{"title":"利用IEEE802.11b WEP的安全Ad Hoc传感器网络性能","authors":"Mohammad Saleh, I. A. Khatib","doi":"10.1109/ICW.2005.67","DOIUrl":null,"url":null,"abstract":"This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured timestamps. The main result is that the security adds a significant delay that may affect future killer applications over ad hoc sensor networks like secure medical application, robotics applications, voice over IP (VoIP) and other delay-sensitive multimedia applications","PeriodicalId":255955,"journal":{"name":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP\",\"authors\":\"Mohammad Saleh, I. A. Khatib\",\"doi\":\"10.1109/ICW.2005.67\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured timestamps. The main result is that the security adds a significant delay that may affect future killer applications over ad hoc sensor networks like secure medical application, robotics applications, voice over IP (VoIP) and other delay-sensitive multimedia applications\",\"PeriodicalId\":255955,\"journal\":{\"name\":\"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-08-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICW.2005.67\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICW.2005.67","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP
This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured timestamps. The main result is that the security adds a significant delay that may affect future killer applications over ad hoc sensor networks like secure medical application, robotics applications, voice over IP (VoIP) and other delay-sensitive multimedia applications