ABSTRACT
This paper presents the design of a novel high-secure wireless video surveillance system. The system is based on the 802.11g ad-hoc wireless infrastructure; and the Intel IXP425 network processors are used as the basic processing unit. A media-dependant video encryption scheme, including reliable data embedding technique and real-time video encryption algorithm, has been implemented for the system to work in an open and insecure wireless environment. Our system offers several unique advantages: (1) it provides high security guarantee; (2) it does not require expensive access points/routers; (3) it can be readily deployed since it is built on top of existing wireless ad-hoc infrastructure; (4) it is robust in the presence of adaptive mechanism and error-prone channel.
- IEEE, 802.11g IEEE Std 2003, http://grouper.ieee.org/groups/802/11/.Google Scholar
- J. Zyren, T. Edmondson, and E. Enders, 802.11g Starts Answering WLAN Range Questions.Google Scholar
- J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, "A Performance Comparison of Multi-hop Wireless Ad-hoc Network Routing Protocols", Mobile Computing and Networking, pp. 85--97, 1998. Google ScholarDigital Library
- C. E. Perkins and E. M. Royer, "Ad-hoc On-demand Distance Vector Routing", in Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, pp. 90, 1999. Google ScholarDigital Library
- S. Desilva and S. R. Das, "Experimental Evaluation of a Wireless Ad Hoc Network", in Proceedings of IEEE ICCCN, 2000.Google ScholarCross Ref
- D. B. Johnson, D. A. Maltz and J. Broch, "DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks", Ad Hoc Networking, 2001, pp. 139--172. Google ScholarDigital Library
- X. Liu and A. Eskicioglu, "Selective Encryption of Multimedia Content in Distributed Networks: Challenges and New Directions", IASTED Communications, Internet & Information Technology (CIIT), 2003.Google Scholar
- C. Gahlin, Secure Ad Hoc Networking, 2004.Google Scholar
- W. Stallings, Network Security Essentials: Applications and Standards, Prenctice Hall, 1999. Google ScholarDigital Library
- H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang, "Self-securing ad hoc wireless networks", ISCC 2002, pp. 567. Google ScholarDigital Library
- L. Lamport, R. Shostak and M. Pease, The Byzantine Generals Problem, IEEE Computer Society Press, 1995.Google Scholar
- A. Shamir, "How to Share a Secret", Commun. ACM, 1979, vol 22, pp. 612--613. Google ScholarDigital Library
- A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage", Lecture Notes in Computer Science, 1995, vol 963, pp. 339. Google ScholarDigital Library
- H. Yin, C. Lin, F. Qiu, G. Min and X. Chu, "A Novel Key-Embedded Scheme for Secure Video Multicast Systems, International Journal of Computers & Electrical Engineering", Under submission.Google Scholar
- H. Yin, C. Lin, F. Qiu, B. Li and Z. Tan, "A Media-Dependent Secure Multicast Protocol for Adaptive Video Applications", in Proceedings of SIGCOMM Asia Workshop, 2005.Google Scholar
- S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of International Conference on Mobile Computing and Networking, pp. 255--265, 2000. Google ScholarDigital Library
- K. Inkinen, "New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes", Telecommunications Software and Multimedia, 2004.Google Scholar
- F. Kargl, A. Klenk, S. Schlott and M. Weber, "Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks", in Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks 2004. Google ScholarDigital Library
- Aleksandr Huhtonen. "Comparing AODV and OLSR routing protocols", Telecommunications Software and Multimedia, 2004.Google Scholar
- Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. "Scenario-based performance analysis of routing protocols for mobile ad-hoc networks", in Proceedings of ACM Mobicom'99, pp. 195--206, 1999. Google ScholarDigital Library
- Samir Ranjan Das, Charles E. Perkins, and Elizabeth E. Royer. "Performance comparison of two on-demand routing protocols for ad hoc networks", in Proceedings of IEEE INFOCOM, pp. 3--12, 2000.Google ScholarCross Ref
- Manel Guerrero Zapata. Secure Ad Hoc On-demand Distance Vector (SAODV) Routing, March 2005. INTERNET-DRAFT draft-guerrero-manet-saodv-03.txt.Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about naming systems. ACM Trans. Program. Lang. Syst., 15, 5 (Nov. 1993), 795--825. Google ScholarDigital Library
Index Terms
- A novel secure wireless video surveillance system based on Intel IXP425 network processor
Recommendations
A Comparative Study of Directional Node-Disjoint Multipath Routing in Wireless Ad Hoc Network
ICCSA '08: Proceedings of the international conference on Computational Science and Its Applications, Part IIThis paper compares the performance of on-demand Directional Node-Disjoint Multipath Routing (DNDMR) protocol with those of contemporary wireless ad hoc network routing protocols. DNDMR protocol especially performs well for grid-style network topology. ...
Enhancing DSR protocol performance in mobile ad hoc network using ACK reply
This paper presents a new method to improve performance of DSR in Ad Hoc Network. We present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using ACK reply path as a backup route when an original ...
The broadcast storm problem in a mobile ad hoc network
Selected Papers from Mobicom'99Broadcasting is a common operation in a network to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently (such as finding a route to a particular host, ...
Comments