Analysis of the Security of Internet of Multimedia Things in Wireless Environment
DOI:
https://doi.org/10.13052/jcsm2245-1439.1316Keywords:
Wireless environment, multimedia applications, internet of multimedia things, VANET, chaotic convolution, samplingAbstract
The Internet of Things (IoT) and real-time flexibility improve people’s lives, and IoT applications rely heavily on multimedia sensors and devices. An interconnected network of IoT multimedia devices has made the Internet of Medical Things (IoMT). It creates massive data distinct from what the Internet of Things (IoT) produced. Smart traffic monitoring and smart hospitals are only a few examples of real-time deployment applications. IoMT data and decision-making must be made quickly since it directly impacts human life. The security heterogeneity of optimization issues is a significant challenge for enabling multimedia applications on the IoT. The IoMT has difficulty achieving low-cost data collecting while maintaining data security. An Internet of Multimedia Things in a wireless environment (IoMT-WE) system decreases the bandwidth and privacy risk caused by the revocation list, ensures the integrity of batch verification information, and corresponds with Vehicular ad hoc network (VANET) security performance. The proposed method uses random subsampling and chaotic convolution to collect numerous images. The sampling method is safe since the measurement matrix is controlled by chaos. As part of the IoMT architecture, wireless multimedia sensor nodes can be more easily deployed over the long term for real-time multimedia. The Wireless Multimedia Sensor Network (WMSN) comprises nodes that can capture both multimedia and non-multimedia data. The ioMT-WE system has been tested and found to be secure and effective.
Downloads
References
Obeidat, H., Shuaieb, W., Obeidat, O., and Abd-Alhameed, R. (2021). A review of indoor localization techniques and wireless technologies. Wireless Personal Communications, 119(1), 289–327.
Safaldin, M., Otair, M., and Abualigah, L. (2021). Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of ambient intelligence and humanized computing, 12(2), 1559–1576.
Manikandan, S., and Chinnadurai, M. (2021). Effective energy adaptive and consumption in wireless sensor network using distributed source coding and sampling techniques. Wireless Personal Communications, 118(2), 1393–1404.
Almutairi, A. F., Al-Gharabally, M., and Salman, A. A. (2021). Particle swarm optimization application for multiple attribute decision-making in vertical handover in heterogeneous wireless networks. Journal of Engineering Research, 9(1).
Chaves, P. R., Assumpção, R. M., Ferreira, L. C., Cardieri, P., Branquinho, O. C., and Fruett, F. (2021). A remote emulation environment for the teaching of low-power wireless communications. Computer Applications in Engineering Education, 29(6), 1453–1464.
Singer, A., and Robinson, J. T. (2021). Wireless power delivery techniques for miniature implantable bioelectronics. Advanced Healthcare Materials, 10(17), 2100664.
Dekkers, G., Rosas, F., van Waterschoot, T., Vanrumste, B., and Karsmakers, P. (2022). Dynamic sensor activation and decision-level fusion in wireless acoustic sensor networks for classification of domestic activities. Information Fusion, 77, 196–210.
Furqan, H. M., Solaija, M. S. J., Türkmen, H., and Arslan, H. (2021). Wireless communication, sensing, and REM: a security perspective. IEEE Open Journal of the Communications Society, 2, 287–321.
Singh, P., and Mittal, N. (2021). An efficient localization approach to locate sensor nodes in 3D wireless sensor networks using adaptive flower pollination algorithm. Wireless Networks, 27(3), 1999–2014.
Bashar, A., and Smys, S. (2021). Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks. IRO Journal on Sustainable Wireless Systems, 3(2), 59–67.
Rawat, P., and Chauhan, S. (2021). Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. Computer Science Review, 40, 100396.
Rezaeipanah, A., Amiri, P., Nazari, H., Mojarad, M., and Parvin, H. (2021). An energy-aware hybrid approach for wireless sensor networks using re-clustering-based multi-hop routing. Wireless Personal Communications, 120(4), 3293–3314.
Rodríguez, D. Z., Carrillo, D., Ramírez, M. A., Nardelli, P. H., and Möller, S. (2021). Incorporating wireless communication parameters into the E-model algorithm. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 29, 956–968.
Abdulsahib, G. M., and Khalaf, O. I. (2021). Accurate and effective data collection with minimum energy path selection in wireless sensor networks using mobile sinks. Journal of Information Technology Management, 13(2), 139–153.
Kanoun, O., Bradai, S., Khriji, S., Bouattour, G., El Houssaini, D., Ben Ammar, M., … and Viehweger, C. (2021). Energy-aware system design for autonomous wireless sensor nodes: A comprehensive review. Sensors, 21(2), 548.
Ostovar, A., Keshavarz, H., and Quan, Z. (2021). Cognitive radio networks for green wireless communications: an overview. Telecommunication Systems, 76(1), 129–138.
Dey, P., Kumar, C., Mitra, M., Mishra, R., Chaulya, S. K., Prasad, G. M., … and Banerjee, G. (2021). Deep convolutional neural network-based secure wireless voice communication for underground mines. Journal of Ambient Intelligence and Humanized Computing, 12(10), 9591–9610.
K. Rajakumari, P. Punitha, R.L. Kumar and C. Suresh, Improvising packet delivery and reducing delay ratio in Mobile ad hoc network using neighbor coverage-based topology control algorithm, International Journal of Communication Systems, 35 (2), 2022.
Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P.M., Sundarasekar, R. and Thota, C., 2018. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generation Computer Systems, 82, pp. 375–387.
Nayak, P., Swetha, G. K., Gupta, S., and Madhavi, K. (2021). Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities. Measurement, 178, 108974.
Almalki, F. A. (2021). Developing an adaptive channel modelling using a genetic algorithm technique to enhance aerial vehicle-to-everything wireless communications. Int J Comput Networks Commun, 13(2), 37–56.
Khashan, O. A., Ahmad, R., and Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448.
Venu, D., Mayuri, A. V. R., Neelakandan, S., Murthy, G. L. N., Arulkumar, N., and Shelke, N. (2022). An efficient low complexity compression-based optimal homomorphic encryption for secure fibre optic communication. Optik, 252, 168545.
Al-Turjman, F., Zahmatkesh, H., and Shahroze, R. (2022). An overview of security and privacy in smart cities’ IoT communications. Transactions on Emerging Telecommunications Technologies, 33(3), e3677.
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R. and Priyan, M.K., 2018. Centralized fog computing security platform for IoT and cloud in healthcare system. In Fog computing: Breakthroughs in research and practice (pp. 365–378). IGI global.
Kumar, P.M., Lokesh, S., Varatharajan, R., Babu, G.C. and Parthasarathy, P., 2018. Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. Future Generation Computer Systems, 86, pp. 527–534.
Ali, S. M., Elameer, A. S., and Jaber, M. M. (2022). IoT network security using autoencoder deep neural network and channel access algorithm. Journal of Intelligent Systems, 31(1), 95–103.
Amutha, J., Sharma, S., and Sharma, S. K. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review, 40, 100376.
Malathy, E. M., Asaithambi, M., Dheeraj, A., and Arputharaj, K. (2022). Hybrid bird swarm optimized quasi affine algorithm based node location in wireless sensor networks. Wireless Personal Communications, 122(2), 947–962.
Muthu, B., Sivaparthipan, C.B., Manogaran, G., Sundarasekar, R., Kadry, S., Shanthini, A. and Dasel, A., 2020. IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. Peer-to-peer networking and applications, 13(6), pp. 2123–2134.
https://www.kdnuggets.com/2017/01/machine-learning-cyber-security.html
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Cyber Security and Mobility
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.