Skip to main content

QoS Aware Adaptive Security Scheme for Video Streaming in MANETs

  • Conference paper
Book cover Foundations and Practice of Security (FPS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7743))

Included in the following conference series:

Abstract

Real-time video streaming is delay sensitive. It has minimum bandwidth and QoS requirements. Achieving target QoS for video streaming is challenging in a decentralized and self-organized MANET. Cryptography algorithms offer confidentiality of shared data, but they have computation cost. Our work addresses the issue of delay overhead caused by the introduction of cryptography that directly affects video streaming performance. Our proposal is motivated by possibilities of adaptive security and multimedia service. We make an effort to identify why, when and how to deploy adaptation. We propose QaASs (QoS aware Adaptive Security scheme), an adaptive mechanism that counters the effect of delay overhead by adapting cryptography and multimedia properties, providing QoS while maintaining a required level of security. We evaluate our proposal through implementation and simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmissions. In: Proceedings of the Symposium on Network and Distributed System Security (SNDSS), pp. 137–144. IEEE Computer Society, Washington, DC (1996)

    Chapter  Google Scholar 

  2. Alampalayam, S., Kumar, A.: An adaptive security model for mobile agents in wireless networks. In: IEEE Global Telecommunications Conference (GLOBECOM), vol. 3, pp. 1516–1521 (December 2003)

    Google Scholar 

  3. Alia, M., Lacoste, M., He, R., Eliassen, F.: Putting together QoS and security in autonomic pervasive systems. In: Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet), pp. 19–28. ACM, New York (2010)

    Chapter  Google Scholar 

  4. Ben Mahmoud, M., Larrieu, N., Pirovano, A., Varet, A.: An adaptive security architecture for future aircraft communications. In: IEEE/AIAA 29th Digital Avionics Systems Conference (DASC), pp. 3.E.2-1–3.E.2-16 (October 2010)

    Google Scholar 

  5. Blasi, L., Savola, R., Abie, H., Rotondi, D.: Applicability of security metrics for adaptive security management in a universal banking hub system. In: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume (ECSA), pp. 197–204. ACM, New York (2010)

    Chapter  Google Scholar 

  6. Crypto++, http://www.cryptopp.com

  7. Devore, J.: Probability and Statistics for Engineering and the Sciences. Cengage Learning (2011)

    Google Scholar 

  8. Djenouri, D., Khelladi, L., Badache, A.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys Tutorials 7(4), 2–28 (2005)

    Article  Google Scholar 

  9. Dong, H., Gibson, J., Kokes, M.: SNR and bandwidth scalable speech coding. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol. 2, pp. II-859–II-862 (2002)

    Google Scholar 

  10. Furht, B.: Encyclopedia of Multimedia. Springer Reference. Springer (2008)

    Google Scholar 

  11. Gibson, J., Servetti, A., Dong, H., Gersho, A., Lookabaugh, T., De Martin, J.: Selective encryption and scalable speech coding for voice communications over multi-hop wireless links. In: IEEE Military Communications Conference (MILCOM), vol. 2, pp. 792–798 (October-November 2004)

    Google Scholar 

  12. ITU-T Rec. H.264 and ISO/IEC 14496-10:2005 (E) (MPEG-4 AVC). H.264: Advanced video coding for generic audiovisual services. Technical report (2005)

    Google Scholar 

  13. He, R., Lacoste, M., Pulou, J., Leneutre, J.: A DSL for Specifying Autonomic Security Management Strategies. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol. 6514, pp. 216–230. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. IEEE. Part 11 Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Control (MAC) Quality of Service (QoS) Enhancements. IEEE Std P802.11e/D13.0 (2005)

    Google Scholar 

  15. Iqbal, R., Shahabuddin, S., Shirmohammadi, S.: Compressed-domain spatial adaptation resilient perceptual encryption of live H.264 video. In: 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), pp. 472–475 (May 2010)

    Google Scholar 

  16. ISO/IEC. ISO/IEC 21000-7:2007 - Information technology - Multimedia framework (MPEG-21) - Part 7: Digital Item Adaptation. Technical report, International Organization for Standardization (2007)

    Google Scholar 

  17. ITU-T. 5-, 4-, 3- and 2-Bits Sample Embedded Adaptive Differential Pulse Code Modulation (ADPCM) (1990)

    Google Scholar 

  18. Kamphenkel, K., Blank, M., Bauer, J., Carle, G.: Adaptive encryption for the realization of real-time transmission of sensitive medical video streams. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6 (June 2008)

    Google Scholar 

  19. Macq, B., Quisquater, J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE 83(6), 944–957 (1995)

    Article  Google Scholar 

  20. Meyer, J., Gadegast, F.: Security mechanisms for Multimedia data with the Example MPEG-1 video, Project description of SECMPEG (2000)

    Google Scholar 

  21. Nijim, M., Ali, A.: AdSeD: An Adaptive Quality of Security Control in Disk Systems. In: 11th IEEE Intl. Conf. on Computational Sci. and Eng. (CSE), pp. 421–428 (July 2008)

    Google Scholar 

  22. Oklander, B., Sidi, M.: Jitter Buffer Analysis. In: Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (August 2008)

    Google Scholar 

  23. Oliveira, T., Oliveira, S., Macedo, D., Nogueira, J.: An adaptive security management model for emergency networks. In: 7th Latin American Network Operations and Management Symposium (LANOMS), pp. 1–4 (October 2011)

    Google Scholar 

  24. Onural, L.: An Overview of Research in 3DTV. In: 14th International Workshop on Systems, Signals and Image Processing (IWSSIP), p. 3 (June 2007)

    Google Scholar 

  25. Pereira, R., Tarouco, L.: Adaptive Multiplexing Based on E-model for Reducing Network Overhead in Voice over IP Security Ensuring Conversation Quality. In: 4th Intl. Conf. on Digital Telecommunications (ICDT), pp. 53–58 (July 2009)

    Google Scholar 

  26. Perkins, C.: RTP: audio and video for the internet. Kaleidoscope Series. Addison-Wesley (2003)

    Google Scholar 

  27. Perkins, D., Hughes, H.: A survey on quality-of-service support for mobile ad hoc networks. Wireless Communications and Mobile Computing 2(5), 503–513 (2002)

    Article  Google Scholar 

  28. Preda, S., Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., Toutain, L.: Dynamic deployment of context-aware access control policies for constrained security devices. J. Syst. Softw. 84(7), 1144–1159 (2011)

    Article  Google Scholar 

  29. Reza, T.: QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. Master’s thesis, School of Computer Science, Carleton University, Ottawa, Ontario, Canada (2012), http://people.scs.carleton.ca/~barbeau/Theses/Tashin_Reza.pdf

  30. Samad, F., Makram, S.: Adaptive security established on the requirements and resource abilities of network nodes. In: IEEE 35th Conference on Local Computer Networks (LCN), pp. 752–755 (October 2010)

    Google Scholar 

  31. Schwarz, H., Marpe, D., Wiegand, T.: Overview of the Scalable Video Coding Extension of the H.264/AVC Standard. IEEE Transactions on Circuits and Systems for Video Technology 17(9), 1103–1120 (2007)

    Article  Google Scholar 

  32. Shnitko, A.: Adaptive security in complex information systems. In: Proc. of the 7th Korea-Russia Intl Symp. on Sci. and Tech. (KORUS), vol. 2, pp. 206–210 (July 2003)

    Google Scholar 

  33. Sühring, K.: H.264/AVC JM Reference Software, http://iphome.hhi.de/suehring/tml/download/

  34. Son, H., David, R., Thuraisingham, B.: Improving timeliness in real-time secure database systems. SIGMOD Rec. 25(1), 29–33 (1996)

    Article  Google Scholar 

  35. Spanos, G., Maples, T.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: Fourth International Conference on Computer Communications and Networks, pp. xviii+683 (September 1995)

    Google Scholar 

  36. Stallings, W.: Cryptography and network security: principles and practice. Prentice Hall (2011)

    Google Scholar 

  37. Taddeo, A., Marcon, P., Ferrante, A.: Negotiation of security services: a multi-criteria decision approach. In: Proceedings of the 4th Workshop on Embedded Systems Security (WESS), pp. 4:1–4:9. ACM, New York (2009)

    Google Scholar 

  38. Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia (MULTIMEDIA), pp. 219–229. ACM, New York (1996)

    Chapter  Google Scholar 

  39. Vaidya, B., Denko, M., Rodrigues, J.: Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6 (December 2009)

    Google Scholar 

  40. Van Deursen, A., Klint, P., Visser, J.: Domain-specific languages: an annotated bibliography. SIGPLAN Not. 35(6), 26–36 (2000)

    Article  Google Scholar 

  41. Van Deursen, D., Van Lancker, W., Van de Walle, R.: On media delivery protocols in the Web. In: IEEE Intl. Conf. on Multimedia and Expo (ICME), pp. 1028–1033 (July 2010)

    Google Scholar 

  42. Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing media for adaptive streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia (MULTIMEDIA), pp. 307–310. ACM, New York (2003)

    Chapter  Google Scholar 

  43. Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology 13(7), 560–576 (2003)

    Article  Google Scholar 

  44. Wiener, M.: Performance Comparison of Public-key Cryptosystems (1998), http://www.rsa.com/rsalabs/pubs/cryptobytes.html

  45. Yau, S., Yin, Y., An, H.: An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems. In: Proceedings of the 2009 IEEE International Conference on Web Services (ICWS), pp. 287–294. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

  46. Yi, J., Adnane, A., David, S., Parrein, B.: Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Networks 9, 28–47 (2011)

    Article  Google Scholar 

  47. Younis, M., Krajewski, N., Farrag, O.: Adaptive security provision for increased energy efficiency in Wireless Sensor Networks. In: IEEE 34th Conf. on Local Comp. Networks (LCN), pp. 999–1005 (October 2009)

    Google Scholar 

  48. Yu, B.: Establishement of elliptic curve cryptosystem. In: IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 1165–1167 (December 2010)

    Google Scholar 

  49. Zou, J., Lu, K., Jin, Z.: Architecture and fuzzy adaptive security algorithm in intelligent firewall. In: Proceedings of MILCOM (MILCOM), vol. 2, pp. 1145–1149 (October 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Reza, T.A., Barbeau, M. (2013). QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds) Foundations and Practice of Security. FPS 2012. Lecture Notes in Computer Science, vol 7743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37119-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37119-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37118-9

  • Online ISBN: 978-3-642-37119-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics