3,117 research outputs found

    QUALITY-DRIVEN CROSS LAYER DESIGN FOR MULTIMEDIA SECURITY OVER RESOURCE CONSTRAINED WIRELESS SENSOR NETWORKS

    Get PDF
    The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the generic problem of quality-driven multimedia resource allocation in WMSNs and proposes a cross layer solution. The fundamental methodologies of multimedia selective encryption and stream authentication, and their application to digital image or video compression standards are presented. New multimedia selective encryption and stream authentication schemes are proposed at application layer, which significantly reduces encryption/authentication complexity. In addition, network resource allocation methodologies at low layers are extensively studied. An unequal error protection-based network resource allocation scheme is proposed to achieve the best effort media quality with integrity and energy efficiency guarantee. Performance evaluation results show that this cross layer framework achieves considerable energy-quality-security gain by jointly designing multimedia selective encryption/multimedia stream authentication and communication resource allocation

    A Survey of Techniques For Improving Energy Efficiency in Embedded Computing Systems

    Full text link
    Recent technological advances have greatly improved the performance and features of embedded systems. With the number of just mobile devices now reaching nearly equal to the population of earth, embedded systems have truly become ubiquitous. These trends, however, have also made the task of managing their power consumption extremely challenging. In recent years, several techniques have been proposed to address this issue. In this paper, we survey the techniques for managing power consumption of embedded systems. We discuss the need of power management and provide a classification of the techniques on several important parameters to highlight their similarities and differences. This paper is intended to help the researchers and application-developers in gaining insights into the working of power management techniques and designing even more efficient high-performance embedded systems of tomorrow

    ANALYSIS THE IMPACT OF SYMMETRIC CRYPTOGRAPHIC ALGORITHMS ON POWER CONSUMPTION FOR VARIOUS DATA TYPES

    Get PDF
    With the emergence of communication techniques as the human beings become advanced day by day these communication techniques also get some advancement or development day by day. After the emergence of internet the communication of data from one place to another is increasing day by day, because as we all know that internet is very fast mode of data transfer as com pared to send your data through post with the help of post - office. As the data over the internet is increasing, it is very necessary that we must ensure to provide the best solution to offer the necessary protection against the data thefts & attacks. For that purpose we use many algorithms, and among these algorithms one of the best algorithms is Encryption algorithm, because it plays an important role in information security systems. But the main problems with such types of algorithms are that they consume a significant amount of computing resources such as CPU time, memory, an d battery power. Power Consumption is not a big deal or big issue in case of wired environment but the computing resources in the wireless environment is limited and limited battery power available. As the technology advances it leads to a lot of changes i n the processors and memory in the computers, by which they requires a lot of power, or in other words we can say that they needs power to boost up, but battery technology or battery backup technology is increa sing at much slower rate, and this cause to fo rming a "battery gap". As it is like the heart of the electronic devices and as most of the equipment of electronics including computing devices and communication devices also requires a good battery backup. Today, a s we all seen that Lap - tops, Palm - tops etc.are generally used instead of Desktop or PC and it is well known that all these are the wireless devices and for these devices the data communication also be wireless and on the contrary, the networking connection will als o be wireless. From above as w e seen, the increasing demand for services on wireless devices has pushed towards us into an important research which finding ways to overcome these limitation. The paper which I present of the behalf of thesis evaluate or analy ze the six most common encry ption algorithms namely AES (Rigndael), DES, 3DES, RC2, Blowfish and RC5. Now I ll try my best to find out the method to analyze the trade - offs between energy and security. There are different approaches used to reduce the energy consumption of security pr otocols. A comparative study also I planned to be conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption, differen t key size and finally enc ryption/decryption speed

    A Compression Technique Exploiting References for Data Synchronization Services

    Get PDF
    Department of Computer Science and EngineeringIn a variety of network applications, there exists significant amount of shared data between two end hosts. Examples include data synchronization services that replicate data from one node to another. Given that shared data may have high correlation with new data to transmit, we question how such shared data can be best utilized to improve the efficiency of data transmission. To answer this, we develop an encoding technique, SyncCoding, that effectively replaces bit sequences of the data to be transmitted with the pointers to their matching bit sequences in the shared data so called references. By doing so, SyncCoding can reduce data traffic, speed up data transmission, and save energy consumption for transmission. Our evaluations of SyncCoding implemented in Linux show that it outperforms existing popular encoding techniques, Brotli, LZMA, Deflate, and Deduplication. The gains of SyncCoding over those techniques in the perspective of data size after compression in a cloud storage scenario are about 12.4%, 20.1%, 29.9%, and 61.2%, and are about 78.3%, 79.6%, 86.1%, and 92.9% in a web browsing scenario, respectively.ope

    Quality of experience-centric management of adaptive video streaming services : status and challenges

    Get PDF
    Video streaming applications currently dominate Internet traffic. Particularly, HTTP Adaptive Streaming ( HAS) has emerged as the dominant standard for streaming videos over the best-effort Internet, thanks to its capability of matching the video quality to the available network resources. In HAS, the video client is equipped with a heuristic that dynamically decides the most suitable quality to stream the content, based on information such as the perceived network bandwidth or the video player buffer status. The goal of this heuristic is to optimize the quality as perceived by the user, the so-called Quality of Experience (QoE). Despite the many advantages brought by the adaptive streaming principle, optimizing users' QoE is far from trivial. Current heuristics are still suboptimal when sudden bandwidth drops occur, especially in wireless environments, thus leading to freezes in the video playout, the main factor influencing users' QoE. This issue is aggravated in case of live events, where the player buffer has to be kept as small as possible in order to reduce the playout delay between the user and the live signal. In light of the above, in recent years, several works have been proposed with the aim of extending the classical purely client-based structure of adaptive video streaming, in order to fully optimize users' QoE. In this article, a survey is presented of research works on this topic together with a classification based on where the optimization takes place. This classification goes beyond client-based heuristics to investigate the usage of server-and network-assisted architectures and of new application and transport layer protocols. In addition, we outline the major challenges currently arising in the field of multimedia delivery, which are going to be of extreme relevance in future years
    corecore