Analysis of the Security of Internet of Multimedia Things in Wireless Environment

被引:0
|
作者
Haddad N.M. [1 ]
Mustafa M.s. [2 ]
Salih H.S. [3 ]
Jaber M.M. [4 ,5 ]
Ali M.H. [6 ]
机构
[1] College of Education, Misan University
[2] Department of Computer Science, Dijlah University College, Baghdad
[3] Department of Private Education in the Iraqi Ministry of Higher Education and Scientific Research, Baghdad
[4] Department of Computer Science, Al-turath University College, Baghdad
[5] Department of Medical Instruments Engineering Techniques, Al-farahidi University, Baghdad
[6] Computer Techniques Engineering Department, Faculty of Information Technology, Imam Ja'afar Al-Sadiq University, Najaf
来源
关键词
and sampling; chaotic convolution; internet of multimedia things; multimedia applications; VANET; Wireless environment;
D O I
10.13052/jcsm2245-1439.1316
中图分类号
学科分类号
摘要
The Internet of Things (IoT) and real-time flexibility improve people's lives, and IoT applications rely heavily on multimedia sensors and devices. An interconnected network of IoT multimedia devices has made the Internet of Medical Things (IoMT). It creates massive data distinct from what the Internet of Things (IoT) produced. Smart traffic monitoring and smart hospitals are only a few examples of real-time deployment applications. IoMT data and decision-making must be made quickly since it directly impacts human life. The security heterogeneity of optimization issues is a significant challenge for enabling multimedia applications on the IoT. The IoMT has difficulty achieving low-cost data collecting while maintaining data security. An Internet of Multimedia Things in a wireless environment (IoMT-WE) system decreases the bandwidth and privacy risk caused by the revocation list, ensures the integrity of batch verification information, and corresponds with Vehicular ad hoc network (VANET) security performance. The proposed method uses random subsampling and chaotic convolution to collect numerous images. The sampling method is safe since the measurement matrix is controlled by chaos. As part of the IoMT architecture, wireless multimedia sensor nodes can be more easily deployed over the long term for real-time multimedia. The Wireless Multimedia Sensor Network (WMSN) comprises nodes that can capture both multimedia and non-multimedia data. The ioMT-WE system has been tested and found to be secure and effective. © 2023 River Publishers.
引用
收藏
页码:161 / 192
页数:31
相关论文
共 50 条
  • [21] Security analysis of a proposed internet of things middleware
    Hiro Gabriel Cerqueira Ferreira
    Rafael Timoteo de Sousa Junior
    Cluster Computing, 2017, 20 : 651 - 660
  • [22] The Analysis and Research on the Internet of Things Security Issues
    Xu, Xinyue
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 461 - 464
  • [23] Security Threats Analysis and Considerations for Internet of Things
    Lee, Yunjung
    Park, Yongjoon
    Kim, DoHyeun
    2015 8TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2015, : 28 - 30
  • [24] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [25] A Security Analysis Method for Industrial Internet of Things
    Mouratidis, Haralambos
    Diamantopoulou, Vasiliki
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4093 - 4100
  • [26] Internet of Things Security Analysis of Smart Campus
    Wang, Lei
    Li, Kunqin
    Chen, Xianxiang
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 418 - 428
  • [27] A framework for automating security analysis of the internet of things
    Ge, Mengmeng
    Hong, Jin B.
    Guttmann, Walter
    Kim, Dong Seong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 : 12 - 27
  • [28] Security analysis of a proposed internet of things middleware
    Cerqueira Ferreira, Hiro Gabriel
    de Sousa Junior, Rafael Timoteo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 651 - 660
  • [29] CLOUD SECURITY AND THE INTERNET OF THINGS: IMPACT ON THE VIRTUAL LEARNING ENVIRONMENT
    Atayero, Aderemi A.
    Ilori, Olusegun A.
    Adedokun, Michael O.
    EDULEARN15: 7TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2015, : 3857 - 3863
  • [30] Security in the internet of things
    Aigner M.
    Cryptology and Information Security Series, 2010, 4 : 109 - 124