Research on Security Situation Assessment Model of Video Transmission Network

Full Text (PDF, 670KB), PP.40-45

Views: 0 Downloads: 0


Gao Jian 1,* Yue Ting 1 Zhu RongChen 1

1. Information technology and network security College, People's Public Security University of China, BeiJing, China

* Corresponding author.


Received: 24 Jan. 2019 / Revised: 2 Feb. 2019 / Accepted: 13 Feb. 2019 / Published: 8 Apr. 2019

Index Terms

Video Transmission Network, Analytic Hierarchy Process, Evaluation Model.


In this paper, we propose a situation assessment model for video transmission network, which evaluates the security risk of video transmission network information from four aspects: front-end perception layer, transmission layer, application layer and other risks.We divide the video network security evaluation system into three layers, and use AHP to determine the weight of each index.The weights of these four aspects are calculated by analytic hierarchy process.The method proposed in this paper can provide an evaluation system and a calculation method for the safe operation of video transmission network and important systems, and can provide specialized information security services for the construction project of video transmission network.

Cite This Paper

Gao Jian, Yue Ting, Zhu RongChen, "Research on Security Situation Assessment Model of Video Transmission Network", International Journal of Modern Education and Computer Science(IJMECS), Vol.11, No.4, pp. 40-45, 2019.DOI: 10.5815/ijmecs.2019.04.05


[1]Houtgast T, Steeneken H J M .Evaluation of speech transmission channels by using artificial signals[J].Acta Acustica United with Acustica, 1971, 25(25):355-367.
[2]Wong T, Findlay J, Mcmurtrie A .An On-Line Method for Transmission Ampacity Evaluation [J].IEEE Transactions on Power Apparatus & Systems, 1982, PAS-101(2):309-315.
[3]Kim H .Evaluation of power system security and development of transmission pricing method[J].Dissertation Abstracts International, Volume: 65-07, Section: B, page: 3606.;Chair: Chanan Singh. 2003.
[4]Xie L , Yang Z , Zhang C , et al.Security evaluation and auxiliary decision-making method for integrated generation and transmission outage schedule[J].Automation of Electric Power Systems, 2012, 36(15):116-119.
[5]Gupta R, Goel L .Security constrained well-being evaluation of a sub-transmission system[C]// International Conference on Electrical & Electronics Engineering. IEEE, 2005.
[6]FarrukhEhtisham, Panaousis E A, Politis C .Performance Evaluation of Secure Video Transmission over WIMAX[J].International Journal of Computer Networks & Communications, 2011, 3(6):28-38.
[7]Tsanai E , Bouras C , Kioumourtzis G , et al.Evaluation of Video Transmission in Emergency Response Ad Hoc Networks[C]// 4th International Conference on Data Communication Networking - DCNET.IEEE, 2013.
[8]Kunkelmann T, Reinema R, Steinmetz R , et al.Evaluation of Different Video Encryption Methods for a Secure Multimedia Conferencing Gateway[J].From Multimedia Services to Network Services, 1997, 1356:75-89.
[9]Hu C, Xue G, Mei L , et al.Building an intelligent video and image analysis evaluation platform for public security[C]// IEEE International Conference on Advanced Video & Signal Based Surveillance.IEEE, 2017.
[10]Sungyong C, Seungsoo B, Sooyoung K, et al.Security Evaluation Framework for Military IoT Devices[J].Security and Communication Networks, 2018, 2018:1-12.
[11]Jiarun S , Ziqiang X U, Fuzheng Y .Parametric-planning model combining the transmission characteristics of network video service[J].Journal of Xidian University, 2016.
[12]Hörsch, Jonas, Hofmann F, Schlachtberger D, et al.PyPSA-Eur: An open optimisation model of the European transmission system[J].Energy Strategy Reviews, 2018, 22:207-215.
[13]Wang P , Zhang G , Ni C, et al.A Two Time-Scales Network Bandwidth Measurement for Video Transmission[C]// 2016 International Conference on Network and Information Systems for Computers (ICNISC).IEEE, 2016.
[14]Nagashino H, Kinouchi Y .Oscillatory modes in a neuronal network model with transmission latency[J].Social Science Electronic Publishing, 2018, 52(02):843-848.
[15]Fu Y, Zhu J, Gao S .CPS Information Security Risk Evaluation System Based on Petri Net[C]// IEEE Second International Conference on Data Science in Cyberspace.IEEE, 2017.
[16]Rizvi S, Ryoo J, Kissell J, et al.A security evaluation framework for cloud security auditing[J].The Journal of Supercomputing, 2017.
[17]Lee J H, Kim S J .Analysis and Security Evaluation of Security Threat on Broadcasting Service[J].Wireless Personal Communications, 2017.
[18]Gulve S P, Khoje S A, Pardeshi P. Implementation of IoT-Based Smart Video Surveillance System[J]. 2017.
[19]Hasan R, Mohammed S K, Khan A , et al. A color frame reproduction technique for IoT-based video surveillance application[C]// IEEE International Symposium on Circuits & Systems. IEEE, 2017.