Reasoning about naming systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Hi-index | 0.06 |
This paper presents the design of a novel high-secure wireless video surveillance system. The system is based on the 802.11g ad-hoc wireless infrastructure; and the Intel IXP425 network processors are used as the basic processing unit. A media-dependant video encryption scheme, including reliable data embedding technique and real-time video encryption algorithm, has been implemented for the system to work in an open and insecure wireless environment. Our system offers several unique advantages: (1) it provides high security guarantee; (2) it does not require expensive access points/routers; (3) it can be readily deployed since it is built on top of existing wireless ad-hoc infrastructure; (4) it is robust in the presence of adaptive mechanism and error-prone channel.