Abstract
Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme (AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog in video transmission applications in the presence of misbehaving nodes.
Similar content being viewed by others
References
Abdalla H., Irfan A., Mike W.: Performance evaluation with different mobility models for dynamic probabilistic flooding in MANETs. Mobile Inf. Syst. 5(1), 65–80 (2009)
Balakrishnan K., Jing D., Varshney V.K.: TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel. Commun. Netw. Conf. 4, 2137–2142 (2005)
Barbeau M., Kranakis E.: Principles of Ad-hoc Networking. Wiley, New York (2007)
Chih-Heng K., Ce-Kuen S., Wen-Shyang H., Artur Z.: An evaluation framework for more realistic simulations of MPEG video transmission. J. Inf. Sci. Eng. 24, 425–440 (2008)
Chee-Onn, C., Hiroshi, I.: Enhancing real-time video streaming over mobile ad hoc networks using multipoint-to-point communication. Comput. Commun. 1754–1764 (2007)
Francesco L., Alfio L., Giovanni S.: Multipath routing and rate-controlled video encoding in wireless video surveillance networks. Multimedia Syst. 14(3), 155–165 (2008)
Hasswa, A., Zulkernine, M., Hassanein, H.: Routeguard: an intrusion detection and response system for mobile ad-hoc networks. In: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications (WiMob’2005), vol. 3, pp. 336–343 (2005)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: A secure on-demand routing protocol for ad-hoc networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking (MobiCom’02) Atlanta, GA, pp. 12–23 (2002)
ITU: Subjective Video Quality Assessment Methods for Multimedia Applications, ITU-T Recommendations P. 910. (1996)
Johnson D.B., Maltz D.A.: Dynamic source routing in ad-hoc wireless networks. In: Imielinski, T., Korth, H. (eds) Mobile Computing, pp. 153–181. Kluwer, Dordrecht (1996)
Koenen R.: MPEG-4 mltimedia for our time. IEEE Spectr. 36(2), 26–33 (1999)
Lie A., Klaue J., Evalvid R.A.: Trace driven simulation of rate, adaptive MPEG-VBR video. Multimedia Syst. 4(1), 33–50 (2008)
Matrawy, A., Lambadaris, L., Changcheng, H.: MPEG4 traffic modeling using the transform expand sample methodology. In: IEEE 4th International Workshop on Networked Appliances, Gaithersburg, pp. 249–256 (2002)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad-hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom’00) pp. 255–265 (2000)
Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad-hoc networks, IEEE International Conference on Communications, ICC ’07, pp. 1154–1159 (2007)
Pandian R., Seethalakashmi P., Ramachandran V.: Enhanced routing protocol for video transmission over mobile adhoc network. J. Appl. Sci. Res. 2(6), 336–340 (2006)
Parker, J., Undercoffer, J., Pinkston, J., Joshi, A.: On intrusion detection and response for mobile ad-hoc networks. In: IEEE International Conference on Performance, Computing, and Communications, pp. 747–752 (2004)
Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad-hoc networks. In: Radio and Wireless Conference, RAWCON ’03, pp. 75–78 (2003)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad-hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS’02), San Antonio, TX, pp. 27–31 (2002)
Perkins C.E.: Ad-hoc Networking. Addison-Wesley, Reading (2000)
Sarkar S.K., Basavaraju T.G., Puttamadappa C.: Ad Hoc Mobile Wireless Networks. Auerbach Publications, Boca Raton (2008)
Sun, B.: Intrusion detection in mobile ad-hoc networks. Dissertation, Texas A&M University (2004)
Symes P.: Digital Video Compression. McGraw-Hill, New York (2001)
Tanapat, A.: On detection mechanisms and their performance for packet dropping attack in ad hoc network. Dissertation, University of Pittsburgh (2008)
The Network Simulator (NS2), http://www.isi.edu/nsnam/ns/
Wiegand T., Sullivan J., Bjontegaard G., Luthra A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560–576 (2003)
Waluyo, A., Srinivasan, B., Taniar, D.: A taxonomy of broadcast indexing schemes for multi channel data dissemination in mobile database. In: Proceedings of the 18th International Conference on Advanced Information Networking and Applications, pp. 213–218 (2004)
Xiao Y., Shen X., Du D.-Z. (eds) (2006) A survey on intrusion detection in mobile ad-hoc networks. In: Avantvalee T., Wu J., Wireless/Mobile Network Security. Springer, New York, pp. 170–196
Yih-Chun, H., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad-hoc networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13 (2002)
Zhang Y., Lee W., Huang Y.: Intrusion detection techniques for mobile wireless networks. Wirel. Netw. J. (ACM WINET) 9(5), 545–556 (2003)
Zhou L., Haas Z.: Securing ad-hoc networks. IEEE Netw. Mag. 13(6), 24–30 (1999)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sheltami, T., Al-Roubaiey, A., Shakshuki, E. et al. Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Systems 15, 273–282 (2009). https://doi.org/10.1007/s00530-009-0166-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-009-0166-0