skip to main content
research-article

Analysis of the Security of Internet of Multimedia Things

Authors Info & Claims
Published:17 December 2020Publication History
Skip Abstract Section

Abstract

To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users’ privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about 15%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.

References

  1. M. Mozaffari, W. Saad, M. Bennis, et al. 2017. Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications. IEEE Trans. Wireless Commun. 16, 11 (2017), 7574--7589.Google ScholarGoogle ScholarCross RefCross Ref
  2. T. Qiu, R. Qiao, and D. O. Wu. 2017. EABS: An event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans. Mobile Comput. 17, 1 (2017), 72--84.Google ScholarGoogle ScholarCross RefCross Ref
  3. J. Wang, Z. Hong, Y. Zhang, and Y. Jin. 2017. Enabling security-enhanced attestation with intel SGX for remote terminal and iot. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 37, 1 (2017), 88--96.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y. Zhang, M. Chen, N. Guizani, et al. 2017. SOVCAN: Safety-oriented vehicular controller area network. IEEE Commun. Mag. 55, 8 (2017), 94--99.Google ScholarGoogle ScholarCross RefCross Ref
  5. J. Park, Y. Kim, and J. R. Lee. 2017. Mobility load balancing method for self-organizing wireless networks inspired by synchronization and matching with preferences. IEEE Trans. Vehic. Technol. 67, 3 (2017), 2594--2606.Google ScholarGoogle ScholarCross RefCross Ref
  6. K. Huang, Q. Zhang, C. Zhou, et al. 2017. An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans. Syst. Man Cybernet.: Syst. 47, 10 (2017), 2704--2713.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Fu, J. Liu, and W. Zhu. 2017. Multimedia content delivery with network function virtualization: The energy perspective. IEEE MultiMedia 24, 3 (2017), 38--47.Google ScholarGoogle ScholarCross RefCross Ref
  8. K. Huguenin, I. Bilogrevic, J. S. Machado, et al. 2017. A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins. IEEE Trans. Mobile Comput. 17, 4 (2017), 760--774.Google ScholarGoogle ScholarCross RefCross Ref
  9. N. Neshenko, E. Bou-Harb, J. Crichigno, et al. 2019. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surveys Tutor. 21, 3 (2019), 2702--2733.Google ScholarGoogle ScholarCross RefCross Ref
  10. H. Wu and W. Wang. 2018. A game theory-based collaborative security detection method for internet of things systems. IEEE Trans. Info. Forens. Secur. 13, 6 (2018), 1432--1445.Google ScholarGoogle ScholarCross RefCross Ref
  11. Y. Zhang, L. Xu, Q. Dong, et al. 2018. Recryptor: A reconfigurable cryptographic cortex-M0 processor with in-memory and near-memory computing for IoT security. IEEE J. Solid-State Circ. 53, 4 (2018), 995--1005.Google ScholarGoogle ScholarCross RefCross Ref
  12. I. You, C. Fung, J. Baek, et al. 2018. IEEE access special section editorial: Security and privacy in applications and services for future internet of things. IEEE Access 6 (2018), 39398--39400.Google ScholarGoogle ScholarCross RefCross Ref
  13. C. M. Chen, B. Xiang, Y. Liu, and K. H. Wang. 2019. A secure authentication protocol for internet of vehicles. IEEE Access 7 (2019), 12047—12057.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. A. Khan, M. Abolhasan, and W. Ni. 2018. An evolutionary game theoretic approach for stable and optimized clustering in VANETs. IEEE Trans. Vehic. Technol. 67, 5 (2018), 4501--4513.Google ScholarGoogle ScholarCross RefCross Ref
  15. X. Zhang and X. Chen. 2019. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network. IEEE Access 7 (2019), 58241--58254.Google ScholarGoogle ScholarCross RefCross Ref
  16. C. Sun, J. Liu, X. Xu, and J. Ma. 2017. A privacy-preserving mutual authentication resisting DoS attacks in VANETs. IEEE Access 5 24012--24022.Google ScholarGoogle Scholar
  17. S. O. Dabironezare, J. Hassel, E. Gandini, et al. 2018. A dual-band focal plane array of kinetic inductance bolometers based on frequency-selective absorbers. IEEE Trans. Terahertz Sci. Technol. 8, 6 (2018), 746--756.Google ScholarGoogle ScholarCross RefCross Ref
  18. N. Desai, C. Juvekar, S. Chandak, et al. 2017. An actively detuned wireless power receiver with public key cryptographic authentication and dynamic power allocation. IEEE J. Solid-State Circ. 53, 1 (2017), 236--246.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. Barenghi, G. M. Bertoni, L. Breveglieri, et al. 2016. A fault-based secret key retrieval method for ECDSA: Analysis and countermeasure. ACM J. Emerg. Technol. Comput. Syst. 13, 1 (2016), 1--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Zhu, Y. Yuan, Y. Chen, et al. 2019. A secure and efficient data integrity verification scheme for cloud-IoT based on short signature. IEEE Access 7 (2019), 90036--90044.Google ScholarGoogle ScholarCross RefCross Ref
  21. J. Cui, J. Zhang, H. Zhong, et al. 2017. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Vehic. Technol. 66, 11 (2017), 10283--10295.Google ScholarGoogle ScholarCross RefCross Ref
  22. S. A. A. Hakeem, M. A. A. El-Gawad, and H. Kim. 2019. A decentralized lightweight authentication and privacy protocol for vehicular networks. IEEE Access 7 (2019), 119689--119705.Google ScholarGoogle ScholarCross RefCross Ref
  23. M. Bi, X. Fu, X. Zhou, et al. 2017. Chaotic nonlinear encryption scheme for CPAs resistance and PAPR reduction in OFDM-PON. IEEE Photon. Technol. Lett. 29, 24 (2017), 2147--2150.Google ScholarGoogle ScholarCross RefCross Ref
  24. Z. C. Liu, L. Xiong, T. Peng, et al. 2018. A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 6 (2018), 26307--26317.Google ScholarGoogle ScholarCross RefCross Ref
  25. C. Che, L. Liu, T. Qiu, et al. 2018. Asgr: An artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans. Intell. Transport. Syst. 20, 5 (2018), 1604--1620.Google ScholarGoogle Scholar
  26. J. Kang, R. Yu, X. Huang, and Y. Zhang. 2017. Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transport. Syst. 19, 8 (2017), 2627--2637.Google ScholarGoogle ScholarCross RefCross Ref
  27. Y. Yu, Y. Zhao, Y. Li, et al. 2019. Blockchain-based anonymous authentication with selective revocation for smart industrial applications. IEEE Trans. Industr. Informat. 16, 5 (2019), 3290--3300.Google ScholarGoogle ScholarCross RefCross Ref
  28. J. Cui, D. Wu, J. Zhang, et al. 2019. An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans. Vehic. Technol. 68, 3 (2019), 2972--2986.Google ScholarGoogle ScholarCross RefCross Ref
  29. Z. Lv, A. Halawani, S. Feng, H. Li, and S. U. Réhman. 2014. Multimodal hand and foot gesture interaction for handheld devices. ACM Trans. Multimedia Comput., Commun., Appl. 11, 1 (Oct. 2014), 1--9.Google ScholarGoogle Scholar
  30. Z. Lv, X. Li, H. Lv, and W. Xiu. 2019. BIM big data storage in webVRGIS. IEEE Trans. Industr. Informat. (May 2019).Google ScholarGoogle Scholar
  31. Z. Lv, W. Kong, X. Zhang, D. Jiang, H. Lv, and X. Lu. 2019. Intelligent security planning for regional distributed energy internet. IEEE Trans. Industr. Informat. (May 2019).Google ScholarGoogle Scholar
  32. Z. Lv, B. Hu, and H. Lv. 2019. Infrastructure monitoring and operation for smart cities based on IoT system. IEEE Trans. Industr. Informat. (Apr. 2019).Google ScholarGoogle Scholar
  33. T. Hussain, K. Muhammad, A. Ullah, Z. Cao, SW. Baik, and V. H. de Albuquerque. 2019. Cloud-assisted multiview video summarization using CNN and bidirectional LSTM. IEEE Trans. Industrial Informat. 16, 1 (July 2019), 77--86.Google ScholarGoogle Scholar
  34. T. Hussain, K. Muhammad, J. Del Ser, and SW. Baik, and V. H. de Albuquerque. 2019. Intelligent embedded vision for summarization of multi-view videos in IIoT. IEEE Trans. Industr. Informat. (Aug. 2019).Google ScholarGoogle Scholar
  35. I. Mehmood, A. Ullah, K. Muhammad, D. J. Deng, W. Meng, F. Al-Turjman, M. Sajjad, and V. H. de Albuquerque. 2019. Efficient image recognition and retrieval on IoT-assisted energy-constrained platforms from big data repositories. IEEE Internet Things J. 6, 6 (Jan. 2019), 9246--9255.Google ScholarGoogle ScholarCross RefCross Ref
  36. K. Muhammad, T. Hussain, M. Tanveer, G. Sannino, and V. H. de Albuquerque. 2019. Cost-effective video summarization using deep CNN with hierarchical weighted fusion for IoT surveillance networks. IEEE Internet Things J. (Nov. 2019).Google ScholarGoogle ScholarCross RefCross Ref
  37. B. Jiang, J. Yang, G. Ding, and H. Wang. 2019. Cyber-physical security design in multimedia data cache resource allocation for industrial networks. IEEE Trans. Industr. Informat. 15, 12 (2019), 6472--6480.Google ScholarGoogle ScholarCross RefCross Ref
  38. B. Jiang, J. Yang, H. Xu, H. Song, and G. Zheng. 2018. Multimedia data throughput maximization in internet-of-things system based on optimization of cache-enabled UAV. IEEE Internet Things J. 14, 6(2) (Dec. 2018), 3525--3532.Google ScholarGoogle Scholar
  39. B. Jiang, J. Yang, Z. Lv, and H. Song. 2018. Wearable vision assistance system based on binocular sensors for visually impaired users. IEEE Internet Things J. 6, 2 (2018), 1375--1383.Google ScholarGoogle ScholarCross RefCross Ref
  40. S. F. Aghili, H. Mala, M. Shojafar, and P. Peris-Lopez. 2019. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gen. Comput. Syst. 1, 96 (2019), 410--424.Google ScholarGoogle ScholarCross RefCross Ref
  41. S. F. Aghili, H. Mala, M. Shojafar, and M. Conti. 2019. Pakit: Proactive authentication and key agreement protocol for internet of things. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’19). IEEE, 348--353.Google ScholarGoogle Scholar

Index Terms

  1. Analysis of the Security of Internet of Multimedia Things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 16, Issue 3s
      Special Issue on Privacy and Security in Evolving Internet of Multimedia Things and Regular Papers
      October 2020
      190 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3444536
      Issue’s Table of Contents

      Copyright © 2020 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 December 2020
      • Online AM: 7 May 2020
      • Accepted: 1 May 2020
      • Revised: 1 April 2020
      • Received: 1 March 2020
      Published in tomm Volume 16, Issue 3s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!