Custom Queueing method for enhancing security of a Packet Scheduling Process in Real Time Networks
DOI:
https://doi.org/10.61841/w9ymj927Keywords:
Wireless Networks, Packet Scheduling, Custom QueuingAbstract
The wireless technologies became a part of our day to day life, for sending and sharing data very rapidly so that everyone today uses wireless networks for their business or personal. The traditional wireless communication technology is unable to satisfy real-time transmission requirements in mobile electronic commerce application such as access of books from digital libraries, access of stock exchange information etc. Recent real time wireless networks require high level security to guarantee the information passed through wireless channels. So, designing flexible security mechanisms for real time applications and transmitting packets through wireless networks is highly desirable. The present work introduces a new packet scheduling algorithm to enhance security which mainly aims to dynamically determine security levels of packets based on security requirements of an application and also guaranteeing deadlines for packets. By incorporating Custom Queuing method with this packet scheduling algorithm, the overall performance of real time networks is increased
Downloads
References
1. Manoharan, Rajesh, et al. "Selection of Intermediate Routes for Secure Data Communication Systems using Graph Theory Application and Grey Wolf Optimization Algorithm in MANETs." IET Networks (2020).
2. Rajesh, M., Gnanasekar, J.M. "Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks." Wireless Personal Communications 97 (2017): 1267–1289. https://doi.org/10.1007/s11277-017-4565-9
3. Rajesh, M. "Streamlining Radio Network Organizing Enlargement Towards Microcellular Frameworks." Wireless Personal Communications (2020). https://doi.org/10.1007/s11277-020-07336-9
4. M. A. Badamas, "Mobile computing systems – security considerations," Information Management and Security, 2001, pp. 134–136.
5. W. Kensaku, K. Shoji, T. Yutaka, K. Yoshinobu, I. Eisaburo. "A packet scheduling algorithm for max-min fairness in multihop wireless LANs." Computer Communications 32 (2009): 1437–1444.
6. Z. Zhang, S. Bronson. "A packet scheduling algorithm for optimizing downlink throughput in wireless LANs with the one-sender–multiple-receiver technique." In: Proc. 28th IEEE Conference on Global Telecommunications (GLOBECOM 2009), Dec. 2009, pp. 1–6.
7. V. Gupta and S. Gupta. "Securing the wireless Internet." IEEE Communications Magazine, Dec. 2001, pp. 68–74.
Chang J. Chang and M. Yu. "Guaranteed Quality of Service wireless access to ATM." IEEE Journal on Selected Areas in Communications, 1997.
8. Guansong Zhang. Packet Scheduling Survey and Tutorial – Modeling Packet Scheduling Algorithms in IP Routers.
9. Xiao Qian, Mohamed Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam, Adam Manzanares. "Improving Security of Real-Time Wireless Networks Through Packet Scheduling." IEEE Transactions on Wireless Communications 7, no. 9 (2008).
10. Xiaomin Zhu, Hao Guo, Shaoshuai Liang, Xiaoling Yang. "An improved security-aware packet scheduling algorithm in real-time wireless networks." Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha, China.
11. Xiaomin Zhu, Hao Guo, Shaoshuai Liang, Xiaoling Yang. "An improved security-aware packet scheduling algorithm in real-time wireless networks." Wireless Sensor Network 8 (2016): 77–84. http://dx.doi.org/10.4236/wsn.2016.85008
12. Xiaomin Zhu, Hao Guo, Shaoshuai Liang, Xiaoling Yang. "An Improved Security-Aware Packet Scheduling Algorithm." Information Systems Engineering Laboratory, National University of Defense Technology, PR China.
13. Arun Raj, P. Blessed Prince. "Round Robin Based Secure Aware Packet Scheduling in Wireless Networks." IJEST 5, no. 3 (March 2013). ISSN: 0975-5462.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
