Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1029
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Das, Saini | |
dc.contributor.author | Mukhopadhyay, Arunabha | |
dc.contributor.author | Saha, Debashish | |
dc.contributor.author | Sadhukhan, Samir K. | |
dc.date.accessioned | 2021-08-26T06:03:22Z | - |
dc.date.available | 2021-08-26T06:03:22Z | - |
dc.date.issued | 2019 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85033477495&doi=10.1007%2fs10796-017-9809-4&partnerID=40&md5=202830a50c0e59487a033d2eb199d402 | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1029 | - |
dc.description | Das, Saini, Indian Institute of Technology Kharagpur, Kharagpur, West Bengal 721302, India; Mukhopadhyay, Arunabha, Indian Institute of Management Lucknow, Lucknow, India; Saha, Debashish, Indian Institute of Management Calcutta, Kolkata, India; Sadhukhan, Samir K., Indian Institute of Management Calcutta, Kolkata, India | |
dc.description | ISSN/ISBN - 13873326 | |
dc.description | pp.959-977 | |
dc.description | DOI - 10.1007/s10796-017-9809-4 | |
dc.description.abstract | Information security breaches are of major concern for healthcare mobile ad-hoc networks (h-MANETs). In this paper, we propose a model that identifies and assesses risk in an h-MANET deployed by a healthcare institution in a disaster-prone region a priori by modeling the possible routes a hacker might follow to compromise a target. Our model proposes a novel method to compute the transition probability of each hop in the h-MANET. Next, it employs Markov theory to compute the maximum and minimum number of hops required to compromise the target for a given source-target <S-T> pair. It then determines the vulnerability for all the paths comprising minimum to maximum hops only for each <S-T> pair by computing their overall transition probability. Finally, our model computes the risk associated with each of these paths. Based on the calculated risk level of each path, the management can recommend an appropriate risk mitigation strategy. | |
dc.publisher | SCOPUS | |
dc.publisher | Information Systems Frontiers | |
dc.publisher | Springer New York LLC | |
dc.relation.ispartofseries | 21(5) | |
dc.subject | Direction-based diurnal mobility | |
dc.subject | Healthcare MANET | |
dc.subject | Markov theory | |
dc.subject | Risk assessment | |
dc.subject | Risk mitigation | |
dc.subject | Transition probability | |
dc.title | A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs | |
dc.type | Article | |
Appears in Collections: | Management Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.