By Topic

Packet size optimization for increased throughput in multi-level security wireless networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Younis, M. ; Dept. of Comput. Sci. & Electr. Eng., Univ. of Maryland Baltimore County, Baltimore, MD, USA ; Farrag, O. ; D'Amico, W.

In wireless networks, the limited available bandwidth combined with varying signal propagation conditions make it necessary to pursue optimization across all layers of the protocol stack in order to boost the achievable throughput. One of the optimization strategies that is deemed to be effective is to dynamically adjust the packet size either to better suit the channel conditions or to minimize the number of overhead bits in the individual packets. However, contemporary packet-size optimization schemes may become ineffective when the system is subject to specific security requirements. This paper addresses the packet optimization problem in multi-level security wireless data networks for which strict confidentiality requirements and access restriction policies have to be observed. We propose a novel scheme that leverages the classification of data in minimizing the number of packet transmissions as well as the overhead within the individual packets. First, the security goals are categorized and appropriate and efficient encryption methodologies are identified. Then, an algorithm is developed to combine the transmission of packets based on the time sensitivity and security attributes of the data in the payload.

Published in:

Military Communications Conference, 2009. MILCOM 2009. IEEE

Date of Conference:

18-21 Oct. 2009