Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network de...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AIMS Press
2023-10-01
|
Series: | Mathematical Biosciences and Engineering |
Subjects: | |
Online Access: | https://www.aimspress.com/article/doi/10.3934/mbe.2023847?viewType=HTML |
_version_ | 1797634024176353280 |
---|---|
author | Faten S. Alamri Khalid Haseeb Tanzila Saba Jaime Lloret Jose M. Jimenez |
author_facet | Faten S. Alamri Khalid Haseeb Tanzila Saba Jaime Lloret Jose M. Jimenez |
author_sort | Faten S. Alamri |
collection | DOAJ |
description | Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics. |
first_indexed | 2024-03-11T12:01:58Z |
format | Article |
id | doaj.art-b8309f92d4864e27acb29926192f3b41 |
institution | Directory Open Access Journal |
issn | 1551-0018 |
language | English |
last_indexed | 2024-03-11T12:01:58Z |
publishDate | 2023-10-01 |
publisher | AIMS Press |
record_format | Article |
series | Mathematical Biosciences and Engineering |
spelling | doaj.art-b8309f92d4864e27acb29926192f3b412023-11-08T01:33:07ZengAIMS PressMathematical Biosciences and Engineering1551-00182023-10-012011191741919010.3934/mbe.2023847Multimedia IoT-surveillance optimization model using mobile-edge authentic computingFaten S. Alamri0Khalid Haseeb1Tanzila Saba 2Jaime Lloret 3Jose M. Jimenez41. Department of Mathematical Sciences, College of Science, Princess Nourah Bint Abdulrahman University, P.O.Box 84428, Riyadh, 11671, Saudi Arabia2. Artificial Intelligence & Data Analytics (AIDA) Lab CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia2. Artificial Intelligence & Data Analytics (AIDA) Lab CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia3. Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politenica de Valencia, 46730, Gandia, València, Spain3. Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politenica de Valencia, 46730, Gandia, València, SpainSmart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics.https://www.aimspress.com/article/doi/10.3934/mbe.2023847?viewType=HTMLmultimedia networksemerging technologiesinfrastructural developmentfuture networksedge computing |
spellingShingle | Faten S. Alamri Khalid Haseeb Tanzila Saba Jaime Lloret Jose M. Jimenez Multimedia IoT-surveillance optimization model using mobile-edge authentic computing Mathematical Biosciences and Engineering multimedia networks emerging technologies infrastructural development future networks edge computing |
title | Multimedia IoT-surveillance optimization model using mobile-edge authentic computing |
title_full | Multimedia IoT-surveillance optimization model using mobile-edge authentic computing |
title_fullStr | Multimedia IoT-surveillance optimization model using mobile-edge authentic computing |
title_full_unstemmed | Multimedia IoT-surveillance optimization model using mobile-edge authentic computing |
title_short | Multimedia IoT-surveillance optimization model using mobile-edge authentic computing |
title_sort | multimedia iot surveillance optimization model using mobile edge authentic computing |
topic | multimedia networks emerging technologies infrastructural development future networks edge computing |
url | https://www.aimspress.com/article/doi/10.3934/mbe.2023847?viewType=HTML |
work_keys_str_mv | AT fatensalamri multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing AT khalidhaseeb multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing AT tanzilasaba multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing AT jaimelloret multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing AT josemjimenez multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing |