Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks

Author(s):  
Lei Chen ◽  
Chung-Wei Lee

Supporting reliable and secure multimedia streaming service is a challenging task in the environment of wireless Mobile Ad hoc Networks (MANETs) where radio signals are prone to security attacks and the quality of media streaming is degraded by signal strength loss and interference. The mobility of mobile devices makes streaming even more difficult as communication links are often broken when the devices move out of the transmission range of their neighbors. This paper proposes a stable multipath routing algorithm and an intelligent secure data distribution scheme for multimedia streaming in MANETs. The multipath Neighbor Stability Routing is able to find more stable and long-lasting paths than traditional ad hoc routing algorithms. The secure data distribution takes historical data-path distribution into consideration and maximally disperses new multimedia data to reduce the possibility of information leakage to unauthorized parties. The authors’ simulation and analysis indicate that the combination of these two mechanisms can provide high quality paths to achieve secure multimedia streaming.

2012 ◽  
pp. 544-564
Author(s):  
Lei Chen ◽  
Chung-Wei Lee

Supporting reliable and secure multimedia streaming service is a challenging task in the environment of wireless Mobile Ad hoc Networks (MANETs) where radio signals are prone to security attacks and the quality of media streaming is degraded by signal strength loss and interference. The mobility of mobile devices makes streaming even more difficult as communication links are often broken when the devices move out of the transmission range of their neighbors. This paper proposes a stable multipath routing algorithm and an intelligent secure data distribution scheme for multimedia streaming in MANETs. The multipath Neighbor Stability Routing is able to find more stable and long-lasting paths than traditional ad hoc routing algorithms. The secure data distribution takes historical data-path distribution into consideration and maximally disperses new multimedia data to reduce the possibility of information leakage to unauthorized parties. The authors’ simulation and analysis indicate that the combination of these two mechanisms can provide high quality paths to achieve secure multimedia streaming.


2010 ◽  
Vol 1 (2) ◽  
pp. 54-74
Author(s):  
Lei Chen ◽  
Chung-wei Lee

Supporting reliable and secure multimedia streaming service is a challenging task in the environment of wireless Mobile Ad hoc Networks (MANETs) where radio signals are prone to security attacks and the quality of media streaming is degraded by signal strength loss and interference. The mobility of mobile devices makes streaming even more difficult as communication links are often broken when the devices move out of the transmission range of their neighbors. This paper proposes a stable multipath routing algorithm and an intelligent secure data distribution scheme for multimedia streaming in MANETs. The multipath Neighbor Stability Routing is able to find more stable and long-lasting paths than traditional ad hoc routing algorithms. The secure data distribution takes historical data-path distribution into consideration and maximally disperses new multimedia data to reduce the possibility of information leakage to unauthorized parties. The authors’ simulation and analysis indicate that the combination of these two mechanisms can provide high quality paths to achieve secure multimedia streaming.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3571 ◽  
Author(s):  
Antonio Guillen-Perez ◽  
Maria-Dolores Cano

The advent of flying ad hoc networks (FANETs) has opened an opportunity to create new added-value services. Even though it is clear that these networks share common features with its predecessors, e.g., with mobile ad hoc networks and with vehicular ad hoc networks, there are several unique characteristics that make FANETs different. These distinctive features impose a series of guidelines to be considered for its successful deployment. Particularly, the use of FANETs for telecommunication services presents demanding challenges in terms of quality of service, energy efficiency, scalability, and adaptability. The proper use of models in research activities will undoubtedly assist to solve those challenges. Therefore, in this paper, we review mobility, positioning, and propagation models proposed for FANETs in the related scientific literature. A common limitation that affects these three topics is the lack of studies evaluating the influence that the unmanned aerial vehicles (UAV) may have in the on-board/embedded communication devices, usually just assuming isotropic or omnidirectional radiation patterns. For this reason, we also investigate in this work the radiation pattern of an 802.11 n/ac (WiFi) device embedded in a UAV working on both the 2.4 and 5 GHz bands. Our findings show that the impact of the UAV is not negligible, representing up to a 10 dB drop for some angles of the communication links.


Author(s):  
Chi-Kin Chau ◽  
Jon Crowcroft ◽  
Kang-Won Lee ◽  
Starsky H.Y. Wong

Because of the increasing number of diverse routing protocols proposed to deal with the network dynamics in mobile ad hoc networks (MANETs), the heterogeneity of MANETs has increased dramatically. While many of these extant proposals only concern enhancing routing in a single domain, little attention has been given to the interoperations among heterogeneous MANETs. Moreover, the existing inter-domain routing protocols (i.e., BGP) that have been designed for the Internet cannot cope with the new challenges derived from the MANETs, such as (1) the rapid dynamic changes of network topology due to mobility, and (2) the larger diversity in intra-domain ad hoc routing protocols. In this chapter, the authors address some of the major challenges and identify new directions to the development of seamless inter-domain routing for enabling end-to-end communications over heterogeneous MANET domains.


Author(s):  
Pramita Mitra ◽  
Christian Poellabauer

The presence of asymmetric links is a common and non-negligible phenomenon in many ad-hoc networks, including MANETs and sensor networks. Asymmetry is caused by node mobility, heterogeneous radio technologies, and irregularities in radio ranges and packet loss patterns. Most existing ad-hoc routing protocols either assume fully symmetric networks or simply ignore any asymmetric links. In the first case, route discovery can fail when the symmetry assumption does not hold true, e.g., many reactive routing protocols rely on a two-phase communication process, where the same path is used to communicate between a sender and a receiver. If a single link on this path is asymmetric, the route establishment may fail. In the second case, asymmetric links are identified and explicitly ignored in the route establishment phase. This can lead to route discovery failure if there is no symmetric path between a sender and a receiver or it can lead to less than optimal routes. This document provides an overview of routing protocols that explicitly consider asymmetric links in the route discovery phase and introduces robust mechanisms that bypass asymmetric links to ensure successful route establishment.


2009 ◽  
pp. 2996-3011
Author(s):  
S. Shanmugavel ◽  
C. Gomathy

As mobile computing gains popularity, the need for ad hoc routing also continues to grow. In mobile ad hoc networks, the mobility of nodes and error prone nature of the wireless medium pose many challenges, including frequent route changes and packet losses. Such problems increase the packet delays and decrease the throughput. To meet with the dynamic queuing behaviour of Ad hoc networks, to provide QoS and hence to improve the performance, a scheduler can be used. This chapter presents a novel fuzzy based priority scheduler for mobile ad-hoc networks, to determine the priority of the packets. The performance of this scheduler is studied using GloMoSim and evaluated in terms of quantitative metrics such as packet delivery ratio, average end-to-end delay and throughput.


Sign in / Sign up

Export Citation Format

Share Document