Skip to main content

Advertisement

Log in

A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks

  • Research
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Data breaches are a critical issue and have become one of the top widespread risks in today’s data-driven digital environment. Hence, Secure data outsourcing is essential in today’s digital communications. The current interconnected network lack many core features, including privacy and security, which make it vulnerable to data leakages when transmitting sensitive information during critical circumstances (e.g., natural and human disasters). In this paper, we propose a network model that can be employed as a future private network paradigm to promptly and securely transmit confidential data, hence minimizing the chances of breaches. Our schemes provide the following contributions: (1) design a private novel network architecture to disseminate multilevel confidential packets using two routers; (2) Develop several heuristics to reduce an NP-hard problem to find an optimal solution for the studied problem; (3) Employee a developed scheduler for selecting the best algorithm that schedule packets securely and timely through two routers such that critical data packets associated to the same confidential level are prohibited from being transmitted at the same time; (4) conduct an analysis study to compare the developed heuristics and to prove the practicality of the proposed solution. The experimental results show the performance of the proposed heuristics. The results showed that the best heuristic is IFP2 in 84.4% of cases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Al-Sarem, M., Saeed, F., Alsaeedi, A., Boulila, W., Al-Hadhrami, T.: Ensemble methods for instance-based Arabic language authorship attribution. IEEE Access 8, 17331–17345 (2020)

    Article  Google Scholar 

  2. Alharbi, M., Jemmali, M.: Algorithms for investment project distribution on regions. Comput. Intell. Neurosci. (2020). https://doi.org/10.1155/2020/3607547

    Article  Google Scholar 

  3. Alquhayz, H., Jemmali, M.: Fixed urgent window pass for a wireless network with user preferences. Wirel. Pers. Commun. 120(2), 1565–1591 (2021)

    Article  Google Scholar 

  4. Alquhayz, H., Jemmali, M.: Max-min processors scheduling. Inf. Technol. Control 50(1), 5–12 (2021)

    Article  Google Scholar 

  5. Alquhayz, H., Jemmali, M., Otoom, M.M.: Dispatching-rule variants algorithms for used spaces of storage supports. Discrete Dyn. Nat. Soc. (2020)

  6. Araghipour, A., Mostafavi, S.: An improved emergency response routing protocol for internet of things. Wirel. Pers. Commun. pp. 1–24 (2021)

  7. Bell, D.E., La Padula, L.J.: Secure computer system: Unified exposition and multics interpretation. Tech. Rep., MITRE CORP BEDFORD MA (1976)

  8. Boulila, W., Ayadi, Z., Farah, I.R.: Sensitivity analysis approach to model epistemic and aleatory imperfection: application to land cover change prediction model. J. Comput. Sci. 23, 58–70 (2017)

    Article  Google Scholar 

  9. Boulila, W., Farah, I.R., Ettabaa, K.S., Solaiman, B., Ghézala, H.B.: Spatio-temporal modeling for knowledge discovery in satellite image databases. In: CORIA, pp. 35–49 (2010)

  10. Canavan, J.E.: Fundamentals of network security. Artech House 685, 59–69 (2001)

    MATH  Google Scholar 

  11. Carroll, J.M.: Implementing multilevel security by violation privilege. Comput. Secur. 7(6), 563–573 (1988)

    Article  Google Scholar 

  12. Chatfield, A.T., Reddick, C.G.: Cybersecurity innovation in government: A case study of us pentagon’s vulnerability reward program. In: Proceedings of the 18th Annual International Conference on Digital Government Research, pp. 64–73 (2017)

  13. Chua, H.N., Ooi, J.S., Herbland, A.: The effects of different personal data categories on information privacy concern and disclosure. Comput. Secur. 110, 102453 (2021)

    Article  Google Scholar 

  14. Ciampa, M.: CompTIA security+ guide to network security fundamentals. Cengage Learning (2021)

  15. Driss, M., Aljehani, A., Boulila, W., Ghandorh, H., Al-Sarem, M.: Servicing your requirements: an fca and rca-driven approach for semantic web services composition. IEEE Access 8, 59326–59339 (2020)

    Article  Google Scholar 

  16. Fuentes-García, M., Camacho, J., Maciá-Fernández, G.: Present and future of network security monitoring. IEEE Access 9, 112744–112760 (2021)

    Article  Google Scholar 

  17. Garey, M., Johnson, D.: Computers intractability: a guide to the theory of np-completeness (San francisco: Wh freeman) (1979)

  18. Ghaleb, F.A., Maarof, M.A., Zainal, A., Al-rimy, B.A.S., Alsaeedi, A., Boulila, W.: Ensemble-based hybrid context-aware misbehavior detection model for vehicular ad hoc network. Remote Sens. 11(23), 2852 (2019)

    Article  Google Scholar 

  19. Haouari, M., Gharbi, A., Jemmali, M.: Bounding strategies for scheduling on identical parallel machines. In: 2006 International Conference on Service Systems and Service Management, vol. 2, pp. 1162–1166. IEEE (2006)

  20. Harsha, B., Blocki, J., Springer, J., Dark, M.: Bicycle attacks considered harmful: quantifying the damage of widespread password length leakage. Comput. Secur. 100, 102068 (2021)

    Article  Google Scholar 

  21. Hidri, L., Jemmali, M.: Near-optimal solutions and tight lower bounds for the parallel machines scheduling problem with learning effect. RAIRO-Oper. Res. 54(2), 507–527 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  22. Jemmali, M.: Budgets balancing algorithms for the projects assignment. Int. J. Adv. Comput. Sci. Appl. 10(11), 574–578 (2019)

    Google Scholar 

  23. Jemmali, M., Alquhayz, H.: Equity data distribution algorithms on identical routers. In: International Conference on Innovative Computing and Communications, pp. 297–305. Springer (2020)

  24. Jemmali, M., Alquhayz, H.: Time-slots transmission data algorithms into network. In: 2020 International Conference on Computing and Information Technology (ICCIT-1441), pp. 1–4. IEEE (2020)

  25. Jemmali, M., Bashir, A.K., Boulila, W., Melhim, L.K.B., Jhaveri, R.H., Ahmad, J.: An efficient optimization of battery-drone-based transportation systems for monitoring solar power plant. IEEE Transactions on Intelligent Transportation Systems (2022)

  26. Jemmali, M., Hidri, L.: Hybrid flow shop with setup times scheduling problem. Comput. Syst. Sci. Eng. 44(1), 563–577 (2023)

    Article  Google Scholar 

  27. Jemmali, M., Hidri, L.: Bounding schemes for the parallel machine scheduling problem with Dejong’s learning effect. J. Parallel Distrib. Comput. 156, 101–118 (2021)

    Article  Google Scholar 

  28. Jemmali, M., Melhim, L.K.B., Al Fayez, F.: Real time read-frequency optimization for railway monitoring system. RAIRO-Oper. Res. 56(4), 2721–2749 (2022)

    Article  MATH  Google Scholar 

  29. Kizza, J.M.: Kizza, Wheeler: Guide to computer network security, vol. 8. Springer (2013)

  30. Liu, F., Huo, W., Han, Y., Yang, S., Li, X.: Study on network security based on pca and bp neural network under green communication. IEEE Access 8, 53733–53749 (2020)

    Article  Google Scholar 

  31. Mahmoud, M.S., Sabih, M.: Networked event-triggered control: an introduction and research trends. Int. J. General Syst. 43(8), 810–827 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  32. Numani, A., Gulfam, S.M., Javed, M.A., Muhammad, B., Prasad, R., Nawaz, S.J.: Network architecture and wireless ad hoc routing for airborne internet services. Wirel. Pers. Commun. pp. 1–15 (2021)

  33. Pfleeger, C.P., Pfleeger, S.L., Margulies, J.: Security in Computing. Prentice-Hall, Inc. (2015)

  34. Praveen, K., Prathap, P.J.: Energy efficient congestion aware resource allocation and routing protocol for iot network using hybrid optimization techniques. Wirel. Pers. Commun. 117(2), 1187–1207 (2021)

    Article  Google Scholar 

  35. Qiu, T., Qiao, R., Wu, D.O.: Eabs: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans. Mobile Comput. 17(1), 72–84 (2017)

    Article  Google Scholar 

  36. Qiu, T., Zheng, K., Han, M., Chen, C.P., Xu, M.: A data-emergency-aware scheduling scheme for internet of things in smart cities. IEEE Trans. Industr. Inform. 14(5), 2042–2051 (2017)

    Article  Google Scholar 

  37. Ramadhani, E.: Anonymity communication vpn and tor: a comparative study. J. Phys.: Conf. Ser. 983, 012060 (2018)

    Google Scholar 

  38. Rao, Z., Xu, Y., Pan, S.: An intelligent routing method based on network partition. Comput. Commun. 160, 25–33 (2020)

    Article  Google Scholar 

  39. Saleem, J., Adebisi, B., Ande, R., Hammoudeh, M.: A state of the art survey-impact of cyber attacks on sme’s. In: Proceedings of the International Conference on Future Networks and Distributed Systems (2017)

  40. Sarhan, A., Jemmali, M.: Novel intelligent architecture and approximate solution for future networks. Plosone 18(3), e0278183 (2023)

    Article  Google Scholar 

  41. Sarhan, A., Jemmali, M., Ben Hmida, A.: Two routers network architecture and scheduling algorithms under packet category classification constraint. In: The 5th International Conference on Future Networks & Distributed Systems, pp. 119–127 (2021)

  42. Sarhan, A., Lilien, L.: An approach to identity management in clouds without trusted third parties. arXiv preprint arXiv:1904.00880 (2019)

  43. Sarhan, A.Y., Carr, S.: A highly-secure self-protection data scheme in clouds using active data bundles and agent-based secure multi-party computation. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 228–236. IEEE (2017)

  44. Schurgers, C., Srivastava, M.B.: Energy efficient routing in wireless sensor networks. In: 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No. 01CH37277), vol. 1, pp. 357–361. IEEE (2001)

  45. Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., Kambhampati, S.: A survey of moving target defenses for network security. IEEE Commun. Surv. Tutorials 22(3), 1909–1941 (2020)

    Article  Google Scholar 

  46. Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. visual. comput. graph. 18(8), 1313–1329 (2011)

    Article  Google Scholar 

  47. von Solms, S.H., Geldenhuys, J.: Managing multi level security in a military intranet environment. Comput. Secur. 18(3), 257–270 (1999)

    Article  Google Scholar 

  48. Vakilinia, I., Sengupta, S.: Vulnerability market as a public-good auction with privacy preservation. Comput. Secur. 93, 101807 (2020)

    Article  Google Scholar 

  49. Wright, M.A.: The need for information security education. Comput. Fraud Secur. 1998(8), 14–17 (1998)

    Article  Google Scholar 

  50. Wu, Y., Song, W., Cao, Z., Zhang, J., Lim, A.: Learning improvement heuristics for solving routing problems.. IEEE Transactions on Neural Networks and Learning Systems (2021)

  51. Xia, F., Dai, X., Wang, Z., Sun, Y.: Feedback based network scheduling of networked control systems. In: 2005 International Conference on Control and Automation, vol. 2, pp. 1231–1236. IEEE (2005)

  52. Zhang, Dg., Niu, H. I., Liu, S.: Novel peecr-based clustering routing approach. Soft Comput. 21(24), 7313–7323 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under project no. R-2023-458.

Funding

The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under project no. R-2023-458.

Author information

Authors and Affiliations

Authors

Contributions

MJ conceived and designed the experiments, performed the experiments, analyzed the data, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft. ABH coding the proposed algorithms performed the experiments, analyzed the data, authored or reviewed drafts of the paper, and approved the final draft. AS analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.

Corresponding author

Correspondence to Mahdi Jemmali.

Ethics declarations

Conflict of interest

The authors declare no competing interests..

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jemmali, M., Ben Hmida, A. & Sarhan, A. A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks. J Netw Syst Manage 31, 59 (2023). https://doi.org/10.1007/s10922-023-09747-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-023-09747-y

Keywords

Navigation