Resource thrifty secure mobile video transfers on open WiFi networks

George Papageorgiou, John Gasparis, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Video transfers using smartphones are becoming increasingly popular. To prevent the interception of content from eavesdroppers, video flows must be encrypted. However, encryption results in a cost in terms of processing delays and energy consumed on the user's device. We argue that encrypting only certain parts of the flow can create sufficiently high distortion at an eavesdropper preserving content confidentiality as a result. By selective encryption, one can reduce delay and the battery consumption on the mobile device. We develop a mathematical framework that captures the impact of the encryption process on the delay experienced by a flow, and the distortion seen by an eavesdropper. This provides a quick and efficient way of determining the right parts of a video flow that must be encrypted to preserve confidentiality, while limiting performance penalties. In practice, it can aid a user in choosing the right level of encryption. We validate our model via extensive experiments with different encryption policies using Android smartphones. We observe that by selectively encrypting parts of a video flow one can preserve the confidentiality while reducing delay by as much as 75% and the energy consumption by as much as 92%.

Original languageEnglish (US)
Title of host publicationCoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies
PublisherAssociation for Computing Machinery
Pages333-344
Number of pages12
ISBN (Print)9781450321013
DOIs
StatePublished - Jan 1 2013
Event2013 9th ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013 - Santa Barbara, CA, United States
Duration: Dec 9 2013Dec 12 2013

Publication series

NameCoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies

Other

Other2013 9th ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2013
CountryUnited States
CitySanta Barbara, CA
Period12/9/1312/12/13

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Resource thrifty secure mobile video transfers on open WiFi networks'. Together they form a unique fingerprint.

  • Cite this

    Papageorgiou, G., Gasparis, J., Krishnamurthy, S. V., Govindan, R., & Porta, T. L. (2013). Resource thrifty secure mobile video transfers on open WiFi networks. In CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies (pp. 333-344). (CoNEXT 2013 - Proceedings of the 2013 ACM International Conference on Emerging Networking Experiments and Technologies). Association for Computing Machinery. https://doi.org/10.1145/2535372.2535389