Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

被引:72
|
作者
Mishra, Dheerendra [1 ]
Vijayakumar, P. [2 ]
Sureshkumar, Venkatasamy [3 ]
Amin, Ruhul [4 ]
Islam, S. K. Hafizul [5 ]
Gope, Prosanta [6 ]
机构
[1] LNM Inst Informat Technol, Dept Math, Jaipur, Rajasthan, India
[2] Univ Coll Engn, Dept Comp Sci & Engn, Melpakkam 604001, Tamil Nadu, India
[3] PSG Coll Technol, Dept Appl Math & Computat Sci, Coimbatore, Tamil Nadu, India
[4] Dr Shyama Prasad Mukherjee Int Inst Informat Tech, Dept Comp Sci & Engn, Naya Raipur, India
[5] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[6] Natl Univ Singapore, Dept Comp Sci, Singapore 119077, Singapore
关键词
Authentication; IoT-based WSN; Anonymity; Sensor node; Gateway node; Smartcard; KEY AGREEMENT SCHEME; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; IMPROVEMENTS; INTERNET;
D O I
10.1007/s11042-017-5376-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om's protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om's protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols.
引用
收藏
页码:18295 / 18325
页数:31
相关论文
共 50 条
  • [1] Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Dheerendra Mishra
    P. Vijayakumar
    Venkatasamy Sureshkumar
    Ruhul Amin
    SK Hafizul Islam
    Prosanta Gope
    Multimedia Tools and Applications, 2018, 77 : 18295 - 18325
  • [2] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Damandeep Kaur
    Khushil Kumar Saini
    Devender Kumar
    Multimedia Tools and Applications, 2022, 81 : 39367 - 39385
  • [3] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Kaur, Damandeep
    Saini, Khushil Kumar
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39367 - 39385
  • [4] Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
    Maurya, Anup Kumar
    Das, Ashok Kumar
    Jamal, Sajjad Shaukat
    Giri, Debasis
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 120
  • [5] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    SENSORS, 2018, 18 (10)
  • [6] Group Key Establishment for Secure Multicasting in IoT-enabled Wireless Sensor Networks
    Porambage, Pawani
    Braeken, An
    Schmitt, Corinna
    Gurtov, Andrei
    Ylianttila, Mika
    Stiller, Burkhard
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 482 - 485
  • [7] Secure and efficient mutual user authentication protocol for wireless sensor networks
    Yang, Qinghua
    Wang, Liejun
    Liu, Qi
    Wang, Mingwei
    Journal of Software Engineering, 2014, 8 (03): : 184 - 193
  • [9] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [10] Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks
    Said, Ghawar
    Ghani, Anwar
    Ullah, Ata
    Azeem, Muhammad
    Bilal, Muhammad
    Kwak, Kyung Sup
    IEEE ACCESS, 2022, 10 : 33571 - 33585