Skip to main content
Log in

Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia technology is a sub field of Internet of Things (IoT) in which multimedia devices are embedded to Wireless Sensor Network (WSN). In this, such devices are used for the flow of multimedia applications such as videos, audios and still images over the internet. For transferring these applications, sensor node captures all the data and transfer it to Gateway Node (GWN) via open channel. Due to the vulnerability of the open channel from the attackers, there are many security issues involved in it and have been researched for many years. Recently, Mishra et al. have presented an authentication protocol for multimedia technology using wireless sensor networks which can be applied in coal mine environment and authors had claimed that this protocol is secure from various attacks. But, in this paper, their protocol is analyzed and proved that it is vulnerable to sensor node impersonation attack, sensor node anonymity problem and insecure session key agreement. Also, a new authentication protocol has been proposed by overcoming these flaws. ProVerif tool is used for the formal security verification. Moreover, the performance of the proposed protocol in terms of computational cost, communication cost, storage cost and security features is compared with other related schemes and it is shown that the proposed protocol offers more security features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Akyildiz IF, Melodia T, Chowdury KR (2007) Wireless multimedia sensor networks: a survey. IEEE Wirel Commun 14(6):32–39

    Article  Google Scholar 

  2. Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704–712

    Article  Google Scholar 

  3. Das AK, Sharma P, Chatterjee S, Sing JK (2012) A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J Netw Comput Appl 35(5):1646–1656

    Article  Google Scholar 

  4. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  5. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MathSciNet  Google Scholar 

  6. Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 36:152–176

    Article  Google Scholar 

  7. Ghadi M, Laouamer L, Moulahi T (2016) Securing data exchange in wireless multimedia sensor networks: perspectives and challenges. Multimed Tools Appl 75(6):3425–3451

    Article  Google Scholar 

  8. Hamid Z, Hussain FB, Pyun JY (2016) Delay and link utilization aware routing protocol for wireless multimedia sensor networks. Multimed Tools Appl 75(14):8195–8216

    Article  Google Scholar 

  9. He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60

    Article  Google Scholar 

  10. Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Netw Appl 8(6):1070–1081

    Article  Google Scholar 

  11. Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392

    Article  Google Scholar 

  12. Kaur D, Kumar D, Saini KK, Grover HS (2019) An improved user authentication protocol for wireless sensor networks. Trans Emerging Telecommun Technol 30(10):e3745

    Google Scholar 

  13. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of a two-factor user authentication in wireless sensor networks. Sensors 10 (3):2450–2459

    Article  Google Scholar 

  14. Kumar D, Chand S, Kumar B (2019) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intell Human Comput 10(2):641–660

    Article  Google Scholar 

  15. Kumar P, Lee SG, Lee HJ (2012) E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647

    Article  Google Scholar 

  16. Kumari S, Chaudhary P, Chen CM, Khan MK (2019) Questioning key compromise attack on ostad-sharif others.’s authentication and session key generation scheme for healthcare applications. IEEE Access 7:39717–39720

    Article  Google Scholar 

  17. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  18. Li J, Zhang W, Kumari S, Choo KKR, Hogrefe D (2018) Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans Emerging Telecommun Technol 29 (6):e3295

    Article  Google Scholar 

  19. Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in iot-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325

    Article  Google Scholar 

  20. Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10

    Article  Google Scholar 

  21. Spreitzer R, Moonsamy V, Korak T, Mangard S (2017) Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun Surv Tutorials 20(1):465–488

    Article  Google Scholar 

  22. Sureshkumar V, Amin R, Vijaykumar V, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with fpga implementation. Futur Gener Comput Syst 100:938–951

    Article  Google Scholar 

  23. Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  24. Turkanovic M, Holbl M (2013) An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Elektron Elektrotech 19(6):109–116

    Article  Google Scholar 

  25. Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Sec Comput 15 (4):708–722

    Google Scholar 

  26. Xie Q, Tang Z, Chen K (2017) Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. Comput Electr Eng 59:218–230

    Article  Google Scholar 

  27. Xu S, Wang X (2013) A new user authentication scheme for hierarchical wireless sensor networks. Int Rev Comput Softw 8(6):197–203

    Google Scholar 

  28. Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Devender Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, D., Saini, K.K. & Kumar, D. Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 81, 39367–39385 (2022). https://doi.org/10.1007/s11042-022-12088-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12088-8

Keywords

Navigation