4.5 Article

Multimedia IoT-surveillance optimization model using mobile-edge authentic computing

Journal

MATHEMATICAL BIOSCIENCES AND ENGINEERING
Volume 20, Issue 11, Pages 19174-19190

Publisher

AMER INST MATHEMATICAL SCIENCES-AIMS
DOI: 10.3934/mbe.2023847

Keywords

Multimedia networks; emerging technologies; infrastructural development; future networks; edge computing

Ask authors/readers for more resources

This study proposes a multimedia optimization model that combines edge computing intelligence and authentication strategies to address data management and transmission issues in IoT systems. The research results demonstrate that the proposed model outperforms comparable work in multiple metrics.
Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available