Open Access Open Access  Restricted Access Subscription or Fee Access

Joint Physical-Application Layer Security for Connectionless Multimedia Delivery

C. Navamani, R. Savanthini, A. Mohan, M. Vanitha

Abstract


In current years, there is necessary to increasing demands for the security of wireless multimedia applications.  Due to the broadcast nature of radio propagation, the wireless transmission can be readily overheard by unauthorized users for interception purposes and is thus highly vulnerable to eavesdropping attacks. Comparing wireless network to traditional wired networks, are suffer from malicious attacks. Usually, physical layer information is dynamic in wireless networks, and application layer information is related to wireless multimedia delivery.  In this work, we propose a joint frame work involving both the physical and application layer security technologies.  The scalable multimedia security service can be achieved without changing the current communication framework.  Specifically, by exploiting the security capacity and signal processing technologies at the physical layer and the authentication and watermarking strategies at the application layer, the available network resources can be utilized efficiently. In addition, we proposed a case study of the physical-layer security in cooperative wireless networks with multiple relays.  In particular, this joint scheme can be implemented easily with low communication overhead, which facilitates its deployment in large-scale wireless multimedia systems.

M. Vanitha

Full Text:

PDF

References


. L. Zhou, H.-C. Chao, and A. Vasilakos, “Joint Forensics- Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks,” IEEE JSAC, vol. 29, no. 7, 2011, pp. 1358–67.

. A. Boho et al., “End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation,” IEEE Signal Proc. Mag., vol. 30, no. 2, 2013, pp. 97–107.

. L. Zhou et al., “Distributed Scheduling Scheme for Video Streaming over Multi-Channel Multi-Radio Multi- Hop Wireless Networks,” IEEE JSAC, vol. 28, no. 3, 2010, pp. 409–19.

. Q. Sun et al., “Quality-Optimized and Secure End-to- End Authentication for Media Delivery,” Proc. IEEE, vol. 96, no. 1, 2008, pp. 97–111.

. Y.-S. Shiu et al., “Physical Layer Security in Wireless Networks: A Tutorial,” IEEE Wireless Commun. vol. 18, no. 2, 2011, pp. 66–74.

. Z. Shu, Y. Qian, and S. Ci, “On Physical Layer Security for Cognitive Radio Networks,” IEEE Network, vol. 27, no. 3, 2013.

. B. Rong et al., “A Pyramidal Security Model for Large- Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study,” IEEE Trans. Vehic. Tech., vol. 58, no. 1, 2009, pp. 39 University of Posts and Telecommunication.

. Z. Li et al., “Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia over Wireless Networks,” IEEE Trans. Multimedia, vol. 9, no. 4, 2007, pp. 837–50.

. C.-F. Lai, Y.-M. Huang, and H.-C. Chao, “DLNA-Based Multimedia Sharing System over OSGI Framework with Extension to P2P Network,” IEEE Systems J., vol. 4, no. 2, June 2010, pp. 262–70.

. D. Wu et al., “A Cooperative Communication Scheme Based on Dynamic Coalition Formation Game in Clustered Wireless Sensor Networks,” IEEE Trans. Wireless Communication, vol. 11, no. 3, 2012, pp. 1190–1200.

. Y. Zou, X. Wang, and W. Shen, “Physical-layer security with multiuser scheduling in cognitive radio networks,” IEEE Trans. Communication., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.

. M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.

. Y. Zou, X. Wang, and W. Shen, “Optimal relay selection for physical-layer security in cooperative wireless networks,” IEEE J. Sel. Areas Communication., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.

. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.

. H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, “Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks,” IEEE Trans. Inf. Forensics Sec., vol. 8, no. 12, pp.2007-2020, Dec. 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.