{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:59:39Z","timestamp":1760234379670,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Although not common today, communications networks could adjust security postures based on changing mission security requirements, environmental conditions, or adversarial capability, through the coordinated use of multiple channels. This will require the ability to measure the security of communications networks in a meaningful way. To address this need, in this paper, we introduce the Quality of Secure Service (QoSS) model, a methodology to evaluate how well a system meets its security requirements. This construct enables a repeatable and quantifiable measure of security in a single- or multi-channel network under static configurations. In this approach, the quantification of security is based upon the probabilities that adversarial listeners and disruptors may gain access to or manipulate transmitted data. The initial model development, albeit a snap-shot of the network security, provides insights into what may affect end-to-end security and to what degree. The model was compared against the performance and expected security of several point-to-point networks, and three simplified architectures are presented as examples. Message fragmentation and duplication across the available channels provides a security performance trade-space, with an accompanying comprehensive measurement of the QoSS. The results indicate that security may be improved with message fragmentation across multiple channels when compared to the number of adversarial listeners or disruptors. This, in turn, points to the need, in future work, to build a full simulation environment with specific protocols and networks to validate the initial modeled results.<\/jats:p>","DOI":"10.3390\/jcp1020016","type":"journal-article","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T10:06:12Z","timestamp":1620381972000},"page":"289-301","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Model for Quantifying the Quality of Secure Service"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2444-4012","authenticated-orcid":false,"given":"Paul","family":"Simon","sequence":"first","affiliation":[{"name":"Air Force Institute of Technology, 2950 Hobson Way, Wright-Patterson AFB, OH 45433, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0193-1192","authenticated-orcid":false,"given":"Scott","family":"Graham","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, 2950 Hobson Way, Wright-Patterson AFB, OH 45433, USA"}]},{"given":"Christopher","family":"Talbot","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, 2950 Hobson Way, Wright-Patterson AFB, OH 45433, USA"}]},{"given":"Micah","family":"Hayden","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, 2950 Hobson Way, Wright-Patterson AFB, OH 45433, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"ref_1","unstructured":"Reine, L., Lindskog, S., and Brunstrom, A. (2007). A Model-based Analysis of Tunability in Privacy Services. IFIP International Summer School on the Future of Identity in the Information Society, Springer."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.22215\/timreview\/712","article-title":"Quantitative metrics and risk assessment: The three tenets model of cybersecurity","volume":"3","author":"Hughes","year":"2013","journal-title":"Technol. Innov. Manag. Rev."},{"key":"ref_3","first-page":"91","article-title":"Cyber risk assessment in distributed information systems","volume":"1","author":"Jabbour","year":"2016","journal-title":"Cyber Def. Rev."},{"key":"ref_4","first-page":"48","article-title":"Metrics for information security vulnerabilities","volume":"1","author":"Wang","year":"2008","journal-title":"J. Appl. Glob. Res."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Duan, Q. (2010, January 2\u20135). Modeling and analysis of end-to-end quality of service provisioning in virtualization-based future Internet. Proceedings of the 2010 Proceedings of 19th International Conference on Computer Communications and Networks, Zurich, Switzerland.","DOI":"10.1109\/ICCCN.2010.5560049"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1109\/JPROC.2002.802002","article-title":"Theories and models for internet quality of service","volume":"90","author":"Firoiu","year":"2002","journal-title":"Proc. IEEE"},{"key":"ref_7","unstructured":"Leon, P.G., and Saxena, A. (2010, January 25\u201327). An approach to quantitatively measure information security. Proceedings of the 3rd India Software Engineering Conference, Mysore, India."},{"key":"ref_8","unstructured":"Clarkson, M. (2010). Quantification and Formalization of Security. [Ph.D. Dissertation, Cornell University]. Available online: https:\/\/ecommons.cornell.edu\/handle\/1813\/14744."},{"key":"ref_9","unstructured":"Nikhat, P., Beg, M.R., and Khan, M.H. (2015, January 6\u20137). Model to quantify confidentiality at requirement phase. Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), Unnao, India."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1017\/S0960129513000595","article-title":"Quantification of integrity","volume":"25","author":"Clarkson","year":"2015","journal-title":"Math. Struct. Comput. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/138027.138036","article-title":"Perfectly secure message transmission","volume":"40","author":"Dolev","year":"1993","journal-title":"J. ACM (JACM)"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Almerhag, I.A., Almarimi, A.A., Goweder, A.M., and Elbekai, A.A. (2010, January 11\u201312). Network security for QoS routing metrics. Proceedings of the International Conference on Computer and Communication Engineering (ICCCE\u201910), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCCE.2010.5556868"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2118","DOI":"10.1109\/TMC.2016.2615305","article-title":"Analysis of dynamic channel bonding in dense networks of WLANs","volume":"16","author":"Faridi","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Han, M., Khairy, S., Cai, L.X., and Cheng, Y. (2016, January 4\u20138). Performance analysis of opportunistic channel bonding in multi-channel WLANs. Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2016.7842131"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"8517","DOI":"10.1109\/TCOMM.2019.2944382","article-title":"Dynamic Channel Bonding Algorithm for Densely Deployed 802.11 ac Networks","volume":"67","author":"Lee","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/COMST.2015.2504408","article-title":"A survey of channel bonding for wireless networks and guidelines of channel bonding for futuristic cognitive radio sensor networks","volume":"18","author":"Bukhari","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MCOM.1983.1091346","article-title":"An introduction to spread spectrum","volume":"21","author":"Cook","year":"1983","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"27176","DOI":"10.1109\/ACCESS.2018.2832189","article-title":"A novel diversity receiver design for cooperative transmission system","volume":"6","author":"Gao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Moulika, V., and Bhagyalakshmi, L. (2019, January 4\u20136). Performance Investigation of Cooperative Diversity Techniques for 5G Wireless Networks. Proceedings of the 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP), Chennai, India.","DOI":"10.1109\/ICESIP46348.2019.8938347"},{"key":"ref_20","unstructured":"Hennessy, L.J., and Patterson, D.A. (2011). Computer Architecture: A Quantitative Approach, Elsevier."},{"key":"ref_21","unstructured":"Russell, T. (2002). Signaling System # 7, McGraw-Hill."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/35.56239","article-title":"Signaling system no. 7: A tutorial","volume":"28","author":"Modarressi","year":"1990","journal-title":"IEEE Commun. Mag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/C-M.1977.217748","article-title":"Special feature the total computer security problem: An oveview","volume":"10","author":"Shankar","year":"1977","journal-title":"Computer"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Archana, B.S., Chandrashekar, A., Bangi, A.G., Sanjana, B.M., and Akram, S. (2017, January 19\u201320). Survey on usable and secure two-factor authentication. Proceedings of the 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India.","DOI":"10.1109\/RTEICT.2017.8256716"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1805974.1805978","article-title":"Combining fragmentation and encryption to protect privacy in data storage","volume":"13","author":"Ciriani","year":"2010","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Feng, L., Zhang, Y., and Li, H. (2015, January 4\u20136). Large file transmission using self-adaptive data fragmentation in opportunistic networks. Proceedings of the 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India.","DOI":"10.1109\/CSNT.2015.273"},{"key":"ref_27","unstructured":"Mikko, P., Keranen, A., and Ott, J. (2008, January 23\u201326). Message fragmentation in opportunistic DTNs. Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wampler, J.A., Chien, H., and Andrew, T. (2017, January 23\u201325). Efficient distribution of fragmented sensor data for obfuscation. Proceedings of the MILCOM 2017\u20142017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2017.8170861"},{"key":"ref_29","first-page":"2231","article-title":"QoS-aware parallel sensing\/probing architecture and adaptive cross-layer protocol design for opportunistic networks","volume":"65","author":"Shankar","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Pohly, D.J., and Patrick, M. (July, January 28). Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols. Proceedings of the 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France.","DOI":"10.1109\/DSN.2016.41"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., and Wang, Y. (2002). Perfectly secure message transmission revisited. International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-46035-7_33"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Srinathan, K., Arvind, N., and Pandu, C.R. (2004). Optimal perfectly secure message transmission. Annual International Cryptology Conference, Springer.","DOI":"10.1007\/978-3-540-28628-8_33"},{"key":"ref_33","first-page":"1","article-title":"Data confidentiality using fragmentation in cloud computing","volume":"1","author":"Hudic","year":"2012","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Sweet, I., Trilla, J.M.C., Scherrer, C., Hicks, M., and Magill, S. (2018). What\u2019s the Over\/Under? Probabilistic Bounds on Information Leakage. International Conference on Principles of Security and Trust, Springer.","DOI":"10.1007\/978-3-319-89722-6_1"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/2\/16\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:57:57Z","timestamp":1760162277000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/2\/16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,7]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["jcp1020016"],"URL":"https:\/\/doi.org\/10.3390\/jcp1020016","relation":{},"ISSN":["2624-800X"],"issn-type":[{"type":"electronic","value":"2624-800X"}],"subject":[],"published":{"date-parts":[[2021,5,7]]}}}