2006
DOI: 10.1007/978-0-387-34738-7_3
|View full text |Cite
|
Sign up to set email alerts
|

On a QoS Intrusion Tolerant Routing protocol in Ad-hoc Networks

Abstract: We propose in this paper a protocol, called QITAR, which will secure the ad-hoc routing process while guaranteeing end-to-end QoS requirements in terms of delay or bandwidth constraints. Our approach provides an intrusion tolerant environment and uses and enhances the concept of Trusted Timely Computing Base in order to deduce consistent delay information and verify the bandwidth value pretended by untrusted nodes. QITAR also proposes a rescue procedure that saves the resources and accelerates the route mainte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Speed sensitive HO scheme, [6] Speed sensitive HO under hierarchical cellular system Does not consider security issues Path selection method, [7] Secures the routing for MMR networks Does not consider QoS issues QITAR, [8] Achieves QoS and intrusion tolerance for ad hoc networks -Vulnerable to high-speed mobility-May experience scalability problems MERQIT, [9] Achieves QoS and intrusion tolerance for mesh networks -Clusterheads are mobile nodes that may experience attacks and leave the network-Isolates malicious nodes WSN-TUM, [13] Fault-intrusion tolerant framework for sensor networks -Split the packet on fragments and send them on disjoint routes. However MMR networks use the same route as the routing architecture is a tree rooted at the MR-BS-Global QoS is hard to guarantee since each fragment uses a different route with different QoS constraints-All sensors participate in the securization effort.…”
Section: Research Work Characteristics Shortcomingsmentioning
confidence: 99%
See 2 more Smart Citations
“…Speed sensitive HO scheme, [6] Speed sensitive HO under hierarchical cellular system Does not consider security issues Path selection method, [7] Secures the routing for MMR networks Does not consider QoS issues QITAR, [8] Achieves QoS and intrusion tolerance for ad hoc networks -Vulnerable to high-speed mobility-May experience scalability problems MERQIT, [9] Achieves QoS and intrusion tolerance for mesh networks -Clusterheads are mobile nodes that may experience attacks and leave the network-Isolates malicious nodes WSN-TUM, [13] Fault-intrusion tolerant framework for sensor networks -Split the packet on fragments and send them on disjoint routes. However MMR networks use the same route as the routing architecture is a tree rooted at the MR-BS-Global QoS is hard to guarantee since each fragment uses a different route with different QoS constraints-All sensors participate in the securization effort.…”
Section: Research Work Characteristics Shortcomingsmentioning
confidence: 99%
“…A few intrusion tolerant routing protocols for the ad hoc and mesh contexts have addressed QoS issues, [8,9]. However, such protocols can not be directly adopted by relay networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation