Abstract
Real-time video streaming is delay sensitive. It has minimum bandwidth and QoS requirements. Achieving target QoS for video streaming is challenging in a decentralized and self-organized MANET. Cryptography algorithms offer confidentiality of shared data, but they have computation cost. Our work addresses the issue of delay overhead caused by the introduction of cryptography that directly affects video streaming performance. Our proposal is motivated by possibilities of adaptive security and multimedia service. We make an effort to identify why, when and how to deploy adaptation. We propose QaASs (QoS aware Adaptive Security scheme), an adaptive mechanism that counters the effect of delay overhead by adapting cryptography and multimedia properties, providing QoS while maintaining a required level of security. We evaluate our proposal through implementation and simulation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmissions. In: Proceedings of the Symposium on Network and Distributed System Security (SNDSS), pp. 137–144. IEEE Computer Society, Washington, DC (1996)
Alampalayam, S., Kumar, A.: An adaptive security model for mobile agents in wireless networks. In: IEEE Global Telecommunications Conference (GLOBECOM), vol. 3, pp. 1516–1521 (December 2003)
Alia, M., Lacoste, M., He, R., Eliassen, F.: Putting together QoS and security in autonomic pervasive systems. In: Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet), pp. 19–28. ACM, New York (2010)
Ben Mahmoud, M., Larrieu, N., Pirovano, A., Varet, A.: An adaptive security architecture for future aircraft communications. In: IEEE/AIAA 29th Digital Avionics Systems Conference (DASC), pp. 3.E.2-1–3.E.2-16 (October 2010)
Blasi, L., Savola, R., Abie, H., Rotondi, D.: Applicability of security metrics for adaptive security management in a universal banking hub system. In: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume (ECSA), pp. 197–204. ACM, New York (2010)
Crypto++, http://www.cryptopp.com
Devore, J.: Probability and Statistics for Engineering and the Sciences. Cengage Learning (2011)
Djenouri, D., Khelladi, L., Badache, A.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys Tutorials 7(4), 2–28 (2005)
Dong, H., Gibson, J., Kokes, M.: SNR and bandwidth scalable speech coding. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 2, pp. II-859–II-862 (2002)
Furht, B.: Encyclopedia of Multimedia. Springer Reference. Springer (2008)
Gibson, J., Servetti, A., Dong, H., Gersho, A., Lookabaugh, T., De Martin, J.: Selective encryption and scalable speech coding for voice communications over multi-hop wireless links. In: IEEE Military Communications Conference (MILCOM), vol. 2, pp. 792–798 (October-November 2004)
ITU-T Rec. H.264 and ISO/IEC 14496-10:2005 (E) (MPEG-4 AVC). H.264: Advanced video coding for generic audiovisual services. Technical report (2005)
He, R., Lacoste, M., Pulou, J., Leneutre, J.: A DSL for Specifying Autonomic Security Management Strategies. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 216–230. Springer, Heidelberg (2011)
IEEE. Part 11 Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Control (MAC) Quality of Service (QoS) Enhancements. IEEE Std P802.11e/D13.0 (2005)
Iqbal, R., Shahabuddin, S., Shirmohammadi, S.: Compressed-domain spatial adaptation resilient perceptual encryption of live H.264 video. In: 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), pp. 472–475 (May 2010)
ISO/IEC. ISO/IEC 21000-7:2007 - Information technology - Multimedia framework (MPEG-21) - Part 7: Digital Item Adaptation. Technical report, International Organization for Standardization (2007)
ITU-T. 5-, 4-, 3- and 2-Bits Sample Embedded Adaptive Differential Pulse Code Modulation (ADPCM) (1990)
Kamphenkel, K., Blank, M., Bauer, J., Carle, G.: Adaptive encryption for the realization of real-time transmission of sensitive medical video streams. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (June 2008)
Macq, B., Quisquater, J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)
Meyer, J., Gadegast, F.: Security mechanisms for Multimedia data with the Example MPEG-1 video, Project description of SECMPEG (2000)
Nijim, M., Ali, A.: AdSeD: An Adaptive Quality of Security Control in Disk Systems. In: 11th IEEE Intl. Conf. on Computational Sci. and Eng. (CSE), pp. 421–428 (July 2008)
Oklander, B., Sidi, M.: Jitter Buffer Analysis. In: Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (August 2008)
Oliveira, T., Oliveira, S., Macedo, D., Nogueira, J.: An adaptive security management model for emergency networks. In: 7th Latin American Network Operations and Management Symposium (LANOMS), pp. 1–4 (October 2011)
Onural, L.: An Overview of Research in 3DTV. In: 14th International Workshop on Systems, Signals and Image Processing (IWSSIP), p. 3 (June 2007)
Pereira, R., Tarouco, L.: Adaptive Multiplexing Based on E-model for Reducing Network Overhead in Voice over IP Security Ensuring Conversation Quality. In: 4th Intl. Conf. on Digital Telecommunications (ICDT), pp. 53–58 (July 2009)
Perkins, C.: RTP: audio and video for the internet. Kaleidoscope Series. Addison-Wesley (2003)
Perkins, D., Hughes, H.: A survey on quality-of-service support for mobile ad hoc networks. Wireless Communications and Mobile Computing 2(5), 503–513 (2002)
Preda, S., Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., Toutain, L.: Dynamic deployment of context-aware access control policies for constrained security devices. J. Syst. Softw. 84(7), 1144–1159 (2011)
Reza, T.: QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. Master’s thesis, School of Computer Science, Carleton University, Ottawa, Ontario, Canada (2012), http://people.scs.carleton.ca/~barbeau/Theses/Tashin_Reza.pdf
Samad, F., Makram, S.: Adaptive security established on the requirements and resource abilities of network nodes. In: IEEE 35th Conference on Local Computer Networks (LCN), pp. 752–755 (October 2010)
Schwarz, H., Marpe, D., Wiegand, T.: Overview of the Scalable Video Coding Extension of the H.264/AVC Standard. IEEE Transactions on Circuits and Systems for Video Technology 17(9), 1103–1120 (2007)
Shnitko, A.: Adaptive security in complex information systems. In: Proc. of the 7th Korea-Russia Intl Symp. on Sci. and Tech. (KORUS), vol. 2, pp. 206–210 (July 2003)
Sühring, K.: H.264/AVC JM Reference Software, http://iphome.hhi.de/suehring/tml/download/
Son, H., David, R., Thuraisingham, B.: Improving timeliness in real-time secure database systems. SIGMOD Rec. 25(1), 29–33 (1996)
Spanos, G., Maples, T.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: Fourth International Conference on Computer Communications and Networks, pp. xviii+683 (September 1995)
Stallings, W.: Cryptography and network security: principles and practice. Prentice Hall (2011)
Taddeo, A., Marcon, P., Ferrante, A.: Negotiation of security services: a multi-criteria decision approach. In: Proceedings of the 4th Workshop on Embedded Systems Security (WESS), pp. 4:1–4:9. ACM, New York (2009)
Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia (MULTIMEDIA), pp. 219–229. ACM, New York (1996)
Vaidya, B., Denko, M., Rodrigues, J.: Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6 (December 2009)
Van Deursen, A., Klint, P., Visser, J.: Domain-specific languages: an annotated bibliography. SIGPLAN Not. 35(6), 26–36 (2000)
Van Deursen, D., Van Lancker, W., Van de Walle, R.: On media delivery protocols in the Web. In: IEEE Intl. Conf. on Multimedia and Expo (ICME), pp. 1028–1033 (July 2010)
Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing media for adaptive streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia (MULTIMEDIA), pp. 307–310. ACM, New York (2003)
Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology 13(7), 560–576 (2003)
Wiener, M.: Performance Comparison of Public-key Cryptosystems (1998), http://www.rsa.com/rsalabs/pubs/cryptobytes.html
Yau, S., Yin, Y., An, H.: An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems. In: Proceedings of the 2009 IEEE International Conference on Web Services (ICWS), pp. 287–294. IEEE Computer Society, Washington, DC (2009)
Yi, J., Adnane, A., David, S., Parrein, B.: Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Networks 9, 28–47 (2011)
Younis, M., Krajewski, N., Farrag, O.: Adaptive security provision for increased energy efficiency in Wireless Sensor Networks. In: IEEE 34th Conf. on Local Comp. Networks (LCN), pp. 999–1005 (October 2009)
Yu, B.: Establishement of elliptic curve cryptosystem. In: IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 1165–1167 (December 2010)
Zou, J., Lu, K., Jin, Z.: Architecture and fuzzy adaptive security algorithm in intelligent firewall. In: Proceedings of MILCOM (MILCOM), vol. 2, pp. 1145–1149 (October 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Reza, T.A., Barbeau, M. (2013). QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds) Foundations and Practice of Security. FPS 2012. Lecture Notes in Computer Science, vol 7743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37119-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-37119-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37118-9
Online ISBN: 978-3-642-37119-6
eBook Packages: Computer ScienceComputer Science (R0)