• DocumentCode
    2319683
  • Title

    Security solution suitability analysis using modified multiplicative analytic hierarchy process

  • Author

    Faigl, Zoltaán ; Lindskog, Stefan ; Brunstrom, Anna

  • Author_Institution
    Mobile Innovation Centre, BME, Budapest, Hungary
  • fYear
    2010
  • fDate
    6-10 Dec. 2010
  • Firstpage
    1248
  • Lastpage
    1253
  • Abstract
    Tackling security and performance issues in ubiquitous computing has turned out to be a challenging task due to the heterogeneity of both the environment and the applications. Services must satisfy several constraints caused by the security, performance, and other requirements of applications, users and providers. This paper introduces a new formalized decision model for security solution suitability analysis. It supports the design of dynamic security services and can be used by security managers making runtime decisions. Our solution improves previously proposed AHP-based decision models. The MAHP decision engine is applied using a new approach. Furthermore, we extend the MAHP algorithm to handle the non-fulfillment of requirements. This results in more accurate decisions, and better fulfillment of the design criteria. The use of the proposed decision model is illustrated through an IKEv2 authentication method selection problem.
  • Keywords
    IP networks; decision making; telecommunication security; ubiquitous computing; IKEv2 authentication method selection problem; MAHP algorithm; formalized decision model; modified multiplicative analytic hierarchy process; security solution suitability analysis; ubiquitous computing; MAHP; decision models; security service design;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    GLOBECOM Workshops (GC Wkshps), 2010 IEEE
  • Conference_Location
    Miami, FL
  • Print_ISBN
    978-1-4244-8863-6
  • Type

    conf

  • DOI
    10.1109/GLOCOMW.2010.5700137
  • Filename
    5700137