Difference between revisions of "esswn"

From NMSL
Line 47: Line 47:
 
* J. Wang, M. Venkatachalam, and Y. Fang, [http://www.fang.ece.ufl.edu/mypaper/jsac07wang.pdf System Architecture and Cross-Layer Optimization of Video Broadcast over WiMAX], IEEE JSAC 25(4), pp. 712--721, MAY 2007.  (Check this special issue of JSAC as well.)
 
* J. Wang, M. Venkatachalam, and Y. Fang, [http://www.fang.ece.ufl.edu/mypaper/jsac07wang.pdf System Architecture and Cross-Layer Optimization of Video Broadcast over WiMAX], IEEE JSAC 25(4), pp. 712--721, MAY 2007.  (Check this special issue of JSAC as well.)
  
* [http://www.wimax.com/] Great WiMax gateway, tutorials, wite papers, ...., and more
+
* [http://www.wimax.com/ First step to WiMax world] Great WiMax gateway, tutorials, wite papers, ...., and more
  
 
* XOHMTM mobile 4G service WiMAX deployment by Sprint [http://www.xohm.com/] (First pay-per-use WiMAX service offered in Baltimore, 2 to 4 megabits per second)
 
* XOHMTM mobile 4G service WiMAX deployment by Sprint [http://www.xohm.com/] (First pay-per-use WiMAX service offered in Baltimore, 2 to 4 megabits per second)

Revision as of 06:54, 25 March 2011

Efficient and Secure Streaming of Scalable Multimedia Content over Wireless Networks

In this project, we design novel algorithms and systems to optimize the efficiency and enhance the security of broadband wireless networks that cover large geographical areas and carry multimedia traffic. Examples of these networks include 3G and 4G cellular networks and IEEE 802.16 (WiMAX) networks. We design optimal transmission schemes of multimedia streams that minimize the energy consumption of mobile devices as well as minimize the bandwidth utilization of the wireless spectrum.

To enhance the security, we address one of the most serious security threats for the wireless infrastructure, which is the exploitation of mobile devices to create malicious botnets. A botnet is a set of compromised devices controlled by remote attackers and used to launch malicious activities such as denial of service attacks and distributing spam emails. We design algorithms to detect the existence of botnets created over mobile devices that are participating in multimedia services, and we develop security schemes to prevent these botnets from forming again as well as to dismantle them if they occur. We focus on botnets that could exploit the session initiation protocol (SIP) for coordinating the compromised devices and launching attacks. SIP is an important component of the IP multimedia subsystem and it is deployed on many mobile phones.


People

  • Ahmad AbdAllah Hassan
  • Islam Elmaddah
  • Saleh Almowuena (PhD student)
  • Mohammad Alkurbi (MSc student)


Research Problems and Ideas


References and Links

  • XOHMTM mobile 4G service WiMAX deployment by Sprint [1] (First pay-per-use WiMAX service offered in Baltimore, 2 to 4 megabits per second)
  • S. Ahson and M. Ilyas, The WiMAX Handbook, CRC Press, 2008. Three volumes. V1: Technologies, Performance Analysis, and QoS. V2: Standards and Security. V3:Applications, eCopy of V3 through SFU Library.