Analysis of the Security of Internet of Multimedia Things

被引:34
|
作者
Lv, Zhihan [1 ,2 ]
Qiao, Liang [1 ]
Song, Houbing [3 ]
机构
[1] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[2] Warsaw Univ Technol, Inst Comp Sci, Artificial Intelligence Dept, Warsaw, Poland
[3] Embry Riddle Aeronaut Univ, Dept Elect Engn & Comp Sci, Daytona Beach, FL 32114 USA
基金
中国国家自然科学基金;
关键词
Internet of things; multimedia VANET; an undo list; privacy information; security; PRESERVING AUTHENTICATION SCHEME; PRIVACY;
D O I
10.1145/3398201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users' privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about I5%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Multimedia Internet of Things: A Comprehensive Survey
    Nauman, Ali
    Qadri, Yazdan Ahmad
    Amjad, Muhammad
    Bin Zikria, Yousaf
    Afzal, Muhammad Khalil
    Kim, Sung Won
    IEEE ACCESS, 2020, 8 : 8202 - 8250
  • [32] Editorial Note: Internet of Multimedia Things
    Piccialli, Francesco
    Jung, Jason J.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (24) : 25873 - 25873
  • [33] Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things
    Li, Wei
    Zhang, Wenwen
    Gu, Dawu
    Tao, Zhi
    Zhou, Zhihong
    Liu, Ya
    Liu, Zhiqiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (02): : 793 - 810
  • [34] Review of Internet of Things security protocols - A Bibliometric Analysis
    Mwansa, Gardner
    Mabanza, Ntima
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 394 - 400
  • [35] An Overview of Safety and Security Analysis Frameworks for the Internet of Things
    Abdulhamid, Alhassan
    Kabir, Sohag
    Ghafir, Ibrahim
    Lei, Ci
    ELECTRONICS, 2023, 12 (14)
  • [36] An Exploratory Analysis of the Security Risks of the Internet of Things in Finance
    Shepherd, Carlton
    Petitcolas, Fabien A. P.
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2017, 2017, 10442 : 164 - 179
  • [37] AN ANALYSIS OF SOFTWARE DEPLOYMENT SECURITY FOR INTERNET OF THINGS DEVICES
    Culic, Ioana
    Vochescu, Alexandru
    Rughiniș, Răzvan
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2023, 85 (02): : 3 - 14
  • [38] AN ANALYSIS OF SOFTWARE DEPLOYMENT SECURITY FOR INTERNET OF THINGS DEVICES
    Culic, Ioana
    Vochescu, Alexandru
    Rughinis, Razvan
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2023, 85 (02): : 3 - 14
  • [39] Security Analysis of the Internet of Things: A Systematic Literature Review
    Martinez, Juan
    Mejia, Jezreel
    Munoz, Mirna
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS IMPROVEMENT (CIMPS 2016): APPLICATIONS IN SOFTWARE ENGINEERING, 2016,
  • [40] A Dynamic Analysis Security Testing Infrastructure for Internet of Things
    Wang, Yong
    Kjerstad, Elliot
    Belisario, Bailey
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,