Security and QoS self-optimization in mobile ad hoc networks

被引:31
作者
Shen, ZhengMing
Thomas, Johnson P. [1 ,2 ,3 ]
机构
[1] Oklahoma State Univ, Dept Comp Sci, Tulsa, OK 74106 USA
[2] Univ Reading, Reading RG6 2AH, Berks, England
[3] Pace Univ, New York, NY USA
关键词
mobile computing; algorithm/protocol design and analysis; network-level security and protection;
D O I
10.1109/TMC.2007.70754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network quality of service (QoS) and network security have been considered as separate entities and research in these areas have largely proceeded independently. However, security impacts overall QoS and it is therefore essential to consider both security and QoS together when designing protocols for ad hoc environments as one impacts the other. In this paper, we propose a mechanism for a distributed dynamic management system which aims to maximize QoS and/or security while maintaining a minimum user acceptable level of QoS and/or security even as network resource availability changes. In order to achieve this objective, we propose three basic frameworks: a policy-based plug-in security framework, multilayer QoS guided routing, and a proportional, integral, derivative (PID) controller. Simulation results indicate the proposed PID optimized security and the QoS algorithm produces similar performance to nonsecure QoS routing protocols under various traffic loads.
引用
收藏
页码:1138 / 1151
页数:14
相关论文
共 20 条
[1]  
[Anonymous], P ACM MOBIHOC
[2]   Distributed quality-of-service routing in ad hoc networks [J].
Chen, SG ;
Nahrstedt, K .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (08) :1488-1505
[3]  
Cruz RL, 2003, IEEE INFOCOM SER, P702
[4]  
Guerin R, 1997, IEEE INFOCOM SER, P75, DOI 10.1109/INFCOM.1997.635116
[5]  
Hsu CS, 2006, IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 2, PROCEEDINGS, P198
[6]  
Kuo B.C., 1997, AUTOMATIC CONTROL SY
[7]   On performance analysis of challenge/response based authentication in wireless networks [J].
Liang, W ;
Wang, WY .
COMPUTER NETWORKS, 2005, 48 (02) :267-288
[8]  
Liang W, 2005, IEEE INFOCOM SER, P1478
[9]   An analytical study on the impact of authentication in wireless local area network [J].
Liang, W ;
Wang, WY .
ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, :361-366
[10]  
Lin CHR, 1999, IEEE J SEL AREA COMM, V17, P1426, DOI 10.1109/49.779924