Analysis of the Security of Internet of Multimedia Things in Wireless Environment

Authors

  • Nabeel Mahdy Haddad College of Education, Misan University, Iraq
  • Mustafa sabah Mustafa Department of Computer Science, Dijlah University College, Baghdad, 10021, Iraq
  • Hayder Sabah Salih Department of Private Education in the Iraqi Ministry of Higher Education and Scientific Research, Baghdad, 10024, Iraq
  • Mustafa Musa Jaber 4) Department of Computer Science, Al-turath University College, Baghdad, 10021, Iraq 5) Department of Medical Instruments Engineering Techniques, Al-farahidi University, Baghdad, Iraq
  • Mohammed Hasan Ali Computer Techniques Engineering Department, Faculty of Information Technology, Imam Ja’afar Al-Sadiq University, Najaf 10023, Iraq

DOI:

https://doi.org/10.13052/jcsm2245-1439.1316

Keywords:

Wireless environment, multimedia applications, internet of multimedia things, VANET, chaotic convolution, sampling

Abstract

The Internet of Things (IoT) and real-time flexibility improve people’s lives, and IoT applications rely heavily on multimedia sensors and devices. An interconnected network of IoT multimedia devices has made the Internet of Medical Things (IoMT). It creates massive data distinct from what the Internet of Things (IoT) produced. Smart traffic monitoring and smart hospitals are only a few examples of real-time deployment applications. IoMT data and decision-making must be made quickly since it directly impacts human life. The security heterogeneity of optimization issues is a significant challenge for enabling multimedia applications on the IoT. The IoMT has difficulty achieving low-cost data collecting while maintaining data security. An Internet of Multimedia Things in a wireless environment (IoMT-WE) system decreases the bandwidth and privacy risk caused by the revocation list, ensures the integrity of batch verification information, and corresponds with Vehicular ad hoc network (VANET) security performance. The proposed method uses random subsampling and chaotic convolution to collect numerous images. The sampling method is safe since the measurement matrix is controlled by chaos. As part of the IoMT architecture, wireless multimedia sensor nodes can be more easily deployed over the long term for real-time multimedia. The Wireless Multimedia Sensor Network (WMSN) comprises nodes that can capture both multimedia and non-multimedia data. The ioMT-WE system has been tested and found to be secure and effective.

Downloads

Download data is not yet available.

Author Biographies

Nabeel Mahdy Haddad, College of Education, Misan University, Iraq

Nabeel Mahdy Haddad is a lecturer at Misan University, Iraq. He completed his PhD at the University of Southern Queensland, Australia, his interest is Machine Learning.

Mustafa sabah Mustafa, Department of Computer Science, Dijlah University College, Baghdad, 10021, Iraq

Mustafa sabah Mustafa is a lecturer at Dijlah University College, His interest area is Deep Learning.

Hayder Sabah Salih, Department of Private Education in the Iraqi Ministry of Higher Education and Scientific Research, Baghdad, 10024, Iraq

Hayder Sabah Salih received his B.Sc Degree in computer engineering from Baghdad university Iraq, Baghdad in 2007, an M.Sc Degree in computer engineering from Moscow Automotive and road construction state technical university (MADI) in 2013, and a Ph.D. Degree in computer engineering/information technology and systems from Tambov State Technical University in 2020, currently he is holding the position of the head of the Scientific Affairs section in the Department of Private Education in Mohesr, Iraq.

Mustafa Musa Jaber, 4) Department of Computer Science, Al-turath University College, Baghdad, 10021, Iraq 5) Department of Medical Instruments Engineering Techniques, Al-farahidi University, Baghdad, Iraq

Mustafa Musa Jaber is a PhD holder from the technical university of Malaysia and he received a postdoctoral from University Tun hussein Onn Malaysia, his interest in telemedicine, machine learning, and the human factor. Currently working as head of the department of information technology, Dijlah University College, Baghdad, Iraq.

Mohammed Hasan Ali, Computer Techniques Engineering Department, Faculty of Information Technology, Imam Ja’afar Al-Sadiq University, Najaf 10023, Iraq

Mohammed Hasan Ali is a Senior Researcher in the Artificial Intelligence & Machine Learning Lab Imam Ja’afar Al-sadiq University. He received his PhD from Faculty of Computing System and Software Engineering Universiti Pahang Malaysia in 2016 and 2019 respectively. Currently working as head of Research Center, Imam Ja’afar Al-sadiq University, Iraq.

References

Obeidat, H., Shuaieb, W., Obeidat, O., and Abd-Alhameed, R. (2021). A review of indoor localization techniques and wireless technologies. Wireless Personal Communications, 119(1), 289–327.

Safaldin, M., Otair, M., and Abualigah, L. (2021). Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of ambient intelligence and humanized computing, 12(2), 1559–1576.

Manikandan, S., and Chinnadurai, M. (2021). Effective energy adaptive and consumption in wireless sensor network using distributed source coding and sampling techniques. Wireless Personal Communications, 118(2), 1393–1404.

Almutairi, A. F., Al-Gharabally, M., and Salman, A. A. (2021). Particle swarm optimization application for multiple attribute decision-making in vertical handover in heterogeneous wireless networks. Journal of Engineering Research, 9(1).

Chaves, P. R., Assumpção, R. M., Ferreira, L. C., Cardieri, P., Branquinho, O. C., and Fruett, F. (2021). A remote emulation environment for the teaching of low-power wireless communications. Computer Applications in Engineering Education, 29(6), 1453–1464.

Singer, A., and Robinson, J. T. (2021). Wireless power delivery techniques for miniature implantable bioelectronics. Advanced Healthcare Materials, 10(17), 2100664.

Dekkers, G., Rosas, F., van Waterschoot, T., Vanrumste, B., and Karsmakers, P. (2022). Dynamic sensor activation and decision-level fusion in wireless acoustic sensor networks for classification of domestic activities. Information Fusion, 77, 196–210.

Furqan, H. M., Solaija, M. S. J., Türkmen, H., and Arslan, H. (2021). Wireless communication, sensing, and REM: a security perspective. IEEE Open Journal of the Communications Society, 2, 287–321.

Singh, P., and Mittal, N. (2021). An efficient localization approach to locate sensor nodes in 3D wireless sensor networks using adaptive flower pollination algorithm. Wireless Networks, 27(3), 1999–2014.

Bashar, A., and Smys, S. (2021). Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks. IRO Journal on Sustainable Wireless Systems, 3(2), 59–67.

Rawat, P., and Chauhan, S. (2021). Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. Computer Science Review, 40, 100396.

Rezaeipanah, A., Amiri, P., Nazari, H., Mojarad, M., and Parvin, H. (2021). An energy-aware hybrid approach for wireless sensor networks using re-clustering-based multi-hop routing. Wireless Personal Communications, 120(4), 3293–3314.

Rodríguez, D. Z., Carrillo, D., Ramírez, M. A., Nardelli, P. H., and Möller, S. (2021). Incorporating wireless communication parameters into the E-model algorithm. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 29, 956–968.

Abdulsahib, G. M., and Khalaf, O. I. (2021). Accurate and effective data collection with minimum energy path selection in wireless sensor networks using mobile sinks. Journal of Information Technology Management, 13(2), 139–153.

Kanoun, O., Bradai, S., Khriji, S., Bouattour, G., El Houssaini, D., Ben Ammar, M., … and Viehweger, C. (2021). Energy-aware system design for autonomous wireless sensor nodes: A comprehensive review. Sensors, 21(2), 548.

Ostovar, A., Keshavarz, H., and Quan, Z. (2021). Cognitive radio networks for green wireless communications: an overview. Telecommunication Systems, 76(1), 129–138.

Dey, P., Kumar, C., Mitra, M., Mishra, R., Chaulya, S. K., Prasad, G. M., … and Banerjee, G. (2021). Deep convolutional neural network-based secure wireless voice communication for underground mines. Journal of Ambient Intelligence and Humanized Computing, 12(10), 9591–9610.

K. Rajakumari, P. Punitha, R.L. Kumar and C. Suresh, Improvising packet delivery and reducing delay ratio in Mobile ad hoc network using neighbor coverage-based topology control algorithm, International Journal of Communication Systems, 35 (2), 2022.

Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P.M., Sundarasekar, R. and Thota, C., 2018. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generation Computer Systems, 82, pp. 375–387.

Nayak, P., Swetha, G. K., Gupta, S., and Madhavi, K. (2021). Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities. Measurement, 178, 108974.

Almalki, F. A. (2021). Developing an adaptive channel modelling using a genetic algorithm technique to enhance aerial vehicle-to-everything wireless communications. Int J Comput Networks Commun, 13(2), 37–56.

Khashan, O. A., Ahmad, R., and Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448.

Venu, D., Mayuri, A. V. R., Neelakandan, S., Murthy, G. L. N., Arulkumar, N., and Shelke, N. (2022). An efficient low complexity compression-based optimal homomorphic encryption for secure fibre optic communication. Optik, 252, 168545.

Al-Turjman, F., Zahmatkesh, H., and Shahroze, R. (2022). An overview of security and privacy in smart cities’ IoT communications. Transactions on Emerging Telecommunications Technologies, 33(3), e3677.

Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R. and Priyan, M.K., 2018. Centralized fog computing security platform for IoT and cloud in healthcare system. In Fog computing: Breakthroughs in research and practice (pp. 365–378). IGI global.

Kumar, P.M., Lokesh, S., Varatharajan, R., Babu, G.C. and Parthasarathy, P., 2018. Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. Future Generation Computer Systems, 86, pp. 527–534.

Ali, S. M., Elameer, A. S., and Jaber, M. M. (2022). IoT network security using autoencoder deep neural network and channel access algorithm. Journal of Intelligent Systems, 31(1), 95–103.

Amutha, J., Sharma, S., and Sharma, S. K. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review, 40, 100376.

Malathy, E. M., Asaithambi, M., Dheeraj, A., and Arputharaj, K. (2022). Hybrid bird swarm optimized quasi affine algorithm based node location in wireless sensor networks. Wireless Personal Communications, 122(2), 947–962.

Muthu, B., Sivaparthipan, C.B., Manogaran, G., Sundarasekar, R., Kadry, S., Shanthini, A. and Dasel, A., 2020. IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. Peer-to-peer networking and applications, 13(6), pp. 2123–2134.

https://www.kdnuggets.com/2017/01/machine-learning-cyber-security.html

Downloads

Published

2023-12-11

How to Cite

1.
Haddad NM, Mustafa M sabah, Salih HS, Jaber MM, Ali MH. Analysis of the Security of Internet of Multimedia Things in Wireless Environment. JCSANDM [Internet]. 2023 Dec. 11 [cited 2024 Jul. 19];13(01):161-92. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/19147

Issue

Section

Futuristic AI Embedded Solutions for Cyber Security