Novel Model of Adaptive Module for Security and QoS Provisioning in Wireless Heterogeneous Networks (original) (raw)

Analysis of Security of QoS in WiMAX and Mobile Networks

SAR Journal - Science and Research

In this paper we discuss several elements of importance for securing QoS in multimedia networks. Firstly, we present the first factor, which refers to understanding the characteristics of multimedia traffic in order to define and implement the QoS requirements. Secondly, factor refers to translation between QoS parameters that implies the distribution of system and network resources, and thirdly the factor establishes the appropriate QoS architecture that can provide the required QoS guarantees for multimedia applications. We have been analyzing security-critical applications such as remote operation, which may require a guaranteed level of availability (hard QoS). There are basically two ways to secure a guaranteed QoS. The first is simply to provide a lot of resources, enough to meet the expected peak (peak) requirements with a significant security margin. This approach generously oversupplies the (over provisioning) network. We gave a detailed security analysis as features of WiM...

Protection and Security Aware QoS Framework for 4G Multihop Wireless Networks

The Worldwide interoperable for Microwave Access (WiMAX) and Long Term Evolution (LTE) standards have well-defined Quality of Service (QoS) and security architecture. However, the details of Radio Resource Management (RRM) components, such as Call Admission Control (CAC) and Packet Scheduling (PS), are still open research topics. Next, some security issues are not yet resolved in the WiMAX or LTE standards.

QoS Provisioning in Wireless/Mobile Multimedia Networks Using an Adaptive Framework

Wireless Networks, 2003

Recently there is a growing interest in the adaptive multimedia networking where the bandwidth of an ongoing multimedia call can be dynamically adjusted. In the wireless/mobile multimedia networks using the adaptive framework, the existing QoS provisioning focused on the call blocking probability and the forced termination probability should be modified. We, therefore, redefine a QoS parameter -the cell overload probability -from the viewpoint of the adaptive multimedia networking. Then, we propose a distributed call admission control (CAC) algorithm that guarantees the upper bound of the cell overload probability. Also, a bandwidth adaptation algorithm which seeks to minimize the cell overload probability is also presented. Simulation experiments are carried out to verify the performance of the proposed CAC algorithm. Furthermore, the performance of the adaptive wireless/mobile network is compared to that of the existing nonadaptive wireless/mobile networks. As a further step in QoS provisioning, we propose another QoS parameter, the degradation period ratio, and discuss analytically how the CAC algorithm guarantees the upper bound of the degradation period ratio.

Supporting Secure Scalable End-To-End QoS In 4G Mobile Wireless Networks

International Conference on Wireless Networks 2013, (ICWN 2013). The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP'13) , 2013

"With the convergence of the Internet and wireless communications, mobile wireless networks and data services are undergoing tremendous evolutionary growth that has seen the development of fourth generation (4G) mobile wireless access technologies based on an all- IP platform. However, major challenges in the development of such heterogeneous network infrastructure such as quality of service (QoS) provisioning and network security services for mobile users’ communication flows, among others still exists. In this paper an integrated architectural view and methodology for QoS and security support in 4G mobile wireless networks, which integrates QoS signaling with secure enhanced evolved packet system authentication and key agreement (SE-EPS AKA protocol) is presented. The success of 4G mobile wireless networks depends on the prudent deployment of homogeneously designed, highspeed, secure, multiservice IP-centric integrated multimedia, voice and data networks."

Special issue on “quality of service and security in wireless and mobile networks”

Wireless Communications and Mobile Computing, 2010

Special issue on ''quality of service and security in wireless and mobile networks'' Recently, wireless and mobile communication systems have become increasingly popular as an inexpensive and promising means for ubiquitous communications and mobile computing. This trend will continue to affect the way in which we live, work, and play with innovative services based on the pervasive and mobile communications support. A preliminary condition for those services to become widely used is the effective support of quality of service (QoS) and security properties. For this reason, QoS and security management of wireless and mobile communication systems are very important issues for the future generation of wireless and mobile networks and services, and the design and management of solutions for QoS and security are some of the most challenging research tasks, in scenarios like the wireless and mobile systems, characterized by new assumptions and limitations. The main limitations typically involve the resources like battery energy, computation, and bandwidth. The new assumptions include the unprecedented dynamics caused by mobility, heterogeneity, variable channel conditions, the traffic characterization of new emerging applications, the open communication nature, and the distributed management architecture of wireless communication systems, like the wireless ad hoc, mesh, vehicular, and sensor networks. This special issue brings together nine contributions, selected from a total of 25 submissions, that address the issues of architectures, technologies, and protocols for wireless and mobile communication systems. The selected papers propose and analyze some of the most interesting and innovative solutions dealing with the QoS and Security management in wireless mobile networks, from different viewpoints, including the QoS-based channel time allocation and scheduling in IEEE 802.15.3 wireless PANs, QoS analysis of IEEE 802.15.4 Low rate WPAN technology in industrial application scenarios, QoS routing with obstacle avoidance properties in wireless sensor EDITORIAL

QoS Aware Adaptive Security Scheme for Video Streaming in MANETs

Lecture Notes in Computer Science, 2013

The author has granted a non exclusive license allowing Library and Archives Canada to reproduce, publish, archive, preserve, conserve, communicate to the public by telecommunication or on the Internet, loan, distrbute and sell theses worldwide, for commercial or non commercial purposes, in microform, paper, electronic and/or any other formats. AVIS: L'auteur a accorde une licence non exclusive permettant a la Bibliotheque et Archives Canada de reproduire, publier, archiver, sauvegarder, conserver, transmettre au public par telecommunication ou par I'lnternet, preter, distribuer et vendre des theses partout dans le monde, a des fins commerciales ou autres, sur support microforme, papier, electronique et/ou autres formats. Bien que ces formulaires aient inclus dans la pagination, il n'y aura aucun contenu manquant.

Providing Tunable Security Services: An IEEE 802.11i Example

2006 Securecomm and Workshops, 2006

The basic idea of QoS is to provide mechanisms that can offer different service levels, which are expressed through well-defined parameters that are specified at run-time on the basis of need. Bit rate, throughput, delay, jitter, and packet loss rate are all examples of common QoS parameters suggested for packet networks. These parameters are all aimed to express (and guarantee) a certain service level with respect to reliability and/or performance. In this paper, we investigate how security can be treated as yet another QoS parameter through the use of tunable security services. The main idea with this work is to let users specify a tradeoff between security and performance through the choice of available security configuration(s). The performance metric used is latency. The concept is illustrated using the IEEE 802.11i wireless local area networking standard.

OSPF-Based Adaptive and Flexible Security-Enhanced QoS Provisioning

2006 IEEE Sarnoff Symposium, 2006

Networks with quality of service (QoS) provisioning rely on QoS routing schemes to select paths between end-to-end hosts that can satisfy the requested service requirements. In this paper, we focus on networks that use a new service paradigm as a nested DiffServ model, which has been described as service vectors in combination with the explicit end-point admission control (EEAC) scheme . The main objectives of service vectors are to improve the QoS granularity and service routing flexibility. These improvements enhances both network utilization and user benefits. However, QoS routing schemes need to consider service vectors to achieve such improvements. In this paper, we discuss a new set of requirements that are added into QoS routing schemes to avoid false routing and low network utilization when using service vectors. The OSPF protocol, as the widely used protocol, guarantees feasible deployability of service vectors in existing networks. Furthermore, we introduce a network architecture that integrates security into the set of QoS parameters and show how security-enabled QoS (SQoS) can also use the OSPF protocol for SQoS routing.

A New Access Control Solution for a Multi-Provider Wireless Environment

Telecommunication Systems, 2005

The fundamental goal in future 4G mobile multi-service networks is to provide an efficient mobile computing environment which enables a user with its portable computer equipped with multiple wireless access interfaces to seamlessly move between different providers' networks. Besides seamless roaming, a key consideration is also devoted to quality-of-service provision. In this article, we propose a model and architectural framework for supporting end-to-end QoS in the context of interconnected multiprovider wireless systems. The proposed integrated COPS-based management and RADIUS-based control access architecture will allow providers to offer multimedia services while optimizing the use of underlying network resources. We suggest new concepts and protocols to provide solutions to the challenges and describe an ongoing research project named MMQoS to build such future networks.

A Wireless Network Node Architecture for Protection of per-Flow Quality of Service

Wireless networks have become the critical infrastructure that enables such applications as sensor networks, mobile personal computing devices, and avionics communication systems. As such, the security of these wireless networks has become an important research issue. Recent literature on wireless network security has focused on traditional security issues, such as encryption and authentication. Less attention has been paid to protecting the quality of service (QoS) assurances that guarantee that critical and important traffic will be routed preferentially through the network. In research that has studied QoS in the face of adversarial attacks, only specific layers of the network protocol stack have been evaluated. In this paper we argue that an integrated architecture for in-network protection of QoS assurances for each individual network traffic flow is essential to wireless network security.