Abstract
Multimedia technology is a sub field of Internet of Things (IoT) in which multimedia devices are embedded to Wireless Sensor Network (WSN). In this, such devices are used for the flow of multimedia applications such as videos, audios and still images over the internet. For transferring these applications, sensor node captures all the data and transfer it to Gateway Node (GWN) via open channel. Due to the vulnerability of the open channel from the attackers, there are many security issues involved in it and have been researched for many years. Recently, Mishra et al. have presented an authentication protocol for multimedia technology using wireless sensor networks which can be applied in coal mine environment and authors had claimed that this protocol is secure from various attacks. But, in this paper, their protocol is analyzed and proved that it is vulnerable to sensor node impersonation attack, sensor node anonymity problem and insecure session key agreement. Also, a new authentication protocol has been proposed by overcoming these flaws. ProVerif tool is used for the formal security verification. Moreover, the performance of the proposed protocol in terms of computational cost, communication cost, storage cost and security features is compared with other related schemes and it is shown that the proposed protocol offers more security features.
Similar content being viewed by others
References
Akyildiz IF, Melodia T, Chowdury KR (2007) Wireless multimedia sensor networks: a survey. IEEE Wirel Commun 14(6):32–39
Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712
Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176
Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75(6):3425–3451
Hamid Z, Hussain FB, Pyun JY (2016) Delay and link utilization aware routing protocol for wireless multimedia sensor networks. Multimed Tools Appl 75(14):8195–8216
He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60
Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Netw Appl 8(6):1070–1081
Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392
Kaur D, Kumar D, Saini KK, Grover HS (2019) An improved user authentication protocol for wireless sensor networks. Trans Emerging Telecommun Technol 30(10):e3745
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of a two-factor user authentication in wireless sensor networks. Sensors 10 (3):2450–2459
Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intell Human Comput 10(2):641–660
Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647
Kumari S, Chaudhary P, Chen CM, Khan MK (2019) Questioning key compromise attack on ostad-sharif others.’s authentication and session key generation scheme for healthcare applications. IEEE Access 7:39717–39720
Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154
Li J, Zhang W, Kumari S, Choo KKR, Hogrefe D (2018) Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans Emerging Telecommun Technol 29 (6):e3295
Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in iot-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325
Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10
Spreitzer R, Moonsamy V, Korak T, Mangard S (2017) Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun Surv Tutorials 20(1):465–488
Sureshkumar V, Amin R, Vijaykumar V, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with fpga implementation. Futur Gener Comput Syst 100:938–951
Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
Turkanovic M, Holbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116
Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Sec Comput 15 (4):708–722
Xie Q, Tang Z, Chen K (2017) Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput Electr Eng 59:218–230
Xu S, Wang X (2013) A new user authentication scheme for hierarchical wireless sensor networks. Int Rev Comput Softw 8(6):197–203
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kaur, D., Saini, K.K. & Kumar, D. Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 81, 39367–39385 (2022). https://doi.org/10.1007/s11042-022-12088-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12088-8