skip to main content
10.1145/1815396.1815661acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

Security-aware multimedia scheduling over heterogeneous wireless networks

Published:28 June 2010Publication History

ABSTRACT

Security is increasingly becoming an important issue in the design of multimedia applications. However, existing scheduling schemes for real-time multimedia services over heterogeneous networks generally do not take into account security requirements when making control decisions. In this paper, we develop and evaluate a security-aware multimedia scheduling scheme in heterogeneous environment. Firstly, we exploit a multimedia transmission model in the context of heterogeneous wireless networks. Then, a security-aware scheduling scheme is proposed by taking into account applications' timing and security requirements in addition to precedence constraints. Furthermore, the proposed scheme is applied to heuristically find resource allocations, which maximize the quality of security and the probability of meeting deadlines for all the multimedia applications. Additionally, extensive experiments are provided to demonstrate the effectiveness of the proposed scheme.

References

  1. P. Vidales, J. Baliosion, J. Serrat, G. Mapp, F. Stejano, and A. Hopper, "Autonomic system for mobility support in 4G networks", IEEE Journal on Selected Areas in Communications, vol. 23, pp. 2288--2304, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Zhou, B. Zheng, A. Wei, B. Geller and J. Cui, "A Scalable Information Security Technique: Joint Authentication-Coding Mechanism for Multimedia over Heterogeneous Wireless Networks," Wireless Personal Communications, vol. 51, no. 1, pp. 5--16, October 2009.Google ScholarGoogle ScholarCross RefCross Ref
  3. Z. Li, Q. Sun, Y. Lian, C. W. Chen, "Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks," IEEE Transactions on Multimedia, vol. 9, no. 4, pp. 837--850, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Patrick, C. Raju, H. Cao, G. Zhu, S. Porta, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks Traynor," IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663--677, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Nasser, A. Hasswa, H. Hassanein, "Handoffs in fourth generation heterogeneous networks," IEEE Communications Magazine, vol. 44, no. 10, pp. 96--103, Oct. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Luo, C. Lin, K. Wang, L. Lei, and C. Liu, "Quality of protection analysis and performance modeling in IP multimedia subsystem," Computer Communications, vol. 32, no. 11, pp. 1336--1345, July 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Zhou, X. Wang, Y. Li, B. Zheng, and B. Geller, "Optimal Scheduling for Multiple Description Video Streams in Wireless Multihop Networks," IEEE Communications Letters, vol. 13, no. 7, pp. 534--536, July 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Zhou, B. Geller, A. Wei, B. Zheng, J. Cui, and S. Xu, "Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment," Proc. of IEEE Globecom 08, New Orleans, USA, pp. 1--5, Dec., 2008.Google ScholarGoogle Scholar
  9. J. A. Stankovic, M. Spuri, K. Ramamritham, and G. C. Buttazzo, "Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms," Kluwer Academic Publishers, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security-aware multimedia scheduling over heterogeneous wireless networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
          June 2010
          1371 pages
          ISBN:9781450300629
          DOI:10.1145/1815396

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 June 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader