Methods.- 6.2.2.2 Fuzzy MADM Methods.- 6.3 Critiques of the Existing Fuzzy Methods.- 6.3.1 Size of Problem.- 6.3.2 Fuzzy vs. Crisp Data.- 6.4 A New Approach to Fuzzy MADM Problem Solving.- 6.4.1 Semantic Modeling of Linguistic Terms.- 6.4.2 Fuzzy Scoring System.- 6.4.3 The Solution.- 6.4.4 The Advantages of the New Approach.- 6.5 Other Multiple Criteria Decision Making Methods.- 6.5.1 Multiple Objective Decision Making Methods.- 6.5.2 Methods of Group Decision Making under Multiple Criteria.- 6.5.2.1 Social Choice Theory.- 6.5.2.2 Experts Judgement/Group Participation.- 6.5.2.3 Game Theory.- 6.6 On Future Studies.- 6.6.1 Semantics of Linguistic Terms.- 6.6.2 Fuzzy Ranking Methods.- 6.6.3 Fuzzy MADM Methods.- 6.6.4 MADM Expert Decision Support Systems.- VII. Bibliography.

8,629 citations

BookDOI
01 Jan 1981

6,268 citations

Journal ArticleDOI
Hao Yang1, Haiyun Luo1, Fan Ye1, Songwu Lu1, Lixia Zhang1 
TL;DR: The security issues related to this problem are identified, the challenges to security design are discussed, and the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel are reviewed.
Abstract: Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. In this article we focus on the fundamental security problem of protecting the multihop network connectivity between mobile nodes in a MANET. We identify the security issues related to this problem, discuss the challenges to security design, and review the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel. The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction.

970 citations

Proceedings Article
01 Jan 2002
TL;DR: This paper presents a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives, over the wireless link.
Abstract: In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust between strangers. We present a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives. In our approach, devices exchange a limited amount of public information over a privileged side channel, which will then allow them to complete an authenticated key exchange protocol over the wireless link. Our solution does not require a public key infrastructure, is secure against passive attacks on the privileged side channel and all attacks on the wireless link, and directly captures users’ intuitions that they want to talk to a particular previously unknown device in their physical proximity. We have implemented our system in Java for a variety of different devices, communication media, and key

803 citations


"A Novel Approach to Secured Network..." refers background in this paper

  • ...It means that it is impossible (or difficult) for an attacker to transmit in that channel, or at least to transmit without being detected by the legitimate participants [9]....

    [...]