Providing Real-time Security Support for Multi-level Ad-hoc Networks

Slides:



Advertisements
Similar presentations
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Advertisements

A Graduate Course on Multimedia Technology 3. Multimedia Communication © Wolfgang Effelsberg Media Scaling and Media Filtering Definition of.
Secure Content Delivery in Information-Centric Networks: Design, Implementation, and Analyses Computer Science Department New Mexico State University,
LOGO Video Packet Selection and Scheduling for Multipath Streaming IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 3, APRIL 2007 Dan Jurca, Student Member,
Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming Mea Wang, Baochun Li Department of Electrical and Computer Engineering University.
Scalable On-demand Media Streaming with Packet Loss Recovery Anirban Mahanti Department of Computer Science University of Calgary Calgary, AB T2N 1N4 Canada.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
Distributed Multimedia Systems
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
Networks & Multimedia Amit Pande, Post-doctoral fellow, Department of Computer Science, University of California Davis
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Adaptive Video Streaming in Vertical Handoff: A Case Study Ling-Jyh Chen, Guang Yang, Tony Sun, M. Y. Sanadidi, Mario Gerla Computer Science Department,
Scalable Team Multicast in Wireless Ad hoc networks Exploiting Coordinated Motion Mario Gerla University of California, Los Angeles.
EE442—Multimedia Networking Jane Dong California State University, Los Angeles.
Media Streaming Performance in a Portable Wireless Classroom Network Presenter: Jean Cao Supervisor: Carey Williamson TRLabs & Dept. of Computer Science.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Load Sharing for Cluster-Based Network Service Jiani Guo and Laxmi Bhuyan Architecture Lab Department of Computer Science and Engineering University of.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Quantitative Evaluation of Secure Network Coding Dawn Meeting UCSC Nov 4, 2010 SeungHoon Lee, Mario Gerla In collaboration with IBM researchers.
Real-time Transport Protocol Matt Boutell CS457: Computer Networks November 15, 2001.
Streaming Video Gabriel Nell UC Berkeley. Outline Scalable MPEG-4 video – Layered coding method – Integrated transport-decoder buffer model RAP streaming.
AdHoc Probe: Path Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen, Tony Sun, Guang Yang, M.Y. Sanadidi, Mario Gerla Computer Science Department,
Adaptive Content Delivery for Scalable Web Servers Authors: Rahul Pradhan and Mark Claypool Presented by: David Finkel Computer Science Department Worcester.
Department of Computer Engineering University of California at Santa Cruz Data Compression (2) Hai Tao.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
CS :: Fall 2003 Layered Coding and Networking Ketan Mayer-Patel.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Distributed Multimedia March 19, Distributed Multimedia What is Distributed Multimedia?  Large quantities of distributed data  Typically streamed.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Video Streaming over Cooperative Wireless Networks Mohamed Hefeeda (Joint.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Optimal Partitioning of Fine-Grained Scalable Video Streams Mohamed Hefeeda.
Dynamic Voltage Frequency Scaling for Multi-tasking Systems Using Online Learning Gaurav DhimanTajana Simunic Rosing Department of Computer Science and.
Scalable Video Coding and Transport Over Broad-band wireless networks Authors: D. Wu, Y. Hou, and Y.-Q. Zhang Source: Proceedings of the IEEE, Volume:
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
Multiplexing Team Members: Cesar Chavez Arne Solas Steven Fong Vi Duong David Nguyen.
1 Efficient Backbone Synthesis Algorithm for Multi-Radio Wireless Mesh Networks Huei-jiun Ju and Izhak Rubin Electrical Engineering Department University.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
1 Hierarchical Parallelization of an H.264/AVC Video Encoder A. Rodriguez, A. Gonzalez, and M.P. Malumbres IEEE PARELEC 2006.
USHA: A Practical Vertical Handoff Solution Ling-Jyh Chen, Tony Sun, Mario Gerla Computer Science Department, UCLA.
Access Link Capacity Monitoring with TFRC Probe Ling-Jyh Chen, Tony Sun, Dan Xu, M. Y. Sanadidi, Mario Gerla Computer Science Department, University of.
Experimental Study on Wireless Multicast Scalability using Merged Hybrid ARQ with Staggered Adaptive FEC S. Makharia, D. Raychaudhuri, M. Wu*, H. Liu*,
Problem and Motivation
Modeling and Simulating MPLS Networks
4G –IP BASED MOBILE COMMUNICATION
Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Klara Nahrstedt Spring 2012
June 2007 An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramanian.
Video scheduling algorithm
H.264/SVC Video Transmission Over P2P Networks
PROTEAN: A Scalable Architecture for Active Networks
Data Dissemination and Management - Topics
Rohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla
Design and Evaluation of a Testbed for Mobile TV Networks
A Server-less Architecture for Building Scalable, Reliable, and Cost-Effective Video-on-demand Systems Raymond Leung and Jack Y.B. Lee Department of Information.
Overview What is Multimedia? Characteristics of multimedia
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Secure Mobile UAV-MBN Network
Ling-Jyh Chen, Mario Gerla Computer Science Department, UCLA
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Overview of Secure Video Applications
Presented by Guided by:-
Delay-Tolerant Mobile Ad-hoc Networks
Kyoungwoo Lee, Nikil Dutt, and Nalini Venkatasubramanian
Reinhard Laroy BIPT European Parliament - 27 February 2012
Lec 11 Data and Signals Computer Networks Al-Mustansiryah University
Project proposal Multi-stream and multi-path audio transmission
Presentation transcript:

Providing Real-time Security Support for Multi-level Ad-hoc Networks Jiejun Kong, Mario Gerla Computer Science Department University of California, Los Angeles {jkong,gerla}@cs.ucla.edu

Real-time Security Support: Characteristics Capable of processing vast amount of data in short period Raises performance concerns on mobile devices This work studies performance aspects of security solutions in mobile ad hoc networks Delay sensitive Packets that incur an extra end-to-end delay are essentially useless Loss-tolerant (nearly solved) Occasional data loss/corruption only causes insignificant glitches Solutions: TESLA, IPsec/ESP What does “adaptive” mean here? ……

Mobile Real-time Applications Mobile real-time data collector Useful in tactical environments, paramedic emergency, news report, personal communications On-device encoding and encryption Motivation 1. Mobile client of multimedia streaming Pocket TV broadcasting On-device decryption and decoding

Application Domain: Digital Battlefields Level 1: Regular Ground Nodes < > Level 3: Aerial Mobile Backbone Level 2: Ground Mobile Backbone

Multi-level Heterogeneous Ad-hoc Networks Problem of homogeneous mobile ad-hoc networks Network capacity approaches 0 when network scale increases Multi-level heterogeneous ad-hoc network provides scalability and throughput guarantees Regular ground nodes Ground mobile backbone (MBN nodes) Aerial mobile backbone structure (UAV nodes) Network capacity approaches the bottleneck link capacity E.g., 11Mbps in 802.11b, 54Mbps in 802.11a

Communication Bandwidth  vs. Computation Bit-rate  Communication bandwidth t Max: W Min: 0 Capacity of a MANET with N nodes: (N) Computation processing bit-rate t Must catch up with t t = t Otherwise packet drop-off or buffer overflow

Communication Bandwidth  vs. Computation Bit-rate  (detail) Major processing overheads come from Operation A: compression (of encoding) Operation B: encryption (of security protection) A is limited due to heavy workload 352x240 resolution image, 24-bit color, 30frame/sec  60Mbps On-device compression 60Mbps  1.5Mbps MPEG stream B is limited due to inflexible encryption schemes designed for large servers When t is at the scale of Mbps speed, can t catch up with t ?

Experiments on Mobile Device iPAQ3670, Intel StrongARM 206MHz CPU, 16M ROM, 64M RAM

Case Study: t <t ok failed Encoding A = 2Mbps. Encryption B = measured previously. Will the overall data rate t reach the line t =1.5Mbps (MPEG I)?

Proposals Call for rate-adaptive security protection Notion of adaptive “real-time” protection Actual protection varies with network condition Yet, a guaranteed lower-bound on protection Data (adaptable rate/content) secured data secret Adaptable strength Adaptable bitrate Security Module (adaptable) (bandwidth estimation etc.) network feedback