2010 International Conference on Computational Intelligence and Communication Networks 2010
DOI: 10.1109/cicn.2010.72
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Mechanism for QoS Routing in Mobile Ad Hoc Networks with QoS Requirements Consideration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Much of the related work for MANETs focuses on examining the time-costs of supporting confidentiality, integrity, and/or authentication, and the effects of these costs on the end-to-end packet delays and throughput [5,22]. Other related work in this domain is to use cryptographic techniques to protect QoS signalling information [12,21]. The focus of our work, however, is on achieving QoS in MANETs containing blackhole attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Much of the related work for MANETs focuses on examining the time-costs of supporting confidentiality, integrity, and/or authentication, and the effects of these costs on the end-to-end packet delays and throughput [5,22]. Other related work in this domain is to use cryptographic techniques to protect QoS signalling information [12,21]. The focus of our work, however, is on achieving QoS in MANETs containing blackhole attackers.…”
Section: Related Workmentioning
confidence: 99%
“…1, the typical configuration of a mobile node (drone) in the FANET is presented using the OSI reference model. From bottom to top, on the physical level, there is the wireless medium through which the signal is physically spread from one drone to another; the data link level, and for the testing made in this article, the IEEE 802.11ac protocol is used on the Medium Access Control (MAC) [10]. In addition, in this layer the MPLS label switching protocol component will be active once the quality of service path has been established; at the network level in the data plane, IPv6 is used as the network protocol, and control plane, the following protocols will be used: AODV as the routing protocol, FHAMIPv6 to improve efficiency in handover, and MPLS to establish source-destination paths with quality of service; finally, in the upper levels of each mobile drone's architecture the applications or services that have different quality of service requirements will be accommodated.…”
Section: Reference Architecturementioning
confidence: 99%
“…The transmissions are made secure by introducing a message digest algorithm. In [14], Sedaghat et al proposed a mechanism to obtain secure MANET QoS routing with regard to QoS considerations. The authors presented a new mechanism over on-demand multipath routing protocol (AOMDV) to provide reliability and security, while ensuring minimum data redundancy.…”
Section: Related Workmentioning
confidence: 99%