{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:39Z","timestamp":1750307079662,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,21]],"date-time":"2012-10-21T00:00:00Z","timestamp":1350777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,21]]},"DOI":"10.1145\/2387238.2387264","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:07:05Z","timestamp":1350907625000},"page":"143-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments"],"prefix":"10.1145","author":[{"given":"Peter J.J.","family":"McNerney","sequence":"first","affiliation":[{"name":"The University of Manchester, Manchester, United Kingdom"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Manchester, Manchester, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NIST Special Publication 800-131A","author":"Barker E.","year":"2011","unstructured":"E. Barker and A. Roginsky . NIST Special Publication 800-131A , Transitions : Recommendation for Trans-itioning the Use of Cryptographic Algorithms and Key Sizes . http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-131A\/sp800-131A.pdf, January 2011 . E. Barker and A. Roginsky. NIST Special Publication 800-131A, Transitions: Recommendation for Trans-itioning the Use of Cryptographic Algorithms and Key Sizes. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-131A\/sp800-131A.pdf, January 2011."},{"key":"e_1_3_2_1_2_1","unstructured":"Monarch Project: Wireless and Mobility Extensions to ns. http:\/\/www.monarch.cs.rice.edu\/cmu-ns.html Nov. 2000. Retrieved: 23\/07\/2010.  Monarch Project: Wireless and Mobility Extensions to ns. http:\/\/www.monarch.cs.rice.edu\/cmu-ns.html Nov. 2000. Retrieved: 23\/07\/2010."},{"key":"e_1_3_2_1_3_1","volume-title":"DARPA Internet Program Protocol Specification. RFC 791 http:\/\/www.ietf.org\/rfc\/rfc791.txt","author":"J.","year":"1981","unstructured":"J. P. (Ed.). Internet Protocol , DARPA Internet Program Protocol Specification. RFC 791 http:\/\/www.ietf.org\/rfc\/rfc791.txt , Sept. 1981 . J. P. (Ed.). Internet Protocol, DARPA Internet Program Protocol Specification. RFC 791 http:\/\/www.ietf.org\/rfc\/rfc791.txt, Sept. 1981."},{"key":"e_1_3_2_1_4_1","unstructured":"O. Gay. HMAC-SHA2. http:\/\/www.ouah.org\/ogay\/hmac\/. Retrieved: 31\/10\/2011.  O. Gay. HMAC-SHA2. http:\/\/www.ouah.org\/ogay\/hmac\/. Retrieved: 31\/10\/2011."},{"key":"e_1_3_2_1_5_1","first-page":"2211","volume-title":"IEEE Wireless Communications and Networking Conference (WCNC 2006","author":"He W.","year":"2006","unstructured":"W. He and K. Nahrstedt . An Integrated Solution to Delay and Security Support in Wireless Networks . In IEEE Wireless Communications and Networking Conference (WCNC 2006 ), pages 2211 -- 2215 , 2006 . W. He and K. Nahrstedt. An Integrated Solution to Delay and Security Support in Wireless Networks. In IEEE Wireless Communications and Networking Conference (WCNC 2006), pages 2211--2215, 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"Feb.","author":"Johnson D.","year":"2007","unstructured":"D. Johnson , Y. Hu , and D. Maltz . The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. RFC 4728 (Experimental) http:\/\/www.ietf.org\/rfc\/rfc4728.txt , Feb. 2007 . D. Johnson, Y. Hu, and D. Maltz. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. RFC 4728 (Experimental) http:\/\/www.ietf.org\/rfc\/rfc4728.txt, Feb. 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498557"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.925684"},{"key":"e_1_3_2_1_9_1","unstructured":"S.-B. Lee G.-S. Ahn X. Zhang A. T. Campbell S.-Y. Nham and C.-J. Yoo. INSIGNIA NS-2 Source Code. http:\/\/comet.columbia.edu\/insignia\/ns_source_code.html. Retrieved: 23\/07\/2010.  S.-B. Lee G.-S. Ahn X. Zhang A. T. Campbell S.-Y. Nham and C.-J. Yoo. INSIGNIA NS-2 Source Code. http:\/\/comet.columbia.edu\/insignia\/ns_source_code.html. Retrieved: 23\/07\/2010."},{"key":"e_1_3_2_1_10_1","first-page":"132","volume-title":"MP-DSR: A QoS-aware Multi-path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks. In In IEEE LCN'01","author":"Leung R.","year":"2001","unstructured":"R. Leung , R. L. Jilei , E. Poon , A.-L. C. Chan , and B. Li . MP-DSR: A QoS-aware Multi-path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks. In In IEEE LCN'01 , pages 132 -- 141 , 2001 . R. Leung, R. L. Jilei, E. Poon, A.-L. C. Chan, and B. Li. MP-DSR: A QoS-aware Multi-path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks. In In IEEE LCN'01, pages 132--141, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575164"},{"key":"e_1_3_2_1_12_1","first-page":"213","volume-title":"Networking And Communications, 2005. (WiMob'2005), IEEE International Conference on","volume":"3","author":"Lu B.","year":"2005","unstructured":"B. Lu and U. W. Pooch . Security in QoS Signaling Systems for Mobile Ad Hoc Networks. In Wireless And Mobile Computing , Networking And Communications, 2005. (WiMob'2005), IEEE International Conference on , volume 3 , pages 213 -- 220 , October 2005 . B. Lu and U. W. Pooch. Security in QoS Signaling Systems for Mobile Ad Hoc Networks. In Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob'2005), IEEE International Conference on, volume 3, pages 213--220, October 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133684"},{"key":"e_1_3_2_1_14_1","volume-title":"McNerney and N. Zhang. A Study on Reservation-Based Adaptation for QoS in Adversarial MANET Environments. In Wireless Communications and Mobile Computing Conference, 2012. IWCMC '12. International","author":"P. J.","year":"2012","unstructured":"P. J. J. McNerney and N. Zhang. A Study on Reservation-Based Adaptation for QoS in Adversarial MANET Environments. In Wireless Communications and Mobile Computing Conference, 2012. IWCMC '12. International , Limassol, Cyprus , August 2012 . P. J. J. McNerney and N. Zhang. A Study on Reservation-Based Adaptation for QoS in Adversarial MANET Environments. In Wireless Communications and Mobile Computing Conference, 2012. IWCMC '12. International, Limassol, Cyprus, August 2012."},{"key":"e_1_3_2_1_15_1","unstructured":"National Institute of Standards and Technology (NIST). Federal Information Processing Standard (FIPS) 180-3 Secure Hash Standard (SHS). http:\/\/csrc.nist.gov\/publications\/fips\/fips180-3\/fips180-3_final.pdf October 2008.  National Institute of Standards and Technology (NIST). Federal Information Processing Standard (FIPS) 180-3 Secure Hash Standard (SHS). http:\/\/csrc.nist.gov\/publications\/fips\/fips180-3\/fips180-3_final.pdf October 2008."},{"key":"e_1_3_2_1_16_1","unstructured":"The Network Simulator - ns-2. http:\/\/nsnam.isi.edu\/nsnam\/index.php\/Main_Page. Retrieved:28\/01\/2010.  The Network Simulator - ns-2. http:\/\/nsnam.isi.edu\/nsnam\/index.php\/Main_Page. Retrieved:28\/01\/2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861392"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1999.1613"},{"key":"e_1_3_2_1_19_1","volume-title":"Jan.","author":"Corson S.","year":"1999","unstructured":"S. Corson and J. Macker . Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (Informational) http:\/\/www.ietf.org\/rfc\/rfc2501.txt , Jan. 1999 . S. Corson and J. Macker. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (Informational) http:\/\/www.ietf.org\/rfc\/rfc2501.txt, Jan. 1999."},{"key":"e_1_3_2_1_20_1","volume-title":"RTP: A Transport Protocol for Real-Time Applications. RFC","author":"Schulzrinne H.","year":"2003","unstructured":"H. Schulzrinne , S. Casner , R. Frederick , and V. Jacobson . RTP: A Transport Protocol for Real-Time Applications. RFC 2550, July 2003 . H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. RFC 2550, July 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2010.72"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70754"},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks. In IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications","author":"Sheng Y.","year":"2008","unstructured":"Y. Sheng , H. Cruickshank , A. Pragad , P. Pangalos , and A. Aghvami . An Integrated QoS , Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks. In IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications , pages 1 -- 5 , 2008 . Y. Sheng, H. Cruickshank, A. Pragad, P. Pangalos, and A. Aghvami. An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks. In IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pages 1--5, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02944790"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5942024"},{"key":"e_1_3_2_1_26_1","volume-title":"Integrating Security with QoS in Next Generation Networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010","author":"Taleb T.","year":"2010","unstructured":"T. Taleb , Y. Aoul , and A. Benslimane . Integrating Security with QoS in Next Generation Networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, December 2010 . T. Taleb, Y. Aoul, and A. Benslimane. Integrating Security with QoS in Next Generation Networks. In Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, December 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(09)60431-3"}],"event":{"name":"MSWiM '12: The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Paphos Cyprus","acronym":"MSWiM '12"},"container-title":["Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2387238.2387264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2387238.2387264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:08Z","timestamp":1750239248000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2387238.2387264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,21]]},"references-count":27,"alternative-id":["10.1145\/2387238.2387264","10.1145\/2387238"],"URL":"https:\/\/doi.org\/10.1145\/2387238.2387264","relation":{},"subject":[],"published":{"date-parts":[[2012,10,21]]},"assertion":[{"value":"2012-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}