A survey on security analysis and privacy issues of wireless multimedia communication system

Author(s):  
A. Vyasa Bharadwaja ◽  
V. Ganesan

Transmission of digital images for wireless multimedia communication system requires reliable security in storage which is a challenging task. So many works are carried out to develop and implement the cryptographic techniques for a wireless multimedia communication system. A traditional symmetric key cryptographic algorithm such as Light weight Data Encryption Standard cipher, Advanced Encryption Standard cipher, Triple-DES, Twofish, Blowfish, RC5 etc played a major role to transmit and receive the multimedia (text, image and video) data. Proposed DNA computing based authentication algorithm provides secure transmission of multimedia data by using symmetric key cryptography techniques. DNA computing techniques provides a higher level of security and enables the user to store a large amount of data. Finally, it shows the implemented result analysis the performance of different symmetric key cryptographic techniques using the simulation parameters such as power consumption, key size, processing time, memory space, speed and latency. It also improves the security level by incorporating the advantage of DNA cryptography to achieve a high level of security against various attacks.


2020 ◽  
Author(s):  
Md Jalil Piran

The stringent requirements of wireless multimedia<br>transmission lead to very high radio spectrum solicitation. Although the radio spectrum is considered as a scarce resource, the<br>issue with spectrum availability is not scarcity, but the inefficient<br>utilization. Unique characteristics of cognitive radio (CR) such<br>as flexibility, adaptability, and interoperability, particularly have<br>contributed to it being the optimum technological candidate to<br>alleviate the issue of spectrum scarcity for multimedia communications. However, multimedia communications over CR<br>networks (MCRNs) as a bandwidth-hungry, delay-sensitive, and<br>loss-tolerant service, exposes several severe challenges specially<br>to guarantee quality of service (QoS) and quality of experience<br>(QoE). As a result, to date, different schemes based on source and<br>channel coding, multicast, and distributed streaming, have been<br>examined to improve the QoS/QoE in MCRNs. In this paper,<br>we survey QoS/QoE provisioning schemes in MCRNs. We first<br>discuss the basic concepts of multimedia communication, CRNs,<br>QoS and QoE. Then, we present the advantages of utilizing CR<br>for multimedia services and outline the stringent QoS and QoE<br>requirements in MCRNs. Next, we classify the critical challenges<br>for QoS/QoE provisioning in MCRNs including spectrum sensing,<br>resource allocation management, network fluctuations management, latency management, and energy consumption management. Then, we survey the corresponding feasible solutions for<br>each challenge highlighting performance issues, strengths, and<br>weaknesses. Furthermore, we discuss several important open<br>research problems and provide some avenues for future research. <br>


2018 ◽  
Vol 14 (9) ◽  
pp. 155014771880218 ◽  
Author(s):  
Bayan Hashr Alamri ◽  
Muhammad Mostafa Monowar ◽  
Suhair Alshehri

Mobile crowdsensing is an emerging technology in which participants contribute sensor readings for different sensing applications. This technology enables a broad range of sensing applications by utilizing smartphones and tablets worldwide to improve people’s quality of life. Protecting participants’ privacy and ensuring the trustworthiness of the sensor readings are conflicting objectives and key challenges in this field. Privacy issues arise from the disclosure of the participant-related context information, such as participants’ location. Trustworthiness issues arise from the open nature of sensing system because anyone can contribute data. This article proposes a privacy-preserving collaborative reputation system that preserves privacy and ensures data trustworthiness of the sensor readings for mobile crowdsensing applications. The proposed work also counters a number of possible attacks that might occur in mobile crowdsensing applications. We provide a detailed security analysis to prove the effectiveness of privacy-preserving collaborative reputation system against a number of attacks. We conduct an extensive simulation to investigate the performance of our schema. The obtained results show that the proposed schema is practical; it succeeds in identifying malicious users in most scenarios. In addition, it tolerates a large number of colluding adversaries even if their number surpass 65%. Moreover, it detects on-off attackers even if they report trusted data with high probability (0.8).


Sign in / Sign up

Export Citation Format

Share Document