Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Authentication without Identification
IEEE Security and Privacy
Performance analysis of priority scheduling mechanisms under heterogeneous network traffic
Journal of Computer and System Sciences
IEEE Transactions on Parallel and Distributed Systems
Quality of protection analysis and performance modeling in IP multimedia subsystem
Computer Communications
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Scalable authentication of MPEG-4 streams
IEEE Transactions on Multimedia
The IMS service platform: a solution for next-generation network operators to be more than bit pipes
IEEE Communications Magazine
Handoffs in fourth generation heterogeneous networks
IEEE Communications Magazine
Autonomic system for mobility support in 4G networks
IEEE Journal on Selected Areas in Communications
Rate-Distortion-Authentication Optimized Streaming of Authenticated Video
IEEE Transactions on Circuits and Systems for Video Technology
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
Hi-index | 0.24 |
Security is becoming an increasingly important issue in the design of multimedia applications, which are widely used in the industry and academic organizations. However, existing scheduling schemes for real-time multimedia service in heterogeneous networks generally do not take into account security requirements when making allocation and control decisions. In this paper, we develop and evaluate a security-critical multimedia scheduling scheme in the framework of heterogeneous networks. At first, we construct a general media distortion model according to the observed parameters in each network, as well as each application's characteristic. After that, we exploit a scalable graph-based authentication method which achieves a good trade-off between flexibility and efficiency. Furthermore, a security-critical scheduling scheme is proposed by taking into account applications' timing and security requirements in addition to precedence constraints. The proposed scheme is applied to heuristically find resource allocations, which maximize the quality of security and the probability of meeting deadlines for all the multimedia applications running on heterogeneous networks. Extensive simulations are provided to demonstrate the effectiveness and feasibility of the proposed scheme.