Abstract
To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users’ privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about 15%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.
- M. Mozaffari, W. Saad, M. Bennis, et al. 2017. Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications. IEEE Trans. Wireless Commun. 16, 11 (2017), 7574--7589.Google Scholar
Cross Ref
- T. Qiu, R. Qiao, and D. O. Wu. 2017. EABS: An event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans. Mobile Comput. 17, 1 (2017), 72--84.Google Scholar
Cross Ref
- J. Wang, Z. Hong, Y. Zhang, and Y. Jin. 2017. Enabling security-enhanced attestation with intel SGX for remote terminal and iot. IEEE Trans. Comput.-Aided Design Integr. Circ. Syst. 37, 1 (2017), 88--96.Google Scholar
Cross Ref
- Y. Zhang, M. Chen, N. Guizani, et al. 2017. SOVCAN: Safety-oriented vehicular controller area network. IEEE Commun. Mag. 55, 8 (2017), 94--99.Google Scholar
Cross Ref
- J. Park, Y. Kim, and J. R. Lee. 2017. Mobility load balancing method for self-organizing wireless networks inspired by synchronization and matching with preferences. IEEE Trans. Vehic. Technol. 67, 3 (2017), 2594--2606.Google Scholar
Cross Ref
- K. Huang, Q. Zhang, C. Zhou, et al. 2017. An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans. Syst. Man Cybernet.: Syst. 47, 10 (2017), 2704--2713.Google Scholar
Cross Ref
- S. Fu, J. Liu, and W. Zhu. 2017. Multimedia content delivery with network function virtualization: The energy perspective. IEEE MultiMedia 24, 3 (2017), 38--47.Google Scholar
Cross Ref
- K. Huguenin, I. Bilogrevic, J. S. Machado, et al. 2017. A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins. IEEE Trans. Mobile Comput. 17, 4 (2017), 760--774.Google Scholar
Cross Ref
- N. Neshenko, E. Bou-Harb, J. Crichigno, et al. 2019. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surveys Tutor. 21, 3 (2019), 2702--2733.Google Scholar
Cross Ref
- H. Wu and W. Wang. 2018. A game theory-based collaborative security detection method for internet of things systems. IEEE Trans. Info. Forens. Secur. 13, 6 (2018), 1432--1445.Google Scholar
Cross Ref
- Y. Zhang, L. Xu, Q. Dong, et al. 2018. Recryptor: A reconfigurable cryptographic cortex-M0 processor with in-memory and near-memory computing for IoT security. IEEE J. Solid-State Circ. 53, 4 (2018), 995--1005.Google Scholar
Cross Ref
- I. You, C. Fung, J. Baek, et al. 2018. IEEE access special section editorial: Security and privacy in applications and services for future internet of things. IEEE Access 6 (2018), 39398--39400.Google Scholar
Cross Ref
- C. M. Chen, B. Xiang, Y. Liu, and K. H. Wang. 2019. A secure authentication protocol for internet of vehicles. IEEE Access 7 (2019), 12047—12057.Google Scholar
Cross Ref
- A. A. Khan, M. Abolhasan, and W. Ni. 2018. An evolutionary game theoretic approach for stable and optimized clustering in VANETs. IEEE Trans. Vehic. Technol. 67, 5 (2018), 4501--4513.Google Scholar
Cross Ref
- X. Zhang and X. Chen. 2019. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network. IEEE Access 7 (2019), 58241--58254.Google Scholar
Cross Ref
- C. Sun, J. Liu, X. Xu, and J. Ma. 2017. A privacy-preserving mutual authentication resisting DoS attacks in VANETs. IEEE Access 5 24012--24022.Google Scholar
- S. O. Dabironezare, J. Hassel, E. Gandini, et al. 2018. A dual-band focal plane array of kinetic inductance bolometers based on frequency-selective absorbers. IEEE Trans. Terahertz Sci. Technol. 8, 6 (2018), 746--756.Google Scholar
Cross Ref
- N. Desai, C. Juvekar, S. Chandak, et al. 2017. An actively detuned wireless power receiver with public key cryptographic authentication and dynamic power allocation. IEEE J. Solid-State Circ. 53, 1 (2017), 236--246.Google Scholar
Cross Ref
- A. Barenghi, G. M. Bertoni, L. Breveglieri, et al. 2016. A fault-based secret key retrieval method for ECDSA: Analysis and countermeasure. ACM J. Emerg. Technol. Comput. Syst. 13, 1 (2016), 1--26.Google Scholar
Digital Library
- H. Zhu, Y. Yuan, Y. Chen, et al. 2019. A secure and efficient data integrity verification scheme for cloud-IoT based on short signature. IEEE Access 7 (2019), 90036--90044.Google Scholar
Cross Ref
- J. Cui, J. Zhang, H. Zhong, et al. 2017. SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Vehic. Technol. 66, 11 (2017), 10283--10295.Google Scholar
Cross Ref
- S. A. A. Hakeem, M. A. A. El-Gawad, and H. Kim. 2019. A decentralized lightweight authentication and privacy protocol for vehicular networks. IEEE Access 7 (2019), 119689--119705.Google Scholar
Cross Ref
- M. Bi, X. Fu, X. Zhou, et al. 2017. Chaotic nonlinear encryption scheme for CPAs resistance and PAPR reduction in OFDM-PON. IEEE Photon. Technol. Lett. 29, 24 (2017), 2147--2150.Google Scholar
Cross Ref
- Z. C. Liu, L. Xiong, T. Peng, et al. 2018. A realistic distributed conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Access 6 (2018), 26307--26317.Google Scholar
Cross Ref
- C. Che, L. Liu, T. Qiu, et al. 2018. Asgr: An artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans. Intell. Transport. Syst. 20, 5 (2018), 1604--1620.Google Scholar
- J. Kang, R. Yu, X. Huang, and Y. Zhang. 2017. Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transport. Syst. 19, 8 (2017), 2627--2637.Google Scholar
Cross Ref
- Y. Yu, Y. Zhao, Y. Li, et al. 2019. Blockchain-based anonymous authentication with selective revocation for smart industrial applications. IEEE Trans. Industr. Informat. 16, 5 (2019), 3290--3300.Google Scholar
Cross Ref
- J. Cui, D. Wu, J. Zhang, et al. 2019. An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans. Vehic. Technol. 68, 3 (2019), 2972--2986.Google Scholar
Cross Ref
- Z. Lv, A. Halawani, S. Feng, H. Li, and S. U. Réhman. 2014. Multimodal hand and foot gesture interaction for handheld devices. ACM Trans. Multimedia Comput., Commun., Appl. 11, 1 (Oct. 2014), 1--9.Google Scholar
- Z. Lv, X. Li, H. Lv, and W. Xiu. 2019. BIM big data storage in webVRGIS. IEEE Trans. Industr. Informat. (May 2019).Google Scholar
- Z. Lv, W. Kong, X. Zhang, D. Jiang, H. Lv, and X. Lu. 2019. Intelligent security planning for regional distributed energy internet. IEEE Trans. Industr. Informat. (May 2019).Google Scholar
- Z. Lv, B. Hu, and H. Lv. 2019. Infrastructure monitoring and operation for smart cities based on IoT system. IEEE Trans. Industr. Informat. (Apr. 2019).Google Scholar
- T. Hussain, K. Muhammad, A. Ullah, Z. Cao, SW. Baik, and V. H. de Albuquerque. 2019. Cloud-assisted multiview video summarization using CNN and bidirectional LSTM. IEEE Trans. Industrial Informat. 16, 1 (July 2019), 77--86.Google Scholar
- T. Hussain, K. Muhammad, J. Del Ser, and SW. Baik, and V. H. de Albuquerque. 2019. Intelligent embedded vision for summarization of multi-view videos in IIoT. IEEE Trans. Industr. Informat. (Aug. 2019).Google Scholar
- I. Mehmood, A. Ullah, K. Muhammad, D. J. Deng, W. Meng, F. Al-Turjman, M. Sajjad, and V. H. de Albuquerque. 2019. Efficient image recognition and retrieval on IoT-assisted energy-constrained platforms from big data repositories. IEEE Internet Things J. 6, 6 (Jan. 2019), 9246--9255.Google Scholar
Cross Ref
- K. Muhammad, T. Hussain, M. Tanveer, G. Sannino, and V. H. de Albuquerque. 2019. Cost-effective video summarization using deep CNN with hierarchical weighted fusion for IoT surveillance networks. IEEE Internet Things J. (Nov. 2019).Google Scholar
Cross Ref
- B. Jiang, J. Yang, G. Ding, and H. Wang. 2019. Cyber-physical security design in multimedia data cache resource allocation for industrial networks. IEEE Trans. Industr. Informat. 15, 12 (2019), 6472--6480.Google Scholar
Cross Ref
- B. Jiang, J. Yang, H. Xu, H. Song, and G. Zheng. 2018. Multimedia data throughput maximization in internet-of-things system based on optimization of cache-enabled UAV. IEEE Internet Things J. 14, 6(2) (Dec. 2018), 3525--3532.Google Scholar
- B. Jiang, J. Yang, Z. Lv, and H. Song. 2018. Wearable vision assistance system based on binocular sensors for visually impaired users. IEEE Internet Things J. 6, 2 (2018), 1375--1383.Google Scholar
Cross Ref
- S. F. Aghili, H. Mala, M. Shojafar, and P. Peris-Lopez. 2019. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gen. Comput. Syst. 1, 96 (2019), 410--424.Google Scholar
Cross Ref
- S. F. Aghili, H. Mala, M. Shojafar, and M. Conti. 2019. Pakit: Proactive authentication and key agreement protocol for internet of things. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’19). IEEE, 348--353.Google Scholar
Index Terms
Analysis of the Security of Internet of Multimedia Things
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Threat-Based Security Analysis for the Internet of Things
SIOT '14: Proceedings of the 2014 International Workshop on Secure Internet of ThingsThe Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.






Comments