On the impact of quality of protection in wireless local area networks with IP mobility
Mobile Networks and Applications
Security and QoS Self-Optimization in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Impact of Security on QoS in Communication Network
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
Quality of protection analysis and performance modeling in IP multimedia subsystem
Computer Communications
A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks
Journal of Network and Computer Applications
Security and delay issues in SIP systems
International Journal of Communication Systems
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Advances in artificial immune systems
IEEE Computational Intelligence Magazine
Second quarter 2009 IEEE Communications Surveys and Tutorials
IEEE Communications Surveys & Tutorials
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
A systematic method for network topology reconfiguration with limited link additions
Journal of Network and Computer Applications
Hi-index | 0.00 |
Quality of service (QoS) and security have been considered as two independent entities. However, they always impact each other in various kinds of scenarios and it is necessary to study the optimization between them. This paper proposes algorithms to evaluate security level with three main features, i.e., authentication, data integrity and confidentiality. Based on that, a novel model is proposed to measure the interaction between delay of QoS and security in different application scenarios, heterogeneous users and disparate services. Furthermore, immune algorithm is used to get optimal parameters for both delay and the security level. Simulation results show that the proposed model can balance delay and security level well under diverse traffic loads of network. The model is useful to get better performance for network service, especially in rigorous network circumstance.