An improved security-aware packet scheduling algorithm in real-time wireless networks

https://doi.org/10.1016/j.ipl.2011.11.018Get rights and content

Abstract

Developing security-aware packet scheduling algorithms can efficiently enhance the security while delivering packets through wireless links. Existing scheduling algorithms developed for real-time wireless networks provide security at the cost of other important performance, e.g., schedulability. The performance problem becomes especially apparent when wireless networks are heavily loaded. To address this issue, we propose in this paper an improved security-aware packet scheduling algorithm (or ISAPS in short) in wireless networks. ISAPS first gives high priority to deal with schedulability when the real-time system is heavily loaded. When the system is under light workload, ISAPS strives to improve the security levels while achieving high schedulability for real-time packets. Compared with the existing packet scheduling algorithm SPSS, ISAPS shows excellent scheduling quality under a wide range of workload characteristics.

Highlights

► An improved security-aware packet scheduling algorithm ISAPS was proposed. ► ISAPS makes best tradeoffs between schedulability and security according to the system workload. ► Simulations results exhibited ISAPSʼs superiority to an existing packet scheduling algorithm SPSS. ► ISAPS improves the adaptivity of real-time wireless networks.

References (17)

  • D. Zhang et al.

    QoS-guaranteed packet scheduling in wireless networks

    J. China Univ. Posts Telecommun.

    (2009)
  • T. Karygiannis, L. Owens, Wireless Network Security 802.11, Bluetooth and Handheld Devices, NIST Special Publication...
  • R.W. Klein et al.

    Application of wavelet-based RF fingerprinting to enhance wireless network security

    J. Commun. Netw.

    (2009)
  • P.K. Sagiraju, P. Gali, D. Akopian, G.V.S. Raju, Enhancing security in wireless networks using positioning techniques,...
  • Z. Wan et al.

    Anonymous user communication for privacy protection in wireless metropolitan mesh networks

    IEEE Trans. Veh. Tech.

    (2010)
  • G.A. Safdar, C. McGrath, M. McLoone, Existing wireless network security mechanisms and their limitations for ad hoc...
  • A. Karnik, K. Passerini, Wireless network security–A discussion from a business perspective, in: Proc. the 4th Wireless...
There are more references available in the full text version of this article.

Cited by (11)

View all citing articles on Scopus
View full text