On a QoS intrusion tolerant routing protocol in ad-hoc networks
- Autores
- Boudriga, Noureddine; Krichene, Neïla
- Año de publicación
- 2006
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- We propose in this paper a protocol, called QITAR, which will secure the ad-hoc routing process while guaranteeing end-to-end QoS requirements in terms of delay or bandwidth constraints. Our approach provides an intrusion tolerant environment and uses and enhances the concept of Trusted Timely Computing Base in order to deduce consistent delay information and verify the bandwidth value pretended by untrusted nodes. QITAR also proposes a rescue procedure that saves the resources and accelerates the route maintenance in case of node mobility
1st IFIP International Conference on Ad-Hoc NetWorking
Red de Universidades con Carreras en Informática (RedUNCI) - Materia
-
Ciencias Informáticas
Routing protocols
intrusion tolerance
ad-hoc routing
QoS - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/23823
Ver los metadatos del registro completo
id |
SEDICI_b31d01848a4883c0e16f4814de9f058a |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/23823 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
On a QoS intrusion tolerant routing protocol in ad-hoc networksBoudriga, NoureddineKrichene, NeïlaCiencias InformáticasRouting protocolsintrusion tolerancead-hoc routingQoSWe propose in this paper a protocol, called QITAR, which will secure the ad-hoc routing process while guaranteeing end-to-end QoS requirements in terms of delay or bandwidth constraints. Our approach provides an intrusion tolerant environment and uses and enhances the concept of Trusted Timely Computing Base in order to deduce consistent delay information and verify the bandwidth value pretended by untrusted nodes. QITAR also proposes a rescue procedure that saves the resources and accelerates the route maintenance in case of node mobility1st IFIP International Conference on Ad-Hoc NetWorkingRed de Universidades con Carreras en Informática (RedUNCI)2006-08info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdfhttp://sedici.unlp.edu.ar/handle/10915/23823enginfo:eu-repo/semantics/altIdentifier/isbn/0-387-34635-Xinfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-03T10:28:25Zoai:sedici.unlp.edu.ar:10915/23823Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-03 10:28:25.251SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
title |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
spellingShingle |
On a QoS intrusion tolerant routing protocol in ad-hoc networks Boudriga, Noureddine Ciencias Informáticas Routing protocols intrusion tolerance ad-hoc routing QoS |
title_short |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
title_full |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
title_fullStr |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
title_full_unstemmed |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
title_sort |
On a QoS intrusion tolerant routing protocol in ad-hoc networks |
dc.creator.none.fl_str_mv |
Boudriga, Noureddine Krichene, Neïla |
author |
Boudriga, Noureddine |
author_facet |
Boudriga, Noureddine Krichene, Neïla |
author_role |
author |
author2 |
Krichene, Neïla |
author2_role |
author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas Routing protocols intrusion tolerance ad-hoc routing QoS |
topic |
Ciencias Informáticas Routing protocols intrusion tolerance ad-hoc routing QoS |
dc.description.none.fl_txt_mv |
We propose in this paper a protocol, called QITAR, which will secure the ad-hoc routing process while guaranteeing end-to-end QoS requirements in terms of delay or bandwidth constraints. Our approach provides an intrusion tolerant environment and uses and enhances the concept of Trusted Timely Computing Base in order to deduce consistent delay information and verify the bandwidth value pretended by untrusted nodes. QITAR also proposes a rescue procedure that saves the resources and accelerates the route maintenance in case of node mobility 1st IFIP International Conference on Ad-Hoc NetWorking Red de Universidades con Carreras en Informática (RedUNCI) |
description |
We propose in this paper a protocol, called QITAR, which will secure the ad-hoc routing process while guaranteeing end-to-end QoS requirements in terms of delay or bandwidth constraints. Our approach provides an intrusion tolerant environment and uses and enhances the concept of Trusted Timely Computing Base in order to deduce consistent delay information and verify the bandwidth value pretended by untrusted nodes. QITAR also proposes a rescue procedure that saves the resources and accelerates the route maintenance in case of node mobility |
publishDate |
2006 |
dc.date.none.fl_str_mv |
2006-08 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/23823 |
url |
http://sedici.unlp.edu.ar/handle/10915/23823 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/isbn/0-387-34635-X |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1842260122912423936 |
score |
13.13397 |