Problem and Motivation

Slides:



Advertisements
Similar presentations
EE5900 Advanced Embedded System For Smart Infrastructure
Advertisements

Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia Systems Authors: Wanghong Yuan, Klara Narhstedt Appears in SOSP 2003 Presented by:
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
ENERGY-EFFICIENT ALGORITHMS INTRODUCTION TO DETERMINISTIC ONLINE POWER-DOWN ALGORITHMS Len Matsuyama CS 695.
Linear Programming: Simplex Method and Sensitivity Analysis
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Purdue University.
1 Multimedia Chapter Introduction to multimedia 7.2 Multimedia files 7.3 Video compression 7.4 Multimedia process scheduling 7.5 Multimedia file.
Wenye Wang Xinbing Wang Arne Nilsson Department of Electrical and Computer Engineering, NC State University March 2005 A New Admission Control Scheme under.
Copyright © 2008 UCI ACES Laboratory Kyoungwoo Lee, Minyoung Kim, Nikil Dutt, and Nalini Venkatasubramanian Error-Exploiting.
Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates Cheng-Hsin Hsu Joint work with Dr. Mohamed Hefeeda April 23, 2009 Simon Fraser.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Sang-Chun Han Hwangjun Song Jun Heo International Conference on Intelligent Hiding and Multimedia Signal Processing (IIH-MSP), Feb, /05 Feb 2009.
Strong Error Detection for Control Units Against Advanced Attackers Kahraman Daglar Akdemir Advisor: Berk Sunar Electrical and Computer Engineering MOTIVATION.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
System-Wide Energy Minimization for Real-Time Tasks: Lower Bound and Approximation Xiliang Zhong and Cheng-Zhong Xu Dept. of Electrical & Computer Engg.
Processor Frequency Setting for Energy Minimization of Streaming Multimedia Application by A. Acquaviva, L. Benini, and B. Riccò, in Proc. 9th Internation.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
ALBERT PARK EEL 6788: ADVANCED TOPICS IN COMPUTER NETWORKS Energy-Accuracy Trade-off for Continuous Mobile Device Location, In Proc. of the 8th International.
Adaptive Video Coding to Reduce Energy on General Purpose Processors Daniel Grobe Sachs, Sarita Adve, Douglas L. Jones University of Illinois at Urbana-Champaign.
QUANTIZED CONTROL and GEOMETRIC OPTIMIZATION Francesco Bullo and Daniel Liberzon Coordinated Science Laboratory Univ. of Illinois at Urbana-Champaign U.S.A.
Killing Zombies with Rate Controlled Adaptive Intra Refresh over Wireless HDMI by Nicholas Jamba.
SensEye: A Multi-Tier Camera Sensor Network by Purushottam Kulkarni, Deepak Ganesan, Prashant Shenoy, and Qifeng Lu Presenters: Yen-Chia Chen and Ivan.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Baoxian Zhao Hakan Aydin Dakai Zhu Computer Science Department Computer Science Department George Mason University University of Texas at San Antonio DAC.
Integrating Fine-Grained Application Adaptation with Global Adaptation for Saving Energy Vibhore Vardhan, Daniel G. Sachs, Wanghong Yuan, Albert F. Harris,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Wireless Networks Breakout Session Summary September 21, 2012.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Low Power Design for Real-Time Systems Low power (energy) consumption is a key design for embedded systems Battery’s life during operation Reliability.
Copyright © 2008 UCI ACES Laboratory Kyoungwoo Lee 1, Aviral Shrivastava 2, Nikil Dutt 1, and Nalini Venkatasubramanian 1.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Network-on-Chip Energy-Efficient Design Techniques for Interconnects Suhail Basit.
Maeda, Sill Torres: CLEVER CLEVER: Cross-Layer Error Verification Evaluation and Reporting Rafael Kioji Vivas Maeda, Frank Sill Torres Federal University.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Fine Granularity Scalability in MPEG-4 Video by Weiping Li Presentation by Warren Cheung.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Multimedia Computing and Networking Jan Reduced Energy Decoding of MPEG Streams Malena Mesarina, HP Labs/UCLA CS Dept Yoshio Turner, HP Labs.
In-Place Decomposition for Robustness in FPGA Ju-Yueh Lee, Zhe Feng, and Lei He Electrical Engineering Dept., UCLA Presented by Ju-Yueh Lee Address comments.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Wireless Sensor Networks M Homework #1. Part 1 Consider two sensor devices (one transmitter and one receiver) IEEE standard- compliant. Assume.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
Determining Optimal Processor Speeds for Periodic Real-Time Tasks with Different Power Characteristics H. Aydın, R. Melhem, D. Mossé, P.M. Alvarez University.
Energy Efficient Data Management in Sensor Networks Sanjay K Madria Web and Wireless Computing Lab (W2C) Department of Computer Science, Missouri University.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Pouya Ostovari and Jie Wu Computer & Information Sciences
Reliable energy management System reliability is affected by use of energy management The use of DVS increases the probability of faults, thus damaging.
Security and Performance Trade-off in wireless sensor network
Adaptive Mobile Applications
Overview of Wireless Networks:
Andrea Acquaviva, Luca Benini, Bruno Riccò
SE-Aware HPC Extension : Selective Data Protection for reducing failures due to soft errors 7/20/2006 Kyoungwoo Lee.
June 2007 An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramanian.
Providing Real-time Security Support for Multi-level Ad-hoc Networks
Coordination and computation over wireless networks
Chapter 7 Multimedia 7.1 Introduction to multimedia
Chapter 7 Multimedia 7.1 Introduction to multimedia
Chapter 7 Multimedia 7.1 Introduction to multimedia
2/23/2019 A Practical Approach for Handling Soft Errors in Iterative Applications Jiaqi Liu and Gagan Agrawal Department of Computer Science and Engineering.
Chapter 7 Multimedia 7.1 Introduction to multimedia
Problem and Motivation
Overview of Secure Video Applications
Kyoungwoo Lee, Nikil Dutt, and Nalini Venkatasubramanian
Kyoungwoo Lee, Minyoung Kim, Nikil Dutt, and Nalini Venkatasubramanian
Chapter 7 Multimedia 7.1 Introduction to multimedia
Presentation transcript:

Problem and Motivation Security and Power Insecure network Symmetric Encryption Technique Video Encoder Secure Video Encoder Attacks Decryption Video Decoder Secure Video Decoder Battery -Operated Devices Problem and Motivation Mobile multimedia applications are vulnerable to security attacks in wireless networks Significant computation for video encryption is expected on battery-operated mobiles Evaluate symmetric video encryption schemes w.r.t. energy Analytical Study Experimental Study 50 % Algorithm NAIVE SELECTIVE Zig-Zag VEA Encryption of all frames Partial encryption (e.g. Intra-blocks) Shuffling coefficients from Quantization XORing and Half Encryption using even byte distribution Moderate Very Low High 100 % 59 % < 1 % Security Relative Energy 10 20 30 40 50 60 70 80 90 FOREMAN.qcif NEWS.qcif Video Clips Measured Energy (Joules) Negligible Energy Overhead Encoding without Encryption Encoding with Encryption (Selective) Encoding with Encryption (Naïve)

Reliability and Power Critical real-time applications on battery-operated embedded systems Demand high reliability and low power consumption (eg: Remote Sensing) Strong relationship between reliability and power consumption with technology advance Reliability approaches require extra energy consumption (eg: Triple Modular Redundancy) Power management techniques affect the system reliability (eg: Voltage scaling and soft error rate) Advance technology causes higher fault rate (eg: lower voltage, higher density) Composibility contributes system level perspectives with knobs for coordinating and optimizing reliability, energy consumption and time constraints Increase Power Reliability Manager: Redundancy Power Manager: DVS, DPM Decrease Reliability COMPOSIBILITY Coordinator  Optimal Solution (1) Compute optimal speed for min energy usage within deadline (2) Control knobs unless feasible for reliability (3) Apply redundancy to satisfy reliability P substrate N+ gate drain source α particle +- -+