Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems 2012
DOI: 10.1145/2387238.2387264
|View full text |Cite
|
Sign up to set email alerts
|

A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments

Abstract: In an untrustworthy mobile ad hoc network (MANET), security and quality of service (QoS) should be considered in an integrated manner. Supporting QoS without considering security threats and their implications may not lead to an optimal QoS solution. However, applying too much security will almost certainly lead to a high level of resource consumption, which may deplete QoS. This paper attempts to address these two issues together by proposing a 2-Dimensional Adaptation ARChitecture (2-DAARC) for achieving QoS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…30% of the source nodes transmits high priority traffic, and the remaining 70% of source nodes transmits low priority traffic. These parameter settings are commonly used in the relevant studies published in literature [10].…”
Section: Simulation Modelmentioning
confidence: 99%
“…30% of the source nodes transmits high priority traffic, and the remaining 70% of source nodes transmits low priority traffic. These parameter settings are commonly used in the relevant studies published in literature [10].…”
Section: Simulation Modelmentioning
confidence: 99%
“…The other main components of the framework are, QoS signaling which is the combination of resource reservation, admission control and packet scheduling. QoS routing [3] which is used to find all or some of the feasible routs in the network. QoS medium access control, manage the accessibility of the shared medium in efficient way as shown in Figure 1.…”
Section: Introductionmentioning
confidence: 99%