Header menu link for other important links
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems
, F. Al-Turjman
Published in Elsevier Ltd
Volume: 58
Session Initiation Protocol (SIP) is a communication protocol of multimedia systems providing IP signaling to initiate instant messaging. The rapid growth of wireless communication has gained momentum for the development of value-added services such as voice, data, and video ubiquitously. Continuous development has emerged in various application domains such as healthcare, surveillance, and automation that integrate the sources of multimedia to support real-time analysis. In mHealth, it has a dedicated multimedia information system (MIS) to support diagnosis, treatment, medicare, and report preparation. It may enable the user to collect the diagnostic information over smart devices. On the other hand, it may eliminate the geographical restriction between users and medical experts to manage medical emergencies. It uses a packet-switched network to cooperate with the wireless infrastructure to provide a standard interface that serves as a data transmission network. However, the communication interface such as real-time transport protocol is still challenging to authenticate the network services, key exchanges, and session blockage in the multimedia systems. Thus, this paper proposes a technique of session scheme interrogation (SSI) and robust lightweight privacy-preserving (RLPP) to resolve the major issues of LTE-A networks. In this paper, the session adaptive strategy is mathematically driven to adopt the session probing in multimedia clients that detects the session blocks proficiently to mitigate the session overheads. Besides, a real-time system has been designed and developed for the analysis of quality metrics such as call success rate, call setup time, end-to-end session delay, RTP utilization, bandwidth consumption, and flooding attack detection rate. The examination results prove that the proposed RLPP and SSI achieve better efficiencies than other existing schemes. © 2020 Elsevier Ltd
About the journal
JournalData powered by TypesetJournal of Information Security and Applications
PublisherData powered by TypesetElsevier Ltd