Abstract
The unique characteristics of wireless networks pose a number of nontrivial challenges to multimedia applications with security and rigorous QoS requirements. Lack of adequate security protection is incapable of meeting security requirements of applications, whereas enabling excessive security services inevitably leads to further degradation in QoS due to additional computation and payload encapsulation. Early work, e.g. LAP, achieves balance by adjusting security policy according to QoS metrics; but none of them are security guaranteed. In this paper, we present an efficient risk-aware QoP (Quality of Protection) and QoS optimization algorithm for multimedia applications in wireless networks. It can achieve an optimization for QoP/QoS performance metrics through offering hierarchical security services and QoS support. Experiment demonstrates that even in high risk environments our scheme can efficiently balance QoP and QoS requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barry, M.G., Campbell, A.T., Veres, A.: Distributed Control Algorithm for Service Differentiation in Wireless Packet Network. In: Proc. IEEE INFOCOM (2001)
Hanley, G., Murphy, S., Murphy, L.: Adapting WLAN MAC Parameters to Enhance VoIP Call Capacity. In: Proc. of the 8th ACM MSWiM 2005, October 2005, pp. 250–254 (2005)
Yu, J., Choi, S., Lee, J.: Enhancement of VoIP over IEEE 802.11 WLAN via Dual Queue Strategy. In: Proc. IEEE ICC (2004)
Ong, C.S., Nahrstedt, K., Yuan, W.: Quality of Protection for Mobile Multimedia Applications. In: Proc. IEEE ICME, vol. 2, pp. 137–140 (2003)
Liang, W., Wang, W.: An Analytical Study on the Impact of Authentication Local Area Networks. In: Proc. IEEE 13th Intel. Conf. and Networks (ICCCN 2004), pp. 361–366 (2004)
Liang, W., Wang, W.: A Quantitative Study of Authentication Networks. In: Proc. IEEE INFOCOM, vol. 2, pp. 1478–1489 (2005)
Liang, W., Wang, W.: On Performance Analysis of Challenge/Response Based Authentication in Wireless Networks. Computer Networks 48(2), 267–288 (2005)
Wang, W., Liang, W., Agarwal, A.K.: Integration of Authentication and Mobility Management in Third Generation and WLAN Data Networks. Wireless Comm. and Mobile Computing (WCMC) 5(6), 665–678 (2005)
Agarwal, A.K., Wang, W.: On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. Mobile Networks and Applications 12, 93–101 (2007)
Schneck, P.A., Schwan, K.: Dynamic Authentication for High performance Networked Application. In: Proc. of the sixth International Workshop on QoS, pp. 127–136 (1998)
He, W., Nahrstedt, K.: An Integrated Solution to Delay and Security Support in wireless network. In: Proc. IEEE WCNC, Las Vegas, vol. 4, pp. 2211–2215 (2006)
He, W., Nahrstedt, K.: Impact of Upper Layer Adaptation on End-to-End Delay Management in Wireless Ad Hoc Networks. In: Proc. IEEE Real-Time Embedded Technology and Application Symposium, RTAS 2006, April 2006, pp. 59–70 (2006)
Shen, Z., Thomas, J.P.: Security and QoS Self-Optimization in Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing 7(9), 1138–1151 (2008)
Agarwal, A.K., Wang, W.: DSPM: Dynamic Security Policy Management for Optimizing Performance in wireless networks. In: Proc. IEEE MILCOM 2006, pp. 1–7 (2006)
Agarwal, A.K., Wang, W., Gupta, R.A., Chow, M.: LAP: Link-Aware Protection for Improving Performance of Loss and Delay Sensitive Applications in Wireless Lans. In: Proc. IEEE MILCOM 2007, pp. 1–7 (2007)
Cole, R., Rosenbluth, J.: Voice over IP performance monitoring. ACM Comput. Commun. Rev. 31, 9–24 (2001)
ITU-T Recommendation G.107, The E-model, a Computational Model for Use in Transmission Planning (1998)
Dai, W.: Crypto++, http://www.eskimo.com/weidai/cryptlib.html
Hariri, S., Qu, G., Modukuri, R., Chen, H., Yousif, M.: Quality-of-Protection (QoP) – An Online Monitoring and Self-Protection Mechanism. IEEE Journal on Selected Areas in Communications 23(10) (2005)
Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press, Cambridge (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xiao, Y., Lin, C., Jiang, Y., Chu, X., Wang, S. (2009). Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds) Quality of Service in Heterogeneous Networks. QShine 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10625-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-10625-5_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10624-8
Online ISBN: 978-3-642-10625-5
eBook Packages: Computer ScienceComputer Science (R0)