Analysis of the Security of Internet of Multimedia Things

被引:34
|
作者
Lv, Zhihan [1 ,2 ]
Qiao, Liang [1 ]
Song, Houbing [3 ]
机构
[1] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[2] Warsaw Univ Technol, Inst Comp Sci, Artificial Intelligence Dept, Warsaw, Poland
[3] Embry Riddle Aeronaut Univ, Dept Elect Engn & Comp Sci, Daytona Beach, FL 32114 USA
基金
中国国家自然科学基金;
关键词
Internet of things; multimedia VANET; an undo list; privacy information; security; PRESERVING AUTHENTICATION SCHEME; PRIVACY;
D O I
10.1145/3398201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To study the security performance of the Internet of multimedia things on the privacy protection of user identity, behavior trajectory, and preference under the new information technology industry wave, in this study, aiming at the problems of the sharing of Internet of things perception data and the exposure of users' privacy information, the Anonymous Batch Authentication Scheme (ABAH) for privacy protection is designed. Hash-based Message Authentication Code is used to cancel the list-checking process and analyze its security performance. Compared with the methods of elliptic curve digital signature algorithm, Bayes least-square method, identity-based bulk verification, anonymous batch authentication and key protocol, conditional privacy authentication scheme, and expert message authentication protocol, the transmission delay, packet loss rate, and computation cost are studied without considering the undo list and during the undo check. The results show that with the increase of information size, the transmission delay and packet loss rate also increase, and the transmission delay of ABAH increases by about I5%, while the correlation between speed and transmission delay is small. In the case of the same amount of validation information, ABAH has the highest validation efficiency, and it still has an efficient validation effect in the case of invalid information. The message packet loss rate for ABAH is always 0 when the undo check validation overhead is considered. It can be found that ABAH can avoid the communication overhead and privacy leakage caused by the revocation list, ensure the integrity of batch verification information, meet the security performance of the vehicular ad hoc network under the Internet of Things, and protect the privacy of users from being disclosed.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Multihoming for Mobile Internet of Multimedia Things
    Balan, Titus
    Robu, Dan
    Sandu, Florin
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [42] Editorial Note: Internet of Multimedia Things
    Multimedia Tools and Applications, 2017, 76 : 25873 - 25873
  • [43] Analysis of Security Issues and Countermeasures for the Industrial Internet of Things
    Pal, Shantanu
    Jadidi, Zahra
    APPLIED SCIENCES-BASEL, 2021, 11 (20):
  • [44] Threat-based Security Analysis for the Internet of Things
    Atamli, Ahmad W.
    Martin, Andrew
    2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2014, : 35 - 43
  • [45] Security Analysis of the Constrained Application Protocol in the Internet of Things
    Alghamdi, Thamer A.
    Lasebae, Aboubaker
    Aiash, Mahdi
    2013 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT 2013), 2013, : 163 - 168
  • [46] Apparatus: A framework for security analysis in internet of things systems
    Mavropoulos, Orestis
    Mouratidis, Haralambos
    Fish, Andrew
    Panaousis, Emmanouil
    AD HOC NETWORKS, 2019, 92
  • [47] Cyberentity Security in the Internet of Things
    Ning, Huansheng
    Liu, Hong
    Yang, Laurence T.
    COMPUTER, 2013, 46 (04) : 46 - 53
  • [48] Security and Privacy in the Internet of Things
    Seitz, Ludwig
    ERCIM NEWS, 2015, (101): : 17 - 17
  • [49] A Review of Security in Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    Refoufi, Allaoua
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) : 325 - 344
  • [50] Challenges In Security In Internet Of Things
    Florea, Julia
    Ruse, Laura Cristina
    Rughinis, Razvan
    2017 16TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2017,