Two routers network architecture and scheduling algorithms under packet category classification constraint

The sending and exchanging of data have become essential in the current revolution of industry 4.0 and digital transformation and all aspects of life. Ensuring the security of transmitted data continues to be a critical issue due to the fast advancement in technology. The studied problem is proven to be NP-hard in the strong sense. The contribution of this paper is twofold. First, we propose a network architecture that enables multilevel data sharing through two routers based on a data category classification constraint. Second, we propose a set of heuristic algorithms for an NP-Hard problem. The constraint of the studied problem is described as follows. Two files belonging to the same category of confidential level should not be transmitted simultaneously through the routers. The proposed architecture involves a scheduler component responsible for finding a schedule that minimizes the maximum estimated transmission time respecting the data category classification constraint. An experimental result is carried out to show the performance of the proposed algorithms. Several indicators are used to measure the performance of algorithms. The best algorithm is the Modified decreasing estimated-transmission time algorithm in 91.6% of cases. The experimental results confirm the practicality of the proposed scheme in terms of two-machines scheduling problems.

[1]  Farhan Aadil,et al.  An Optimized and Efficient Routing Protocol Application for IoV , 2021 .

[2]  Mahdi Jemmali,et al.  Fixed Urgent Window Pass for a Wireless Network with User Preferences , 2021, Wireless Personal Communications.

[3]  Yudhistira Nugraha,et al.  Towards a framework for trustworthy data security level agreement in cloud procurement , 2021, Comput. Secur..

[4]  Petros Nicopolitidis,et al.  A blockchain-based secure routing protocol for opportunistic networks , 2021, J. Ambient Intell. Humaniz. Comput..

[5]  Mahdi Jemmali,et al.  Time-slots Transmission Data Algorithms into Network , 2020, 2020 International Conference on Computing and Information Technology (ICCIT-1441).

[6]  Jacek Rumiński,et al.  A survey of neural networks usage for intrusion detection systems , 2020, Journal of Ambient Intelligence and Humanized Computing.

[7]  Christian Damsgaard Jensen,et al.  The application of Software Defined Networking on securing computer networks: A survey , 2019, J. Netw. Comput. Appl..

[8]  Leszek Lilien,et al.  An Approach to Identity Management in Clouds without Trusted Third Parties , 2019, ArXiv.

[9]  Qiang Duan Qiang Duan,et al.  Network as a Service for Next Generation Internet , 2017 .

[10]  Steve Carr,et al.  A Highly-Secure Self-Protection Data Scheme in Clouds Using Active Data Bundles and Agent-Based Secure Multi-party Computation , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[11]  Nirvana Meratnia,et al.  Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers , 2014, Sensors.

[12]  G. Padmavathi,et al.  A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..

[13]  Liang Dong,et al.  Real-time scheduling with security awareness for packet switched networks , 2012, 2012 IEEE Radio and Wireless Symposium.

[14]  William Yurcik,et al.  Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs , 2007, ArXiv.

[15]  Yi Yang,et al.  Generic Threats to Routing Protocols , 2006, RFC.

[16]  George Varghese,et al.  Network Algorithmics-An Interdisciplinary Approach to Designing Fast Networked Devices , 2004 .

[17]  Gabriel Maciá-Fernández,et al.  Present and Future of Network Security Monitoring , 2021, IEEE Access.

[18]  Mahdi Jemmali,et al.  Equity Data Distribution Algorithms on Identical Routers , 2019 .

[19]  S. Mercy Shalinie,et al.  A survey of distributed denial of service attack , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[20]  Pankaj Kumar Sehgal,et al.  A Comparative Study of various Secure Routing Protocols based on AODV , 2011 .