60 likes | 149 Views
QoS-aware Security Approches (eventual PhD topic) Ana Nieto (1st Year Grant Holder) nieto@lcc.uma.es. Current Work. BRB. Current Work. Future Work. Traffic Classifier. Tradeoffs amongst network Security and Quality of Service ( QoS ) in WSNs
E N D
QoS-aware Security Approches(eventual PhD topic)Ana Nieto(1st Year Grant Holder)nieto@lcc.uma.es
Current Work BRB Current Work Future Work TrafficClassifier • Tradeoffs amongst network Security and Quality of Service (QoS) in WSNs • Improving routing protocols taking into account Energy consumption, Delay and Security in the path • Prolonging the Lifetime of WSNs • Choosing the best routes to Critical traffic • Increasing the Security in the network • Flow-based path selection • Different information to be shared… • …requires different paths to be sended • Depends on: • Security • QoS parameters
Range of Best Routes (RBR) Current Work RBR + Constrains Traffic Classifier Future Work • Improving routing protocols taking into account Energy (E) consumption, Delay (D) and Security (S) in the path. • The path (p) used to send data from the source node (s) to the Sink (d) belongs to the set RBR defined as: • Where the function K(p) is defined as: • The k value is internal to each node of the network • The higher the value of k, the higher the cardinal of RBR • The weights (we, wd, ws) in the formulation represents the importance of each parameter • RBR varies taking different wi values in K(p) • Range of Best Routes (RBR) • Ch
Routing by traffic Classifier Current Work RBR Traffic Classifier Future Work • These applications generate different flows • Different resource consumptions • Uncontrolled degradation of the network • Set of states for each node: • Dependent of how the sender understands the network • Independent: Charitable (all traffic), Egoist (low battery)
Routing by traffic Classifier Current Work RBR Traffic Classifier Future Work
Future Work • Actual RBR considersthatnodeshave a global view of thenetwork status • Thesystemshouldchangetheirbehaviourdependingontheobservedsecurityautomaticaly • Data minimizationwithoutloss of accuracy • Nodescouldinterchangeminimalammount of data tobeactualized • Extrapolate the proposed scheme to be used between clusters Current Work Future Work