SlideShare a Scribd company logo
1 of 9
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 50-58
www.iosrjournals.org
DOI: 10.9790/0661-17225058 www.iosrjournals.org 50 | Page
A Secure QOS Distributed Routing Protocol for Hybrid Wireless
Networks
S.Aakasham1
, S.R.Mugunthan2
1
PG Scholar, Dept of CSE, SVS College of Engineering, Tamil Nadu, India.
2
Assistent Professor, Dept of CSE, SVS College of Engineering, Tamil Nadu, India
Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion-
detection, overhead, transmission delay.
Index Terms: Hybrid Wireless Networks, Mobile ad-hoc network (MANET), Quality of Service (QoS), QoS-
Oriented Distributed Routing Protocol (QOD), Enhanced Adaptive ACKnowledgment (EAACK)
I. Introduction
The future development of wireless networks has stimulated numerous wireless applications that have
been used in wide areas such as emergency services, education, commerce, military, and entertainment. It
improved technology and reduced costs, wireless networks have gained much more preferences over wired
networks in the past few decades. Nowadays, people wish to watch videos, play games, watch TV, and make
long distance conferencing via wireless mobile devices ―on the go.‖ The widespread use of wireless and mobile
devices and the increasing demand for mobile multimedia streaming services are leading to a promising near
future where wireless multimedia services (e.g., mobile gaming, online TV, and online conferences) are widely
deployed. The emergence and the envisioned future of real time and multimedia applications have stimulated
the need of high Quality of Service (QoS) support in wireless and mobile networking environments [5]. The
QoS support reduces end-to- end transmission delay and enhances throughput to guarantee the seamless
communication between mobile devices and wireless infrastructures.
Hybrid wireless networks have been proven to be a better network structure for the next generation
wireless networks [6], [7], [8], [9], and can help to tackle the stringent end-to end QoS requirements of different
applications. Hybrid networks synergistically combine infrastructure networks and MANETs to leverage each
other. Specifically, infrastructure networks improve the scalability of MANETs, while MANETs automatically
establish self-organizing networks, extending the coverage of the infrastructure networks. In a vehicle
opportunistic access network (an instance of hybrid networks), people in vehicles need to upload or download
videos from remote Internet servers through access points (APs) (i.e., base stations) spreading out in a city.
Since it is unlikely that the base stations cover the entire city to maintain sufficiently strong signal everywhere
to support an application requiring high link rates, the vehicles themselves can form a MANET to extend the
coverage of the base stations, providing continuous network connections.
Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless
transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or
indirectly. Industrial remote access and control via wireless networks are becoming more and more popular
these days [35]. One of the major advantages of wireless networks is its ability to allow data communication
between different parties and still maintain their mobility. However, this communication is limited to the range
of transmitters. This means that two nodes cannot communicate with each other when the distance between the
two nodes is beyond the communication range of their own. MANET solves this problem by allowing
intermediate par- ties to relay data transmissions. This is achieved by dividing MANET into two types of
networks, namely, single-hop and multihop. In a single-hop network, all nodes within the same radio range
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 51 | Page
communicate directly with each other. On the other hand, in a multihop network, nodes rely on other
intermediate nodes to transmit if the destination node is out of their radio range. In contrary to the traditional
wireless network, MANET has a decentralized network infrastructure. MANET does not require a fixed
infrastructure; thus, all nodes are free to move randomly [10], [27], [29]. MANET is capable of creating a self-
configuring and self-maintaining network without the help of a centralized infrastructure, which is often
infeasible in critical mission applications like military conflict or emergency recovery. Minimal configuration
and quick deployment make MANET ready to be used in emergency circumstances where an infrastructure is
unavailable or unfeasible to install in scenarios like natural or human-induced disasters, military conflicts, and
medical emergency situations [19], [30].
Owing to these unique characteristics, Hybrid wireless networks is becoming more and more widely
implemented in the industry [14], [28]. However, considering the fact that Hybrid wireless networks is popular
among critical mission applications, network security is of vital importance. Unfortunately, the open medium
and remote distribution of Hybrid wireless networks make it vulnerable to various types of attacks. For example,
due to the nodes’ lack of physical protection, malicious attackers can easily capture and compromise nodes to
achieve attacks. In particular, considering the fact that most routing protocols in Hybrid wireless networks
assume that every node in the network behaves cooperatively with other nodes and presumably not malicious
[5], attackers can easily compromise Hybrid wireless networks by inserting malicious or non-cooperative nodes
into the network. Furthermore, because of Hybrid wireless networks distributed architecture and changing
topology, a traditional centralized monitoring technique is no longer feasible in Hybrid wireless networks. In
such case, it is crucial to develop an intrusion-detection system (IDS). specially designed for Hybrid wireless
networks. Many research efforts have been devoted to such research topic [1], [3], [6]–[9], [15], [16], [22], [24],
[26], [29],[31].
In the next section, we mainly concentrate on discussing the background information required for
understanding this research topic
II. Problem Definition
Our proposed approach EAACK is designed to tackle three of the six weaknesses of Watchdog
scheme, namely, false misbehavior, limited transmission power, and receiver collision.
In this section, we discuss these three weaknesses in detail.
1. False misbehavior
2. Limited transmission power
3. Receiver collision
Fig-1: Reveicer collisions
In a typical example of receiver collisions, shown in Fig. 1, after node A sends Packet 1 to node B, it
tries to overhear if node B forwarded this packet to node C; meanwhile, node X is forwarding Packet 2 to node
C. In such case, node A overhears that node B has successfully forwarded Packet 1 to node C but failed to detect
that node C did not receive this packet due to a collision between Packet 1 and Packet 2 at node C.
Fig-2: Limited Transmission Power
In the case of limited transmission power, in order to preserve its own battery resources, node B
intentionally limits its transmission power so that it is strong enough to be overheard by node A but not strong
enough to be received by node C, as shown in Fig. 2.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 52 | Page
Fig-3: False Misbehavior Report
For false misbehavior report, although node A successfully overheard that node B forwarded Packet 1
to node C, node A still reported node B as misbehaving, as shown in Fig. 3. Due to the open medium and remote
distribution of typical MANETs, attackers can easily capture and compromise one or two nodes to achieve this
false misbehavior report attack. As discussed in previous sections, TWOACK and AACK solve two of these
three weaknesses, namely, receiver collision and limited transmission power. However, both of them are
vulnerable to the false misbehavior attack. In this research work, our goal is to propose a new IDS specially
designed for MANETs, which solves not only receiver collision and limited transmission power but also the
false misbehavior problem.
Furthermore, we extend our research to adopt a digital signature scheme during the packet transmission
process. As in all acknowledgment-based IDSs, it is vital to ensure the integrity and authenticity of all
acknowledgment packets.
III. Network And Service Models
We consider a hybrid wireless network with an arbitrary number of base stations spreading over the
network. N mobile nodes are moving around in network. Each node ni (1≤ i ≤ N) uses IEEE 802.11 interface
with the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol [28]. Since a hybrid
network where nodes are equipped with multiinterfaces that transmit packets through multichannels generate
much less interference than a hybrid network where nodes are equipped with a single Wi-Fi interface, we
assume that each node is equipped with a single Wi-Fi interface in order to deal with a more difficult problem.
Therefore, the base stations considered in this paper are access points (APs). The Wi-Fi interface enables nodes
to communicate with both APs and mobile nodes. For example, in a University campus, normally only buildings
have APs. Therefore, people that do not have Wi-Fi access but close to buildings can use two-hop relay
transmissions to connect to the APs in the buildings. Feeney et al. [29] considered the similar scenario in his
work.
Fig-4: Hybrid Wireless Network Model
The QoS requirements mainly include end-to-end delay bound, which is essential for many
applications with stringent real-time requirement. While throughput guarantee is also important, it is
automatically guaranteed by bounding the transmission delay for a certain amount of packets [31]. The source
node conducts admission control to check whether there are enough resources to satisfy the requirements of QoS
of the packet stream. Fig. 4 shows the network model of a hybrid network. For example, when a source node n1
wants to upload files to an Internet server through APs, it can choose to send packets to the APs directly by
itself or require its neighbor nodes n2, n3, or n4 to assist the packet transmission.
We assume that queuing occurs only at the output ports of the mobile nodes [32]. After a mobile node
generates the packets, it first tries to transmit the packets to its nearby APs that can guarantee the QoS
requirements. If it fails (e.g., out of the transmission range of APs or in a hot/dead spot), it relies on its
neighbors that can guarantee the QoS requirements for relaying packets to APs. Relaying for a packet stream
can be modeled as a process, in which packets from a source node traverse a number of queuing servers to some
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 53 | Page
APs [31]. In this model, the problem of how to secure QoS routing can be transformed to the problem of how to
schedule the neighbor resources between nodes to ensure secure QoS of packet routing.
IV. Scheme Description
In this paper, we propose a Secure Quality of Service Oriented Distributed routing protocol (SQOD).
SQOD contain two contrivances:
1. QoS-Oriented Distributed Routing Protocol (QOD).
2. Enhanced Adaptive ACKnowledgment (EAACK).
We use first a QoS-Oriented Distributed routing protocol (QOD)[1]. Usually, a hybrid network has
widespread base stations. The data transmission in hybrid networks has two features. 1. An AP can be a source
or a destination to any mobile node. Second, the number of transmission hops between a mobile node and an AP
is small. The first feature allows a stream to have anycast transmission along multiple transmission paths to its
destination through base stations. 2. Enables a source node to connect to an AP through an intermediate node.
Taking full advantage of the two features, QOD transforms the packet routing problem into a dynamic resource
scheduling problem. QOD is the first work for QoS routing in hybrid networks.
This QOD makes five contributions:
Earliest Deadline First scheduling algorithm: The algorithm selects qualified neighbors and employs
deadline-driven scheduling mechanism to guarantee QoS routing.
Distributed packet scheduling algorithm: After qualified neighbors are identified, this algorithm schedules
packet routing. It assigns earlier generated packets to forwarders with higher queuing delays, while assigns more
recently generated packets to forwarders with lower queuing delays to reduce total transmission delay.
Mobility-based segment resizing algorithm: The source
node adaptively resizes each packet in its packet stream for each neighbor node according to the neighbor’s
mobility in order to increase the scheduling feasibility of the packets from the source node.
Least Slack First (LSF) scheduling algorithm: In this algorithm, an intermediate node first forwards the
packet with the least time allowed to wait before being forwarded out to achieve fairness in packet forwarding.
Data redundancy elimination based transmission: Due to the broadcasting feature of the wireless networks,
the APs and mobile nodes can overhear and cache packets. This algorithm eliminates the redundant data to
improve the QoS of the packet transmission.
Specifically, above the algorithms used in QOD, if a source node is not within the transmission range
of the AP, a source node selects nearby neighbors that can provide QoS services to forward its packets to base
stations in a distributed manner. The source node schedules the packet streams to neighbors based on their
queuing condition, channel condition, and mobility, aiming to reduce transmission time and increase network
capacity. The neighbors then forward packets to base stations, which further forward packets to the destination.
If any intermediate node cannot send the packets to destination. Check the node if it is affected from any
attacker or malicious used Enhanced Adaptive ACKnowledgment (EAACK) scheme.
EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior
report authentication (MRA). In order to distinguish different packet types in different schemes, we included a
2-b packet header in EAACK. According to the Internet draft of DSR [42], there is 6 b reserved in the DSR
header. In EAACK, we use 2 b of the 6 b to flag different types of packets. Details are described in Table I.
Table-1: Packet Type Indicators
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 54 | Page
EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior
report authentication (MRA). In order to distinguish different packet types in different schemes, we included a
2-b packet header in EAACK. According to the Internet draft of DSR [11], there is 6 b reserved in the DSR
header. In EAACK, we use 2 b of the 6 b to flag different types of packets. Details are listed in Table I.
Fig-5: System control flow
Fig. 5 presents a flowchart describing the EAACK scheme. Please note that, in our proposed scheme,
we assume that the link between each node in the network is bidirectional. Furthermore, for each
communication process, both the source node and the destination node are not malicious. Unless specified, all
acknowledgment packets described in this research are required to be digitally signed by its sender and verified
by its receiver.
4.1. ACK
ACK is basically an end-to-end acknowledgment scheme. It acts as a part of the hybrid scheme in
EAACK, aiming to reduce network overhead when no network misbehavior is detected.
Fig-6: ACK scheme
In Fig. 6, in ACK mode, node S first sends out an ACK data packet Pad1to the destination node D. If all
the intermediate nodes along the route between nodes S and D are cooperative and node D successfully receives
Pad1, node D is required to send back an ACK acknowledgment packet Pak1 along the same route but in a
reverse order. Within a predefined time period, if node S receives Pak1, then the packet transmission from node S
to node D is successful. Otherwise, node S will switch to S-ACK mode by sending out an S-ACK data packet to
detect the misbehaving nodes in the route.
4.2. S-ACK
The S-ACK scheme is an improved version of the TWOACK scheme proposed by Liu et al. [44]. The
principle is to let every three consecutive nodes work in a group to detect misbehaving nodes. For every three
consecutive nodes in the route, the third node is required to send an S-ACK acknowledgment packet to the first
node. The intention of introducing S-ACK mode is to detect misbehaving nodes in the presence of receiver
collision or limited transmission power. As shown in Fig. 7, in S-ACK mode, the three consecutive nodes (i.e.,
F1, F2, and F3) work in a group to detect misbehaving nodes in the network. Node F1 first sends out S-ACK
data packet Psad1 to node F2. Then, node F2 forwards this packet to node F3. When node F3 receives Psad1, as it
is the third node in this three-node group, node F3 is required to send back an S-ACK acknowledgment packet
Psak1 to node F2. Node F2 forwards Psak1 back to node F1. If node F1 does not receive this acknowledgment
packet within a predefined time period, both nodes F2 and F3 are reported as malicious. Moreover, a
misbehavior report will be generated by node F1 and sent to the source node S.
where the source node immediately trusts the misbehavior report, EAACK requires the source node to
switch to MRA mode and confirm this misbehavior report. This is a vital step to detect false misbehavior report
in our proposed scheme.
4.3. MRA
The MRA scheme is designed to resolve the weakness of Watchdog when it fails to detect misbehaving
nodes with the presence of false misbehavior report. The false misbehavior report can be generated by malicious
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 55 | Page
attackers to falsely report innocent nodes as malicious. This attack can be lethal to the entire network when the
attackers break down sufficient nodes and thus cause a network division. The core of MRA scheme is to
authenticate whether the destination node has received the reported missing packet through a different route.
Fig-7: S-ACK schema
To initiate the MRA mode, the source node first searches its local knowledge base and seeks for an
alternative route to the destination node. If there is no other that exists, the source node starts a DSR routing
request to find another route. Due to the nature of MANETs, it is common to find out multiple routes between
two nodes.
By adopting an alternative route to the destination node, we circumvent the misbehavior reporter node.
When the destination node receives an MRA packet, it searches its local knowledge base and compares if the
reported packet was received. If it is already received, then it is safe to conclude that this is a false misbehavior
report and whoever generated this report is marked as malicious. Otherwise, the misbehavior report is trusted
and accepted.
By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite the
existence of false mis-behavior report.
V. Performance Evaluation
This section demonstrates the distinguishing properties of SQOD compared to QOD through
simulations on NS-2 [40]. QOD is a resource reservation-based routing protocol for QoS routing in MANETs.
This protocol extends AODV by adding information of the maximum delay and minimum available bandwidth
of each neighbor in a node’s routing table. To apply QOD in hybrid networks, we let a source node search for
the QoS guaranteed path to an AP. The intermediate nodes along the path reserve the resources for the source
node.
In the simulation, the setup was the same as Six APs with IEEE 802.11 MAC protocol are uniformly
distributed in the area. We randomly selected two source nodes to send packets to APs in every 10 s. A node’s
traffic is generated with constant bit rate (CBR) sources. The generation rate of the CBR traffic is 100 kb/s.
Unless otherwise specified, the speeds of the nodes were randomly selected from [1-40]m/s. Since the number
of successfully delivered packets within a certain delay is critical to the QoS of video streaming applications, we
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 56 | Page
define a new metric, namely QoS guaranteed throughput that measures the throughput sent from a source node
to a destination node satisfying a QoS delay requirement as 1 s. This metric can simultaneously reflect delay,
packet delivery ratio, throughput, and jitter features of packet transmission.
5.1 Packet delivery ratio with Different Mobility Speeds
In this experiment, a node’s mobility speed was randomly selected from (1; 10; 20; 30; 40). Fig. 8 plots
the QoS packet delivery ratio of all systems versus the node mobility speed. It shows that the QoS packet
delivery ratio of all systems decrease as node mobility increases. This is because higher mobility causes higher
frequent link breakages, which leads to more packet drops. Reestablishing the broken links results in a long
transmission delay for subsequent packets.
In each experiment, during 50 s, we continually selected a certain number of random nodes to transmit
packets to their randomly selected destinations for a time period randomly chosen from [1 to 5]s. As the number
of source nodes in the system increases, the percentage of the packet delivery ratio increases. This is because as
more packets are generated, every packet in the scheduling queue needs to wait for more time to be forwarded
out, which leads to higher packet delivery ratio and hence more delivery packets. We also see that the
percentage of the packet delivery ration in SQOD is higher than that of QOD.
Fig-8: Packet delivery ratio with Different Mobility Speeds
5.2. Delay with Different Mobility Speeds
In this section, we compare SQOD with QOD for delay. This experiment, a node’s mobility speed was
randomly selected from (1; 10; 20; 30; 40). Fig. 9 plots the QoS delay of all systems versus the node mobility
speed. We let the forwarding nodes receive as many packets from neighbor nodes as possible without admission
control to show the performance of SQOD and QOD when the packets are scheduling infeasible.
In each experiment, during 50 s, we continually selected a certain number of random nodes to transmit
packets to their randomly selected destinations for a time period randomly chosen from [1 to 5]s. As the number
of source nodes in the system increases, the percentage of the delayed packets increases. This is because as more
packets are generated, every packet in the scheduling queue needs to wait for more time to be forwarded out,
which leads to higher delay and hence more delayed packets. We also see that the percentage of the delayed
packets in QOD is higher than that of SQOD. This is because SQOD always tries to meet the deadlines of
packets with the earliest deadlines, while SQOD tries to balance the delay among the packets. Therefore, QOD
is able to meet more deadlines than SQOD support the QoS routing due to lower queue delay, while QoD makes
full use of the resources of the nodes around a source node, and distributively forwards the packets to the APs,
improving the QoS throughput of the system.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 57 | Page
Fig-9: Delay with Different Mobility Speeds
VI. Conclusions
Hybrid wireless networks that integrate MANETs and infrastructure wireless networks have proven to
be a better network structure for the next generation networks. Packet-dropping attack has always been a major
threat to the security in Hybrid wireless networks. In this paper, we propose a Secure QoS oriented distributed
routing protocol (SQOD) for hybrid networks. It provides Secure QoS services in a highly dynamic scenario.
Experimental results show that SQOD can achieve high mobility-resilience, scalability, and contention
reduction.
Furthermore, in an effort to prevent the attackers from initiating forged acknowledgment attacks, we
extended our research to incorporate digital signature in our proposed scheme. Although it generates more ROs
in some cases, as demonstrated in our experiment, it can vastly improve the network’s PDR when the attackers
are smart enough to forge acknowledgment packets. We think that this tradeoff is worthwhile when network
security is the top priority. In the future, we plan to evaluate the performance of SQOD based on the real
testbed.
References
[1]. H. Wu and X. Jia, ―QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks,‖ Ad Hoc Networks, vol.
5, pp. 600-612, 2009.
[2]. H. Luo, R. Ramjeey, P. Sinhaz, L. Liy, and S. Lu, ―UCAN: A Unified Cell and Ad-Hoc Network Architecture,‖ Proc. ACM
MobiCom, 2003.
[3]. P.K. Mckinley, H. Xu, A. Esfahanian, and L.M. Ni, ―Unicast-Based Multicast Communication in Wormhole-Routed Direct
Networks,‖ IEEE Trans. Parallel Data and Distributed Systems, vol. 5, no. 12, pp. 1252-1265, Dec. 1992.
[4]. H. Wu, C. Qiao, S. De, and O. Tonguz, ―Integrated Cell and Ad Hoc Relaying Systems: iCAR,‖ IEEE J. Selected Areas in Comm.,
vol. 19, no. 10, pp. 2105-2115, Oct. 2001.
[5]. J. Zhou and Y.R. Yang, ―PAR CelS: Pervasive Ad-Hoc Relaying for Cell Systems,‖ Proc. IFIP Mediterranean Ad Hoc Networking
Workshop (Med-Hoc-Net), 2002.
[6]. R. Braden, D. Clark, and S. Shenker, Integrated Services in the Internet Architecture: An Overview, IETF RFC 1633, 1994.
[7]. E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, Resource Reservation Protocol RSVP, IETF RFC 2205, 1998.
[8]. I. Jawhar and J. Wu, ―Quality of Service Routing in Mobile Ad Hoc Networks,‖ Network Theory and Applications, Springer, 2004.
[9]. T. Reddy, I. Karthigeyan, B. Manoj, and C. Murthy, ―Quality of Service Provisioning in Ad Hoc Wireless Networks: A Survey of
Issues and Solutions,‖ Ad Hoc Networks, vol. 4, no. 1, pp. 83-124, 2006.
[10]. X. Du, ―QoS Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol. 2, pp. 241-254, 2004.
[11]. S. Jiang, Y. Liu, Y. Jiang, and Q. Yin, ―Provisioning of Adaptability to Variable Topologies for Routing Schemes in MANETs,‖
IEEE J. Selected Areas in Comm., vol. 22, no. 7, pp. 1347-1356, Sept. 2004.
[12]. M. Conti, E. Gregori, and G. Maselli, ―Reliable and Efficient Forwarding in Ad Hoc Networks,‖ Ad Hoc Networks, vol. 4, pp. 398-
415, 2006.
[13]. G. Chakrabarti and S. Kulkarni, ―Load Balancing and Resource Reservation in Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol.
4, pp. 186-203, 2006.
[14]. A. Argyriou and V. Madisetti, ―Using a New Protocol to Enhance Path Reliability and Realize Load Balancing in Mobile Ad Hoc
Networks,‖ Ad Hoc Networks, vol. 4, pp. 60-74, 2006.
[15]. C. Shen and S. Rajagopalan, ―Protocol-Independent Multicast Packet Delivery Improvement Service for Mobile Ad Hoc
Networks,‖ Ad Hoc Networks, vol. 5, pp. 210-227, 2007.
[16]. C.E. Perkins, E.M. Royer, and S.R. Das, Quality of Service in Ad Hoc On-Demand Distance Vector Routing, IETF Internet draft,
2001.
[17]. Z. Shen and J.P. Thomas, ―Security and QoS Self-Optimization in Mobile Ad Hoc Networks,‖ IEEE Trans. Mobile Computing, vol.
7, pp. 1138-1151, Sept. 2008.
[18]. Y. Li and A. Ephremides, ―A Joint Scheduling Power Control and Routing Algorithm for Ad Hoc Networks,‖ Ad Hoc Networks,
2008.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 58 | Page
[19]. S. Ibrahim, K. Sadek, W. Su, and R. Liu, ―Cooperative Communications with Relay-Selection: When to Cooperate and Whom to
Cooperate With?‖ IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2814-2827, July 2008.
[20]. A. Bletsas, A. Khisti, D.P. Reed, and A. Lippman, ―A Simple Cooperative Diversity Method Based on Network Path Selection,‖
IEEE J. Selected Areas in Comm., vol. 24, no. 3, pp. 659-672, Mar. 2006.
[21]. T. Ng and W. Yu, ―Joint Optimization of Relay Strategies and Resource Allocations in Cellular Networks,‖ IEEE J. Selected Areas
in Comm., vol. 25, no. 2, pp. 328-339, Feb. 2004.
[22]. J. Cai, X. Shen, J.W. Mark, and A.S. Alfa, ―Semi-Distributed User Relaying Algorithm for Amplify-and-Forward Wireless Relay
Networks,‖ IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1348- 1357, Apr. 2008.
[23]. Y. Wei and D. Gitlin, ―Two-Hop-Relay Architecture for Next- Generation WWAN/WLAN Integration,‖ IEEE Wireless Comm.,
vol. 11, no. 2, pp. 24-30, Apr. 2004.
[24]. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE-SA Standards Board, 1999.
[25]. L. Feeney, B. Cetin, D. Hollos, M. Kubisch, S. Mengesha, and H. Karl, ―Multi-Rate Relaying for Performance Improvement in
IEEE 802.11 WLANS,‖ Proc. Fifth Int’l Conf. Wired/Wireless Internet Comm., 2007.
[26]. P. Gupta and P.R. Kumar, ―The Capacity of Wireless Networks,‖ IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388- 404,
Mar. 2000.
[27]. H. Zhang, ―Service Disciplines for Guaranteed Performance Service in Packet-Switching Networks,‖ Proc. IEEE, vol. 83, no. 10,
pp. 1374-1396, Oct. 1995.
[28]. [28] M. Karol, M. Hluchyj, and S. Mogan, ―Input versus Output Queueing on a Space-Division Packet Switch,‖ IEEE Trans.
Comm.,vol. 35, no. 12, pp. 1347-1356, Dec. 1987.
[29]. [29] S. Sahu, P. Nain, C. Diot, V. Firoiu, and D. Towsley, ―On Achievable Service Differentiation with Token Bucket Marking for
TCP,‖ Proc. ACM SIGMETRICS Int’l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), 2000.
[30]. [30] C. Liu and J. Layland, ―Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment,‖ J. ACM, vol. 20,
pp. 46- 61, 1973.
[31]. [31] D. Lin and R. Morris, ―Dynamics of Random Early Detection,‖ Proc. ACM Special Interest Group Data Comm.
(SIGCOMM),1997.
[32]. K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, ―Which wireless technology for industrial
wireless sensor networks? The development of OCARI technol,‖ IEEE Trans. Ind. Electron.,vol. 56, no. 10, pp. 4266–4278, Oct.
2009.
[33]. R. Akbani, T. Korkmaz, and G. V. S. Raju, ―Mobile Ad hoc Network Security,‖ in Lecture Notes in Electrical Engineering, vol.
127.New York: Springer-Verlag, 2012, pp. 659–666.
[34]. R. H. Akbani, S. Patel, and D. C. Jinwala, ―DoS attacks in mobile ad hoc networks: A survey,‖ in Proc. 2nd Int. Meeting ACCT,
Rohtak, Haryana, India, 2012, pp. 535–541.
[35]. T. Anantvalee and J. Wu, ―A Survey on Intrusion Detection in Mobile Ad Hoc Networks,‖ in Wireless/Mobile Security. New York:
Springer-Verlag, 2008.
[36]. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug.
2007.
[37]. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, ―Modeling and optimization of a solar energy harvester system for
self-powered wireless sensor networks,‖ IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.
[38]. V. C. Gungor and G. P. Hancke, ―Industrial wireless sensor networks: Challenges, design principles, and technical approach,‖ IEEE
Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
[39]. Y. Hu, D. Johnson, and A. Perrig, ―SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,‖ in Proc.
4th IEEEWorkshop Mobile Comput. Syst. Appl., 2002, pp. 3–13.
[40]. Y. Hu, A. Perrig, and D. Johnson, ―ARIADNE: A secure on-demand routing protocol for ad hoc networks,‖ in Proc. 8th ACM Int.
Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.
[41]. G. Jayakumar and G. Gopinath, ―Ad hoc mobile wireless networks routing protocol—A review,‖ J. Comput. Sci., vol. 3, no. 8, pp.
574–582, 2007.
[42]. D. Johnson and D. Maltz, ―Dynamic Source Routing in ad hoc wireless networks,‖ in Mobile Computing. Norwell, MA: Kluwer,
1996, ch. 5, pp. 153–181.
[43]. N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting misbehaving nodes in MANETs,‖ in Proc. 12th Int. Conf. iiWAS, Paris,
France, Nov. 8–10, 2010, pp. 216–222.
[44]. N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting forged acknowledgements in MANETs,‖ in Proc. IEEE 25th Int. Conf. AINA,
Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.
[45]. N. Nasser and Y. Chen, ―Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,‖ in Proc.
IEEE Int Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.
[46]. J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, ―On intrusion detection and response for mobile ad hoc networks,‖ in Proc.
IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747–752.
[47]. A. Patcha and A. Mishra, ―Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,‖ in Proc.
Radio Wireless Conf., 2003, pp. 75–78.
[48]. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, ―Secure routing and intrusion detection in ad hoc networks,‖ in
Proc. 3rd
Int. Conf. Pervasive Comput. Commun., 2005, pp. 191–199.

More Related Content

What's hot

MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Enhanced Mobile IP Handover Using Link Layer Information
Enhanced Mobile IP Handover Using Link Layer InformationEnhanced Mobile IP Handover Using Link Layer Information
Enhanced Mobile IP Handover Using Link Layer InformationCSCJournals
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deploymentDr. Ayman Elnashar, PhD
 
Video streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocolVideo streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
 
Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)MNIT Jaipur
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16eSimona Halunga
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study IRJET Journal
 
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
 
LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)
LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)
LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)Akram Awad, PhD, MBA
 

What's hot (15)

MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Enhanced Mobile IP Handover Using Link Layer Information
Enhanced Mobile IP Handover Using Link Layer InformationEnhanced Mobile IP Handover Using Link Layer Information
Enhanced Mobile IP Handover Using Link Layer Information
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deployment
 
Video streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocolVideo streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocol
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)Heterogeneous Networks(HetNets)
Heterogeneous Networks(HetNets)
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...
 
LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)
LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)
LTE Hetnet Deployments: The Five W's and the H (by Akram Awad)
 

Viewers also liked

Lossless Image Compression Using Data Folding Followed By Arithmetic Coding
Lossless Image Compression Using Data Folding Followed By Arithmetic CodingLossless Image Compression Using Data Folding Followed By Arithmetic Coding
Lossless Image Compression Using Data Folding Followed By Arithmetic Codingiosrjce
 
Load Rebalancing for Distributed Hash Tables in Cloud Computing
Load Rebalancing for Distributed Hash Tables in Cloud ComputingLoad Rebalancing for Distributed Hash Tables in Cloud Computing
Load Rebalancing for Distributed Hash Tables in Cloud Computingiosrjce
 
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...iosrjce
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial Systemiosrjce
 
Developing The active Learning Model to Improve the Effectiveness Study Group...
Developing The active Learning Model to Improve the Effectiveness Study Group...Developing The active Learning Model to Improve the Effectiveness Study Group...
Developing The active Learning Model to Improve the Effectiveness Study Group...iosrjce
 
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...iosrjce
 
Speech to text conversion for visually impaired person using µ law companding
Speech to text conversion for visually impaired person using µ law compandingSpeech to text conversion for visually impaired person using µ law companding
Speech to text conversion for visually impaired person using µ law compandingiosrjce
 
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community Prevalence and Pattern of Tobacco Use among Adults in an Urban Community
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community iosrjce
 
Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...
Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...
Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...iosrjce
 
Effect of cold atmospheric pressure plasma needle on DNA
Effect of cold atmospheric pressure plasma needle on DNAEffect of cold atmospheric pressure plasma needle on DNA
Effect of cold atmospheric pressure plasma needle on DNAiosrjce
 
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...Political Factors Militating the Success of Hospitality Industry in Nigeria: ...
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...iosrjce
 
Economic Relations between Two Countries
Economic Relations between Two CountriesEconomic Relations between Two Countries
Economic Relations between Two Countriesiosrjce
 
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLS
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLSBER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLS
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLSiosrjce
 
Sentiment Features based Analysis of Online Reviews
Sentiment Features based Analysis of Online ReviewsSentiment Features based Analysis of Online Reviews
Sentiment Features based Analysis of Online Reviewsiosrjce
 
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?iosrjce
 
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various ParametersDifferentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various Parametersiosrjce
 
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...iosrjce
 
Concept Drift for obtaining Accurate Insight on Process Execution
Concept Drift for obtaining Accurate Insight on Process ExecutionConcept Drift for obtaining Accurate Insight on Process Execution
Concept Drift for obtaining Accurate Insight on Process Executioniosrjce
 
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...iosrjce
 
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...iosrjce
 

Viewers also liked (20)

Lossless Image Compression Using Data Folding Followed By Arithmetic Coding
Lossless Image Compression Using Data Folding Followed By Arithmetic CodingLossless Image Compression Using Data Folding Followed By Arithmetic Coding
Lossless Image Compression Using Data Folding Followed By Arithmetic Coding
 
Load Rebalancing for Distributed Hash Tables in Cloud Computing
Load Rebalancing for Distributed Hash Tables in Cloud ComputingLoad Rebalancing for Distributed Hash Tables in Cloud Computing
Load Rebalancing for Distributed Hash Tables in Cloud Computing
 
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
 
Developing The active Learning Model to Improve the Effectiveness Study Group...
Developing The active Learning Model to Improve the Effectiveness Study Group...Developing The active Learning Model to Improve the Effectiveness Study Group...
Developing The active Learning Model to Improve the Effectiveness Study Group...
 
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...
 
Speech to text conversion for visually impaired person using µ law companding
Speech to text conversion for visually impaired person using µ law compandingSpeech to text conversion for visually impaired person using µ law companding
Speech to text conversion for visually impaired person using µ law companding
 
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community Prevalence and Pattern of Tobacco Use among Adults in an Urban Community
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community
 
Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...
Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...
Antral inflammatory polyp causing intermittent gastric outlet obstruction: Ca...
 
Effect of cold atmospheric pressure plasma needle on DNA
Effect of cold atmospheric pressure plasma needle on DNAEffect of cold atmospheric pressure plasma needle on DNA
Effect of cold atmospheric pressure plasma needle on DNA
 
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...Political Factors Militating the Success of Hospitality Industry in Nigeria: ...
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...
 
Economic Relations between Two Countries
Economic Relations between Two CountriesEconomic Relations between Two Countries
Economic Relations between Two Countries
 
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLS
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLSBER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLS
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLS
 
Sentiment Features based Analysis of Online Reviews
Sentiment Features based Analysis of Online ReviewsSentiment Features based Analysis of Online Reviews
Sentiment Features based Analysis of Online Reviews
 
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?
 
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various ParametersDifferentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
 
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...
 
Concept Drift for obtaining Accurate Insight on Process Execution
Concept Drift for obtaining Accurate Insight on Process ExecutionConcept Drift for obtaining Accurate Insight on Process Execution
Concept Drift for obtaining Accurate Insight on Process Execution
 
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...
 
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...
 

Similar to A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks

International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
3. 7769 8114-1-pb
3. 7769 8114-1-pb3. 7769 8114-1-pb
3. 7769 8114-1-pbIAESIJEECS
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkredpel dot com
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communicationijtsrd
 
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdfTopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdfBrianJanAdela3
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Similar to A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks (20)

International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
3. 7769 8114-1-pb
3. 7769 8114-1-pb3. 7769 8114-1-pb
3. 7769 8114-1-pb
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
N010617783
N010617783N010617783
N010617783
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
 
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdfTopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
TopologicalPlanningandDesignofHeterogeneousMobileNetworksinDenseAreas.pdf
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 50-58 www.iosrjournals.org DOI: 10.9790/0661-17225058 www.iosrjournals.org 50 | Page A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks S.Aakasham1 , S.R.Mugunthan2 1 PG Scholar, Dept of CSE, SVS College of Engineering, Tamil Nadu, India. 2 Assistent Professor, Dept of CSE, SVS College of Engineering, Tamil Nadu, India Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service (QoS) requirements in real time transmission for wireless application. But it stream including critical mission application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network (MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment (EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion- detection, overhead, transmission delay. Index Terms: Hybrid Wireless Networks, Mobile ad-hoc network (MANET), Quality of Service (QoS), QoS- Oriented Distributed Routing Protocol (QOD), Enhanced Adaptive ACKnowledgment (EAACK) I. Introduction The future development of wireless networks has stimulated numerous wireless applications that have been used in wide areas such as emergency services, education, commerce, military, and entertainment. It improved technology and reduced costs, wireless networks have gained much more preferences over wired networks in the past few decades. Nowadays, people wish to watch videos, play games, watch TV, and make long distance conferencing via wireless mobile devices ―on the go.‖ The widespread use of wireless and mobile devices and the increasing demand for mobile multimedia streaming services are leading to a promising near future where wireless multimedia services (e.g., mobile gaming, online TV, and online conferences) are widely deployed. The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments [5]. The QoS support reduces end-to- end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. Hybrid wireless networks have been proven to be a better network structure for the next generation wireless networks [6], [7], [8], [9], and can help to tackle the stringent end-to end QoS requirements of different applications. Hybrid networks synergistically combine infrastructure networks and MANETs to leverage each other. Specifically, infrastructure networks improve the scalability of MANETs, while MANETs automatically establish self-organizing networks, extending the coverage of the infrastructure networks. In a vehicle opportunistic access network (an instance of hybrid networks), people in vehicles need to upload or download videos from remote Internet servers through access points (APs) (i.e., base stations) spreading out in a city. Since it is unlikely that the base stations cover the entire city to maintain sufficiently strong signal everywhere to support an application requiring high link rates, the vehicles themselves can form a MANET to extend the coverage of the base stations, providing continuous network connections. Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or indirectly. Industrial remote access and control via wireless networks are becoming more and more popular these days [35]. One of the major advantages of wireless networks is its ability to allow data communication between different parties and still maintain their mobility. However, this communication is limited to the range of transmitters. This means that two nodes cannot communicate with each other when the distance between the two nodes is beyond the communication range of their own. MANET solves this problem by allowing intermediate par- ties to relay data transmissions. This is achieved by dividing MANET into two types of networks, namely, single-hop and multihop. In a single-hop network, all nodes within the same radio range
  • 2. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 51 | Page communicate directly with each other. On the other hand, in a multihop network, nodes rely on other intermediate nodes to transmit if the destination node is out of their radio range. In contrary to the traditional wireless network, MANET has a decentralized network infrastructure. MANET does not require a fixed infrastructure; thus, all nodes are free to move randomly [10], [27], [29]. MANET is capable of creating a self- configuring and self-maintaining network without the help of a centralized infrastructure, which is often infeasible in critical mission applications like military conflict or emergency recovery. Minimal configuration and quick deployment make MANET ready to be used in emergency circumstances where an infrastructure is unavailable or unfeasible to install in scenarios like natural or human-induced disasters, military conflicts, and medical emergency situations [19], [30]. Owing to these unique characteristics, Hybrid wireless networks is becoming more and more widely implemented in the industry [14], [28]. However, considering the fact that Hybrid wireless networks is popular among critical mission applications, network security is of vital importance. Unfortunately, the open medium and remote distribution of Hybrid wireless networks make it vulnerable to various types of attacks. For example, due to the nodes’ lack of physical protection, malicious attackers can easily capture and compromise nodes to achieve attacks. In particular, considering the fact that most routing protocols in Hybrid wireless networks assume that every node in the network behaves cooperatively with other nodes and presumably not malicious [5], attackers can easily compromise Hybrid wireless networks by inserting malicious or non-cooperative nodes into the network. Furthermore, because of Hybrid wireless networks distributed architecture and changing topology, a traditional centralized monitoring technique is no longer feasible in Hybrid wireless networks. In such case, it is crucial to develop an intrusion-detection system (IDS). specially designed for Hybrid wireless networks. Many research efforts have been devoted to such research topic [1], [3], [6]–[9], [15], [16], [22], [24], [26], [29],[31]. In the next section, we mainly concentrate on discussing the background information required for understanding this research topic II. Problem Definition Our proposed approach EAACK is designed to tackle three of the six weaknesses of Watchdog scheme, namely, false misbehavior, limited transmission power, and receiver collision. In this section, we discuss these three weaknesses in detail. 1. False misbehavior 2. Limited transmission power 3. Receiver collision Fig-1: Reveicer collisions In a typical example of receiver collisions, shown in Fig. 1, after node A sends Packet 1 to node B, it tries to overhear if node B forwarded this packet to node C; meanwhile, node X is forwarding Packet 2 to node C. In such case, node A overhears that node B has successfully forwarded Packet 1 to node C but failed to detect that node C did not receive this packet due to a collision between Packet 1 and Packet 2 at node C. Fig-2: Limited Transmission Power In the case of limited transmission power, in order to preserve its own battery resources, node B intentionally limits its transmission power so that it is strong enough to be overheard by node A but not strong enough to be received by node C, as shown in Fig. 2.
  • 3. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 52 | Page Fig-3: False Misbehavior Report For false misbehavior report, although node A successfully overheard that node B forwarded Packet 1 to node C, node A still reported node B as misbehaving, as shown in Fig. 3. Due to the open medium and remote distribution of typical MANETs, attackers can easily capture and compromise one or two nodes to achieve this false misbehavior report attack. As discussed in previous sections, TWOACK and AACK solve two of these three weaknesses, namely, receiver collision and limited transmission power. However, both of them are vulnerable to the false misbehavior attack. In this research work, our goal is to propose a new IDS specially designed for MANETs, which solves not only receiver collision and limited transmission power but also the false misbehavior problem. Furthermore, we extend our research to adopt a digital signature scheme during the packet transmission process. As in all acknowledgment-based IDSs, it is vital to ensure the integrity and authenticity of all acknowledgment packets. III. Network And Service Models We consider a hybrid wireless network with an arbitrary number of base stations spreading over the network. N mobile nodes are moving around in network. Each node ni (1≤ i ≤ N) uses IEEE 802.11 interface with the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol [28]. Since a hybrid network where nodes are equipped with multiinterfaces that transmit packets through multichannels generate much less interference than a hybrid network where nodes are equipped with a single Wi-Fi interface, we assume that each node is equipped with a single Wi-Fi interface in order to deal with a more difficult problem. Therefore, the base stations considered in this paper are access points (APs). The Wi-Fi interface enables nodes to communicate with both APs and mobile nodes. For example, in a University campus, normally only buildings have APs. Therefore, people that do not have Wi-Fi access but close to buildings can use two-hop relay transmissions to connect to the APs in the buildings. Feeney et al. [29] considered the similar scenario in his work. Fig-4: Hybrid Wireless Network Model The QoS requirements mainly include end-to-end delay bound, which is essential for many applications with stringent real-time requirement. While throughput guarantee is also important, it is automatically guaranteed by bounding the transmission delay for a certain amount of packets [31]. The source node conducts admission control to check whether there are enough resources to satisfy the requirements of QoS of the packet stream. Fig. 4 shows the network model of a hybrid network. For example, when a source node n1 wants to upload files to an Internet server through APs, it can choose to send packets to the APs directly by itself or require its neighbor nodes n2, n3, or n4 to assist the packet transmission. We assume that queuing occurs only at the output ports of the mobile nodes [32]. After a mobile node generates the packets, it first tries to transmit the packets to its nearby APs that can guarantee the QoS requirements. If it fails (e.g., out of the transmission range of APs or in a hot/dead spot), it relies on its neighbors that can guarantee the QoS requirements for relaying packets to APs. Relaying for a packet stream can be modeled as a process, in which packets from a source node traverse a number of queuing servers to some
  • 4. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 53 | Page APs [31]. In this model, the problem of how to secure QoS routing can be transformed to the problem of how to schedule the neighbor resources between nodes to ensure secure QoS of packet routing. IV. Scheme Description In this paper, we propose a Secure Quality of Service Oriented Distributed routing protocol (SQOD). SQOD contain two contrivances: 1. QoS-Oriented Distributed Routing Protocol (QOD). 2. Enhanced Adaptive ACKnowledgment (EAACK). We use first a QoS-Oriented Distributed routing protocol (QOD)[1]. Usually, a hybrid network has widespread base stations. The data transmission in hybrid networks has two features. 1. An AP can be a source or a destination to any mobile node. Second, the number of transmission hops between a mobile node and an AP is small. The first feature allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations. 2. Enables a source node to connect to an AP through an intermediate node. Taking full advantage of the two features, QOD transforms the packet routing problem into a dynamic resource scheduling problem. QOD is the first work for QoS routing in hybrid networks. This QOD makes five contributions: Earliest Deadline First scheduling algorithm: The algorithm selects qualified neighbors and employs deadline-driven scheduling mechanism to guarantee QoS routing. Distributed packet scheduling algorithm: After qualified neighbors are identified, this algorithm schedules packet routing. It assigns earlier generated packets to forwarders with higher queuing delays, while assigns more recently generated packets to forwarders with lower queuing delays to reduce total transmission delay. Mobility-based segment resizing algorithm: The source node adaptively resizes each packet in its packet stream for each neighbor node according to the neighbor’s mobility in order to increase the scheduling feasibility of the packets from the source node. Least Slack First (LSF) scheduling algorithm: In this algorithm, an intermediate node first forwards the packet with the least time allowed to wait before being forwarded out to achieve fairness in packet forwarding. Data redundancy elimination based transmission: Due to the broadcasting feature of the wireless networks, the APs and mobile nodes can overhear and cache packets. This algorithm eliminates the redundant data to improve the QoS of the packet transmission. Specifically, above the algorithms used in QOD, if a source node is not within the transmission range of the AP, a source node selects nearby neighbors that can provide QoS services to forward its packets to base stations in a distributed manner. The source node schedules the packet streams to neighbors based on their queuing condition, channel condition, and mobility, aiming to reduce transmission time and increase network capacity. The neighbors then forward packets to base stations, which further forward packets to the destination. If any intermediate node cannot send the packets to destination. Check the node if it is affected from any attacker or malicious used Enhanced Adaptive ACKnowledgment (EAACK) scheme. EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report authentication (MRA). In order to distinguish different packet types in different schemes, we included a 2-b packet header in EAACK. According to the Internet draft of DSR [42], there is 6 b reserved in the DSR header. In EAACK, we use 2 b of the 6 b to flag different types of packets. Details are described in Table I. Table-1: Packet Type Indicators
  • 5. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 54 | Page EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report authentication (MRA). In order to distinguish different packet types in different schemes, we included a 2-b packet header in EAACK. According to the Internet draft of DSR [11], there is 6 b reserved in the DSR header. In EAACK, we use 2 b of the 6 b to flag different types of packets. Details are listed in Table I. Fig-5: System control flow Fig. 5 presents a flowchart describing the EAACK scheme. Please note that, in our proposed scheme, we assume that the link between each node in the network is bidirectional. Furthermore, for each communication process, both the source node and the destination node are not malicious. Unless specified, all acknowledgment packets described in this research are required to be digitally signed by its sender and verified by its receiver. 4.1. ACK ACK is basically an end-to-end acknowledgment scheme. It acts as a part of the hybrid scheme in EAACK, aiming to reduce network overhead when no network misbehavior is detected. Fig-6: ACK scheme In Fig. 6, in ACK mode, node S first sends out an ACK data packet Pad1to the destination node D. If all the intermediate nodes along the route between nodes S and D are cooperative and node D successfully receives Pad1, node D is required to send back an ACK acknowledgment packet Pak1 along the same route but in a reverse order. Within a predefined time period, if node S receives Pak1, then the packet transmission from node S to node D is successful. Otherwise, node S will switch to S-ACK mode by sending out an S-ACK data packet to detect the misbehaving nodes in the route. 4.2. S-ACK The S-ACK scheme is an improved version of the TWOACK scheme proposed by Liu et al. [44]. The principle is to let every three consecutive nodes work in a group to detect misbehaving nodes. For every three consecutive nodes in the route, the third node is required to send an S-ACK acknowledgment packet to the first node. The intention of introducing S-ACK mode is to detect misbehaving nodes in the presence of receiver collision or limited transmission power. As shown in Fig. 7, in S-ACK mode, the three consecutive nodes (i.e., F1, F2, and F3) work in a group to detect misbehaving nodes in the network. Node F1 first sends out S-ACK data packet Psad1 to node F2. Then, node F2 forwards this packet to node F3. When node F3 receives Psad1, as it is the third node in this three-node group, node F3 is required to send back an S-ACK acknowledgment packet Psak1 to node F2. Node F2 forwards Psak1 back to node F1. If node F1 does not receive this acknowledgment packet within a predefined time period, both nodes F2 and F3 are reported as malicious. Moreover, a misbehavior report will be generated by node F1 and sent to the source node S. where the source node immediately trusts the misbehavior report, EAACK requires the source node to switch to MRA mode and confirm this misbehavior report. This is a vital step to detect false misbehavior report in our proposed scheme. 4.3. MRA The MRA scheme is designed to resolve the weakness of Watchdog when it fails to detect misbehaving nodes with the presence of false misbehavior report. The false misbehavior report can be generated by malicious
  • 6. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 55 | Page attackers to falsely report innocent nodes as malicious. This attack can be lethal to the entire network when the attackers break down sufficient nodes and thus cause a network division. The core of MRA scheme is to authenticate whether the destination node has received the reported missing packet through a different route. Fig-7: S-ACK schema To initiate the MRA mode, the source node first searches its local knowledge base and seeks for an alternative route to the destination node. If there is no other that exists, the source node starts a DSR routing request to find another route. Due to the nature of MANETs, it is common to find out multiple routes between two nodes. By adopting an alternative route to the destination node, we circumvent the misbehavior reporter node. When the destination node receives an MRA packet, it searches its local knowledge base and compares if the reported packet was received. If it is already received, then it is safe to conclude that this is a false misbehavior report and whoever generated this report is marked as malicious. Otherwise, the misbehavior report is trusted and accepted. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite the existence of false mis-behavior report. V. Performance Evaluation This section demonstrates the distinguishing properties of SQOD compared to QOD through simulations on NS-2 [40]. QOD is a resource reservation-based routing protocol for QoS routing in MANETs. This protocol extends AODV by adding information of the maximum delay and minimum available bandwidth of each neighbor in a node’s routing table. To apply QOD in hybrid networks, we let a source node search for the QoS guaranteed path to an AP. The intermediate nodes along the path reserve the resources for the source node. In the simulation, the setup was the same as Six APs with IEEE 802.11 MAC protocol are uniformly distributed in the area. We randomly selected two source nodes to send packets to APs in every 10 s. A node’s traffic is generated with constant bit rate (CBR) sources. The generation rate of the CBR traffic is 100 kb/s. Unless otherwise specified, the speeds of the nodes were randomly selected from [1-40]m/s. Since the number of successfully delivered packets within a certain delay is critical to the QoS of video streaming applications, we
  • 7. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 56 | Page define a new metric, namely QoS guaranteed throughput that measures the throughput sent from a source node to a destination node satisfying a QoS delay requirement as 1 s. This metric can simultaneously reflect delay, packet delivery ratio, throughput, and jitter features of packet transmission. 5.1 Packet delivery ratio with Different Mobility Speeds In this experiment, a node’s mobility speed was randomly selected from (1; 10; 20; 30; 40). Fig. 8 plots the QoS packet delivery ratio of all systems versus the node mobility speed. It shows that the QoS packet delivery ratio of all systems decrease as node mobility increases. This is because higher mobility causes higher frequent link breakages, which leads to more packet drops. Reestablishing the broken links results in a long transmission delay for subsequent packets. In each experiment, during 50 s, we continually selected a certain number of random nodes to transmit packets to their randomly selected destinations for a time period randomly chosen from [1 to 5]s. As the number of source nodes in the system increases, the percentage of the packet delivery ratio increases. This is because as more packets are generated, every packet in the scheduling queue needs to wait for more time to be forwarded out, which leads to higher packet delivery ratio and hence more delivery packets. We also see that the percentage of the packet delivery ration in SQOD is higher than that of QOD. Fig-8: Packet delivery ratio with Different Mobility Speeds 5.2. Delay with Different Mobility Speeds In this section, we compare SQOD with QOD for delay. This experiment, a node’s mobility speed was randomly selected from (1; 10; 20; 30; 40). Fig. 9 plots the QoS delay of all systems versus the node mobility speed. We let the forwarding nodes receive as many packets from neighbor nodes as possible without admission control to show the performance of SQOD and QOD when the packets are scheduling infeasible. In each experiment, during 50 s, we continually selected a certain number of random nodes to transmit packets to their randomly selected destinations for a time period randomly chosen from [1 to 5]s. As the number of source nodes in the system increases, the percentage of the delayed packets increases. This is because as more packets are generated, every packet in the scheduling queue needs to wait for more time to be forwarded out, which leads to higher delay and hence more delayed packets. We also see that the percentage of the delayed packets in QOD is higher than that of SQOD. This is because SQOD always tries to meet the deadlines of packets with the earliest deadlines, while SQOD tries to balance the delay among the packets. Therefore, QOD is able to meet more deadlines than SQOD support the QoS routing due to lower queue delay, while QoD makes full use of the resources of the nodes around a source node, and distributively forwards the packets to the APs, improving the QoS throughput of the system.
  • 8. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 57 | Page Fig-9: Delay with Different Mobility Speeds VI. Conclusions Hybrid wireless networks that integrate MANETs and infrastructure wireless networks have proven to be a better network structure for the next generation networks. Packet-dropping attack has always been a major threat to the security in Hybrid wireless networks. In this paper, we propose a Secure QoS oriented distributed routing protocol (SQOD) for hybrid networks. It provides Secure QoS services in a highly dynamic scenario. Experimental results show that SQOD can achieve high mobility-resilience, scalability, and contention reduction. Furthermore, in an effort to prevent the attackers from initiating forged acknowledgment attacks, we extended our research to incorporate digital signature in our proposed scheme. Although it generates more ROs in some cases, as demonstrated in our experiment, it can vastly improve the network’s PDR when the attackers are smart enough to forge acknowledgment packets. We think that this tradeoff is worthwhile when network security is the top priority. In the future, we plan to evaluate the performance of SQOD based on the real testbed. References [1]. H. Wu and X. Jia, ―QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks,‖ Ad Hoc Networks, vol. 5, pp. 600-612, 2009. [2]. H. Luo, R. Ramjeey, P. Sinhaz, L. Liy, and S. Lu, ―UCAN: A Unified Cell and Ad-Hoc Network Architecture,‖ Proc. ACM MobiCom, 2003. [3]. P.K. Mckinley, H. Xu, A. Esfahanian, and L.M. Ni, ―Unicast-Based Multicast Communication in Wormhole-Routed Direct Networks,‖ IEEE Trans. Parallel Data and Distributed Systems, vol. 5, no. 12, pp. 1252-1265, Dec. 1992. [4]. H. Wu, C. Qiao, S. De, and O. Tonguz, ―Integrated Cell and Ad Hoc Relaying Systems: iCAR,‖ IEEE J. Selected Areas in Comm., vol. 19, no. 10, pp. 2105-2115, Oct. 2001. [5]. J. Zhou and Y.R. Yang, ―PAR CelS: Pervasive Ad-Hoc Relaying for Cell Systems,‖ Proc. IFIP Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2002. [6]. R. Braden, D. Clark, and S. Shenker, Integrated Services in the Internet Architecture: An Overview, IETF RFC 1633, 1994. [7]. E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, Resource Reservation Protocol RSVP, IETF RFC 2205, 1998. [8]. I. Jawhar and J. Wu, ―Quality of Service Routing in Mobile Ad Hoc Networks,‖ Network Theory and Applications, Springer, 2004. [9]. T. Reddy, I. Karthigeyan, B. Manoj, and C. Murthy, ―Quality of Service Provisioning in Ad Hoc Wireless Networks: A Survey of Issues and Solutions,‖ Ad Hoc Networks, vol. 4, no. 1, pp. 83-124, 2006. [10]. X. Du, ―QoS Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol. 2, pp. 241-254, 2004. [11]. S. Jiang, Y. Liu, Y. Jiang, and Q. Yin, ―Provisioning of Adaptability to Variable Topologies for Routing Schemes in MANETs,‖ IEEE J. Selected Areas in Comm., vol. 22, no. 7, pp. 1347-1356, Sept. 2004. [12]. M. Conti, E. Gregori, and G. Maselli, ―Reliable and Efficient Forwarding in Ad Hoc Networks,‖ Ad Hoc Networks, vol. 4, pp. 398- 415, 2006. [13]. G. Chakrabarti and S. Kulkarni, ―Load Balancing and Resource Reservation in Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol. 4, pp. 186-203, 2006. [14]. A. Argyriou and V. Madisetti, ―Using a New Protocol to Enhance Path Reliability and Realize Load Balancing in Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol. 4, pp. 60-74, 2006. [15]. C. Shen and S. Rajagopalan, ―Protocol-Independent Multicast Packet Delivery Improvement Service for Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol. 5, pp. 210-227, 2007. [16]. C.E. Perkins, E.M. Royer, and S.R. Das, Quality of Service in Ad Hoc On-Demand Distance Vector Routing, IETF Internet draft, 2001. [17]. Z. Shen and J.P. Thomas, ―Security and QoS Self-Optimization in Mobile Ad Hoc Networks,‖ IEEE Trans. Mobile Computing, vol. 7, pp. 1138-1151, Sept. 2008. [18]. Y. Li and A. Ephremides, ―A Joint Scheduling Power Control and Routing Algorithm for Ad Hoc Networks,‖ Ad Hoc Networks, 2008.
  • 9. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks DOI: 10.9790/0661-17225058 www.iosrjournals.org 58 | Page [19]. S. Ibrahim, K. Sadek, W. Su, and R. Liu, ―Cooperative Communications with Relay-Selection: When to Cooperate and Whom to Cooperate With?‖ IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2814-2827, July 2008. [20]. A. Bletsas, A. Khisti, D.P. Reed, and A. Lippman, ―A Simple Cooperative Diversity Method Based on Network Path Selection,‖ IEEE J. Selected Areas in Comm., vol. 24, no. 3, pp. 659-672, Mar. 2006. [21]. T. Ng and W. Yu, ―Joint Optimization of Relay Strategies and Resource Allocations in Cellular Networks,‖ IEEE J. Selected Areas in Comm., vol. 25, no. 2, pp. 328-339, Feb. 2004. [22]. J. Cai, X. Shen, J.W. Mark, and A.S. Alfa, ―Semi-Distributed User Relaying Algorithm for Amplify-and-Forward Wireless Relay Networks,‖ IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1348- 1357, Apr. 2008. [23]. Y. Wei and D. Gitlin, ―Two-Hop-Relay Architecture for Next- Generation WWAN/WLAN Integration,‖ IEEE Wireless Comm., vol. 11, no. 2, pp. 24-30, Apr. 2004. [24]. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE-SA Standards Board, 1999. [25]. L. Feeney, B. Cetin, D. Hollos, M. Kubisch, S. Mengesha, and H. Karl, ―Multi-Rate Relaying for Performance Improvement in IEEE 802.11 WLANS,‖ Proc. Fifth Int’l Conf. Wired/Wireless Internet Comm., 2007. [26]. P. Gupta and P.R. Kumar, ―The Capacity of Wireless Networks,‖ IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388- 404, Mar. 2000. [27]. H. Zhang, ―Service Disciplines for Guaranteed Performance Service in Packet-Switching Networks,‖ Proc. IEEE, vol. 83, no. 10, pp. 1374-1396, Oct. 1995. [28]. [28] M. Karol, M. Hluchyj, and S. Mogan, ―Input versus Output Queueing on a Space-Division Packet Switch,‖ IEEE Trans. Comm.,vol. 35, no. 12, pp. 1347-1356, Dec. 1987. [29]. [29] S. Sahu, P. Nain, C. Diot, V. Firoiu, and D. Towsley, ―On Achievable Service Differentiation with Token Bucket Marking for TCP,‖ Proc. ACM SIGMETRICS Int’l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), 2000. [30]. [30] C. Liu and J. Layland, ―Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment,‖ J. ACM, vol. 20, pp. 46- 61, 1973. [31]. [31] D. Lin and R. Morris, ―Dynamics of Random Early Detection,‖ Proc. ACM Special Interest Group Data Comm. (SIGCOMM),1997. [32]. K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, ―Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,‖ IEEE Trans. Ind. Electron.,vol. 56, no. 10, pp. 4266–4278, Oct. 2009. [33]. R. Akbani, T. Korkmaz, and G. V. S. Raju, ―Mobile Ad hoc Network Security,‖ in Lecture Notes in Electrical Engineering, vol. 127.New York: Springer-Verlag, 2012, pp. 659–666. [34]. R. H. Akbani, S. Patel, and D. C. Jinwala, ―DoS attacks in mobile ad hoc networks: A survey,‖ in Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541. [35]. T. Anantvalee and J. Wu, ―A Survey on Intrusion Detection in Mobile Ad Hoc Networks,‖ in Wireless/Mobile Security. New York: Springer-Verlag, 2008. [36]. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007. [37]. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, ―Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,‖ IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008. [38]. V. C. Gungor and G. P. Hancke, ―Industrial wireless sensor networks: Challenges, design principles, and technical approach,‖ IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009. [39]. Y. Hu, D. Johnson, and A. Perrig, ―SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,‖ in Proc. 4th IEEEWorkshop Mobile Comput. Syst. Appl., 2002, pp. 3–13. [40]. Y. Hu, A. Perrig, and D. Johnson, ―ARIADNE: A secure on-demand routing protocol for ad hoc networks,‖ in Proc. 8th ACM Int. Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23. [41]. G. Jayakumar and G. Gopinath, ―Ad hoc mobile wireless networks routing protocol—A review,‖ J. Comput. Sci., vol. 3, no. 8, pp. 574–582, 2007. [42]. D. Johnson and D. Maltz, ―Dynamic Source Routing in ad hoc wireless networks,‖ in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181. [43]. N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting misbehaving nodes in MANETs,‖ in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8–10, 2010, pp. 216–222. [44]. N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting forged acknowledgements in MANETs,‖ in Proc. IEEE 25th Int. Conf. AINA, Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494. [45]. N. Nasser and Y. Chen, ―Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,‖ in Proc. IEEE Int Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159. [46]. J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, ―On intrusion detection and response for mobile ad hoc networks,‖ in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747–752. [47]. A. Patcha and A. Mishra, ―Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,‖ in Proc. Radio Wireless Conf., 2003, pp. 75–78. [48]. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, ―Secure routing and intrusion detection in ad hoc networks,‖ in Proc. 3rd Int. Conf. Pervasive Comput. Commun., 2005, pp. 191–199.