{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:40:05Z","timestamp":1723016405163},"reference-count":23,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T00:00:00Z","timestamp":1525046400000},"content-version":"vor","delay-in-days":119,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2016YFB0801503"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"While mobile networks provide many opportunities for people, they face security problems huge enough that a firewall is essential. The firewall in mobile networks offers a secure intranet through which all traffic is handled and processed. Furthermore, due to the limited resources in mobile networks, the firewall execution can impact the quality of communication between the intranet and the Internet. In this paper, a performance evaluation mathematical model for firewall system of mobile networks is developed using queuing theory for a multihierarchy firewall with multiple concurrent services. In addition, the throughput and the package loss rate are employed as performance evaluation indicators, and discrete\u2010event simulated experiments are conducted for further verification. Lastly, experimental results are compared to theoretically obtained values to identify a resource allocation scheme that provides optimal firewall performance and can offer a better quality of service (QoS) in mobile networks.<\/jats:p>","DOI":"10.1155\/2018\/8130152","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T23:31:40Z","timestamp":1525131100000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0332-0686","authenticated-orcid":false,"given":"Shichang","family":"Xuan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1177-3693","authenticated-orcid":false,"given":"Dapeng","family":"Man","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9016-0600","authenticated-orcid":false,"given":"Jiangchuan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5985-7648","authenticated-orcid":false,"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1720-9882","authenticated-orcid":false,"given":"Miao","family":"Yu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,4,30]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.02.016"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.017"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.001"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.06.012"},{"key":"e_1_2_9_6_2","doi-asserted-by":"crossref","unstructured":"PengJ. ChooR. K.-K. andAshmanH. Astroturfing detection in social media: using binary n-gram analysis for authorship attribution Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA 2016.","DOI":"10.1109\/TrustCom.2016.0054"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0665-5"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"BuiN.andWidmerJ. Mobile network resource optimization under imperfect prediction Proceedings of the 16th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks WoWMoM \u203215 2015 USA 1 9.","DOI":"10.1109\/WoWMoM.2015.7158161"},{"key":"e_1_2_9_9_2","doi-asserted-by":"crossref","unstructured":"NikraveshA. YaoH. XuS. ChoffnesD. andMaoZ. M. Mobilyzer: an open platform for controllable mobile network measurements Proceedings of the 13th Annual International Conference on Mobile Systems Applications and Services MobiSys \u203215 2015 389\u2013404.","DOI":"10.1145\/2742647.2742670"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(00)00037-7"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.036"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2011.199"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.182"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.280"},{"key":"e_1_2_9_15_2","doi-asserted-by":"crossref","unstructured":"SalahK. Queuing analysis of network firewalls Proceedings of the 53rd IEEE Global Communications Conference GLOBECOM \u203210 2010.","DOI":"10.1109\/GLOCOM.2010.5684053"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.122011.110151"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2014.01.006"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"ZapechnikovS. MiloslavskayaN. andTolstoyA. Modeling of next-generation firewalls as queueing services Proceedings of the 8th International Conference on Security of Information and Networks SIN \u203215 2015 ACM.","DOI":"10.1145\/2799979.2799997"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.005"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.88"},{"key":"e_1_2_9_21_2","doi-asserted-by":"crossref","unstructured":"TongY. SheJ. DingB. WangL. andChenL. Online mobile Micro-Task Allocation in spatial crowdsourcing Proceedings of the 32nd IEEE International Conference on Data Engineering ICDE \u203216 2016 Helsinki Finland IEEE 49\u201360 https:\/\/doi.org\/10.1109\/ICDE.2016.7498228 2-s2.0-84980347541.","DOI":"10.1109\/ICDE.2016.7498228"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2797962"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0167280"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8130152.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8130152.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/8130152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:33:47Z","timestamp":1723012427000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/8130152"}},"subtitle":[],"editor":[{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/8130152"],"URL":"https:\/\/doi.org\/10.1155\/2018\/8130152","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-01-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}