QoS Aware Adaptive Security Scheme for Video Streaming in MANETs - - PowerPoint PPT Presentation

qos aware adaptive security scheme for
SMART_READER_LITE
LIVE PREVIEW

QoS Aware Adaptive Security Scheme for Video Streaming in MANETs - - PowerPoint PPT Presentation

5 th International Symposium on Foundations & Practice of Security October 25 - 26, 2012, Montreal, QC, Canada QoS Aware Adaptive Security Scheme for Video Streaming in MANETs Tahsin Reza and Prof. Michel Barbeau School of Computer


slide-1
SLIDE 1

5th International Symposium on Foundations & Practice of Security

October 25 - 26, 2012, Montreal, QC, Canada

QoS Aware Adaptive Security Scheme for Video Streaming in MANETs

Tahsin Reza and Prof. Michel Barbeau School of Computer Scienece, Carleton University

slide-2
SLIDE 2

Contents

  • Problem overview
  • Contributions
  • Simulation results
  • Conclusion and Future work
slide-3
SLIDE 3

Problem overview

  • Multimedia streaming in MANETs
  • Confidentiality of video data –

Cryptography

  • Overhead caused by cryptography affects

streaming performance

  • Possibilities of selective encryption [1-3],

adaptive security [4,5], and properties of multimedia services

slide-4
SLIDE 4

(These results are obtained from our earlier work [6]) Indices

Evaluation: Cumulative packet scheduling delay

slide-5
SLIDE 5

Key contributions: Adaptive mechanisms

  • 1. Fixed frame rate and adaptive crypto

scheme

  • 2. Optional inter coded frame encryption
  • 3. Optional inter coded frame transmission
  • 4. Frame rate adaptation
  • Crypto scheme:
slide-6
SLIDE 6
  • 1. Fixed frame rate and adaptive

crypto scheme

  • Each station maintains a pre-populated

cryptography performance profile

(crypto scheme: encryption / decryption throughput)

  • Receiver provides periodic feedback

(decryption throughput, packet rate, transmission delay)

  • Crypto Threshold, (indicates the

maximum time allowed for a video data unit (slice, frame or a GOP) to spend in cryptography operations)

  • Sender calculates crypto delay,
  • If is not satisfied,

cypto scheme is changed to meet

slide-7
SLIDE 7

Example: Cryptography performance profile

slide-8
SLIDE 8
  • 1. Fixed frame rate and adaptive

crypto scheme (continued)

Two ECDH based rekeying techniques:

  • 1. Only the source renews its key – requires
  • ne way communications
  • 2. Both parties renew their keys – requires two

way communications

slide-9
SLIDE 9
  • 1. Fixed frame rate and adaptive

crypto scheme (continued)

36 Nodes | MP-OLSR | 802.11e | H.264/AVC [6]

5

slide-10
SLIDE 10
  • 1. Fixed frame rate and adaptive crypto

scheme (continued)

slide-11
SLIDE 11
  • 2. Optional inter coded frame

encryption

Crypto scheme and frame rate are fixed. Encrypting frames containing inter coded macroblocks (e.g., P and B-frames) are optional.

slide-12
SLIDE 12
  • 2. Optional inter coded frame

encryption (continued)

36 Nodes | MP-OLSR | 802.11e | H.264/AVC

slide-13
SLIDE 13
  • 3. Optional inter coded frame

transmission

  • Crypto scheme is fixed and all the

transmitted video data must be encrypted.

  • It is optional to encrypt and transmit video

frames containing inter coded macroblocks (e.g., P and B-frames).

slide-14
SLIDE 14
  • 3. Optional inter coded frame

transmission (continued)

36 Nodes | MP-OLSR | 802.11e | H.264/AVC

slide-15
SLIDE 15
  • 4. Frame rate adaptation

we replace TPdec in PKTfb by cumulative decryption time and considers cumulative encryption time as well and

slide-16
SLIDE 16
  • 4. Frame rate adaptation (continued)

36 Nodes | MP-OLSR | 802.11e | H.264/AVC @30 fps

slide-17
SLIDE 17

Conclusion

slide-18
SLIDE 18

Future work

  • We have only considered H.264/AVC and
  • unicasting. The concept can be extended for H.

264/SVC and 3D/Stereoscopic video coding and multicasting.

  • An algorithm to determine the value of Crypto

Threshold based on network and application parameters.

  • Using Multi Criteria Decision Making approach

(e.g., AHP) to realize multidimensional (e.g., adapting security and QoS parameters simultaneously) adaptation decisions.

slide-19
SLIDE 19

References

[1] G. Spanos and T. Maples. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. Fourth International Conference

  • n Computer Communications and Networks, pages xviii+683, September 1995.

[2] J. Meyer and F. Gadegast. Security mechanisms for Multimedia data with the Example MPEG-1 video, Project description of SECMPEG. 2000. [3] L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the fourth ACM international conference on Multimedia (MULTIMEDIA), pages 219{229, New York, NY, USA, 1996. ACM. [4] R. Iqbal, S. Shahabuddin, and S. Shirmohammadi. Compressed-domain spatial adaptation resilient perceptual encryption of live H.264 video. In 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), pages 472{475, May 2010. [5] M. Ben Mahmoud, N. Larrieu, A. Pirovano, and A. Varet. An adaptive security architecture for future aircraft communications. In IEEE/AIAA 29th Digital Avionics Systems Conference (DASC), pages 3.E.2{1{3.E.2{16, October 2010. [6] T. Reza. QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. Master's thesis, School of Computer Science, Carleton University, Ottawa, Ontario, Canada, 2012. http://people.scs.carleton.ca/~barbeau/Theses/Tashin_Reza.pdf.

slide-20
SLIDE 20

Questions?

slide-21
SLIDE 21

Thank You!