• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Adaptive control of real-time media applications in best-effort networks

Khariwal, Vivek 15 November 2004 (has links)
Quality of Service (QoS) in real-time media applications can be defined as the ability to guarantee the delivery of packets from source to destination over best-effort networks within some constraints. These constraints defined as the QoS metrics are end-to-end packet delay, delay jitter, throughtput, and packet losses. Transporting real-time media applications over best-effort networks, e.g. the Internet, is an area of current research. Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) have failed to provide the desired QoS. This research aims at developing application-level end-to-end QoS controls to improve the user-perceived quality of real-time media applications over best-effort networks, such as, the public Internet. In this research an end-to-end packet based approach is developed. The end-to- end packet based approach consists of source buffer, network simulator ns-2, destina- tion buffer, and controller. Unconstrained model predictive control (MPC) methods are implemented by the controller at the application layer. The end-to-end packet based approach uses end-to-end network measurements and predictions as feedback signals. Effectiveness of the developed control methods are examined using Matlab and ns-2. The results demonstrate that sender-based control schemes utilizing UDP at transport layer are effective in providing QoS for real-time media applications transported over best-effort networks. Significant improvements in providing QoS are visible by the reduction of packet losses and the elimination of disruptions during the playback of real-time media. This is accompanied by either a decrease or increase in the playback start-time.
2

A Performance and Security Analysis of Elliptic Curve Cryptography Based Real-Time Media Encryption

Sen, Nilanjan 12 1900 (has links)
This dissertation emphasizes the security aspects of real-time media. The problems of existing real-time media protections are identified in this research, and viable solutions are proposed. First, the security of real-time media depends on the Secure Real-time Transport Protocol (SRTP) mechanism. We identified drawbacks of the existing SRTP Systems, which use symmetric key encryption schemes, which can be exploited by attackers. Elliptic Curve Cryptography (ECC), an asymmetric key cryptography scheme, is proposed to resolve these problems. Second, the ECC encryption scheme is based on elliptic curves. This dissertation explores the weaknesses of a widely used elliptic curve in terms of security and describes a more secure elliptic curve suitable for real-time media protection. Eighteen elliptic curves had been tested in a real-time video transmission system, and fifteen elliptic curves had been tested in a real-time audio transmission system. Based on the performance, X9.62 standard 256-bit prime curve, NIST-recommended 256-bit prime curves, and Brainpool 256-bit prime curves were found to be suitable for real-time audio encryption. Again, X9.62 standard 256-bit prime and 272-bit binary curves, and NIST-recommended 256-bit prime curves were found to be suitable for real-time video encryption.The weaknesses of NIST-recommended elliptic curves are discussed and a more secure new elliptic curve is proposed which can be used for real-time media encryption. The proposed curve has fulfilled all relevant security criteria, but the corresponding NIST curve could not fulfill two such criteria. The research is applicable to strengthen the security of the Internet of Things (IoT) devices, especially VoIP cameras. IoT devices have resource constraints and thus need lightweight encryption schemes for security. ECC could be a better option for these devices. VoIP cameras use a similar methodology to traditional real-time video transmission, so this research could be useful to find a better security solution for these devices.

Page generated in 0.0677 seconds