Energy-distortion-authentication optimized resource allocation for secure wireless image streaming

Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Hsiao Hwa Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Joint consideration of energy efficiency, multimedia quality and media authenticity has largely been overlooked in the studies of secure wireless multimedia streaming. In this paper, we propose an authentication - resource allocation framework for secure transmission of multimedia streaming over energy constrained wireless networks. The contributions of this research can be summarized in three aspects. Firstly, a hash chain based stream level authentication scheme compatible for JPEG2000 compression standard is proposed. Secondly, link layer energydistortion is modeled, and the energy-distortion convex hull is efficiently identified, which significantly reduces optimization complexity. Finally, an authentication oriented resource allocation scheme is proposed based on the proposed authentication scheme and link layer energy-distortion convex hull, where the authenticated image quality is optimized according to energy budget constraints.

Original languageEnglish (US)
Title of host publicationWCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings
Pages2810-2815
Number of pages6
StatePublished - Sep 18 2008
EventIEEE Wireless Communications and Networking Conference, WCNC 2008 - Las Vegas, NV, United States
Duration: Mar 31 2008Apr 3 2008

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

OtherIEEE Wireless Communications and Networking Conference, WCNC 2008
CountryUnited States
CityLas Vegas, NV
Period3/31/084/3/08

Fingerprint

Authentication
Resource allocation
Image quality
Energy efficiency
Wireless networks

Keywords

  • Energy constrained wireless networks
  • JPEG2000 multimedia authentication
  • Resource allocation

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Wang, W., Peng, D., Wang, H., Sharif, H., & Chen, H. H. (2008). Energy-distortion-authentication optimized resource allocation for secure wireless image streaming. In WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings (pp. 2810-2815). [4489523] (IEEE Wireless Communications and Networking Conference, WCNC).

Energy-distortion-authentication optimized resource allocation for secure wireless image streaming. / Wang, Wei; Peng, Dongming; Wang, Honggang; Sharif, Hamid; Chen, Hsiao Hwa.

WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. 2008. p. 2810-2815 4489523 (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wang, W, Peng, D, Wang, H, Sharif, H & Chen, HH 2008, Energy-distortion-authentication optimized resource allocation for secure wireless image streaming. in WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings., 4489523, IEEE Wireless Communications and Networking Conference, WCNC, pp. 2810-2815, IEEE Wireless Communications and Networking Conference, WCNC 2008, Las Vegas, NV, United States, 3/31/08.
Wang W, Peng D, Wang H, Sharif H, Chen HH. Energy-distortion-authentication optimized resource allocation for secure wireless image streaming. In WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. 2008. p. 2810-2815. 4489523. (IEEE Wireless Communications and Networking Conference, WCNC).
Wang, Wei ; Peng, Dongming ; Wang, Honggang ; Sharif, Hamid ; Chen, Hsiao Hwa. / Energy-distortion-authentication optimized resource allocation for secure wireless image streaming. WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. 2008. pp. 2810-2815 (IEEE Wireless Communications and Networking Conference, WCNC).
@inproceedings{728ec2a3f22640aea7e30ca81366d7b3,
title = "Energy-distortion-authentication optimized resource allocation for secure wireless image streaming",
abstract = "Joint consideration of energy efficiency, multimedia quality and media authenticity has largely been overlooked in the studies of secure wireless multimedia streaming. In this paper, we propose an authentication - resource allocation framework for secure transmission of multimedia streaming over energy constrained wireless networks. The contributions of this research can be summarized in three aspects. Firstly, a hash chain based stream level authentication scheme compatible for JPEG2000 compression standard is proposed. Secondly, link layer energydistortion is modeled, and the energy-distortion convex hull is efficiently identified, which significantly reduces optimization complexity. Finally, an authentication oriented resource allocation scheme is proposed based on the proposed authentication scheme and link layer energy-distortion convex hull, where the authenticated image quality is optimized according to energy budget constraints.",
keywords = "Energy constrained wireless networks, JPEG2000 multimedia authentication, Resource allocation",
author = "Wei Wang and Dongming Peng and Honggang Wang and Hamid Sharif and Chen, {Hsiao Hwa}",
year = "2008",
month = "9",
day = "18",
language = "English (US)",
isbn = "9781424419968",
series = "IEEE Wireless Communications and Networking Conference, WCNC",
pages = "2810--2815",
booktitle = "WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings",

}

TY - GEN

T1 - Energy-distortion-authentication optimized resource allocation for secure wireless image streaming

AU - Wang, Wei

AU - Peng, Dongming

AU - Wang, Honggang

AU - Sharif, Hamid

AU - Chen, Hsiao Hwa

PY - 2008/9/18

Y1 - 2008/9/18

N2 - Joint consideration of energy efficiency, multimedia quality and media authenticity has largely been overlooked in the studies of secure wireless multimedia streaming. In this paper, we propose an authentication - resource allocation framework for secure transmission of multimedia streaming over energy constrained wireless networks. The contributions of this research can be summarized in three aspects. Firstly, a hash chain based stream level authentication scheme compatible for JPEG2000 compression standard is proposed. Secondly, link layer energydistortion is modeled, and the energy-distortion convex hull is efficiently identified, which significantly reduces optimization complexity. Finally, an authentication oriented resource allocation scheme is proposed based on the proposed authentication scheme and link layer energy-distortion convex hull, where the authenticated image quality is optimized according to energy budget constraints.

AB - Joint consideration of energy efficiency, multimedia quality and media authenticity has largely been overlooked in the studies of secure wireless multimedia streaming. In this paper, we propose an authentication - resource allocation framework for secure transmission of multimedia streaming over energy constrained wireless networks. The contributions of this research can be summarized in three aspects. Firstly, a hash chain based stream level authentication scheme compatible for JPEG2000 compression standard is proposed. Secondly, link layer energydistortion is modeled, and the energy-distortion convex hull is efficiently identified, which significantly reduces optimization complexity. Finally, an authentication oriented resource allocation scheme is proposed based on the proposed authentication scheme and link layer energy-distortion convex hull, where the authenticated image quality is optimized according to energy budget constraints.

KW - Energy constrained wireless networks

KW - JPEG2000 multimedia authentication

KW - Resource allocation

UR - http://www.scopus.com/inward/record.url?scp=51649118128&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51649118128&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:51649118128

SN - 9781424419968

T3 - IEEE Wireless Communications and Networking Conference, WCNC

SP - 2810

EP - 2815

BT - WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings

ER -