Architectural aspects of QoS-aware personal networks

Personal Networks (PN) are future communication systems that combine wireless and infracuture based networks to provide users a variety of services anywhere and anytime. PNs introduce new design challenges due to the heterogeneity of the involved technologies, the need for self-organization, the dynamics of the system composition, the application-driven nature, the co-operation with infrastructure-based networks, and the security hazards. This paper discusses the challenges of security and QoS provisioning in designing self-organized personal networks and combines them all into an integrated architectural framework.

[1]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.

[2]  Jamal N. Al-Karaki,et al.  Quality of service support in IEEE 802.11 wireless ad hoc networks , 2004, Ad Hoc Networks.

[3]  Louise Lamont,et al.  Hierarchical OLSR - a scalable proactive routing protocol for heterogeneous ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[4]  William Adjie-Winoto,et al.  The design and implementation of an intentional naming system , 2000, OPSR.

[5]  Chenxi Zhu,et al.  QoS routing for mobile ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[6]  Charles E. Perkins,et al.  Service Location Protocol , 1997, RFC.

[7]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[8]  Nitin H. Vaidya,et al.  Priority Scheduling in Wireless Ad Hoc Networks , 2002, MobiHoc '02.

[9]  Ingrid Moerman,et al.  Analysis of Decentralized Resource and Service Discovery Mechanisms in Wireless Multi-hop Networks , 2005, WWIC.

[10]  Xiaoyan Hong,et al.  Scalable ad hoc routing in large, dense wireless networks using clustering and landmarks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[11]  Sonia M. Heemstra de Groot,et al.  A Security Architecture for Personal Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[12]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[13]  Ignas G. Niemegeers,et al.  Research Issues in Ad-Hoc Distributed Personal Networking , 2003, Wirel. Pers. Commun..

[14]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[15]  Mosa Ali Abu-Rgheff,et al.  Design and evaluation of an integrated mobile IP and SIP framework for advanced handoff management , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[16]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[17]  Stuart Cheshire,et al.  Dynamic Configuration of IPv4 Link-Local Addresses , 2005, RFC.

[18]  Thomas Kunz,et al.  Proactive QoS Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[19]  Geert Heijenk,et al.  Service discovery using Bloom filters , 2006 .

[20]  Edith Cohen,et al.  Search and replication in unstructured peer-to-peer networks , 2002, ICS '02.

[21]  Klara Nahrstedt,et al.  Distributed quality-of-service routing in ad hoc networks , 1999, IEEE J. Sel. Areas Commun..

[22]  David L. Black,et al.  An Architecture for Differentiated Service , 1998 .

[23]  Edward W. Knightly,et al.  Distributed Priority Scheduling and Medium Access in Ad Hoc Networks , 2002, Wirel. Networks.

[24]  Piet Van Mieghem,et al.  Concepts of exact QoS routing algorithms , 2004, IEEE/ACM Transactions on Networking.

[25]  T. Aaron Gulliver,et al.  Quality of service for ad hoc on-demand distance vector routing , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[26]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[27]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[28]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[29]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[30]  Piet Van Mieghem,et al.  Hop-by-hop quality of service routing , 2001, Comput. Networks.

[31]  John Kubiatowicz,et al.  Probabilistic location and routing , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[32]  Zheng Wang,et al.  An Architecture for Differentiated Services , 1998, RFC.

[33]  Marco Dorigo,et al.  AntNet: Distributed Stigmergetic Control for Communications Networks , 1998, J. Artif. Intell. Res..

[34]  Piet Van Mieghem,et al.  Responsible Editor: A. Kshemkalyani , 2006 .

[35]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.