skip to main content
10.1145/2535372.2535389acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Resource thrifty secure mobile video transfers on open WiFi networks

Published: 09 December 2013 Publication History

Abstract

Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.

References

[1]
AForge.NET. http://www.aforgenet.com/framework/features/motion_detection/_2.0.html.
[2]
EvalVid with GPAC. http://www2.tkn.tu-berlin.de/research/evalvid/EvalVid/docevalvid.html.
[3]
FFmpeg. http://ffmpeg.org/.
[4]
Firesheep. http://codebutler.com/firesheep/.
[5]
Google apps documentation and support. http://support.google.com/a/bin/answer.py?hl=en&answer=1279090.
[6]
GPAC. http://gpac.wp.mines-telecom.fr/.
[7]
A guide to sniffing out passwords and cookies. http://lifehacker.com/5853483.
[8]
Report: Mobile uploads up fourteen-fold. http://www.pcmag.com/article2/0,2817,2392007,00.asp.
[9]
What's APPening wtih Apple FaceTime. http://researchcenter.paloaltonetworks.com/2010/08/whats-appening-with-apple-facetime/.
[10]
x264. http://www.videolan.org/developers/x264.html.
[11]
YUV CIF reference videos (lossless H.264 encoded). http://www2.tkn.tu-berlin.de/research/evalvid/cif.html.
[12]
American National Standards Institute. ANSI X3.92-1981 American National Standard, Data Encryption Algorithm, 1981.
[13]
J. S. Baras, V. Tabatabaee, G. Papageorgiou, and N. Rentz. Performance metric sensitivity computation for optimization and trade-off analysis in wireless networks. In IEEE GLOBECOM, 2008.
[14]
A. C. Bovik. The Essential Guide to Video Processing. Academic Press, 2009.
[15]
D. S. A. Elminaam et al. Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12):280--286, Dec. 2008.
[16]
W. Fischer et al. The Markov-modulated Poisson process (MMPP) cookbook. Performance Evaluation, 18(2):149--171, Sept. 1993.
[17]
M. Garetto, T. Salonidis, and E. W. Knightly. Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks. In IEEE INFOCOM, 2006.
[18]
H. Heffes and D. M. Lucantoni. A Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance. IEEE J. Sel. Areas Commun., 4(6), Sept. 1986.
[19]
O. C. Ibe. Markov Processes for Stochastic Modeling. Academic Press, 2008.
[20]
International Telecommunications Union. ITU-R BT.601: Studio encoding parameters of digital television for standard 4:3 and wide-screen 16:9 aspect ratios.
[21]
ISO/IEC JTC1/SC29/WG11. ISO/IEC 14496 -- Coding of audio-visual objects. http://mpeg.chiariglione.org/standards/mpeg-4/mpeg-4.htm.
[22]
M. T. Ivrlać, R. L.-U. Choi, E. G. Steinbach, and J. A. Nossek. Models and analysis of streaming video transmission over wireless fading channels. Signal Proessing: Image Communication, 24(8):651--665, Sept. 2009.
[23]
D. Li and J. Pan. Performance evaluation of video streaming over multi-hop wireless local area networks. IEEE Trans. Wireless Commun., 9(1):338--347, Jan. 2010.
[24]
T. Lookabaugh and D. C. Sicker. Selective encryption for consumer applications. IEEE Commun. Mag., 42(5):124--129, May 2004.
[25]
M. F. Neuts. A versatile Markovian point process. Journal of Applied Probability, 16(4):764--779, Dec. 1979.
[26]
G. Papageorgiou, J. Gasparis, S. V. Krishnamurthy, R. Govindan, and T. L. Porta. Securing mobile video uploads from eavesdroppers with minimum performance penalties: Tech report. http://www.cs.ucr.edu/~gpapag/tech-report-encryption.pdf, June 2013.
[27]
G. Papageorgiou, S. Singh, S. V. Krishnamurthy, R. Govindan, and T. L. Porta. Distortion-resilient routing for video flows in wireless multi-hop networks. In IEEE ICNP, 2012.
[28]
P. Prasithsangaree and P. Krishnamurthy. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In IEEE GLOBECOM, 2003.
[29]
M.-R. Ra, R. Govindan, and A. Ortega. P3: Toward privacy-preserving photo sharing. In USENIX NSDI, 2013.
[30]
V. Ramaswami. The N/G/1 queue and its detailed analysis. Advances in Applied Probability, 12(1):222--261, Mar. 1980.
[31]
United States National Institute of Standards and Technology (NIST). Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197., Nov. 2001.
[32]
W. Wang, M. Hempel, D. Peng, H. Wang, H. Sharif, and H.-H. Chen. On energy efficient encryption for video streaming in wireless sensor networks. IEEE Trans. Multimedia, 12(5):417--426, Aug. 2010.
[33]
Y. Wang, M. Claypool, and R. Kinicki. Impact of reference distance for motion compensation prediction on video quality. In Proceedings of ACM/SPIE Multimedia Computing and Networking (MMCN 2007), 2007.
[34]
T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra. Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol., 13(7):560--576, July 2003.

Cited By

View all

Index Terms

  1. Resource thrifty secure mobile video transfers on open WiFi networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CoNEXT '13: Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
      December 2013
      454 pages
      ISBN:9781450321013
      DOI:10.1145/2535372
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 December 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. delay
      2. distortion
      3. encryption
      4. power
      5. wireless video transmission

      Qualifiers

      • Research-article

      Conference

      CoNEXT '13
      Sponsor:
      CoNEXT '13: Conference on emerging Networking Experiments and Technologies
      December 9 - 12, 2013
      California, Santa Barbara, USA

      Acceptance Rates

      CoNEXT '13 Paper Acceptance Rate 44 of 226 submissions, 19%;
      Overall Acceptance Rate 198 of 789 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media