Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies 2013
DOI: 10.1145/2535372.2535389
|View full text |Cite
|
Sign up to set email alerts
|

Resource thrifty secure mobile video transfers on open WiFi networks

Abstract: Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…In other words, given certain applications and settings, one could reduce the costs in providing agility. For example, in our earlier work, we consider selective encryption of video flows in order to provide protection against eavesdroppers [11]. Encrypting large video files for transfer over wireless settings could incur high energy costs and induce additional processing delays.…”
Section: Managing Costmentioning
confidence: 99%
“…In other words, given certain applications and settings, one could reduce the costs in providing agility. For example, in our earlier work, we consider selective encryption of video flows in order to provide protection against eavesdroppers [11]. Encrypting large video files for transfer over wireless settings could incur high energy costs and induce additional processing delays.…”
Section: Managing Costmentioning
confidence: 99%
“…The Open service, application service access rules and the programmable interface of application are managed and controlled. [5] At the control level, the security policy control is configured and managed by the controller. And the exchange, routing and forwarding are carried out through the control instructions issued by the controller.…”
Section: Discussion On Reducing the Vulnerability Of Sdnmentioning
confidence: 99%