10-04-2017, 08:13 PM
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
When the security and routing protocols are analyzed independently several vulnerabilities of the secure network traffic remains undetected. A joint analysis of security and routing protocols in wireless networks reveals these vulnerabilities of secure network traffic. a class of continuous metrics is developed for evaluating the vulnerability of the network traffic as a function of the routing protocols and security protocols used in the network. The set theory and the circuit theory is used to develop two complementary interpretations of security in the network. a network analyst or an adversary can then easily determine the weaknesses in the secure network. a nonlinear integer programming minimization problem is used to model the node capture attacks using the vulnerability metric. The Greedy Node capture Approximation using Vulnerability Evaluation (GNAVE) algorithm is proposed.
Get the report here:
http://wnss.sv.cmu.edu/papers/tdsc-09.pdf