Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks

Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks

Lei Chen, Chung-Wei Lee
ISBN13: 9781466609211|ISBN10: 1466609214|EISBN13: 9781466609228
DOI: 10.4018/978-1-4666-0921-1.ch009
Cite Chapter Cite Chapter

MLA

Chen, Lei, and Chung-Wei Lee. "Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks." Emergent Trends in Personal, Mobile, and Handheld Computing Technologies, edited by Wen-Chen Hu, IGI Global, 2012, pp. 141-159. https://doi.org/10.4018/978-1-4666-0921-1.ch009

APA

Chen, L. & Lee, C. (2012). Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks. In W. Hu (Ed.), Emergent Trends in Personal, Mobile, and Handheld Computing Technologies (pp. 141-159). IGI Global. https://doi.org/10.4018/978-1-4666-0921-1.ch009

Chicago

Chen, Lei, and Chung-Wei Lee. "Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks." In Emergent Trends in Personal, Mobile, and Handheld Computing Technologies, edited by Wen-Chen Hu, 141-159. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0921-1.ch009

Export Reference

Mendeley
Favorite

Abstract

Supporting reliable and secure multimedia streaming service is a challenging task in the environment of wireless Mobile Ad hoc Networks (MANETs) where radio signals are prone to security attacks and the quality of media streaming is degraded by signal strength loss and interference. The mobility of mobile devices makes streaming even more difficult as communication links are often broken when the devices move out of the transmission range of their neighbors. This paper proposes a stable multipath routing algorithm and an intelligent secure data distribution scheme for multimedia streaming in MANETs. The multipath Neighbor Stability Routing is able to find more stable and long-lasting paths than traditional ad hoc routing algorithms. The secure data distribution takes historical data-path distribution into consideration and maximally disperses new multimedia data to reduce the possibility of information leakage to unauthorized parties. The authors’ simulation and analysis indicate that the combination of these two mechanisms can provide high quality paths to achieve secure multimedia streaming.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.