悉尼科技大学全球大数据技术中心计算机视觉与模式识别实验室何祥健主任学术报告 12月03日下午
发布时间: 2018-11-23 访问次数: 14

报告题目【A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks】
时间:2018年12月03日(星期一)15:00
地点:旗山校区施学共楼五楼会议室
主讲:悉尼科技大学全球大数据技术中心计算机视觉与模式识别实验室主任,何祥健
主办:福建省网络安全与密码技术重点实验室
参加对象:计算机类相关教师和研究生

  
报告人简介:Professor Xiangjian He is the Director of Computer Vision and Pattern Recognition Laboratory at the Global Big Data Technologies Centre (GBDTC) at the University of Technology Sydney (UTS).

He is an IEEE Senior Member and has been an IEEE Signal Processing Society Student Committee member. He received a UTS Chancellor's Award for Research Excellence in 2018. He has also been awarded Internationally Registered Technology Specialist by International Technology Institute (ITI). He has been carrying out research mainly in the areas of image processing, network security, pattern recognition, computer vision and machine learning in the previous years.

He has played various chair roles in many international conferences such as ACM MM, MMM, ICDAR, IEEE BigDataSE IEEE TrustCom, IEEE CIT, IEEE AVSS, IEEE TrustCom, IEEE ICPR and IEEE ICARCV.

 

报告摘要:Wireless Multimedia Sensor Networks (WMSNs) produce an enormous amount of big multimedia data. Due to large size, Multimedia Sensor Nodes (MSNs) cannot store generated multimedia data for a long time. In this scenario, mobile sinks can be utilized for data collection. However, due to vulnerable nature of wireless networks, there is a need for an efficient security scheme to authenticate both MSNs and mobile sinks. In this paper, we propose a scheme to protect an underlying WMSN during mobile multimedia data collection. The proposed scheme is a two-layer scheme. At the first layer, all MSNs are distributed into small clusters. Each cluster is represented by a single Cluster Head (CH). At the second layer, all CHs verify identities of mobile sinks before sharing multimedia data. Authentication at both layers ensures a secure data exchange. We evaluate the performance of proposed scheme through extensive simulation results. The simulation results prove that the proposed scheme performs better as compared to existing state-of-the-art approaches in terms of resilience and handshake duration. The proposed scheme is also analyzed in terms of authentication rate, data freshness, and packet delivery ratio, and has shown a better performance.