Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

被引:0
|
作者
Dheerendra Mishra
P. Vijayakumar
Venkatasamy Sureshkumar
Ruhul Amin
SK Hafizul Islam
Prosanta Gope
机构
[1] The LNM Institute of Information Technology,Department of Mathematics
[2] University College of Engineering,Department of Computer Science and Engineering
[3] PSG College of Technology,Department of Applied Mathematics and Computational Sciences
[4] Dr. Shyama Prasad Mukherjee International Institute of Information Technology,Department of Computer Science and Engineering
[5] Indian Institute of Information Technology Kalyani,Department of Computer Science and Engineering
[6] National University of Singapore,Department of Computer Science
来源
关键词
Authentication; IoT-based WSN; Anonymity; Sensor node; Gateway node; Smartcard;
D O I
暂无
中图分类号
学科分类号
摘要
In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols.
引用
收藏
页码:18295 / 18325
页数:30
相关论文
共 50 条
  • [31] Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
    Lee, Cheng-Chi
    Lin, Tsung-Hung
    Tsai, Chwei-Shyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1375 - 1378
  • [32] Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks
    Draz, Umar
    Ali, Tariq
    Ahmad Zafar, Nazir
    Saeed Alwadie, Abdullah
    Irfan, Muhammad
    Yasin, Sana
    Ali, Amjad
    Khan Khattak, Muazzam A.
    [J]. ETRI JOURNAL, 2021, 43 (03) : 414 - 426
  • [33] An efficient and scalable key management protocol for secure group communications in wireless sensor networks
    Sun, Hung-Min
    Chen, Chien-Ming
    Chu, Feng-Ying
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 919 - 924
  • [34] An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
    Althobaiti, Ohood
    Al-Rodhaan, Mznah
    Al-Dhelaan, Abdullah
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [35] An Efficient Broadcast Authentication Protocol in Wireless Sensor Networks
    Zhao Xin
    Wang Xiaodong
    Yu Wanrong
    Zhou Xingming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (02) : 368 - 372
  • [36] Efficient Security Authentication Protocol in Wireless Sensor Networks
    Latha, S. Asha
    Sivabalan, A.
    [J]. ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 418 - +
  • [37] Spatial Anti-Void Querying in IoT-enabled Wireless Sensor Networks
    Mostefaoui, Ahmed
    Merzoug, Mohammed Amine
    Yahiaoui, Reda
    [J]. PROCEEDINGS OF THE INT'L ACM SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, MOBIWAC 2023, 2023, : 45 - 52
  • [38] IoT-Enabled Wireless Sensor Networks and Geospatial Technology for Urban Infrastructure Management
    Krishna, E. S. Phalguna
    Praveena, N.
    Manju, I.
    Malathi, N.
    Giri, Rakesh Kumar
    Preetha, M.
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (04) : 2248 - 2256
  • [39] Artificial Intelligence Driven Power Optimization in IOT-Enabled Wireless Sensor Networks
    Balkhande, Balasaheb
    Ghule, Gauri
    Meshram, Vijeet H.
    Anandpawar, Winit Nilkanth
    Gaikwad, Vaidya Shrimant
    Ranjan, Nidhi
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (02) : 38 - 46
  • [40] IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication
    Huda, Samsul
    Nogami, Yasuyuki
    Rahayu, Maya
    Akada, Takuma
    Hossain, Md Biplob
    Musthafa, Muhammad Bisri
    Jie, Yang
    Anh, Le Hoang
    [J]. Computers, Materials and Continua, 2024, 81 (02): : 3165 - 3187