作者
Oleksandr Lemeshko, Oleksandra Yeremenko, Amal Mersni, Juraj Gazda
发表日期
2022/6/16
研讨会论文
2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT)
页码范围
1-6
出版商
IEEE
简介
The paper presents an improved method of confidential messages secure routing over intersecting paths in cyber resilient networks. It allows making fuller use of the available network resources. Within the method, the level of network security of routes, networks, and confidential messages, in general, was assessed due to the compromise probability of the network links. In turn, the message compromise probability is calculated by the formula of total probability, considering the level of network security of bridges in the network structure without prior calculation of disjoint paths set. According to the numerical study results of the method application, the most significant gain in terms of the message compromise probability has been obtained at a relatively low level of cyber threats in the network. The secure routing method was implemented and presented by software prototypes of secure routing protocols that can form …
引用总数
学术搜索中的文章
O Lemeshko, O Yeremenko, A Mersni, J Gazda - 2022 XXVIII International Conference on Information …, 2022