QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic

نویسنده

  • Shashank Tripathi
چکیده

The selection of security schemes against Wormhole Attack (WHA) in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of this active threat on Quality of Service (QoS) of the Integrated Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) Ad Hoc network can be minimized by a suitable secure routing protocol. The aim of this work is to analyze QoS of the Integrated UMTS and WLAN network for Constant Bit-Rate (CBR) voice messaging, interactive traffic under a secure distance vector routing protocol with various security schemes under WHA. This paper compares them on the basis of QoS metrics. Keywords— Integrated UMTS and WLAN Ad Hoc network, Scalibility, QoS, Routing, Security, WHA

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

QoS-Aware Multi-tier Location Managements for Integrated WLAN/UMTS Networks

This paper addresses quality of service (QoS)-aware multi-tier location managements for integrated WLAN/UMTS networks. Single registration (SR) and multiple registration (MR) schemes are introduced and improved to support both voice and data services efficiently. The performance of the improved SR and MR schemes is analyzed based on mobility and traffic characteristics of mobile users. The resu...

متن کامل

Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack

Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they ...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016