Abstract
The purpose of this paper is to propose a context-aware secure routing protocol suitable for real-time services. Since such a protocol undergoes a number of independent constraints connected with: dynamic changes of the environment, security assumptions, network limitations and end-users personal requirements, the context factors need specific treatment to be real support for an optimal route selection. The proposed framework systemizes the roles of all actors in establishing optimal and secure network connection for real-time services. The most suitable routing scheme is selected dynamically from the available portfolio, basing on actual context factors. Optimally, in the case of absence of any routing scheme satisfying a specific criterion given by context, a new scheme can be created on-demand, using the multi-constrained optimal path selection technique. The framework supports also additional optimization techniques (like fast packet retransmission, redundant routing etc.). Also the necessary security mechanisms have been implemented. Besides standard hard-security mechanisms, like private key encryption, also soft security techniques (i.e. reputation management) for detecting and blocking malicious nodes are used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
MacDonald, N.: The Future of Information Security is Context-Aware and Adaptive. Gartner RAS Core Research Note G00200385 (2010)
Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. Int. J. Ad Hoc and Ubiquitous Computing 2(4) (2007)
Jovanovikj, V., Gabrijelcic, D., Klobucar, T.: A conceptual model of security context. Int. J. Inf. Secur. (2014), doi:10.1007/s10207-014-0229-x
Hayashi, E., Das, S., Shahriyar, A., Owusu, E., Han, J., Hong, J., Oakley, I., Perrig, A., Zhang, J.: CASA: A Framework for Context-Aware Scalable Authentication. In: SOUPS 2013: Proceedings of the Ninth Symposium on Usable Privacy and Secrecy, Newcastle, UK (2013)
Michelberger, B., Mutschler, B., Reichert, M.: A Context Framework for Process-Oriented Information Logistics. In: Abramowicz, W., Kriksciuniene, D., Sakalauskas, V. (eds.) BIS 2012. LNBIP, vol. 117, pp. 260â271. Springer, Heidelberg (2012)
Li, W., Joshi, A., Finn, T.: CAST: A Context-Aware Security and Trust Framework for Mobile Ad-hoc Networks Using Polices. Distributed and Parallel Databases 31(2), 353â376 (2013)
Kotulski, Z., Sepczuk, M., Sitek, A., Tunia, M.A.: Adaptable context management framework for secure network services â to be published (2014)
Fiedler, M., Hossfeld, T., Tran-Gia, P.: A generic quantitative relationship between quality of experience and quality of service. IEEE Network 24(2), 36â41 (2010)
Ciszkowski, T., Mazurczyk, W., Kotulski, Z., Hossfeld, T., Fiedler, M., Collange, D.: Towards Quality of Experience-based Reputation Models for Future Web Service Provisioning. Telecommunication Systems 51(4), 283â295 (2012)
Wrona, K., Gomez, L.: Context-aware security and secure context-awareness in ubiquitous computing environments. Annales UMCS Informatica AI4, 332â348 (2006)
OryĆczak, G., Kotulski, Z.: Agent based infrastructure for real-time applications. Annales UMCS, Informatica 11(4), 33â47 (2011)
Tao, S., Xu, K., Estepa, A., Gao, T.F.L., Guerin, R., Kurose, J., Towsley, D., Zhang, Z.-L.: Improving VoIP quality through path switching. In: 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005. Proceedings IEEE, vol. 4. IEEE (2005)
Chen, X., Wang, C., Xuan, D., Li, Z., Min, Y., Zhao, W.: Survey on QoS Management of VoIP. In: International Conference on Computer Networks and Mobile Computing (ICCNMC 2003), IEEE (2003)
Aurrecoechea, C., Campbell, A.T., Hauw, L.: A survey of QoS architectures. Multimedia Systems 6(3), 138â151 (1998)
Chipara, O., He, Z., Xing, G., Chen, Q., Wang, X., Lu, C., Stankovic, J., Abdelzaher, T.: Real-time power-aware routing in sensor networks. In: Proceeding of the 14th IEEE International Workshop on Quality of Service (IWQoS). IEEE (2006)
Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the 1st ACM Workshop on Wireless Security. ACM (2002)
Haas, Z.J., Pearlman, M.R., Samar, P.: The zone routing protocol (ZRP) for Ad-hoc networks. In: Proceedings of the 55th Internet Engineering Task Force (2002)
Ma, Q., Steenkiste, P.: On path selection for traffic with bandwidth guarantees. In: Proceedings of the 1997 International Conference on Network, ICNP 1997, p. 191. IEEE Computer Society, Washington, DC (1997)
Li, Z., Mohapatra, P.: QRON: QoS-aware routing in overlay networks. IEEE Journal on Selected Areas in Communications 22(1), 29â40 (2004)
Amir, Y., Danilov, C., Goose, S., Hedqvist, D., Terzis, A.: An overlay architecture for high-quality VoIP streams. IEEE Transactions on Multimedia 8(6), 1250â1262 (2006)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, San Francisco (1979)
Garroppo, R.G., Giordano, S., Tavanti, L.: A survey on multi-constrained optimal path computation: Exact and approximate algorithms. Computer Networks 54(17), 3081â3107 (2010)
Kuipers, F., Van Mieghem, P., Korkmaz, T., Krunz, M.: An overview of constraint-based path selection algorithms for QoS routing. IEEE Communications Magazine 40(12), 50â55 (2002)
Wenning, B.L., Pesch, D., Timm-Giel, A., Görg, C.: Environmental monitoring aware routing in wireless sensor networks. Wireless and Mobile Networking 284, 5â16 (2008)
OryĆczak, G., Kotulski, Z.: Notary-based self-healing mechanism for centralized peer-to-peer infrastructures. Annales UMCS, Informatica 12(4), 97â112 (2012)
Nafaa, A., Taleb, T., Murphy, L.: Forward error correction strategies for media streaming over wireless networks. IEEE Communications Magazine 46(1), 72 (2008)
Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials 10(4), 78â93 (2008)
JĂžsang, A., Roslan, I.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)
Liu, J., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48â62. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
OryĆczak, G., Kotulski, Z. (2014). Context-Aware Secure Routing Protocol for Real-Time Services. In: Kotulski, Z., KsiÄĆŒopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-662-44893-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44892-2
Online ISBN: 978-3-662-44893-9
eBook Packages: Computer ScienceComputer Science (R0)