Data analysis based dynamic prediction model for public security in internet of multimedia things networks

被引:3
|
作者
Qureshi, Kashif Naseer [1 ]
Alhudhaif, Adi [2 ]
Arshad, Noman [1 ]
Kalsoom, Um [1 ]
Jeon, Gwanggil [3 ]
机构
[1] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci Al Kharj, Dept Comp Sci, POB 151, Al Kharj 11942, Saudi Arabia
[3] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon, South Korea
关键词
IoMT; Technology; Network; Prediction; Security; Data;
D O I
10.1007/s11042-021-11462-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Multimedia Things (IoMT) has gained popularity due to its immersive growth and real-time applications range from smart health to smart transportation systems. These systems always have various threats related to security breaches and privacy. With the passage of time, all types of cybercrimes and terrorism activities and its planning were initiated by using these networks and technologies. Terrorist attacks are unavoidable because of well-organized and well-planned attack planning. The all the data among these threat actors transmitted by using IoMT sensors and devices. Therefore, there is a need to analyze this type of data and predict the terrorist activities for in-time decision making. This paper presents a complete overview of existing models for such type of data and proposes a Terrorist Attacks Internet of Multimedia Things (TA-IoMT) model and a predictive model for public security in IoMT networks. The proposed model provides more effective data handling, cloud storage data management, and prediction to control and detect these kinds of activities. The results show an average of 89% accuracy, 0.73% sensitivity, and 0.92% specificity as compared to existing solutions.
引用
收藏
页码:19705 / 19721
页数:17
相关论文
共 50 条
  • [41] Physical Layer Security Analysis of Cognitive NOMA Internet of Things Networks
    Li, Meiling
    Yuan, Hu
    Maple, Carsten
    Cheng, Wenjie
    Epiphaniou, Gregory
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 1045 - 1055
  • [42] Multicast Security Model for Internet of Things Based on Context Awareness
    Harb, Hussein
    William, Ashraf
    El-Mohsen, Omayma A.
    Mansour, Hala A.
    2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 303 - 309
  • [43] SecKit: A Model-based Security Toolkit for the Internet of Things
    Neisse, Ricardo
    Steri, Gary
    Fovino, Igor Nai
    Baldini, Gianmarco
    COMPUTERS & SECURITY, 2015, 54 : 60 - 76
  • [44] Food security information platform model based on internet of things
    Zhang, Lei
    Zhu, Shanhong
    Advance Journal of Food Science and Technology, 2015, 8 (05) : 312 - 315
  • [45] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Qing Zhang
    Dilong Xu
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 573 - 580
  • [46] Security protocol of internet of things based on NTRU encryption model
    Li Y.
    International Journal of Information and Communication Technology, 2021, 18 (02) : 125 - 141
  • [47] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Zhang, Qing
    Xu, Dilong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 573 - 580
  • [48] Hybrid encryption model for managing the data security in medical internet of things
    Jyotheeswari, P.
    Jeyanthi, N.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2020, 13 (01) : 25 - 31
  • [49] Towards Security Challenges to Internet-of-Things: Big Data, Networks, and Applications
    Alseady, Shurug
    Baz, Abdullah
    Alsubait, Tahani
    Alarabi, Louai
    Alhakami, Hosam
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (11): : 131 - 141
  • [50] Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
    Gao, Yuan
    Xian, Hequn
    Yu, Aimin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (03)