Browse > Article
http://dx.doi.org/10.5909/JBE.2008.13.2.261

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network  

Shin, Myoung-Sub (Graduate School of Information Management and Security, Korea University)
Lim, Sun-Hee (Graduate School of Information Management and Security, Korea University)
Yi, Ok-Yeon (Department of Mathematics, Kookmin University)
Lim, Jong-In (Graduate School of Information Management and Security, Korea University)
Publication Information
Journal of Broadcast Engineering / v.13, no.2, 2008 , pp. 261-273 More about this Journal
Abstract
Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.
Keywords
WLAN Mesh Networks; Multimedia; Security quantitative Analysis; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 International Organization for Standardization (ISO), Information Processing Systems - Open Systems Interconnection - Part 2: Security Architecture, ISO/IEC 7498-2, ISO, Geneva, 1989
2 W.Steven Conner, Jan Kruys, Kyeongsoo Kim, Juan Carlos Zuniga, 'IEEE 802.11s Tutorial; Overview of the Amendment for Wireless Local Area Mesh Networking.' IEEE 802 Plenary, November 2006
3 Stedano M. Faccion, Carl W Ijting, Jarkko Kneckt, Ameya Damle, 'Mesh WLAN Networks: Concept and System Design,' IEEE Wireless communication, Vol. 13, pp. 10-17, April, 2006   DOI   ScienceOn
4 L.Tang, 'Methods for Encrypting and Decrypting MPEG Video Data Efficiently,' Proceeding of ACM International Multimedia Conference and Exhibition, pp. 219-229, Noberber 1996
5 Guang Ming Hong. Chun Yuan, Yi Wang, Yu Shuo Zhong, 'A Quality Controllable Encryption for H.264/ AVC Video Coding,' Advances in Multimedia Information Processing PCM 2006, Vol. 2461, pp. 510-517, October 2006
6 Tuo Shi, Brian King, and Paul Salama, 'Selective Encryption for H.264/ AVC Video Coding,' the Society of Photo-Optical Instrumentation Engineers, Vol. 6072, pp. 461-469, Feb, 2006
7 Martin Prangl, Tibor Szkaliczki, Hermann Hellwagner, 'A Framework for Utility-Based Multimedia Adaptation,' IEEE Trans. on circuits and systems for video technology, Vol. 17, pp. 719-728, June 2007   DOI   ScienceOn
8 Chui Sian Ong, Klara Nahrstedt and Wanghong Yuan, 'Quality of Protection for mobile multimedia Application,' in ICME 2003, Vol.2, pp. 137-140, July 2003
9 Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, 'Authenticated Routing for Ad hoc Networks,' In journal on Selected Areas in Communication, Vol. 23. pp. 598-610, March 2005   DOI   ScienceOn
10 Atul Puri, Xuemin Chen. Ajay Luthra, 'Video coding using the H.264/MPEG-4 AVC compression standard,' Signal Processing: Image Communication Vol. 19, No. 99, pp. 793-839, October 2004   DOI   ScienceOn
11 RFC 3748, 'Extensible Authentication Protocol(EAP),' June 2004
12 Akyildiz, I.F., Wang, X. and Wang, W., 'Wireless Mesh Networks: A Survey,' Computer Networks Journal (Elsevier), Vol. 47, pp. 445-487, March 2005   DOI   ScienceOn
13 International Telecommunication Union (ITU), Security Architecture for Open Systems Interconnection for CCIT Applications, Recommendation ITU-T X.800, ITU, Geneva, 1991
14 IEEE Standard 802.11i, 'Wireless LAN Medium Access Control and Physical Layer specification: Medium Access Control (MAC) Security Enhancements,' July. 2004
15 IEEE 802.l x, 'IEEE Standard for Local and Metropolitan area networks-Port-Based Network Access Control,' 2001
16 Avesh K. Agarwal, Wenye Wang, 'On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility,' Springer Mobile Network Application, Vol. 12, pp. 93-110, November 2006
17 Yih-Chun Hu, David B. Johnson, Adrian Perrig, 'Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,' In proceedings of the 4th IEEE workshop on Mobile Computing Systems and Application, Vol. I, pp.175-192, July 2003