Multimedia IoT-surveillance optimization model using mobile-edge authentic computing

Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network de...

Full description

Bibliographic Details
Main Authors: Faten S. Alamri, Khalid Haseeb, Tanzila Saba, Jaime Lloret, Jose M. Jimenez
Format: Article
Language:English
Published: AIMS Press 2023-10-01
Series:Mathematical Biosciences and Engineering
Subjects:
Online Access:https://www.aimspress.com/article/doi/10.3934/mbe.2023847?viewType=HTML
_version_ 1797634024176353280
author Faten S. Alamri
Khalid Haseeb
Tanzila Saba
Jaime Lloret
Jose M. Jimenez
author_facet Faten S. Alamri
Khalid Haseeb
Tanzila Saba
Jaime Lloret
Jose M. Jimenez
author_sort Faten S. Alamri
collection DOAJ
description Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics.
first_indexed 2024-03-11T12:01:58Z
format Article
id doaj.art-b8309f92d4864e27acb29926192f3b41
institution Directory Open Access Journal
issn 1551-0018
language English
last_indexed 2024-03-11T12:01:58Z
publishDate 2023-10-01
publisher AIMS Press
record_format Article
series Mathematical Biosciences and Engineering
spelling doaj.art-b8309f92d4864e27acb29926192f3b412023-11-08T01:33:07ZengAIMS PressMathematical Biosciences and Engineering1551-00182023-10-012011191741919010.3934/mbe.2023847Multimedia IoT-surveillance optimization model using mobile-edge authentic computingFaten S. Alamri0Khalid Haseeb1Tanzila Saba 2Jaime Lloret 3Jose M. Jimenez41. Department of Mathematical Sciences, College of Science, Princess Nourah Bint Abdulrahman University, P.O.Box 84428, Riyadh, 11671, Saudi Arabia2. Artificial Intelligence & Data Analytics (AIDA) Lab CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia2. Artificial Intelligence & Data Analytics (AIDA) Lab CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia3. Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politenica de Valencia, 46730, Gandia, València, Spain3. Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politenica de Valencia, 46730, Gandia, València, SpainSmart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics.https://www.aimspress.com/article/doi/10.3934/mbe.2023847?viewType=HTMLmultimedia networksemerging technologiesinfrastructural developmentfuture networksedge computing
spellingShingle Faten S. Alamri
Khalid Haseeb
Tanzila Saba
Jaime Lloret
Jose M. Jimenez
Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
Mathematical Biosciences and Engineering
multimedia networks
emerging technologies
infrastructural development
future networks
edge computing
title Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
title_full Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
title_fullStr Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
title_full_unstemmed Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
title_short Multimedia IoT-surveillance optimization model using mobile-edge authentic computing
title_sort multimedia iot surveillance optimization model using mobile edge authentic computing
topic multimedia networks
emerging technologies
infrastructural development
future networks
edge computing
url https://www.aimspress.com/article/doi/10.3934/mbe.2023847?viewType=HTML
work_keys_str_mv AT fatensalamri multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing
AT khalidhaseeb multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing
AT tanzilasaba multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing
AT jaimelloret multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing
AT josemjimenez multimediaiotsurveillanceoptimizationmodelusingmobileedgeauthenticcomputing