Skip to main content
Log in

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Amin R, Biswas GP (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80

    Article  Google Scholar 

  2. Amin R, Islam SH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101 :42–62

    Article  Google Scholar 

  3. Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2016) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Fut Gen Comput Syst. https://doi.org/10.1016/j.future.2016.12.028

  4. Anwar S, Mohamad Zain J, Zolkipli MF, Inayat Z, Khan S, Anthony B, Chang V (2017) From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms 10:2

    Article  Google Scholar 

  5. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36

    Article  MATH  Google Scholar 

  6. Chang V (2015) Towards a big data system disaster recovery in a private cloud. Ad Hoc Netw 35:65–82

    Article  Google Scholar 

  7. Chang V, Kuo YH, Ramachandran M (2016) Cloud computing adoption framework: a security framework for business clouds. Fut Gen Comput Syst 57:24–41. https://doi.org/10.1016/j.future.2015.09.031

    Article  Google Scholar 

  8. Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712

    Article  Google Scholar 

  9. Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10,081–10,106

    Article  Google Scholar 

  10. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  11. Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656

    Article  Google Scholar 

  12. Doshi N, Kumari S, Mishra D, Li X, Choo KKR, Sangaiah AK (2017) A password based authentication scheme for wireless multimedia systems. Multimed Tools Appl 1–26

  13. Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176

    Article  Google Scholar 

  14. Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75(6):3425–3451

    Article  Google Scholar 

  15. Hamid Z, Hussain FB, Pyun JY (2016) Delay and link utilization aware routing protocol for wireless multimedia sensor networks. Multimed Tools Appl 75 (14):8195–8216

    Article  Google Scholar 

  16. Han W (2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptology ePrint Archive 2011:293

  17. Han K, Shon T (2015) Authentication of mobile applications through various local distributors. Multimed Tools Appl 74(5):1541–1555

    Article  Google Scholar 

  18. He D, Kumar N, Chilamkurti N (2013) A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. In: Proceedings of the international symposium on wireless and pervasive computing (ISWPC’13), pp 1–6

  19. He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60

    Article  Google Scholar 

  20. Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670

    Article  Google Scholar 

  21. Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Network Appl 8(6):1070–1081

    Article  Google Scholar 

  22. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459

    Article  Google Scholar 

  23. Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4):6443–6462

    Article  Google Scholar 

  24. Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of the advances in Cryptology (CRYPTO’99), vol 1666. LNCS, pp 388–397

  25. Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12 (2):1625–1647

    Article  Google Scholar 

  26. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  27. Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603

    Article  Google Scholar 

  28. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  MATH  Google Scholar 

  29. Nam J, Choo KKR, Han S, Kim M, Paik J, Won D (2015) Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLOS One 10(4):e0116,709

    Article  Google Scholar 

  30. Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sensor Netw 2013

  31. Song R (2010) Advanced smart card based password authentication protocol. Comput Standards Interf 32(5):321–325

    Article  Google Scholar 

  32. Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D (2016) Efficient location privacy algorithm for Internet of Things (IoT) services and applications. J Netw Comput Appl https://doi.org/10.1016/j.jnca.2016.10.011

  33. Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the IEEE Global telecommunications conference (IEEE GLOBECOM’07), pp 986–990

  34. Turkanović M, Hölbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektronika ir Elektrotechnika 19(6):109–116

    Google Scholar 

  35. Turkanović M, Hölbl M (2014) Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Wireless Person Commun 77(2):907–922

    Article  Google Scholar 

  36. Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  37. Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: Proceedings of the 2010 IEEE 6th international conference on wireless and mobile computing, networking and communications, pp 600–606

  38. Vaidya B, Makrakis D, Mouftah H (2012) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw

  39. Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput Netw 73:41–57

    Article  Google Scholar 

  40. Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1–15

    Article  Google Scholar 

  41. Wang Z, Cao C, Yang N, Chang V (2016) ABE with improved auxiliary input for big data security. J Comput Syst Sci. https://doi.org/10.1016/j.jcss.2016.12.006

  42. Xu S, Wang X (2013) A new user authentication scheme for hierarchical wireless sensor networks. Int Rev Comput Softw 8(6):197–203

    Google Scholar 

  43. Xu L, Wu F (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9

    Article  Google Scholar 

  44. Xu J, Zhu WT, Feng DG (2009) An improved smart card based password authentication scheme with provable security. Comput Stand Interf 31(4):723–728

    Article  Google Scholar 

  45. Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

  46. Yang J, He S, Lin Y, Lv Z (2015) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl 1–16

  47. Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779

    Article  Google Scholar 

  48. Zhang Y, Fu G, Zhao Z, Li H, Yang J (2012) Discussion on application of IoT technology in coal mine safety supervision. Procedia Eng 43:233–237

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to SK Hafizul Islam.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, D., Vijayakumar, P., Sureshkumar, V. et al. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77, 18295–18325 (2018). https://doi.org/10.1007/s11042-017-5376-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5376-4

Keywords

Navigation