Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks

Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks

Shahin Vakilinia, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja, Iman Vakilinia
DOI: 10.4018/ijbdcn.2013100102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.
Article Preview
Top

Introduction

Wireless Ad-Hoc networks consist of a collection of nodes which are capable of communicating with each other without requiring a fixed infrastructure. In addition, in the case of mobile nodes, the interconnection between nodes can change continuously. Such a network is generally called a mobile Ad-Hoc network (MANET). Nodes within transmission range of each other communicate directly, and nodes which are far apart use other nodes in order to transmit their data through multiple hops.

Since our goal in this paper is to address QoS and security issues in mobile Ad-Hoc networks, we will choose various layer architectures based on QoS and security criteria and then focus on a cross-layer design to improve such performance. With such views in mind, at the MAC layer, we will focus on Multi-Channel MAC schemes that provide better performance in fading and jamming scenarios (Bahl et al., 2004; Hoi et al., 2007; Jain et al., 2001; So & Vaidya, 2004; Tang & Garcia, 1998).

Among QoS-aware routing schemes (Marina & Das, 2001), INSIGNIA (Lee et al., 2000; Mohapatra et al., 2003), ASAP (Xue et al., 2003) and INORA (Dharmaraju et al., 2002), Multipath routing algorithms targeted at providing QoS will be considered as a basis. A good architecture for QoS-aware Ad-Hoc networks is proposed in (Chen & Heinzelman, 2004). Our architecture is similar to the approach proposed by Chen and Heinzelman while we try to enhance their approach by taking cross-layer issues into account and also improving the performance of protocols at each layer in all of the mentioned algorithms.

On the other hand, in order to provide security we have to secure our layers against attacks. In (Xu et al., 2005) detecting ways of jamming attacks of wireless Ad-Hoc networks were introduced and some good methods for defense against jamming attacks were explained in (Xu et al., 2004; Xu, 2007). In (IEEE Std 802.11i) one of the most effective common authentication methods, extensive authentication protocol (EAP) was described and (Alghathbar & Mahmoud, 2009) tried to expand 802.11 EAP suitable and more secure and non detectable for the wireless Systems. (Stamouli, 2003; Zhang & Lee, 2000) introduce some intrusion detection systems on the physical and MAC layers.

Routing attacks are being introduced in (Ayirci & Rong, 2009; Goyal et al., 2010; Kannhavong etal., 2007; Noubir & Lin, 2003). Some secure Ad-Hoc routing protocols have also been proposed in (Hu et al., 2002; Hu et al., 2005; Desilva & Boppana, 2005). SAODV is very well-known and resistant against a lot of attacks such as black hole and worm-hole attacks (Hu et al., 2005). However, it does not include problems such as sniffing in the network layer and end-to-end authentication. None of these papers has considered QoS issues. In other words, they do not consider the effect of making the networks secure on the QoS parameters of the wireless Ad-Hoc network.

Because of our focus to have the secure QoS-aware voice calls over the Ad-Hoc network, we have to consider both security and QoS and the interactions between them. In fact, main issue of this paper is based on considering QoS and security problems simultaneously. Our proposed QoS-aware algorithms support network QoS parameters with existence of security algorithms.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2024)
Volume 18: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 17: 2 Issues (2021)
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing