{"title":"Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks","authors":"Ilkka Uusitalo, T. Väisänen, J. Latvakoski","doi":"10.1109/AINAW.2007.321","DOIUrl":null,"url":null,"abstract":"We describe a test environment and present results for securing real -time traffic in a hybrid mobile ad hoc network. We adapted existing security and mobility technologies into the hybrid mobile ad hoc network context and applied them to provide security for VoIP calls. We evaluated the feasibility of the technologies, and compared their behavior. We also simplified an existing ad hoc routing protocol implementation to suit the needs of our small network. Finally, measurements were carried out regarding delays, overheads and bandwidth usage of the technologies.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINAW.2007.321","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We describe a test environment and present results for securing real -time traffic in a hybrid mobile ad hoc network. We adapted existing security and mobility technologies into the hybrid mobile ad hoc network context and applied them to provide security for VoIP calls. We evaluated the feasibility of the technologies, and compared their behavior. We also simplified an existing ad hoc routing protocol implementation to suit the needs of our small network. Finally, measurements were carried out regarding delays, overheads and bandwidth usage of the technologies.