skip to main content
10.1145/1089737.1089748acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

A novel secure wireless video surveillance system based on Intel IXP425 network processor

Published:13 October 2005Publication History

ABSTRACT

This paper presents the design of a novel high-secure wireless video surveillance system. The system is based on the 802.11g ad-hoc wireless infrastructure; and the Intel IXP425 network processors are used as the basic processing unit. A media-dependant video encryption scheme, including reliable data embedding technique and real-time video encryption algorithm, has been implemented for the system to work in an open and insecure wireless environment. Our system offers several unique advantages: (1) it provides high security guarantee; (2) it does not require expensive access points/routers; (3) it can be readily deployed since it is built on top of existing wireless ad-hoc infrastructure; (4) it is robust in the presence of adaptive mechanism and error-prone channel.

References

  1. IEEE, 802.11g IEEE Std 2003, http://grouper.ieee.org/groups/802/11/.Google ScholarGoogle Scholar
  2. J. Zyren, T. Edmondson, and E. Enders, 802.11g Starts Answering WLAN Range Questions.Google ScholarGoogle Scholar
  3. J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, "A Performance Comparison of Multi-hop Wireless Ad-hoc Network Routing Protocols", Mobile Computing and Networking, pp. 85--97, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. E. Perkins and E. M. Royer, "Ad-hoc On-demand Distance Vector Routing", in Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, pp. 90, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Desilva and S. R. Das, "Experimental Evaluation of a Wireless Ad Hoc Network", in Proceedings of IEEE ICCCN, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  6. D. B. Johnson, D. A. Maltz and J. Broch, "DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks", Ad Hoc Networking, 2001, pp. 139--172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. X. Liu and A. Eskicioglu, "Selective Encryption of Multimedia Content in Distributed Networks: Challenges and New Directions", IASTED Communications, Internet & Information Technology (CIIT), 2003.Google ScholarGoogle Scholar
  8. C. Gahlin, Secure Ad Hoc Networking, 2004.Google ScholarGoogle Scholar
  9. W. Stallings, Network Security Essentials: Applications and Standards, Prenctice Hall, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang, "Self-securing ad hoc wireless networks", ISCC 2002, pp. 567. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Lamport, R. Shostak and M. Pease, The Byzantine Generals Problem, IEEE Computer Society Press, 1995.Google ScholarGoogle Scholar
  12. A. Shamir, "How to Share a Secret", Commun. ACM, 1979, vol 22, pp. 612--613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage", Lecture Notes in Computer Science, 1995, vol 963, pp. 339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Yin, C. Lin, F. Qiu, G. Min and X. Chu, "A Novel Key-Embedded Scheme for Secure Video Multicast Systems, International Journal of Computers & Electrical Engineering", Under submission.Google ScholarGoogle Scholar
  15. H. Yin, C. Lin, F. Qiu, B. Li and Z. Tan, "A Media-Dependent Secure Multicast Protocol for Adaptive Video Applications", in Proceedings of SIGCOMM Asia Workshop, 2005.Google ScholarGoogle Scholar
  16. S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of International Conference on Mobile Computing and Networking, pp. 255--265, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Inkinen, "New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes", Telecommunications Software and Multimedia, 2004.Google ScholarGoogle Scholar
  18. F. Kargl, A. Klenk, S. Schlott and M. Weber, "Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks", in Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Aleksandr Huhtonen. "Comparing AODV and OLSR routing protocols", Telecommunications Software and Multimedia, 2004.Google ScholarGoogle Scholar
  20. Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. "Scenario-based performance analysis of routing protocols for mobile ad-hoc networks", in Proceedings of ACM Mobicom'99, pp. 195--206, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Samir Ranjan Das, Charles E. Perkins, and Elizabeth E. Royer. "Performance comparison of two on-demand routing protocols for ad hoc networks", in Proceedings of IEEE INFOCOM, pp. 3--12, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  22. Manel Guerrero Zapata. Secure Ad Hoc On-demand Distance Vector (SAODV) Routing, March 2005. INTERNET-DRAFT draft-guerrero-manet-saodv-03.txt.Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about naming systems. ACM Trans. Program. Lang. Syst., 15, 5 (Nov. 1993), 795--825. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A novel secure wireless video surveillance system based on Intel IXP425 network processor

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WMuNeP '05: Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
          October 2005
          158 pages
          ISBN:159593183X
          DOI:10.1145/1089737

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 October 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          WMuNeP '05 Paper Acceptance Rate18of41submissions,44%Overall Acceptance Rate36of90submissions,40%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader