Security for QoS assured wireless and mobile networks

نویسندگان

  • Matteo Cesana
  • Azzedine Boukerche
  • Albert Y. Zomaya
چکیده

The rapid evolution of wireless technologies as well as their pervasive diffusion in everyday’s life has dramatically changed the world in the last two decades. On one side, service providers/operators can nowadays leverage new wireless technologies to reach new types of customers in a cost effective way; on the other side, end users are actually given richer and more flexible “connectivity opportunities” to obtain the required services. The down side of this scenario deals with the increased complexity in the management of all the system components. Users/customers are becoming more and more demanding in terms of the perceived quality of service (QoS), eventually expecting the very same quality they experience in wired networks in the wireless realm. To this extent, advanced wireless systems must be able to support and manage high-quality services, thus matching the heterogeneous requirements coming from the users. Concurrently, risks and security threats are inherent in any wireless network, and there is an increasing demand for effective security-enforcing techniques to attain authentication, privacy, confidentiality, data integrity, privacy, access control, and non-repudiation, when operating and/or using wireless networks. In this scenario, the deployment of security measures and the provision of QoS represent two critical and tightly coupled challenges in the design of network services, architectures, and protocols in today’s inter-networked world. Such challenges are even made harder in mobile wireless scenarios where the network infrastructure may feature mobile, energy and resource-constrained network devices. To this extent, the success of specific wireless networking technologies is often dependant on the capability of the specific technology to support QoS, on one side, and to provide security, on the other side. The aim of this special issue is to provide an upto-date snapshot on advanced solutions to support the design and deployment of secure and efficient services in wireless mobile networks. The special issue is composed of seven high-quality contributions, each one focusing on a specific component of the aforementioned framework. The first batch of four papers deals with security aspects. The first two papers in the batch focus on security solutions for Wireless Mesh Networks (WMNs); namely, the first one, DSA-Mesh: a Distributed Security Architecture forWMNs, proposes a fully distributed security architecture to ensure security and data confidentiality of the communications occurring in the backbone of a WMN; the proposed solution provides a distributed authentication and access control scheme for the wireless mesh routers taking part in the network, as well as a dynamic key distribution algorithm that supports layer-2 encryption. Whilst the wireless mesh architecture addressed in the first paper is general, in the second manuscript onDifferentiated Security in WMNs, the authors target the design of securemechanisms for IEEE 802.11s-basedWMNs. The rationale andmain contribution of the work is the replication in the wireless environment of the virtual LAN structures typical of the wired networks to achieve protection against internal/external attacks including selective forwarding attacks, routing attacks, and eavesdropping. The third contribution, Fast 802.11 handovers with 802.1X re-authentications, targets the issue of supporting secure client mobility in multi-access point Wireless LAN deployments. Namely, the authors analyze the impact of pre-authentication and re-authentication of a mobile client when handing over between two contiguous WLAN access points, and further propose an advance algorithm to reduce the handover latency while maintaining the authentication of the client itself. The last manuscript dealing with security aspects, Characterizing The Greedy Behavior in Wireless Ad Hoc Networks, switches the focus from static wireless network (wireless mesh and wireless LANs) to dynamic wireless ad hoc networks, by analyzing the network-wide impact of greedy behaviors of single wireless nodes. The authors further introduce a rational greedy strategy in the radio

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things

With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...

متن کامل

Assessment of DSACC and QPART Algorithms in Ad Hoc Networks

The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2011