Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tsai, Hsin-Yi | en_US |
dc.contributor.author | Huang, Yu-Lun | en_US |
dc.date.accessioned | 2014-12-08T15:20:59Z | - |
dc.date.available | 2014-12-08T15:20:59Z | - |
dc.date.issued | 2011-12-01 | en_US |
dc.identifier.issn | 0018-9529 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TR.2011.2170117 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/14915 | - |
dc.description.abstract | This paper presents a wireless risk assessment method to help an administrator manage wireless network security. The assessment method consists of a risk model and an assessment measure. The risk model is in charge of modeling the wireless network risk. Security requirements, wireless attacks, and system configurations are considered in the model. The assessment measure is an algorithm which determines the risk value of the wireless network according to the risk model. Our risk model is developed upon an extended analytic hierarchy process, which contains the 4 layers: the risk layer, the requirement layer, the attack layer, and the configuration layer. The separate layers of the risk model are helpful in dealing with the dynamics of a wireless network because only the related layers are introduced to the assessment measure when changes of the network are detected. Based on the risk model per device, our assessment measure evaluates the wireless network risk in consideration of the relations between devices, attacks, and configurations. Hence, our risk assessment method, composed of the risk model and the assessment measure, can determine the wireless network risk efficiently while considering the dependencies in the wireless network. Two examples are introduced in this paper to examine the feasibility of our method. In the first example, we demonstrate that the risk values derived by our method meet the ground truth by performing practical experiments. The second example shows that our method can evaluate the risk of a changing wireless network with efficiency, and can distinguish disparities in different wireless networks. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Analytic hierarchy process (AHP) | en_US |
dc.subject | risk assessment | en_US |
dc.subject | wireless security | en_US |
dc.title | An Analytic Hierarchy Process-Based Risk Assessment Method for Wireless Networks | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TR.2011.2170117 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON RELIABILITY | en_US |
dc.citation.volume | 60 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 801 | en_US |
dc.citation.epage | 816 | en_US |
dc.contributor.department | 電控工程研究所 | zh_TW |
dc.contributor.department | Institute of Electrical and Control Engineering | en_US |
dc.identifier.wosnumber | WOS:000297588200011 | - |
dc.citation.woscount | 5 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.