Energy-distortion-authentication optimized resource allocation for secure wireless image streaming

Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Hsiao Hwa Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

Joint consideration of energy efficiency, multimedia quality and media authenticity has largely been overlooked in the studies of secure wireless multimedia streaming. In this paper, we propose an authentication - resource allocation framework for secure transmission of multimedia streaming over energy constrained wireless networks. The contributions of this research can be summarized in three aspects. Firstly, a hash chain based stream level authentication scheme compatible for JPEG2000 compression standard is proposed. Secondly, link layer energydistortion is modeled, and the energy-distortion convex hull is efficiently identified, which significantly reduces optimization complexity. Finally, an authentication oriented resource allocation scheme is proposed based on the proposed authentication scheme and link layer energy-distortion convex hull, where the authenticated image quality is optimized according to energy budget constraints.

Original languageEnglish (US)
Title of host publicationWCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2810-2815
Number of pages6
ISBN (Print)9781424419968
DOIs
StatePublished - 2008
EventIEEE Wireless Communications and Networking Conference, WCNC 2008 - Las Vegas, NV, United States
Duration: Mar 31 2008Apr 3 2008

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Other

OtherIEEE Wireless Communications and Networking Conference, WCNC 2008
CountryUnited States
CityLas Vegas, NV
Period3/31/084/3/08

Keywords

  • Energy constrained wireless networks
  • JPEG2000 multimedia authentication
  • Resource allocation

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Energy-distortion-authentication optimized resource allocation for secure wireless image streaming'. Together they form a unique fingerprint.

Cite this