ABSTRACT
Security is increasingly becoming an important issue in the design of multimedia applications. However, existing scheduling schemes for real-time multimedia services over heterogeneous networks generally do not take into account security requirements when making control decisions. In this paper, we develop and evaluate a security-aware multimedia scheduling scheme in heterogeneous environment. Firstly, we exploit a multimedia transmission model in the context of heterogeneous wireless networks. Then, a security-aware scheduling scheme is proposed by taking into account applications' timing and security requirements in addition to precedence constraints. Furthermore, the proposed scheme is applied to heuristically find resource allocations, which maximize the quality of security and the probability of meeting deadlines for all the multimedia applications. Additionally, extensive experiments are provided to demonstrate the effectiveness of the proposed scheme.
- P. Vidales, J. Baliosion, J. Serrat, G. Mapp, F. Stejano, and A. Hopper, "Autonomic system for mobility support in 4G networks", IEEE Journal on Selected Areas in Communications, vol. 23, pp. 2288--2304, 2005. Google ScholarDigital Library
- L. Zhou, B. Zheng, A. Wei, B. Geller and J. Cui, "A Scalable Information Security Technique: Joint Authentication-Coding Mechanism for Multimedia over Heterogeneous Wireless Networks," Wireless Personal Communications, vol. 51, no. 1, pp. 5--16, October 2009.Google ScholarCross Ref
- Z. Li, Q. Sun, Y. Lian, C. W. Chen, "Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks," IEEE Transactions on Multimedia, vol. 9, no. 4, pp. 837--850, 2007. Google ScholarDigital Library
- K. Patrick, C. Raju, H. Cao, G. Zhu, S. Porta, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks Traynor," IEEE Transactions on Mobile Computing, vol. 6, no. 6, pp. 663--677, June 2007. Google ScholarDigital Library
- N. Nasser, A. Hasswa, H. Hassanein, "Handoffs in fourth generation heterogeneous networks," IEEE Communications Magazine, vol. 44, no. 10, pp. 96--103, Oct. 2006. Google ScholarDigital Library
- A. Luo, C. Lin, K. Wang, L. Lei, and C. Liu, "Quality of protection analysis and performance modeling in IP multimedia subsystem," Computer Communications, vol. 32, no. 11, pp. 1336--1345, July 2009. Google ScholarDigital Library
- L. Zhou, X. Wang, Y. Li, B. Zheng, and B. Geller, "Optimal Scheduling for Multiple Description Video Streams in Wireless Multihop Networks," IEEE Communications Letters, vol. 13, no. 7, pp. 534--536, July 2009. Google ScholarDigital Library
- L. Zhou, B. Geller, A. Wei, B. Zheng, J. Cui, and S. Xu, "Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment," Proc. of IEEE Globecom 08, New Orleans, USA, pp. 1--5, Dec., 2008.Google Scholar
- J. A. Stankovic, M. Spuri, K. Ramamritham, and G. C. Buttazzo, "Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms," Kluwer Academic Publishers, 1998. Google ScholarDigital Library
Index Terms
- Security-aware multimedia scheduling over heterogeneous wireless networks
Recommendations
Scheduling security-critical multimedia applications in heterogeneous networks
Security is becoming an increasingly important issue in the design of multimedia applications, which are widely used in the industry and academic organizations. However, existing scheduling schemes for real-time multimedia service in heterogeneous ...
An improved security-aware packet scheduling algorithm in real-time wireless networks
Developing security-aware packet scheduling algorithms can efficiently enhance the security while delivering packets through wireless links. Existing scheduling algorithms developed for real-time wireless networks provide security at the cost of other ...
Scheduling Security-Critical Real-Time Applications on Clusters
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional real-time scheduling algorithms, however, either disregard ...
Comments