Secure Low-Bandwidth Video Streaming through Reliable Multipath Propagation in MANETs
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Secure Low-Bandwidth Video Streaming through Reliable Multipath Propagation in MANETs

Authors: S. Mohideen Badhusha, K. Duraiswamy

Abstract:

Most of the existing video streaming protocols provide video services without considering security aspects in decentralized mobile ad-hoc networks. The security policies adapted to the currently existing non-streaming protocols, do not comply with the live video streaming protocols resulting in considerable vulnerability, high bandwidth consumption and unreliability which cause severe security threats, low bandwidth and error prone transmission respectively in video streaming applications. Therefore a synergized methodology is required to reduce vulnerability and bandwidth consumption, and enhance reliability in the video streaming applications in MANET. To ensure the security measures with reduced bandwidth consumption and improve reliability of the video streaming applications, a Secure Low-bandwidth Video Streaming through Reliable Multipath Propagation (SLVRMP) protocol architecture has been proposed by incorporating the two algorithms namely Secure Low-bandwidth Video Streaming Algorithm and Reliable Secure Multipath Propagation Algorithm using Layered Video Coding in non-overlapping zone routing network topology. The performances of the proposed system are compared to those of the other existing secure multipath protocols Sec-MR, SPREAD using NS 2.34 and the simulation results show that the performances of the proposed system get considerably improved.

Keywords: Bandwidth consumption, layered video coding, multipath propagation, reliability, security threats, video streaming applications, vulnerability.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1108040

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1886

References:


[1] M. Lindeberg, S. Kristiansen, T. Plagemann and V. Goebel, “Challenges and Techniques for Video Streaming over Mobile Ad Hoc Networks,” Multimedia Systems, Volume 17, Number 1, pp.51-82, Springer – Verlag, 2011.
[2] Tim Bohrloch, Carlos T. Calafate, A. Torres, J. C. Cano and P.Manzoni, “Evaluating Video Streaming Performance in MANETs Using a Testbed,” XXII Jornadas de Paralelismo Sept 2011.
[3] C. Y. Tseng, P. Bala Subramanyam, and C. Ko, et al., “A Specification- Based Intrusion Detection System for AODV,” in Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, VA, 2003, pp. 125–134.
[4] A. Boukerch, L. Xu, and K. EL-Khatib, “Trust-Based Security for Wireless Ad Hoc and Sensor Networks,” Computer Communications 30 (2007) 2413–2427.
[5] D. Djenouri, L. Khelladi, and N. Badache, “A Survey of Security Issue in Mobile Ad Hoc and Sensor Networks,” IEEE Communications Surveys & Tutorials 7 (2005) 2–28.
[6] Wei Wang, Huiran Wang, Beizhan Wang, Yaping Wang, and Jiajun Wang, “Energy-Aware and Self-Adaptive Anomaly Detection Scheme Based on Network Tomography in Mobile Ad Hoc Networks,” Elsevier- Information Sciences 220 (2013) 580–602.
[7] H. Yang, G. Zhong, and S. W. Lu, “Network Performance Centric Security Design in MANET,” ACM Mobile Computing and Communications Review 6 (2002) 121–130.
[8] Zheng Wan, “Adaptive Video Transmission in Manets,” Proceedings of IC-BNMT 2009.
[9] Harsharndeep Singh, MeenuDhiman and HarmunishTaneja “EVSM: Enhanced Video Streaming in Mobile Ad-Hoc Networks,” International Journal of Computer Science and Telecommunications, Volume 3, Issue 9, September 2012.
[10] Haas, Z.J., and Pearlman, M.R., “The performance of query control schemes for the zone routing protocol,” IEEE/ACM Trans. Netw, 9(4), 427–438, 2001.
[11] JiefuZhai, Keman Yu, Jiang Li, and Shipeng Li “A Low Complexity Motion Compensated Frame Interpolation Method,” ISCAS 2005, May 2005.
[12] Y.J. Chiu and T. Berger, “A software-only video codec using pixel wise conditional differential replenishment and perceptual enhancements,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 9, No. 3, pp. 438-450, April 1999.
[13] Y.C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on demand routing protocol for ad hoc networks,” MobiCom 2002, 2002.
[14] W. Lou and Y. Fang, “A survey of wireless security in mobile Ad-Hoc networks: challenges and available solutions,” book chapter in Ad-Hoc Wireless Networking, Kluwer, 2003.
[15] P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc Networks,” Proc. SCS Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS ’02), 2002.
[16] W. Lou and Y. Fang, “Securing data delivery in ad hoc networks,” International Workshop on Cryptology and Network Security (CANS’03), Miami, FL, 2003.
[17] M.G. Zapata, “Secure Ad Hoc on-Demand Distance Vector Routing,” Mobile Computing and Comm. Rev., Vol. 6, No.3, pp. 106-107, 2002.
[18] P. Papadimitratos and Z. Haas,Securing Mobile Ad Hoc Networks, Handbook of Ad-Hoc Wireless Networks, M.Ilyas, ed., CRC Press, 2002.
[19] W. Wei and A. Zakhor, “Robust Multipath Source Routing Protocol (RMPSR) for Video Communication over Wireless Ad Hoc Networks,” ICME, 2004.
[20] Anit Kumar and Pardeep Mittal, “A Comparative Study of AODV & DSR Routing Protocols in Mobile Ad-Hoc Networks,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013, ISSN: 2277 128X.
[21] Dr.A.A.Gurjar andMr.A.A.Dande, “Adhoc on Demand Distance Vector Routing Protocol: A Review Study,” Research Inventy: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 2, Issue 3 (February 2013), Pp 27-29.
[22] Y.C. Hu, A. Perrig, D. B. Johnson,“Ariadne : a secure on demand routing protocol for ad hoc networks,” MobiCom2002, 2002.
[23] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M., and Belding- Royer,“A Secure Routing Protocol for Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’02), pp. 78-89, 2002.
[24] Lou, W.; Liu, W., Zhang, Y., & Fan, Y.,“SPREAD: Improving network security by multipath routing in mobile ad hoc networks,” Springer Wireless Networks, Vol. 15, No. 3, 2009, pp. 279-294.
[25] Mavropodi, R.; Kotzanikolaoua, P., &Douligerisa, C., “SecMR- a secure multipath routing protocol for ad hoc networks,” Elsevier Ad Hoc Networks, Vol. 5, Issue 1, January 2007, pp 87-99.
[26] H. Schwarz, D. Marpe, and T. Wiegand, “Overview of the scalable video coding extension of H.264/AVC,” IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 9, PP. 1103–1120, Sep. 2007.
[27] Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., &Viennot, L. (2001). “Optimized link state routing protocol for ad hoc networks,” In Proceedings of IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century, (pp. 62–68).
[28] ShapourJoudiBegdillo, Mehdi Asadi, andAbolfazlToroghi, “Improving Packet Delivery Ratio in ODMRP with Route Diversity,” IJCSNS International Journal of Computer Science and Network Security, (Vol.7 No.12) (2007, December).