Secure routing in reliable networks: proactive and reactive approach

O Yeremenko, O Lemeshko, A Persikov - Conference on Computer …, 2017 - Springer
In this paper, the approach to providing a given level of information security for multipath
routing of confidential messages in a network is considered. A method for providing secure …

Investigation of the secure paths set calculation approach based on vulnerability assessment

M Yevdokymenko, O Yeremenko, A Shapovalova… - 2021 - openarchive.nure.ua
Анотація An approach to the calculation of secure paths based on the routing model taking
into account information security risks using the basic vulnerability criticality metrics is …

[HTML][HTML] Secure multipath routing algorithm with optimal balancing message fragments in MANET

OS Yeremenko, AS Ali - Радиоэлектроника и информатика, 2015 - cyberleninka.ru
This paper is devoted to the proposition of the algorithm of secure multipath routing with
optimal balancing message fragments number in MANET. The work considered the concept …

A survey on secure multipath routing protocols in WSNs

E Stavrou, A Pitsillides - Computer Networks, 2010 - Elsevier
Routing protocols in wireless sensor networks (WSN) have been substantially investigated
by researches. Most state-of-the-art surveys have focused on reviewing the different routing …

Improvement of EIGRP Protocol Routing Algorithm with the Consideration of Information Security Risk Parameters

A Snihurov, V Chakrian - 2015 - openarchive.nure.ua
Анотація In this paper it's proposed to use the parameter of information security risk in the
formula of EIGRP protocol metric calculation to route the traffic by the most secure paths in …

Toward a taxonomy and attacker model for secure routing protocols

M Hollick, C Nita-Rotaru, P Papadimitratos… - ACM SIGCOMM …, 2017 - dl.acm.org
A secure routing protocol represents a foundational building block of a dependable
communication system. Unfortunately, currently no taxonomy exists to assist in the design …

A multipath routing approach for secure data delivery

W Lou, Y Fang - … for Network-Centric Operations: Creating the …, 2001 - ieeexplore.ieee.org
In this paper, we propose a novel approach to enhance data confidentiality when
transmitting across insecure networks. The idea is to take advantage of the distributed …

Improvement of flow-oriented fast reroute model based on scalable protection solutions for telecommunication network elements

AV Lemeshko, OS Yeremenko… - … and Radio Engineering, 2017 - dl.begellhouse.com
The flow-oriented fast reroute model has been improved. The node and link protection were
formulated in the linear form with implantation of the single path and multipath routing …

Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing

P Narula, SK Dhurandher, S Misra… - Computer Communications, 2008 - Elsevier
Due to their applications in situations such as emergencies, crisis management, military and
healthcare, message security is of paramount importance in mobile ad-hoc networks …

Fast ReRoute scalable solution with protection schemes of network elements

OS Yeremenko, OV Lemeshko… - 2017 IEEE First Ukraine …, 2017 - ieeexplore.ieee.org
The Fast ReRoute flow-based model has been improved, where the node and link
protection schemes in the linear form were formulated with the implementation of single path …