Analysis of the Security of Internet of Multimedia Things

被引:33
|
作者
Lv, Zhihan [1 ,2 ]
Qiao, Liang [1 ]
Song, Houbing [3 ]
机构
[1] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[2] Warsaw Univ Technol, Inst Comp Sci, Artificial Intelligence Dept, Warsaw, Poland
[3] Embry Riddle Aeronaut Univ, Dept Elect Engn & Comp Sci, Daytona Beach, FL 32114 USA
基金
中国国家自然科学基金;
关键词
Internet of things; multimedia VANET; an undo list; privacy information; security; PRESERVING AUTHENTICATION SCHEME; PRIVACY;
D O I
10.1145/3398201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users' privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about I5%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Internet of multimedia things (IoMT): A review
    Laghari, Asif Ali
    Li, Hang
    Karim, Shahid
    Hyder, Waheeduddin
    Shoulin, Yin
    Khan, Abdullah Ayub
    Laghari, Rashid Ali
    [J]. REVIEW OF SOCIONETWORK STRATEGIES, 2024,
  • [42] Internet of multimedia things: Vision and challenges
    Alvi, Sheeraz A.
    Afzal, Bilal
    Shah, Ghalib A.
    Atzori, Luigi
    Mahmood, Waqar
    [J]. AD HOC NETWORKS, 2015, 33 : 87 - 111
  • [43] Multihoming for Mobile Internet of Multimedia Things
    Balan, Titus
    Robu, Dan
    Sandu, Florin
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [44] Editorial Note: Internet of Multimedia Things
    [J]. Multimedia Tools and Applications, 2017, 76 : 25873 - 25873
  • [45] Editorial Note: Internet of Multimedia Things
    Piccialli, Francesco
    Jung, Jason J.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (24) : 25873 - 25873
  • [46] Multimedia Internet of Things: A Comprehensive Survey
    Nauman, Ali
    Qadri, Yazdan Ahmad
    Amjad, Muhammad
    Bin Zikria, Yousaf
    Afzal, Muhammad Khalil
    Kim, Sung Won
    [J]. IEEE ACCESS, 2020, 8 : 8202 - 8250
  • [47] A Review of Security in Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    Refoufi, Allaoua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) : 325 - 344
  • [48] Cyberentity Security in the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Yang, Laurence T.
    [J]. COMPUTER, 2013, 46 (04) : 46 - 53
  • [49] Security and Privacy in the Internet of Things
    Seitz, Ludwig
    [J]. ERCIM NEWS, 2015, (101): : 17 - 17
  • [50] Token security for internet of things
    Narendrakumar, Sudha
    Razaque, Abdul
    Patel, Varil
    Almi'ani, Muder
    Rizvi, Syed S.
    Hans, Akshat
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (04) : 334 - 343