Skip to main content

Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks

  • Conference paper
Quality of Service in Heterogeneous Networks (QShine 2009)

Abstract

The unique characteristics of wireless networks pose a number of nontrivial challenges to multimedia applications with security and rigorous QoS requirements. Lack of adequate security protection is incapable of meeting security requirements of applications, whereas enabling excessive security services inevitably leads to further degradation in QoS due to additional computation and payload encapsulation. Early work, e.g. LAP, achieves balance by adjusting security policy according to QoS metrics; but none of them are security guaranteed. In this paper, we present an efficient risk-aware QoP (Quality of Protection) and QoS optimization algorithm for multimedia applications in wireless networks. It can achieve an optimization for QoP/QoS performance metrics through offering hierarchical security services and QoS support. Experiment demonstrates that even in high risk environments our scheme can efficiently balance QoP and QoS requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barry, M.G., Campbell, A.T., Veres, A.: Distributed Control Algorithm for Service Differentiation in Wireless Packet Network. In: Proc. IEEE INFOCOM (2001)

    Google Scholar 

  2. Hanley, G., Murphy, S., Murphy, L.: Adapting WLAN MAC Parameters to Enhance VoIP Call Capacity. In: Proc. of the 8th ACM MSWiM 2005, October 2005, pp. 250–254 (2005)

    Google Scholar 

  3. Yu, J., Choi, S., Lee, J.: Enhancement of VoIP over IEEE 802.11 WLAN via Dual Queue Strategy. In: Proc. IEEE ICC (2004)

    Google Scholar 

  4. Ong, C.S., Nahrstedt, K., Yuan, W.: Quality of Protection for Mobile Multimedia Applications. In: Proc. IEEE ICME, vol. 2, pp. 137–140 (2003)

    Google Scholar 

  5. Liang, W., Wang, W.: An Analytical Study on the Impact of Authentication Local Area Networks. In: Proc. IEEE 13th Intel. Conf. and Networks (ICCCN 2004), pp. 361–366 (2004)

    Google Scholar 

  6. Liang, W., Wang, W.: A Quantitative Study of Authentication Networks. In: Proc. IEEE INFOCOM, vol. 2, pp. 1478–1489 (2005)

    Google Scholar 

  7. Liang, W., Wang, W.: On Performance Analysis of Challenge/Response Based Authentication in Wireless Networks. Computer Networks 48(2), 267–288 (2005)

    Article  MATH  Google Scholar 

  8. Wang, W., Liang, W., Agarwal, A.K.: Integration of Authentication and Mobility Management in Third Generation and WLAN Data Networks. Wireless Comm. and Mobile Computing (WCMC) 5(6), 665–678 (2005)

    Article  Google Scholar 

  9. Agarwal, A.K., Wang, W.: On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. Mobile Networks and Applications 12, 93–101 (2007)

    Article  Google Scholar 

  10. Schneck, P.A., Schwan, K.: Dynamic Authentication for High performance Networked Application. In: Proc. of the sixth International Workshop on QoS, pp. 127–136 (1998)

    Google Scholar 

  11. He, W., Nahrstedt, K.: An Integrated Solution to Delay and Security Support in wireless network. In: Proc. IEEE WCNC, Las Vegas, vol. 4, pp. 2211–2215 (2006)

    Google Scholar 

  12. He, W., Nahrstedt, K.: Impact of Upper Layer Adaptation on End-to-End Delay Management in Wireless Ad Hoc Networks. In: Proc. IEEE Real-Time Embedded Technology and Application Symposium, RTAS 2006, April 2006, pp. 59–70 (2006)

    Google Scholar 

  13. Shen, Z., Thomas, J.P.: Security and QoS Self-Optimization in Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing 7(9), 1138–1151 (2008)

    Article  Google Scholar 

  14. Agarwal, A.K., Wang, W.: DSPM: Dynamic Security Policy Management for Optimizing Performance in wireless networks. In: Proc. IEEE MILCOM 2006, pp. 1–7 (2006)

    Google Scholar 

  15. Agarwal, A.K., Wang, W., Gupta, R.A., Chow, M.: LAP: Link-Aware Protection for Improving Performance of Loss and Delay Sensitive Applications in Wireless Lans. In: Proc. IEEE MILCOM 2007, pp. 1–7 (2007)

    Google Scholar 

  16. Cole, R., Rosenbluth, J.: Voice over IP performance monitoring. ACM Comput. Commun. Rev. 31, 9–24 (2001)

    Article  Google Scholar 

  17. ITU-T Recommendation G.107, The E-model, a Computational Model for Use in Transmission Planning (1998)

    Google Scholar 

  18. Dai, W.: Crypto++, http://www.eskimo.com/weidai/cryptlib.html

  19. Hariri, S., Qu, G., Modukuri, R., Chen, H., Yousif, M.: Quality-of-Protection (QoP) – An Online Monitoring and Self-Protection Mechanism. IEEE Journal on Selected Areas in Communications 23(10) (2005)

    Google Scholar 

  20. Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press, Cambridge (2008)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Xiao, Y., Lin, C., Jiang, Y., Chu, X., Wang, S. (2009). Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. In: Bartolini, N., Nikoletseas, S., Sinha, P., Cardellini, V., Mahanti, A. (eds) Quality of Service in Heterogeneous Networks. QShine 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 22. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10625-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10625-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10624-8

  • Online ISBN: 978-3-642-10625-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics