2019
DOI: 10.11591/ijece.v9i4.pp2603-2613
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc

Abstract: A cross layer QoS framework is a complete system that provides required QoS services to each node present in the network. All components within it cooperate together for providing the required services. In existing QoS frameworks there is no security mechanism provided while Security is a critical aspect for QoS in the MANET environment. Cross layer QoS framework  tend to be vulnerable to a number of threats and attacks like, over/under-reporting of available bandwidth, over-reservation, state table starvation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Sahu et. al [7] proposed a cross-layer security framework that prevents malicious attacks in the network. The proposed framework used throughput, end to end delay, jitter, and packet drop ratio as QoS metrics where-in different scenarios were evaluated.…”
Section: Related Work On Security Framework In Manetsmentioning
confidence: 99%
“…Sahu et. al [7] proposed a cross-layer security framework that prevents malicious attacks in the network. The proposed framework used throughput, end to end delay, jitter, and packet drop ratio as QoS metrics where-in different scenarios were evaluated.…”
Section: Related Work On Security Framework In Manetsmentioning
confidence: 99%
“…the MPRs search procedure launched by the NPC (Node Performing the Computation) makes it possible to detect a set of nodes able to transmit its messages and its data to other nodes far from its range and therefore cover the entire network. The computation of the MPR by the standard algorithm RFC3626 [3] presented below remains basic and insufficient because it does not take into account all the characteristics of the node and the network, for a thorough study of this problem we compared several approaches proposed by researchers in order to improve the quality of service [4,5] and security level [6,7] of this protocol against attacks [8,9].…”
Section: Introductionmentioning
confidence: 99%