Analysis of the Security of Internet of Multimedia Things

被引:33
|
作者
Lv, Zhihan [1 ,2 ]
Qiao, Liang [1 ]
Song, Houbing [3 ]
机构
[1] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[2] Warsaw Univ Technol, Inst Comp Sci, Artificial Intelligence Dept, Warsaw, Poland
[3] Embry Riddle Aeronaut Univ, Dept Elect Engn & Comp Sci, Daytona Beach, FL 32114 USA
基金
中国国家自然科学基金;
关键词
Internet of things; multimedia VANET; an undo list; privacy information; security; PRESERVING AUTHENTICATION SCHEME; PRIVACY;
D O I
10.1145/3398201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users' privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about I5%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Analysis of the Security of Internet of Multimedia Things in Wireless Environment
    Haddad, Nabeel Mahdy
    Mustafa, Mustafa sabah
    Salih, Hayder Sabah
    Jaber, Mustafa Musa
    Ali, Mohammed Hasan
    [J]. Journal of Cyber Security and Mobility, 2024, 13 (01): : 161 - 192
  • [2] Multimedia Traffic Security Architecture for the Internet of Things
    Zhou, Liang
    Chao, Han-Chieh
    [J]. IEEE NETWORK, 2011, 25 (03): : 35 - 40
  • [3] Advanced security model for multimedia data sharing in Internet of Things
    Dhar, Shalini
    Khare, Ashish
    Singh, Rajani
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
  • [4] Guest Editorial: Security and Privacy for Multimedia in the Internet of Things (IoT)
    Chang, Victor
    Sun, Gang
    Li, Jin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18201 - 18202
  • [5] Guest Editorial: Security and Privacy for Multimedia in the Internet of Things (IoT)
    Victor Chang
    Gang Sun
    Jin Li
    [J]. Multimedia Tools and Applications, 2018, 77 : 18201 - 18202
  • [6] Analysis of Cloud Security and Internet of Things
    Qian, Peng
    Ding, Yaowei
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 513 - 516
  • [7] Analysis and Design of Security in Internet of Things
    Tian, Cuihua
    Chen, Xuhui
    Guo, Di
    Sun, Jinhua
    Liu, Ling
    Hong, Jiangshui
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 678 - 684
  • [8] Data analysis based dynamic prediction model for public security in internet of multimedia things networks
    Qureshi, Kashif Naseer
    Alhudhaif, Adi
    Arshad, Noman
    Kalsoom, Um
    Jeon, Gwanggil
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (14) : 19705 - 19721
  • [9] Data analysis based dynamic prediction model for public security in internet of multimedia things networks
    Kashif Naseer Qureshi
    Adi Alhudhaif
    Noman Arshad
    Um Kalsoom
    Gwanggil Jeon
    [J]. Multimedia Tools and Applications, 2022, 81 : 19705 - 19721
  • [10] Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things
    Sharma, Suraj
    Zhang, Xuyun
    El-Sayed, Hesham
    Tan, Zhiyuan
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)