Skip to main content
Log in

Autonomous and Intelligent Mobile Multimedia Cyber-Physical System with Secured Heterogeneous IoT Network

  • Research
  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) and smart technologies perform a vital role in gathering data to facilitate extreme environments. These systems offer an autonomous management of real-time multimedia activities and are integrated with future networks. Smart communication and Cyber-Physical Systems (CPS) are tightly integrated with various processes to improve the efficiency, safety, and functionality of mobile networks. In recent decades, many approaches have been proposed to cope with the communication gap between physical objects and heterogeneous devices using adaptive routing techniques. Autonomous Multimedia CPS implementation using sensor technologies is significant for environmental monitoring, surveillance, and smart cities. However, reliable and fault-tolerant CPS communication in multimedia networks remains a research challenge. Most existing schemes deal with device mobility, which consumes energy and high latency communication in a constrained environment. In this research work, we proposed an optimized multimedia communication framework using adaptive intelligence for forwarding routes and decreasing the probability of data loss. It examines environmental parameters and circumstances for a prediction and decision-making system based on Particle Swarm Optimization (PSO). Furthermore, the proposed framework uses edge-enabled security to provide trusted sessions for devices with token-based authentication. Compared to existing work, the proposed framework demonstrates notable performance improvement for throughput, data latency, and alive nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Alam S, Siddiqui ST, Ahmad A, Ahmad R, Shuaib M (2020) Internet of Things (IoT) Enabling Technologies, Requirements, and Security Challenges. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_12

  2. Georgios L, Kerstin S, Theofylaktos A (2019) Internet of things in the context of industry 4.0: An overview. International Journal of Entrepreneurial Knowledge 7(1):4–19. https://doi.org/10.15759/ijek/2019/v7i1/183964

  3. Rahim A, Zhong Y, Ahmad T, Ahmad S, Pławiak P, Hammad M (2023) Enhancing smart home security: anomaly detection and face recognition in smart home IoT devices using logit-boosted CNN models. Sensors 23(15):6979

    Article  Google Scholar 

  4. Albreem MA, Sheikh AM, Alsharif MH, Jusoh M, Yasin MNM (2021) Green Internet of things (GIoT): applications, practices, awareness, and challenges. IEEE Access 9:38833–38858

    Article  Google Scholar 

  5. Montazerolghaem A (2023) Efficient Resource Allocation for Multimedia Streaming in Software-Defined Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems, 24(12):14718–14731. https://doi.org/10.1109/TITS.2023.3303404

  6. Guenat S, Purnell P, Davies ZG, Nawrath M, Stringer LC, Babu GR, Balasubramanian M, Ballantyne EE, Bylappa BK, Chen B (2022) Meeting sustainable development goals via robotics and autonomous systems. Nat Commun 13(1):3559

    Article  Google Scholar 

  7. Saba T, Rehman A, Haseeb K, Bahaj SA, Jeon G (2022) Energy-efficient edge optimization embedded system using graph theory with 2-tiered security. Electronics 11(18):2942

    Article  Google Scholar 

  8. Wan S, Gu Z, Ni Q (2020) Cognitive computing and wireless communications on the edge for healthcare service robots. Comput Commun 149:99–106

    Article  Google Scholar 

  9. Ameen N, Hosany S, Tarhini A (2021) Consumer interaction with cutting-edge technologies: implications for future research. Comput Hum Behav 120:106761

    Article  Google Scholar 

  10. Khan ZA, Hussain T, Ullah W, Baik SW (2023) A Trapezoid Attention Mechanism for Power Generation and Consumption Forecasting. IEEE Transactions on Industrial Informatics, 20(4)5750-5762. https://doi.org/10.1109/TII.2023.3335453

  11. Srivani M, Murugappan A, Mala T (2023) Cognitive computing technological trends and future research directions in healthcare — A systematic literature review. Artificial Intelligence in Medicine, 138:102513. https://doi.org/10.1016/j.artmed.2023.102513

  12. Li J, Dai J, Issakhov A, Almojil SF, Souri A (2021) Towards decision support systems for energy management in the smart industry and internet of things. Comput Ind Eng 161:107671

    Article  Google Scholar 

  13. Bréhon–Grataloup L, Kacimi R, Beylot A-L (2022) Mobile edge computing for V2X architectures and applications: a survey. Comput Netw 206:108797

    Article  Google Scholar 

  14. Celik A, Romdhane I, Kaddoum G, Eltawil AM (2022) A Top-Down Survey on Optical Wireless Communications for the Internet of Things. IEEE Communications Surveys & Tutorials, 25(1):1–45. https://doi.org/10.1109/COMST.2022.3220504

  15. Patel NR, Kumar S (2018) Wireless sensor networks’ challenges and future prospects. In: 2018 International Conference on System Modeling & Advancement in Research Trends (SMART), IEEE

  16. Liu J, Zhao Z, Ji J, Hu M (2020) Research and application of wireless sensor network technology in power transmission and distribution system. Intell Converged Networks 1(2):199–220

    Article  Google Scholar 

  17. Han T, Muhammad K, Hussain T, Lloret J, Baik SW (2020) An efficient deep learning framework for intelligent energy management in IoT networks. IEEE Internet Things J 8(5):3170–3179

    Article  Google Scholar 

  18. Karale A (2021) The challenges of IoT addressing security, ethics, privacy, and laws. Internet Things 15:100420

    Article  Google Scholar 

  19. Jurcut A, Niculcea T, Ranaweera P, Le-Khac N-A (2020) Security considerations for internet of things: a survey. SN Comput Sci 1(4):1–19

    Article  Google Scholar 

  20. Abbas G, Mehmood A, Carsten M, Epiphaniou G, Lloret J (2022) Safety, security and privacy in machine learning based internet of things. J Sens Actuator Networks 11(3):38

    Article  Google Scholar 

  21. Cao Y, Yang A, Li H, Zeng Q, Gao J (2023) A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing. Computers & Security 137:103650. https://doi.org/10.1016/j.cose.2023.103650

  22. Singh KD, Sood SK (2021) QoS-aware optical fog-assisted cyber-physical system in the 5 g ready heterogeneous network. Wireless Pers Commun 116(4):3331–3350

    Article  Google Scholar 

  23. Rejeb A, Rejeb K, Simske S, Treiblmaier H, Zailani S (2022) The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet Things 19:100565

    Article  Google Scholar 

  24. Aboubakar M, Kellil M, Roux P (2021) A review of IoT network management: Current status and perspectives. Journal of King Saud University - Computer and Information Sciences, 34(7):4163–4176. https://doi.org/10.1016/j.jksuci.2021.03.006

  25. Mao W, Zhao Z, Chang Z, Min G, Gao W (2021) Energy-efficient industrial internet of things: overview and open issues. IEEE Trans Industr Inf 17(11):7225–7237

    Article  Google Scholar 

  26. Qin H, Chen W, Li N, Wang T, Chen H, Yang G, Peng Y (2023) CPS: cross-interface network partitioning and scheduling towards QoS-aware data flow delivery in multimedia IoT. J Netw Comput Appl 217:103698

    Article  Google Scholar 

  27. Karthik G, Kalyana Kumar A, Karri AB, Jagini NP (2023) Deep intelligent blockchain technology for securing IoT-based healthcare multimedia data. Wireless Netw 29:2481–2493. https://doi.org/10.1007/s11276-023-03333-5

  28. Wang X, Han Y, Leung VC, Niyato D, Yan X, Chen X (2020) Convergence of edge computing and deep learning: a comprehensive survey. IEEE Commun Surv Tutorials 22(2):869–904

    Article  Google Scholar 

  29. Haseeb K, Islam N, Saba T, Rehman A, Mehmood Z (2020) LSDAR: a light-weight structure based data aggregation routing protocol with secure internet of things integrated next-generation sensor networks. Sustain Cities Soc 54:101995

    Article  Google Scholar 

  30. Zikria YB, Yu H, Afzal MK, Rehmani MH, Hahm O (2018) Internet of Things (IoT): Operating System, Applications and Protocols Design, and Validation Techniques. Future Generation Computer Systems 88:699–706. https://doi.org/10.1016/j.future.2018.07.058

  31. Ghasempour A (2019) Internet of things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions 4(1):22

    Article  Google Scholar 

  32. Khan LU, Yaqoob I, Imran M, Han Z, Hong CS (2020) 6G wireless systems: a vision, architectural elements, and future directions. IEEE Access 8:147029–147044

    Article  Google Scholar 

  33. Lu J, Hu K, Yang X, Hu C, Wang T (2021) A cluster-tree-based energy-efficient routing protocol for wireless sensor networks with a mobile sink. J Supercomputing 77(6):6078–6104

    Article  Google Scholar 

  34. Rady A, Shokair M, El-Rabaie ESM, Saad W, Benaya A (2019) Energy‐efficient routing protocol based on sink mobility for wireless sensor networks. IET Wirel Sens Syst 9(6):405–415

    Article  Google Scholar 

  35. Latif K, Javaid N, Ullah I, Kaleem Z, Abbas Malik Z, Nguyen LD (2020) DIEER: delay-intolerant energy-efficient routing with sink mobility in underwater wireless sensor networks. Sensors 20(12):3467

    Article  Google Scholar 

  36. El-Fouly FH, Ramadan RA (2020) Real-time energy-efficient reliable traffic aware routing for industrial wireless sensor networks. IEEE Access 8:58130–58145

    Article  Google Scholar 

  37. Kumar AR, Sivagami A (2020) Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network. Multimed Tools Appl 79:14031–14051

    Article  Google Scholar 

  38. Jaiswal K, Anand V (2020) EOMR: an energy-efficient optimal multi-path routing protocol to improve QoS in wireless sensor network for IoT applications. Wireless Pers Commun 111:2493–2515

    Article  Google Scholar 

  39. Razaque A, Jararweh Y, Alotaibi B, Alotaibi M, Hariri S, Almiani M (2022) Energy-efficient and secure mobile fog-based cloud for the internet of things. Future Gener Comput Syst 127:1–13

    Article  Google Scholar 

  40. Wu F, Li X, Xu L, Vijayakumar P, Kumar N (2020) A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Syst J 15(1):1120–1129

    Article  Google Scholar 

  41. Biswas K, Muthukkumarasamy V, Chowdhury MJM, Wu X-W, Singh K (2023) A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks. Computer Networks 232:109842. https://doi.org/10.1016/j.comnet.2023.109842

  42. Jain M, Saihjpal V, Singh N, Singh SB (2022) An overview of variants and advancements of PSO algorithm. Appl Sci 12(17):8392

    Article  Google Scholar 

  43. Diffie W, Van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2(2):107–125

    Article  MathSciNet  Google Scholar 

  44. Devaraj SA, Aruna T (2020) MACBHA: modified adaptive cluster-based Heuristic Approach with co-operative spectrum sensing in Wireless Sensor Networks. Wireless Pers Commun 114(1):69–84

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Artificial Intelligence & Data Analytics (AIDA) lab CCIS Prince Sultan University, Riyadh, Saudi Arabia. All authors are thanked for their support.

The author, Fahad F. Alruwaili, would like to thank the Deanship of Scientific Research at Shaqra University for supporting this research.

Funding

No specific funding received for this research.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization, AR, KH, FA; methodology, AR, KH, AA, FA, software, AR, KH, FA, AA; validation, KH, TS, AA ; writing—original draft preparation, AR, KH, FA, AA, writing—review and editing, AR, KH, TS; visualization,  TS, AA, FA; supervision, AR, AA, FA; project administration, FA, TS, KH; funding, AR, A.A; All authors had approved the final version.

Corresponding author

Correspondence to Fahad F. Alruwaili.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rehman, A., Haseeb, K., Alruwaili, F.F. et al. Autonomous and Intelligent Mobile Multimedia Cyber-Physical System with Secured Heterogeneous IoT Network. Mobile Netw Appl (2024). https://doi.org/10.1007/s11036-024-02329-5

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11036-024-02329-5

Keywords

Navigation