• Oleksandr Lemeshko Doctor of Sciences (Engineering), Professor, Kharkiv National University of Radio Electronics, Head of V.V. Popovskyy Department of Infocommunication Engineering, Kharkiv, Ukraine, Ukraine
  • Anastasia Shapovalova Kharkiv National University of Radio Electronics, Assistant professor of V.V. Popovskyy Department of Infocommunication Engineering, Kharkiv, Ukraine, Ukraine
  • Aymen Mohammed Khodayer Al- Dulaimi (Engineering Sciences), Al-Farahidi University, Head of department of Communication Technical Engineering, Iraq
  • Oleksandra Yeremenko Doctor of Sciences (Engineering), Ass.professor, Kharkiv National University of Radio Electronics, Professor of V.V. Popovskyy Department of Infocommunication Engineering, Kharkiv, Ukraine, Ukraine
  • Maryna Yevdokymenko PhD (Engineering Sciences), Kharkiv National University of Radio Electronics, Associate Professor of V.V. Popovskyy Department of Infocommunication Engineering, Kharkiv, Ukraine, Ukraine




routing, network, compromise, model.


Background. In modern telecommunication networks, the functioning of network protocols is aimed at achieving a high level of Quality of Service and network security. Therefore, an urgent scientific and applied problem is the adaptation of routing solutions with load balancing to the requirements of network security. The novelty of the proposed model is the modification of the load balancing conditions, in which, in addition to the link bandwidth (Quality of Service indicator), the probability of its compromise (network security indicator) is also taken into account. The routing solutions obtained within the framework of the proposed model are aimed at reducing the overload of network links that have a high probability of compromise by switching traffic to more secure links.
Objective. Developing the flow-based routing model with load balancing, which takes into account the parameters of network security.
Methods. Analysis of all known publications on load balancing and network security. Synthesis of a load balancing flowbased routing model. Study of the influence of network security parameters of communication links on routing and load balancing processes.
Results. A new condition for load balancing is proposed, which is a modification of the existing Traffic Engineering solution based on accounting the network security parameters - the probabilities of compromising communication links.
Conclusions. In routing with load balancing, parameters of network security should be considered. Depending on the network state and user requirements, different models of network security parameters for load balancing processes can be used.


Gupta S. Security and QoS in Wireless Sensor Networks

// 1st Edition. eBooks2go Inc. – 2018. – 134 p.

Kiser Q. Computer Networking and Cybersecurity: A

Guide to Understanding Communications Systems, Internet

Connections, and Network Security Along with Protection

from Hacking and Cyber Security Threats // Kindle Edition. –

– 122 p.

Revathi S., Geetha A. A survey of applications and

security issues in software defined networking // International

Journal of Computer Network and Information Security

(IJCNIS). – 2017. – Vol. 9(3). – pp. 21-28.


Lemeshko O. V., Yevseyeva O. Y., Garkusha S. V. A

tensor model of multipath routing based on multiple QoS

metrics // 2013 International Siberian Conference on Controland Communications (SIBCON) Proceedings. – 2013. – pp.

-4. https://doi.org/10.1109/SIBCON.2013.6693645

Yeremenko O., Lemeshko O., Persikov A. Secure

routing in reliable networks: proactive and reactive approach

// Shakhovska, N., Stepashko, V. (eds.) CSIT 2017. AISC,

Springer, Cham. – 2018. – Vol. 689 – pp. 631–655.


Shaik M. S., Mira F. A Comprehensive Mechanism of

MANET Network Layer Based Security Attack Prevention //

International Journal of Wireless and Microwave

Technologies (IJWMT) – 2020. – Vol. 10(1). – pp. 38-47


Palani U., Amuthavalli G., Alamelumangai V. Secure

and load-balanced routing protocol in wireless sensor

network or disaster management // IET Information Security.

– 2020. – Vol. 14(5). – pp. 513-520.


Patil M. V., Jadhav V. Secure, reliable and load

balanced routing protocols for multihop wireless networks //

International Conference on Intelligent Computing and

Control (I2C2) Proceedings. – 2017. – pp. 1-6.


Kumar N., Singh Y. Trust and packet load balancing

based secure opportunistic routing protocol for WSN // 2017

th International Conference on Signal Processing,

Computing and Control (ISPCC) Proceedings. – 2017. – pp.

-467. https://doi.org/10.1109/ISPCC.2017.8269723

Li S ., Zhao S., Wang X., Zhang K., Li L. Adaptive and

secure load-balancing routing protocol for service-oriented

wireless sensor networks // IEEE Systems Journal. – 2013. –

Vol. 8(3). – pp. 858-867.


Lemeshko O., Yeremenko O., Yevdokymenko M.,

Shapovalova A., Hailan A. M., Mersni A. Cyber Resilience

Approach Based on Traffic Engineering Fast ReRoute with

Policing // 2019 10th IEEE International Conference on

Intelligent Data Acquisition and Advanced Computing

Systems: Technology and Applications (IDAACS)

Proceedings. – 2019. – Vol. 1. – pp. 117-122.


Lemeshko O., Yeremenko O. Enhanced method of fast

re-routing with load balancing in software-defined networks

// Journal of Electrical Engineering. – 2017. – Vol. 68(6). –

pp. 444-454. https://doi.org/10.1515/jee-2017-0079

Lemeshko O., Yeremenko O. Linear optimization

model of MPLS Traffic Engineering Fast ReRoute for link,

node, and bandwidth protection // 2018 14th International

Conference on Advanced Trends in Radioelecrtronics,

Telecommunications and Computer Engineering (TCSET)

Proceedings. – 2018. – pp. 1009-1013.


Mendiola A., Astorga J., Jacob E., Higuero M. A survey

on the contributions of Software-Defined Networking to

Traffic Engineering // IEEE Communications Surveys &

Tutorials. – 2017. – Vol. 19(2). – pp. 918-953.


Vanderbei R. J. Linear programming: foundations and

extensions // Springer Nature. 2014. – Vol. 285. – 414 p.