Optimization between security and delay of quality-of-service

Quality of service (QoS) and security have been considered as two independent entities. However, they always impact each other in various kinds of scenarios and it is necessary to study the optimization between them. This paper proposes algorithms to evaluate security level with three main features, i.e., authentication, data integrity and confidentiality. Based on that, a novel model is proposed to measure the interaction between delay of QoS and security in different application scenarios, heterogeneous users and disparate services. Furthermore, immune algorithm is used to get optimal parameters for both delay and the security level. Simulation results show that the proposed model can balance delay and security level well under diverse traffic loads of network. The model is useful to get better performance for network service, especially in rigorous network circumstance.

[1]  Zhen Ji,et al.  A hybrid immune multiobjective optimization algorithm , 2010, Eur. J. Oper. Res..

[2]  Stefan Lindskog,et al.  Providing Tunable Security Services: An IEEE 802.11i Example , 2006, 2006 Securecomm and Workshops.

[3]  Christian Callegari,et al.  Security and delay issues in SIP systems , 2009 .

[4]  H. Imai,et al.  On the impact of security on latency in WLAN 802.11b , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[5]  Dapeng Wu,et al.  An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.

[6]  Kai Wang,et al.  Quality of protection analysis and performance modeling in IP multimedia subsystem , 2009, Comput. Commun..

[7]  Marisol García-Valls,et al.  QoS-Aware Real-Time Composition Algorithms for Service-Based Applications , 2009, IEEE Transactions on Industrial Informatics.

[8]  Nelson L. S. da Fonseca Fourth quarter 2009 IEEE communications surveys and tutorials , 2009 .

[9]  Wei Qu,et al.  IPSec-based secure wireless virtual private network , 2002, MILCOM 2002. Proceedings.

[10]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[11]  Wei Liang,et al.  On performance analysis of challenge/response based authentication in wireless networks , 2005, Comput. Networks.

[12]  Meikang Qiu,et al.  Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.

[13]  Wenye Wang,et al.  On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility , 2007, Mob. Networks Appl..

[14]  Wei Liang,et al.  A quantitative study of authentication and QoS in wireless IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[15]  Johnson P. Thomas,et al.  Security and QoS Self-Optimization in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.

[16]  Doru E. Tiliute Security of Mobile ad-hoc Wireless Networks. A Brief Survey , 2007 .

[17]  Stefan Lindskog,et al.  Providing Tunable Security in IEEE 802.11i Enabled Networks , 2006 .

[18]  Chao-Yang Lee,et al.  A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..

[19]  Jun Zhang,et al.  Impact of Security on QoS in Communication Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[20]  Brian L. Mark,et al.  Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs , 2006, IEEE Transactions on Vehicular Technology.