Online citations, reference lists, and bibliographies.
← Back to Search

SAMS: A Seamless And Authorized Multimedia Streaming Framework For WMSN-Based IoMT

M. Jan, M. Usman, X. He, Ateeq Ur Rehman
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
An Internet of Multimedia Things (IoMT) architecture aims to provide a support for real-time multimedia applications by using wireless multimedia sensor nodes that are deployed for a long-term usage. These nodes are capable of capturing both multimedia and nonmultimedia data, and form a network known as Wireless Multimedia Sensor Network (WMSN). In a WMSN, underlying routing protocols need to provide an acceptable level of Quality of Service (QoS) support for multimedia traffic. In this paper, we propose a Seamless and Authorized Streaming (SAMS) framework for a cluster-based hierarchical WMSN. The SAMS uses authentication at different levels to form secured clusters. The formation of these clusters allows only legitimate nodes to transmit captured data to their Cluster Heads (CHs). Each node senses the environment, stores captured data in its buffer, and waits for its turn to transmit to its CH. This waiting may result in an excessive packet-loss and end-to-end delay for multimedia traffic. To address these issues, a channel allocation approach is proposed for an intercluster communication. In the case of a buffer overflow, a member node in one cluster switches to a neighboring CH provided that the latter has an available channel for allocation. The experimental results show that the SAMS provides an acceptable level of QoS and enhances security of an underlying network.
This paper references
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic (2014)
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
A payload-based mutual authentication scheme for Internet of Things
M. Jan (2019)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi (2013)
Ubiquitous Transmission of Multimedia Sensor Data in Internet of Things
G. Xu (2018)
A Survey on Security and Privacy Issues in Internet-of-Things
Yuchen Yang (2017)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
M. Jan (2014)
Secure integration of IoT and Cloud Computing
C. Stergiou (2018)
A Sybil attack detection scheme for a forest wildfire monitoring application
M. Jan (2018)
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
A. K. Das (2016)
Two-factor user authentication in wireless sensor networks
M. Das (2009)
IoT-RTP and IoT-RTCP: Adaptive Protocols for Multimedia Transmission over Internet of Things Environments
O. Said (2017)
Guidelines for Writing RFC Text on Security Considerations
M. Westerlund (2016)
PASCCC: Priority-based application-specific congestion control clustering protocol
M. Jan (2014)
IoMT: A Reliable Cross Layer Protocol for Internet of Multimedia Things
S. Rani (2017)
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
R. Amin (2016)
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
Jie Lin (2017)
IoT security: Review, blockchain solutions, and open challenges
M. Khan (2018)
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-lien Yeh (2011)
Two-factor mutual authentication with key agreement in wireless sensor networks
B. Vaidya (2016)

This paper is referenced by
A comprehensive survey of security threats and their mitigation techniques for next‐generation SDN controllers
T. Han (2020)
A Distributed Trust Management Model for the Internet of Things (DTM-IoT)
M. Alshehri (2019)
Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks
Xiaoying Qiu (2019)
PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme
Rahim Khan (2019)
DEAR-2: An Energy-Aware Routing Protocol with Guaranteed Delivery in Wireless Ad-hoc Networks
Muhammad Umair Hassan (2019)
Lifting-based fast and low memory DWT computation for IoT platform
Mohd Tausif (2019)
Internet of Things-Based Smart City Environments Using Big Data Analytics: A Survey
Muhammad Babar (2019)
SMFrWF: Segmented Modified Fractional Wavelet Filter: Fast Low-Memory Discrete Wavelet Transform (DWT)
Mohd Tausif (2019)
An energy-efficient distributed adaptive cooperative routing based on reinforcement learning in wireless multimedia sensor networks
Denghui Wang (2020)
An efficient priority‐based convolutional auto‐encoder approach for electrocardiogram signal compression in Internet of Things based healthcare system
Rakesh Kumar Mahendran (2020)
Research Challenges in the Internet of Things (IoTs)
Seema Begum (2019)
Internet of Medical Things (IoMT) for orthopaedic in COVID-19 pandemic: Roles, challenges, and applications
Ravi Pratap Singh (2020)
ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods
Lanjing Wang (2020)
Interoperability and Data Storage in Internet of Multimedia Things: Investigating Current Trends, Research Challenges and Future Directions
Guojie Yang (2020)
An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network
Syed Roohullah Jan (2019)
IOT in Big Data Challenges and Opportunities
I. Khan (2018)
A Survey on Big Multimedia Data Processing and Management in Smart Cities
M. Usman (2019)
A Survey on Representation Learning Efforts in Cybersecurity Domain
M. Usman (2020)
Semantic Scholar Logo Some data provided by SemanticScholar