Abstract
Transmitting video streams while ensuring security is a challenging issue in wireless networks. Due to the openness of the wireless medium, encryption techniques should be used in many critical applications to secure video stream transmission. However, this may impact the quality of service required to efficiently reconstruct video data caused by the processing overhead and delays generated by the encryption procedure. In addition, a degradation of the transmission performance in terms of signal to noise ratio (SNR) and bit error rate can occur due to the varying characteristics of the wireless environment, which affect the available bandwidth on the channel. Thus, adaptable approach that can make a trade-off between security enforcement and transmission performance is required. In this work, we investigate the design of a video stream transmission scheme over wireless networks that can ensure security and efficiency. Our proposal is cognitive-based in the sens that security policy is selected according to the risk level evaluated by the receiver. This is done using real-time assessment of the network security state, intrusion detection, access history, and resource availability in the mobile device. The main goal is to satisfy the real-time constraints of the video stream and guarantee clear reconstitution of specific part of the scene qualified as the region of interest (ROI) by adapting the compressing parameter, qualified as the delivery ratio, according to the selected security policy and the transmission characteristics of the wireless channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
H.264: Advanced video coding for generic audiovisual services
Alia, M., Lacoste, M., He, R., Eliassen, F.: Putting together QoS and security in autonomic pervasive systems. In: Proceedings of 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2010), Bodrum, Turkey, pp. 19–28 (October 2010)
Haykin, S.: Cognitive Dynamic Systems: Perception-Action Cycle, Radar and Radio. Cambridge University Press, New York (2012)
Kamphenkel, K., Blank, M., Bauer, J., Carle, G.: Adaptive encryption for the realization of real-time transmission of sensitive medical video streams. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM 2008, Newport Beach, CA, pp. 1–6 (June 2008)
Kang, K.D., Son, S.H.: Towards security and qos optimization in real-time embedded systems. ACM SIGBED Review 3(1), 29–34 (2006)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Lee, S.K., Ryoo, J., Yoo, S., Jung, J., Lee, W., Kim, H.: Cosa: Adaptive link-aware real-time streaming for mobile devices. In: Proceedings of IEEE WiMob 2013, Lyon, France (October 2013)
Mahmoud, M.S.B., Larrieu, N., Pirovano, A., Varet, A.: An adaptive security architecture for future aircraft communications. In: Proceedings of the IEEE/AIAA Digital Avionics Systems Conference (DASC 2010), Salt Lake City, UT, pp. 3.E.2-1–3.E.2-16 (October 2010)
Reza, T.A., Barbeau, M.: QaASs: Qos aware adaptive security scheme for video streaming in manets. Journal of Information Security and Applications 18(1), 68–82 (2013)
Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing media for adaptive streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia (MULTIMEDIA), New York, NY, USA, pp. 307–310 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Abdallah, W., Lee, S.k., Kim, H., Boudriga, N. (2014). Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8630. Springer, Cham. https://doi.org/10.1007/978-3-319-11197-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-11197-1_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11196-4
Online ISBN: 978-3-319-11197-1
eBook Packages: Computer ScienceComputer Science (R0)