Skip to main content

Streaming Media Securely over Multipath Multihop Wireless Network

  • Conference paper
Emerging Technologies in Knowledge Discovery and Data Mining (PAKDD 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4819))

Included in the following conference series:

  • 1492 Accesses

Abstract

With the rapid growth and popularity of wireless LANs (WLANs), the development of ubiquitous services is in demand. Mobile Ad hoc Networks (MANETs) are very attractive for many environments, such as home networking, emergency response scenarios etc. However, real-time voice communication is a critical application for many of these network scenarios. In this paper, we put forward a framework for secure audio streaming over multihop wireless network. And we propose an efficient multipath routing for MANET, while using scalable speech coding and selective encryption in secure RTP. With the simulation results, the performance of the proposed scheme is evaluated.

This work was partially supported by University Research Program of Ministry of Information & Communication in Republic of Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mueller, S., et al.: Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges. In: Calzarossa, M.C., Gelenbe, E. (eds.) Performance Tools and Applications to Networked Systems. LNCS, vol. 2965, pp. 209–234. Springer, Heidelberg (2004)

    Google Scholar 

  2. Li, X., Cuthbert, L.: Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. In: IEEE MASCOTS 2004, Netherlands, pp. 184–191 (2004)

    Google Scholar 

  3. Ye, Z., et al.: A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad Hoc Networks Journal 2(1), 87–107 (2004)

    Article  Google Scholar 

  4. Wang, L., et al.: Multipath source routing in wireless ad hoc networks. In: CCECE 2000, vol. 1, pp. 479–483 (2000)

    Google Scholar 

  5. Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. Mobile Computing 353, 153–181 (1996)

    Article  Google Scholar 

  6. Lee, S.J., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. IEEE ICC 2001 3, 867–871 (2001)

    Google Scholar 

  7. Perkins, C.E., et al.: Ad hoc on-demand distance vector (AODV) routing. In: IETF RFC, vol. 3561 (2003)

    Google Scholar 

  8. Lee, S.J., Gerla, M.: AODV-BR: Backup routing in ad hoc networks. IEEE WCNC 2000 3, 1311–1316 (2000)

    Google Scholar 

  9. Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. Wiley Wireless Communications and Mobile Computing 6(7), 969–988 (2006)

    Article  Google Scholar 

  10. Wei, W., Zakhor, A.: Robust Multipath Source Routing Protocol (RMPSR) for Video Communication over Wireless Ad Hoc Networks. In: ICME 2004, Taiwan, pp. 1379–1382 (2004)

    Google Scholar 

  11. Mao, S., et al.: Video transport over ad hoc networks: multistream coding with multipath transport. IEEE Journal on Selected Areas in Communications 21(10), 1721–1737 (2003)

    Article  Google Scholar 

  12. Alattar, A.M., Al-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams. IEEE ISCAS 1999, 340–343 (1999)

    Google Scholar 

  13. Lookabaugh, T., et al.: Selective encryption and MPEG-2. ACM Multimedia (2003)

    Google Scholar 

  14. Gibson, J.D., et al.: Selective Encryption and Scalable Speech Coding for Voice Communications over Multi-Hop Wireless Links. IEEE MILCOM 2004 2, 792–798 (2004)

    Article  Google Scholar 

  15. Dong, H., et al.: SNR and bandwidth scalable speech coding. IEEE ISCAS 2002 2, 859–862 (2002)

    Google Scholar 

  16. Pallapothu, S., Mahajan, S.: Selective Encryption Support in SRTP. draft-smahajan-srtp-selective-encryption-00.txt, work in progress (2006)

    Google Scholar 

  17. Reddy, L.R., Raghavan, S.V.: SMORT: Scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Networks 5(2), 162–188 (2007)

    Article  Google Scholar 

  18. ITU-T, 5-, 4-, 3-, and 2-bit/sample embedded adaptive differential pulse code modulation (ADPCM) (December 1990)

    Google Scholar 

  19. ISO/IEC JTC1 SC29/WG11, ISO/IEC FDIS 14496-3, Subparts 1, 2, 3, Coding of Audio-Visual Objects Part 3: Audio, ISO/IEC JTC1 SC29/WG11 N2503 (October 1998)

    Google Scholar 

  20. OPNET Modeler Simulation Software, http://www.opnet.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Takashi Washio Zhi-Hua Zhou Joshua Zhexue Huang Xiaohua Hu Jinyan Li Chao Xie Jieyue He Deqing Zou Kuan-Ching Li Mário M. Freire

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vaidya, B., Lee, S., Kim, EK., Han, S. (2007). Streaming Media Securely over Multipath Multihop Wireless Network. In: Washio, T., et al. Emerging Technologies in Knowledge Discovery and Data Mining. PAKDD 2007. Lecture Notes in Computer Science(), vol 4819. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77018-3_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77018-3_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77016-9

  • Online ISBN: 978-3-540-77018-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics