QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic
نویسنده
چکیده
The selection of security schemes against Wormhole Attack (WHA) in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of this active threat on Quality of Service (QoS) of the Integrated Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) Ad Hoc network can be minimized by a suitable secure routing protocol. The aim of this work is to analyze QoS of the Integrated UMTS and WLAN network for Constant Bit-Rate (CBR) voice messaging, interactive traffic under a secure distance vector routing protocol with various security schemes under WHA. This paper compares them on the basis of QoS metrics. Keywords— Integrated UMTS and WLAN Ad Hoc network, Scalibility, QoS, Routing, Security, WHA
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملQoS-Aware Multi-tier Location Managements for Integrated WLAN/UMTS Networks
This paper addresses quality of service (QoS)-aware multi-tier location managements for integrated WLAN/UMTS networks. Single registration (SR) and multiple registration (MR) schemes are introduced and improved to support both voice and data services efficiently. The performance of the improved SR and MR schemes is analyzed based on mobility and traffic characteristics of mobile users. The resu...
متن کاملPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they ...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کامل