Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

被引:0
|
作者
Dheerendra Mishra
P. Vijayakumar
Venkatasamy Sureshkumar
Ruhul Amin
SK Hafizul Islam
Prosanta Gope
机构
[1] The LNM Institute of Information Technology,Department of Mathematics
[2] University College of Engineering,Department of Computer Science and Engineering
[3] PSG College of Technology,Department of Applied Mathematics and Computational Sciences
[4] Dr. Shyama Prasad Mukherjee International Institute of Information Technology,Department of Computer Science and Engineering
[5] Indian Institute of Information Technology Kalyani,Department of Computer Science and Engineering
[6] National University of Singapore,Department of Computer Science
来源
关键词
Authentication; IoT-based WSN; Anonymity; Sensor node; Gateway node; Smartcard;
D O I
暂无
中图分类号
学科分类号
摘要
In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols.
引用
收藏
页码:18295 / 18325
页数:30
相关论文
共 50 条
  • [1] Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Mishra, Dheerendra
    Vijayakumar, P.
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Islam, S. K. Hafizul
    Gope, Prosanta
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18295 - 18325
  • [2] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Damandeep Kaur
    Khushil Kumar Saini
    Devender Kumar
    [J]. Multimedia Tools and Applications, 2022, 81 : 39367 - 39385
  • [3] Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
    Kaur, Damandeep
    Saini, Khushil Kumar
    Kumar, Devender
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39367 - 39385
  • [4] Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
    Maurya, Anup Kumar
    Das, Ashok Kumar
    Jamal, Sajjad Shaukat
    Giri, Debasis
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 120
  • [5] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    [J]. SENSORS, 2018, 18 (10)
  • [6] Group Key Establishment for Secure Multicasting in IoT-enabled Wireless Sensor Networks
    Porambage, Pawani
    Braeken, An
    Schmitt, Corinna
    Gurtov, Andrei
    Ylianttila, Mika
    Stiller, Burkhard
    [J]. 40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 482 - 485
  • [7] Secure and efficient mutual user authentication protocol for wireless sensor networks
    Yang, Qinghua
    Wang, Liejun
    Liu, Qi
    Wang, Mingwei
    [J]. Journal of Software Engineering, 2014, 8 (03): : 184 - 193
  • [8] Secure and efficient mutual user authentication protocol for wireless sensor networks
    [J]. Wang, Liejun, 1600, Academic Journals Inc. (08):
  • [9] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [10] Light-Weight Secure Aggregated Data Sharing in IoT-Enabled Wireless Sensor Networks
    Said, Ghawar
    Ghani, Anwar
    Ullah, Ata
    Azeem, Muhammad
    Bilal, Muhammad
    Kwak, Kyung Sup
    [J]. IEEE ACCESS, 2022, 10 : 33571 - 33585