Analysis of the Security of Internet of Multimedia Things

被引:34
|
作者
Lv, Zhihan [1 ,2 ]
Qiao, Liang [1 ]
Song, Houbing [3 ]
机构
[1] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[2] Warsaw Univ Technol, Inst Comp Sci, Artificial Intelligence Dept, Warsaw, Poland
[3] Embry Riddle Aeronaut Univ, Dept Elect Engn & Comp Sci, Daytona Beach, FL 32114 USA
基金
中国国家自然科学基金;
关键词
Internet of things; multimedia VANET; an undo list; privacy information; security; PRESERVING AUTHENTICATION SCHEME; PRIVACY;
D O I
10.1145/3398201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users' privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about I5%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Internet of Things Security
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [22] Internet of things security
    Baskaran S.B.M.
    Journal of ICT Standardization, 2019, 7 (01): : 21 - 39
  • [23] Physical layer security in massive internet of things: delay and security analysis
    Zhang, Shuai
    Xu, Xiaoming
    Peng, Jianhua
    Huang, Kaizhi
    Li, Zhigang
    IET COMMUNICATIONS, 2019, 13 (01) : 93 - 98
  • [24] Internet of multimedia things (IoMT): A review
    Laghari, Asif Ali
    Li, Hang
    Karim, Shahid
    Hyder, Waheeduddin
    Shoulin, Yin
    Khan, Abdullah Ayub
    Laghari, Rashid Ali
    REVIEW OF SOCIONETWORK STRATEGIES, 2024, : 19 - 47
  • [25] PIT: A Probe into Internet of Things by Comprehensive Security Analysis
    Sachidananda, Vinay
    Bhairav, Suhas
    Ghosh, Nirnay
    Elovici, Yuval
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 522 - 529
  • [26] Security analysis of the LED lightweight cipher in the internet of things
    Li, Wei
    Gu, Da-Wu
    Zhao, Chen
    Liu, Zhi-Qiang
    Liu, Ya
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (03): : 434 - 445
  • [27] A CONCEPTUAL MODEL TO SUPPORT SECURITY ANALYSIS IN THE INTERNET OF THINGS
    Mavropoulos, Orestis
    Mouratidis, Haralambos
    Fish, Andrew
    Panaousis, Emmanouil
    Kalloniatis, Christos
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (02) : 557 - 578
  • [28] Security of Medical Internet of Things (MIoT)- A Bibliometric Analysis
    Patil R.Y.
    Patil Y.H.
    Bannore A.
    Journal of Engineering Science and Technology Review, 2023, 16 (03) : 181 - 190
  • [29] Security Analysis and Exploitation of Arduino devices in the Internet of Things
    Alberca, Carlos
    Pastrana, Sergio
    Suarez-Tangil, Guillermo
    Palmieri, Paolo
    PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 437 - 442
  • [30] Internet of multimedia things: Vision and challenges
    Alvi, Sheeraz A.
    Afzal, Bilal
    Shah, Ghalib A.
    Atzori, Luigi
    Mahmood, Waqar
    AD HOC NETWORKS, 2015, 33 : 87 - 111