Skip to main content

Table 1 Comparing the 3TCA architecture with the current research work

From: Intrusion tolerant QoS provision in mobile multihop relay networks

Research work

Characteristics

Shortcomings

Self optimization HandOver (HO) mechanism,[4]

Reduces HO numbers and optimizes channel scanning

-Does not consider security issues-Uses GPS

Fast HO scheme, [5]

Minimizes collisions in order to achieve fast HO

Does not consider security issues

Speed sensitive HO scheme, [6]

Speed sensitive HO under hierarchical cellular system

Does not consider security issues

Path selection method, [7]

Secures the routing for MMR networks

Does not consider QoS issues

QITAR, [8]

Achieves QoS and intrusion tolerance for ad hoc networks

-Vulnerable to high-speed mobility-May experience scalability problems

MERQIT, [9]

Achieves QoS and intrusion tolerance for mesh networks

-Clusterheads are mobile nodes that may experience attacks and leave the network-Isolates malicious nodes

WSN-TUM, [13]

Fault-intrusion tolerant framework for sensor networks

-Split the packet on fragments and send them on disjoint routes. However MMR networks use the same route as the routing architecture is a tree rooted at the MR-BS-Global QoS is hard to guarantee since each fragment uses a different route with different QoS constraints-All sensors participate in the securization effort. For MMR networks, this should be the task of the MR-BS

SPR, MLR and SecMLR, [14]

Secure routing protocols for sensor networks

-Intrusion tolerance is simply achieved by setting up routing tables with multiple entries to specified gateways-If the scheme is adopted for MMR networks, it can be only implemented on the backbone-QoS constraints are not considered

Our method

-Architecture designed for MMR networks-Achieves QoS and intrusion tolerance for MMR networks-Compensates HO delays-Detects attacks and compensates their impact on the agreed QoS

Â