Secure Low-Bandwidth Video Streaming through Reliable Multipath Propagation in MANETs

Most of the existing video streaming protocols provide video services without considering security aspects in decentralized mobile ad-hoc networks. The security policies adapted to the currently existing non-streaming protocols, do not comply with the live video streaming protocols resulting in considerable vulnerability, high bandwidth consumption and unreliability which cause severe security threats, low bandwidth and error prone transmission respectively in video streaming applications. Therefore a synergized methodology is required to reduce vulnerability and bandwidth consumption, and enhance reliability in the video streaming applications in MANET. To ensure the security measures with reduced bandwidth consumption and improve reliability of the video streaming applications, a Secure Low-bandwidth Video Streaming through Reliable Multipath Propagation (SLVRMP) protocol architecture has been proposed by incorporating the two algorithms namely Secure Low-bandwidth Video Streaming Algorithm and Reliable Secure Multipath Propagation Algorithm using Layered Video Coding in non-overlapping zone routing network topology. The performances of the proposed system are compared to those of the other existing secure multipath protocols Sec-MR, SPREAD using NS 2.34 and the simulation results show that the performances of the proposed system get considerably improved.




References:
[1] M. Lindeberg, S. Kristiansen, T. Plagemann and V. Goebel, “Challenges
and Techniques for Video Streaming over Mobile Ad Hoc Networks,”
Multimedia Systems, Volume 17, Number 1, pp.51-82, Springer –
Verlag, 2011.
[2] Tim Bohrloch, Carlos T. Calafate, A. Torres, J. C. Cano and P.Manzoni,
“Evaluating Video Streaming Performance in MANETs Using a
Testbed,” XXII Jornadas de Paralelismo Sept 2011.
[3] C. Y. Tseng, P. Bala Subramanyam, and C. Ko, et al., “A Specification-
Based Intrusion Detection System for AODV,” in Proc. of ACM
Workshop on Security of Ad Hoc and Sensor Networks, VA, 2003, pp.
125–134.
[4] A. Boukerch, L. Xu, and K. EL-Khatib, “Trust-Based Security for
Wireless Ad Hoc and Sensor Networks,” Computer Communications 30
(2007) 2413–2427.
[5] D. Djenouri, L. Khelladi, and N. Badache, “A Survey of Security Issue
in Mobile Ad Hoc and Sensor Networks,” IEEE Communications
Surveys & Tutorials 7 (2005) 2–28.
[6] Wei Wang, Huiran Wang, Beizhan Wang, Yaping Wang, and Jiajun
Wang, “Energy-Aware and Self-Adaptive Anomaly Detection Scheme
Based on Network Tomography in Mobile Ad Hoc Networks,” Elsevier-
Information Sciences 220 (2013) 580–602.
[7] H. Yang, G. Zhong, and S. W. Lu, “Network Performance Centric
Security Design in MANET,” ACM Mobile Computing and
Communications Review 6 (2002) 121–130.
[8] Zheng Wan, “Adaptive Video Transmission in Manets,” Proceedings of
IC-BNMT 2009.
[9] Harsharndeep Singh, MeenuDhiman and HarmunishTaneja “EVSM:
Enhanced Video Streaming in Mobile Ad-Hoc Networks,” International
Journal of Computer Science and Telecommunications, Volume 3, Issue
9, September 2012. [10] Haas, Z.J., and Pearlman, M.R., “The performance of query control
schemes for the zone routing protocol,” IEEE/ACM Trans. Netw, 9(4),
427–438, 2001.
[11] JiefuZhai, Keman Yu, Jiang Li, and Shipeng Li “A Low Complexity
Motion Compensated Frame Interpolation Method,” ISCAS 2005, May
2005.
[12] Y.J. Chiu and T. Berger, “A software-only video codec using pixel wise
conditional differential replenishment and perceptual enhancements,”
IEEE Trans. on Circuits and Systems for Video Technology, Vol. 9, No.
3, pp. 438-450, April 1999.
[13] Y.C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on demand
routing protocol for ad hoc networks,” MobiCom 2002, 2002.
[14] W. Lou and Y. Fang, “A survey of wireless security in mobile Ad-Hoc
networks: challenges and available solutions,” book chapter in Ad-Hoc
Wireless Networking, Kluwer, 2003.
[15] P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc
Networks,” Proc. SCS Comm. Networks and Distributed Systems
Modeling and Simulation Conf. (CNDS ’02), 2002.
[16] W. Lou and Y. Fang, “Securing data delivery in ad hoc networks,”
International Workshop on Cryptology and Network Security
(CANS’03), Miami, FL, 2003.
[17] M.G. Zapata, “Secure Ad Hoc on-Demand Distance Vector Routing,”
Mobile Computing and Comm. Rev., Vol. 6, No.3, pp. 106-107, 2002.
[18] P. Papadimitratos and Z. Haas,Securing Mobile Ad Hoc Networks,
Handbook of Ad-Hoc Wireless Networks, M.Ilyas, ed., CRC Press,
2002.
[19] W. Wei and A. Zakhor, “Robust Multipath Source Routing Protocol
(RMPSR) for Video Communication over Wireless Ad Hoc Networks,”
ICME, 2004.
[20] Anit Kumar and Pardeep Mittal, “A Comparative Study of AODV &
DSR Routing Protocols in Mobile Ad-Hoc Networks,” International
Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 5, May 2013, ISSN: 2277 128X.
[21] Dr.A.A.Gurjar andMr.A.A.Dande, “Adhoc on Demand Distance Vector
Routing Protocol: A Review Study,” Research Inventy: International
Journal of Engineering and Science ISSN: 2278-4721, Vol. 2, Issue 3
(February 2013), Pp 27-29.
[22] Y.C. Hu, A. Perrig, D. B. Johnson,“Ariadne : a secure on demand
routing protocol for ad hoc networks,” MobiCom2002, 2002.
[23] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M., and Belding-
Royer,“A Secure Routing Protocol for Ad-Hoc Networks,” Proc. IEEE
Int’l Conf. Network Protocols (ICNP ’02), pp. 78-89, 2002.
[24] Lou, W.; Liu, W., Zhang, Y., & Fan, Y.,“SPREAD: Improving network
security by multipath routing in mobile ad hoc networks,” Springer
Wireless Networks, Vol. 15, No. 3, 2009, pp. 279-294.
[25] Mavropodi, R.; Kotzanikolaoua, P., &Douligerisa, C., “SecMR- a secure
multipath routing protocol for ad hoc networks,” Elsevier Ad Hoc
Networks, Vol. 5, Issue 1, January 2007, pp 87-99.
[26] H. Schwarz, D. Marpe, and T. Wiegand, “Overview of the scalable
video coding extension of H.264/AVC,” IEEE Trans. Circuits Syst.
Video Technol., vol. 17, no. 9, PP. 1103–1120, Sep. 2007.
[27] Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A.,
&Viennot, L. (2001). “Optimized link state routing protocol for ad hoc
networks,” In Proceedings of IEEE International Multi Topic
Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century,
(pp. 62–68).
[28] ShapourJoudiBegdillo, Mehdi Asadi, andAbolfazlToroghi, “Improving
Packet Delivery Ratio in ODMRP with Route Diversity,” IJCSNS
International Journal of Computer Science and Network Security, (Vol.7
No.12) (2007, December).