{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:37:44Z","timestamp":1760236664725,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Rarely are communications networks point-to-point. In most cases, transceiver relay stations exist between transmitter and receiver end-points. These relay stations, while essential for controlling cost and adding flexibility to network architectures, reduce the overall security of the respective network. In an effort to quantify that reduction, we extend the Quality of Secure Service (QoSS) model to these complex networks, specifically multi-hop networks. In this approach, the quantification of security is based upon probabilities that adversarial listeners and disruptors gain access to or manipulate transmitted data on one or more of these multi-hop channels. Message fragmentation and duplication across available channels provides a security performance trade-space, with its consequent QoSS. This work explores that trade-space and the corresponding QoSS model to describe it.<\/jats:p>","DOI":"10.3390\/jcp1040038","type":"journal-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T21:47:36Z","timestamp":1639604856000},"page":"793-803","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Extending the Quality of Secure Service Model to Multi-Hop Networks"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2444-4012","authenticated-orcid":false,"given":"Paul M.","family":"Simon","sequence":"first","affiliation":[{"name":"Air Force Institute of Technology (AFIT), Dayton, OH 45433, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0193-1192","authenticated-orcid":false,"given":"Scott","family":"Graham","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology (AFIT), Dayton, OH 45433, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,15]]},"reference":[{"key":"ref_1","first-page":"48","article-title":"Metrics for information security vulnerabilities","volume":"1","author":"Wang","year":"2008","journal-title":"J. Appl. Glob. Res."},{"key":"ref_2","unstructured":"Leon, P.G., and Saxena, A.S. (2010, January 25\u201327). An approach to quantitatively measure information security. Proceedings of the 3rd India Software Engineering Conference, Mysore, India."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Nikhat, P., Beg, M.R., and Khan, M.H. (2015, January 6\u20137). Model to quantify confidentiality at requirement phase. Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), Unnao, India.","DOI":"10.1145\/2743065.2743117"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3390\/jcp1020016","article-title":"Model for Quantifying the Quality of Secure Service","volume":"1","author":"Simon","year":"2021","journal-title":"J. Cybersecur. Priv."},{"key":"ref_5","unstructured":"Hennessy, L.J., and Patterson, D.A. (2011). Computer Architecture: A Quantitative Approach, Elsevier."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ghali, C., Narayanan, A., Oran, D., Tsudik, G., and Wood, C.A. (2015, January 28). Secure Fragmentation for Content-Centric Networks. Proceedings of the 2015 IEEE 14th International Symposium on Network Computing and Applications, Boston, MA, USA.","DOI":"10.1109\/NCA.2015.34"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Lim, K.W., Kapusta, K., Memmi, G., and Jung, W.S. (2019). Multi-Hop Data Fragmentation in Unattended Wireless Sensor Networks. arXiv.","DOI":"10.1109\/GIOTS49054.2020.9119569"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/35.56239","article-title":"Signaling system no. 7: A tutorial","volume":"28","author":"Modarressi","year":"1990","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","unstructured":"Russell, T. (2002). Signaling System # 7, McGraw-Hill."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Moulika, V., and Bhagyalakshmi, L. (2019, January 4\u20136). Performance Investigation of Cooperative Diversity Techniques for 5G Wireless Networks. Proceedings of the 2019 IEEE 1st International Conference on Energy, Systems and Information Processing (ICESIP), Chennai, India.","DOI":"10.1109\/ICESIP46348.2019.8938347"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/138027.138036","article-title":"Perfectly secure message transmission","volume":"40","author":"Dolev","year":"1993","journal-title":"J. ACM"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Srinathan, K., Arvind, N., and Pandu, C.R. (2004). Optimal perfectly secure message transmission. Annual International Cryptology Conference, Springer.","DOI":"10.1007\/978-3-540-28628-8_33"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., and Wang, Y. (2002). Perfectly secure message transmission revisited. International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-46035-7_33"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6340","DOI":"10.1109\/TIT.2020.2994285","article-title":"Efficient Protocols for Perfectly Secure Message Transmission With Applications to Secure Network Coding","volume":"66","author":"Spini","year":"2020","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wampler, J.A., Chien, H., and Andrew, T. (2017, January 23\u201325). Efficient distribution of fragmented sensor data for obfuscation. Proceedings of the MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2017.8170861"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MWC.2006.1678163","article-title":"MIMO-OFDM Wireless Systems: Basics, Perspectives, and Challenges","volume":"13","author":"Bolcskei","year":"2006","journal-title":"IEEE Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1109\/JPROC.2002.802002","article-title":"Theories and models for internet quality of service","volume":"90","author":"Firoiu","year":"2002","journal-title":"Proc. IEEE"},{"key":"ref_18","unstructured":"Rass, S., and Schartner, P. (2010, January 12\u201315). Multipath Authentication without shared Secrets and with Applications in Quantum Networks. Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, USA."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1017\/S0960129513000595","article-title":"Quantification of integrity","volume":"25","author":"Clarkson","year":"2015","journal-title":"Math. Struct. Comput. Sci."},{"key":"ref_20","unstructured":"Rausand, M., and Hoyland, A. (2003). System Reliability Theory: Models, Statistical Methods, and Applications, John Wiley & Sons."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1504\/IJACT.2010.038309","article-title":"Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality","volume":"2","author":"Patra","year":"2010","journal-title":"Int. J. Appl. Cryptogr."},{"key":"ref_22","unstructured":"Menc\u00edk, J. (2016). Concise Reliability for Engineers, BoD-Books on Demand\/Intech. Chapter 1."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Hayden, M., Graham, S., Betances, A., and Mills, R. (2020, January 16). Multi-Channel Security through Data Fragmentation. Proceedings of the IFIP International Conference on Critical Infrastructure Protection, Arlington, VA, USA.","DOI":"10.1007\/978-3-030-62840-6_7"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/38\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:49:07Z","timestamp":1760168947000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":23,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["jcp1040038"],"URL":"https:\/\/doi.org\/10.3390\/jcp1040038","relation":{},"ISSN":["2624-800X"],"issn-type":[{"type":"electronic","value":"2624-800X"}],"subject":[],"published":{"date-parts":[[2021,12,15]]}}}