53,620 research outputs found

    An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks

    Full text link
    Colloque avec actes et comité de lecture. internationale.International audienceAn ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. This exibility in space and time induces new challenges towards the security infrastructure needed to support secure unicast and multicast communications. Especially, traditional group key management architectures meant for wired networks are not appropriate in such environment due to high dynamics and mobility of nodes. In this paper, we propose an enhanced hybrid key management protocol for secure multicast dedicated to operate in ad hoc networks. Built on a protocol called BAAL dedicated to key distribution in wired networks, our approach integrates threshold cryptography and the services of the AKMP protocol to deliver fast, efficient and mobility aware key distribution in a multicast service

    A novel approach to quality-of-service provisioning in trusted relay Quantum Key Distribution networks

    Get PDF
    In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we propose a novel quality of service (QoS) model including new metrics for determining the states of public and quantum channels as well as a comprehensive metric of the QKD link. We also propose a novel routing protocol to achieve high-level scalability and minimize consumption of cryptographic keys. Given the limited mobility of nodes in QKD networks, our routing protocol uses the geographical distance and calculated link states to determine the optimal route. It also benefits from a caching mechanism and detection of returning loops to provide effective forwarding while minimizing key consumption and achieving the desired utilization of network links. Simulation results are presented to demonstrate the validity and accuracy of the proposed solutions.Web of Science28118116

    Evaluation of the MDC and FEC over the quality of service and quality of experience for video distribution in ad hoc networks

    Full text link
    Mobile ad hoc networks (MANETs) offer an excellent scenario for deploying communication applications because of the connectivity and versatility of this kind of networks. In contrast, the topology is usually extremely dynamic causing high rate of packet loss, so that ensuring a specific Quality of Service (QoS) for real-time video services becomes a hard challenge. In this paper, we evaluate the effect of using Multiple Description Coding (MDC) and Forward Error Correction (FEC) techniques for improving video quality in a multimedia content distribution system. A hybrid architecture using fixed and wireless ad hoc networks is proposed, which enables the use of multipoint-to-point transmission. MDC and FEC mechanisms can be combined with multipath transmission to increase the network efficiency and recover lost packets, improving the overall Quality of Experience (QoE) of the receiver. Simulations have been analyzed paying attention to objective parameters (Peak Signal to Noise Ratio, Packet Delivery Ratio, Decodable Frame Rate and interruptions) and subjective parameters. Results show that MDC increases the probability of packet delivery and FEC is able to recover lost frames and reduce video interruptions in moderate mobility scenarios, resulting in the improvement of video quality and the final user experience.This work was supported by project MIQUEL (TEC2007- 68119-C02-01/TCM) of the Spanish Ministry of Education and Science. The authors would like to thank the Editor and the reviewers for helpful suggestions to improve the quality of this paper.Acelas Delgado, P.; Arce Vila, P.; Guerri Cebollada, JC.; Castellanos Hernández, WE. (2014). Evaluation of the MDC and FEC over the quality of service and quality of experience for video distribution in ad hoc networks. Multimedia Tools and Applications. 68(3):969-989. https://doi.org/10.1007/s11042-012-1111-3969989683Apostolopoulos JG, Wong T, Tan W, Wee SJ (2002) On multiple description streaming with content delivery networks. IEEE INFOCOMBoukerche A (2009) Algorithms and protocols for wireless and mobile ad hoc networks. John Wiley & Sons IncChow CO, Ishii H (2007) Enhancing real-time video streaming over mobile ad hoc networks using multipoint-to-point communication. Comput Commun 30:1754–1764Clausen T, Jacquet P (2003) Optimized link state routing protocol (OLSR), RFC 3626Corrie B et al (2003) Towards quality of experience in advanced collaborative environments. Third Annual Workshop on Advanced Collaborative EnvironmentsGabrielyan E, Hersch R (2006) Reliable multi-path routing schemes for real-time streaming. International Conference on Digital Telecommunications, pp 65–65Gandikota VR, Tamma BR, Murthy CSR (2008) Adaptive-FEC based packet loss resilience scheme for supporting voice communication over adhoc wireless networks. IEEE Trans Mobile Comput 7:1184–1199Gharavi H (2008) Multi-channel for multihop communication links. International Conference on Telecommunications, pp 1–6Grega M, Janowski L, Leszczuk M, Romaniak P, Papir Z (2008) Quality of experience evaluation for multimedia services. Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 4:142–153Hsieh MY, Huang YM, Chian TC (2007) Transmission of layered video streaming via multi-path on ad hoc networks. Multimed Tool Appl 34:155–177ITU—International Telecommunication Union (2007) Definition of quality of experience (QoE)”, Reference: TD 109rev2 (PLEN/12)ITU-R Recommendation BT.500-12 (2009) Methodology for the subjective assessment of the quality of television pictures. International Telecommunication Union, GenevaITU-T Recommendation P.910 (2000) Subjective video quality assessment methods for multimedia applications. International Telecommunication Union, GenevaKao KL, Ke ChH, Shieh CH (2006) An advanced simulation tool-set for video transmission performance evaluation. IEEE Region 10 Conference, pp 1–40Ke CH et al (2006) A novel realistic simulation tool for video transmission over wireless network. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trsutworthy ComputingKeisuke U, Cheeonn C, Hiroshi I (2008) A study on video performance of multipoint-to-point video streaming with multiple description coding over ad hoc networks. EEJ Trans Electron, Inf Syst 128:1431–1437Kilkki K (2008) Quality of experience in communications ecosystem. J Univers Comput Sci 14:615–624Li A (2007) RTP payload format for generic forward error correction. RFC 5109, Dec. 2007Li J, Blake C, Couto DD, Lee H, Morris R (2001) Capacity of ad hoc wireless networks. 7th Annual International Conference on Mobile Computing and Networking, pp 16–21Liao Y, Gibson JD (2011) Routing-aware multiple description video coding over mobile ad-hoc networks. IEEE Trans Multimed 13:132–142Lindeberg M, Kristiansen S, Plagemann T, Goebel V (2011) Challenges and techniques for video streaming over mobile ad hoc networks. Multimed Syst 17:51–82Mao S et al (2003) Video transport over ad hoc networks: multistream coding with multipath transport. IEEE J Sel Area Comm 21:1721–1737Ni P (2009) Towards Optimal Quality of Experience Via Scalable Video Coding. Mälardalen University Press Licentiate Theses, SwedenPinson MH, Wolf S (2004) A new standardized method for objectively measuring video quality. IEEE Trans Broadcast 50:312–322Rong B, Qian Y, Lu K, Hu RQ, Kadoch M (2010) Multipath routing over wireless mesh networks for multiple description video transmission. IEEE J Sel Area Comm 28:321–331Schierl T, Ganger K, Hellge C, Wiegand T, Stockhammer T (2006) SVC-based multisource streaming for robust video trans- mission in mobile ad hoc networks. IEEE Wireless Comm 13:96–103Schierl T, Stockhammer T, Wiegand T (2007) Mobile video transmission using scalable video coding. IEEE Trans Circ Syst Video Tech 17:1204–1217Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans Circ Syst Video Tech 17:1103–1120VQEG (2008) Video quality experts group. Available online: http://www.vqeg.orgWang Z et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612Wei W, Zakhor A (2004) Robust multipath source routing protocol (RMPSR) for video communication over wireless ad hoc net- works. Proceedings of IEEE International Conference on Multimedia and Expo 2:1379–1382Winkler S, Mohandas P (2008) The evolution of video quality measurement: from PSNR to hybrid metrics. IEEE Trans Broadcast 54:660–668Xunqi Y, Modestino JW, Bajic IV (2005) Performance analysis of the efficacy of packet-level FEC in improving video transport over networks. IEEE International Conference on Image Processing 2:177–180Zink M, Schmitt J, Steinmetz R (2005) Layer-encoded video in scalable adaptive streaming. IEEE Trans Multimed 7:75–8

    A Load-Balancing and Push-out Scheme for Supporting QoS in MANETs

    Get PDF
    Currently, mobile ad hoc networks (MANETs) lack load-balancing capabilities, and thus, they fail to provide good performance especially in the case of a large volume of traffic. Ad hoc networks lack also service differentiation. However, in these wireless environments, where channel conditions are variable and bandwidth is scarce, the differentiated services developed for the Internet are suboptimal without lower layers' support. The IEEE 802.11 standard for Wireless LANs is the most widely used WLAN standard today. It has a mode of operation that can be used to provide service differentiation, but it has been shown to perform badly. In this paper, we present a simple but very effective method for support Quality of Service, by the use of load-balancing and push-out scheme. This approach offers to the mobile node: the ability to alleviate congestion by traffic distribution of excessive load, and to support priority of packets in the single MAC buffer. We evaluate the performance of our algorithm and compare it with the original IEEE 802.11b protocol. Simulation results show that this new approach reduces packet loss rate and increases throughput as well as provides service differentiation in the MAC layer

    A Novel approach to quality-of-service provisioning in trusted relay quantum key distribution networks

    Get PDF
    In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we propose a novel quality of service (QoS) model including new metrics for determining the states of public and quantum channels as well as a comprehensive metric of the QKD link. We also propose a novel routing protocol to achieve high-level scalability and minimize consumption of cryptographic keys. Given the limited mobility of nodes in QKD networks, our routing protocol uses the geographical distance and calculated link states to determine the optimal route. It also benefits from a caching mechanism and detection of returning loops to provide effective forwarding while minimizing key consumption and achieving the desired utilization of network links. Simulation results are presented to demonstrate the validity and accuracy of the proposed solutions

    Load balancing the GRID ad-hoc routing protocol

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.Includes bibliographical references (leaves 47-48).Grid is a mobile ad hoc routing system with significantly better scaling properties than previously designed protocols in networks with a uniform distribution of nodes. It achieves scalability by building a distributed location database in which memory requirements are apportioned fairly to all nodes in the network. In networks of spatially non-uniform node distribution, however, a small fraction of the nodes need to store a disproportionate amount of location information, posing a significant problem for nodes with limited memory such as small handheld devices. We propose a new location service to improve the scalability of Grid while preserving its fundamental design. Our new service, GLS2, ensures protocol correctness despite limited memory constraints. To preserve high success rate and improve query path efficiency, GLS2 applies a new location query algorithm which allows nodes to drop location information if necessary. Simulated tests demonstrate that GLS2's efficiency and correctness are preserved in situations of limited memory as well as those of extremely uneven node distributions while still achieving proper load-balancing.by Rebecca S. Bloom.M.Eng

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio
    corecore