Next Article in Journal
A Personalized QoS Prediction Approach for CPS Service Recommendation Based on Reputation and Location-Aware Collaborative Filtering
Next Article in Special Issue
Digital Self-Interference Cancellation for Asynchronous In-Band Full-Duplex Underwater Acoustic Communication
Previous Article in Journal
A Combined Gravity Compensation Method for INS Using the Simplified Gravity Model and Gravity Database
Previous Article in Special Issue
A Multi-Hop Clustering Mechanism for Scalable IoT Networks
Open AccessArticle

A Lightweight Protocol for Secure Video Streaming

1
Department of Computers Science, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania
2
Department of Software Engineering, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania
3
Department of Multimedia Engineering, Kaunas University of Technology, Studentu 50-212, LT-51368 Kaunas, Lithuania
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(5), 1554; https://doi.org/10.3390/s18051554
Received: 16 April 2018 / Revised: 10 May 2018 / Accepted: 11 May 2018 / Published: 14 May 2018
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. View Full-Text
Keywords: information security; computer networks; steganography; the Internet of Things; fog computing; cryptography information security; computer networks; steganography; the Internet of Things; fog computing; cryptography
Show Figures

Figure 1

MDPI and ACS Style

Venčkauskas, A.; Morkevicius, N.; Bagdonas, K.; Damaševičius, R.; Maskeliūnas, R. A Lightweight Protocol for Secure Video Streaming. Sensors 2018, 18, 1554.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop