Skip to main content
Log in

Video transmission enhancement in presence of misbehaving nodes in MANETs

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme (AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog in video transmission applications in the presence of misbehaving nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdalla H., Irfan A., Mike W.: Performance evaluation with different mobility models for dynamic probabilistic flooding in MANETs. Mobile Inf. Syst. 5(1), 65–80 (2009)

    Google Scholar 

  2. Balakrishnan K., Jing D., Varshney V.K.: TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel. Commun. Netw. Conf. 4, 2137–2142 (2005)

    Article  Google Scholar 

  3. Barbeau M., Kranakis E.: Principles of Ad-hoc Networking. Wiley, New York (2007)

    Book  Google Scholar 

  4. Chih-Heng K., Ce-Kuen S., Wen-Shyang H., Artur Z.: An evaluation framework for more realistic simulations of MPEG video transmission. J. Inf. Sci. Eng. 24, 425–440 (2008)

    Google Scholar 

  5. Chee-Onn, C., Hiroshi, I.: Enhancing real-time video streaming over mobile ad hoc networks using multipoint-to-point communication. Comput. Commun. 1754–1764 (2007)

  6. Francesco L., Alfio L., Giovanni S.: Multipath routing and rate-controlled video encoding in wireless video surveillance networks. Multimedia Syst. 14(3), 155–165 (2008)

    Article  Google Scholar 

  7. Hasswa, A., Zulkernine, M., Hassanein, H.: Routeguard: an intrusion detection and response system for mobile ad-hoc networks. In: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications (WiMob’2005), vol. 3, pp. 336–343 (2005)

  8. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A secure on-demand routing protocol for ad-hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking (MobiCom’02) Atlanta, GA, pp. 12–23 (2002)

  9. ITU: Subjective Video Quality Assessment Methods for Multimedia Applications, ITU-T Recommendations P. 910. (1996)

  10. Johnson D.B., Maltz D.A.: Dynamic source routing in ad-hoc wireless networks. In: Imielinski, T., Korth, H. (eds) Mobile Computing, pp. 153–181. Kluwer, Dordrecht (1996)

    Chapter  Google Scholar 

  11. Koenen R.: MPEG-4 mltimedia for our time. IEEE Spectr. 36(2), 26–33 (1999)

    Article  Google Scholar 

  12. Lie A., Klaue J., Evalvid R.A.: Trace driven simulation of rate, adaptive MPEG-VBR video. Multimedia Syst. 4(1), 33–50 (2008)

    Article  Google Scholar 

  13. Matrawy, A., Lambadaris, L., Changcheng, H.: MPEG4 traffic modeling using the transform expand sample methodology. In: IEEE 4th International Workshop on Networked Appliances, Gaithersburg, pp. 249–256 (2002)

  14. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom’00) pp. 255–265 (2000)

  15. Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad-hoc networks, IEEE International Conference on Communications, ICC ’07, pp. 1154–1159 (2007)

  16. Pandian R., Seethalakashmi P., Ramachandran V.: Enhanced routing protocol for video transmission over mobile adhoc network. J. Appl. Sci. Res. 2(6), 336–340 (2006)

    Google Scholar 

  17. Parker, J., Undercoffer, J., Pinkston, J., Joshi, A.: On intrusion detection and response for mobile ad-hoc networks. In: IEEE International Conference on Performance, Computing, and Communications, pp. 747–752 (2004)

  18. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad-hoc networks. In: Radio and Wireless Conference, RAWCON ’03, pp. 75–78 (2003)

  19. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad-hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS’02), San Antonio, TX, pp. 27–31 (2002)

  20. Perkins C.E.: Ad-hoc Networking. Addison-Wesley, Reading (2000)

    Google Scholar 

  21. Sarkar S.K., Basavaraju T.G., Puttamadappa C.: Ad Hoc Mobile Wireless Networks. Auerbach Publications, Boca Raton (2008)

    Google Scholar 

  22. Sun, B.: Intrusion detection in mobile ad-hoc networks. Dissertation, Texas A&M University (2004)

  23. Symes P.: Digital Video Compression. McGraw-Hill, New York (2001)

    Google Scholar 

  24. Tanapat, A.: On detection mechanisms and their performance for packet dropping attack in ad hoc network. Dissertation, University of Pittsburgh (2008)

  25. The Network Simulator (NS2), http://www.isi.edu/nsnam/ns/

  26. Wiegand T., Sullivan J., Bjontegaard G., Luthra A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560–576 (2003)

    Article  Google Scholar 

  27. Waluyo, A., Srinivasan, B., Taniar, D.: A taxonomy of broadcast indexing schemes for multi channel data dissemination in mobile database. In: Proceedings of the 18th International Conference on Advanced Information Networking and Applications, pp. 213–218 (2004)

  28. Xiao Y., Shen X., Du D.-Z. (eds) (2006) A survey on intrusion detection in mobile ad-hoc networks. In: Avantvalee T., Wu J., Wireless/Mobile Network Security. Springer, New York, pp. 170–196

  29. Yih-Chun, H., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13 (2002)

  30. Zhang Y., Lee W., Huang Y.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. J. (ACM WINET) 9(5), 545–556 (2003)

    Article  Google Scholar 

  31. Zhou L., Haas Z.: Securing ad-hoc networks. IEEE Netw. Mag. 13(6), 24–30 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elhadi Shakshuki.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sheltami, T., Al-Roubaiey, A., Shakshuki, E. et al. Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Systems 15, 273–282 (2009). https://doi.org/10.1007/s00530-009-0166-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-009-0166-0

Keywords

Navigation