Skip to main content

Security Attributes Quantifying for Intrusion Tolerant in Mobile Network Based on SMP

  • Chapter
  • First Online:
Recent Advances in Computer Science and Information Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 126))

  • 110 Accesses

Abstract

For the mobile wireless networks’s physical properties of restrictions, I reduce appropriately Madan’s based semi-Markov process model so that it can adapt to the security requirement of mobile communication. In this paper, we propose a framework for optimizing the dynamic behavior of SMP, and use it to analyze the system parameters. Using embedded DTMC solve the system safety indicators, including system availability, reliability and services rate, and the corresponding numerical analysis results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K., Jou, F.: SITAR: A scalable intrusion-tolerant architecture for distributed services. In: Proc. of 2nd Annual IEEE Systems, Man, and Cybernetics Informations Assurance Workshop, West Point, NY (June 2001)

    Google Scholar 

  2. Madana, B.B., Popstojanova, K.G., Vaidyanathan, K., et al.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation 56(1-4), 167–186 (2004)

    Article  Google Scholar 

  3. Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd edn. John Wiley & Sons (2001)

    Google Scholar 

  4. Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications. Wiley Press, New York (2001)

    Google Scholar 

  5. Medhi, J.: Stochastic Processes. Wiley Eastern, New Delhi (1994)

    MATH  Google Scholar 

  6. Third Generation Partnership Project (3GPP), Rationale and Track of Security Decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 8), 3GPP TS 33.821 v1.0.0 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqiang Di .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this chapter

Cite this chapter

Di, X., Yang, H. (2012). Security Attributes Quantifying for Intrusion Tolerant in Mobile Network Based on SMP. In: Qian, Z., Cao, L., Su, W., Wang, T., Yang, H. (eds) Recent Advances in Computer Science and Information Engineering. Lecture Notes in Electrical Engineering, vol 126. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25766-7_112

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25766-7_112

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25765-0

  • Online ISBN: 978-3-642-25766-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics