TY - GEN
T1 - Exploring the security requirements for quality of service in combined wired and wireless networks
AU - Fadlullah, Zubair Md
AU - Taleb, Tarik
AU - Nasser, Nidal
AU - Kato, Nei
PY - 2009
Y1 - 2009
N2 - In the modern era of Internet, providing Quality of Service (QoS) is a challenging issue, particularly in resourceconstrained wireless networks with delay-sensitive multimedia traffic. Real-time and multimedia services are now available to end-users over wired networks, Wireless Local Area Networks (WLANs), and Wireless Personal Area Networks (WPANs). While the usual trend is to provide the best possible QoS for these services, it is also imperative to deploy security requirements along with the QoS parameters. In this paper, we argue that the existing approaches for including security parameters (such as encryption/decryption key lengths) with QoS parameters (e.g., end-to-end delay requirements) lead to further security risks and consequently fail to provide an adequate solution. Through simulations, we point out the pitfalls of integrating delay and security support in the contemporary approaches. We also envision QoS2, a framework integrating both quality of security and QoS, in order to provide possible solutions for solving these problems. We also demonstrate via simulation the effectiveness and strength of our adopted approach.
AB - In the modern era of Internet, providing Quality of Service (QoS) is a challenging issue, particularly in resourceconstrained wireless networks with delay-sensitive multimedia traffic. Real-time and multimedia services are now available to end-users over wired networks, Wireless Local Area Networks (WLANs), and Wireless Personal Area Networks (WPANs). While the usual trend is to provide the best possible QoS for these services, it is also imperative to deploy security requirements along with the QoS parameters. In this paper, we argue that the existing approaches for including security parameters (such as encryption/decryption key lengths) with QoS parameters (e.g., end-to-end delay requirements) lead to further security risks and consequently fail to provide an adequate solution. Through simulations, we point out the pitfalls of integrating delay and security support in the contemporary approaches. We also envision QoS2, a framework integrating both quality of security and QoS, in order to provide possible solutions for solving these problems. We also demonstrate via simulation the effectiveness and strength of our adopted approach.
KW - Encryption
KW - Quality of protection
KW - Quality of service
UR - http://www.scopus.com/inward/record.url?scp=70450277340&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70450277340&partnerID=8YFLogxK
U2 - 10.1145/1582379.1582397
DO - 10.1145/1582379.1582397
M3 - Conference contribution
AN - SCOPUS:70450277340
SN - 9781605585697
T3 - Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
SP - 73
EP - 78
BT - Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
T2 - 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Y2 - 21 June 2009 through 24 June 2009
ER -