By Topic

Security-enhanced quality of service (SQOS): a network analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
P. Sakarindr ; Dept. of Electr. & Comput. Eng., New Jersey Inst. of Technol., Newark, NJ, USA ; N. Ansari ; R. Rojas-Cessa ; S. Papavassiliou

Security and quality-of-service (QoS) issues have traditionally been considered separately, with different objectives and implementation architectures. No protocol has been designed and implemented so far to parameterize security as a QoS parameter. However, it has been noted recently that security and QoS are highly intertwined; security mechanisms may severely affect QoS mechanisms in terms of network performance and data confidentiality. In addition, users are not given the choices on which security services and mechanisms as well as which security level should be applied to their traffic. A security-enhanced quality of service-based (SQoS) network has been presented recently, with two major objectives. One objective is to offer the users elastic choices on the treatment of messages with appropriate security mechanisms with respect to their own QoS and budget requirements. Another objective is to facilitate interaction between security and QoS mechanisms in the most efficient manner by providing information to each other. In this paper, the network performance is investigated by defining the utility functions and maximizing the user's benefits subject to a set of constraints

Published in:

MILCOM 2005 - 2005 IEEE Military Communications Conference

Date of Conference:

17-20 Oct. 2005