Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wi...
Saved in:
Published in | Multimedia tools and applications Vol. 77; no. 14; pp. 18295 - 18325 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.07.2018
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 1380-7501 1573-7721 |
DOI | 10.1007/s11042-017-5376-4 |
Cover
Abstract | In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols. |
---|---|
AbstractList | In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols. |
Author | Vijayakumar, P. Gope, Prosanta Sureshkumar, Venkatasamy Mishra, Dheerendra Islam, SK Hafizul Amin, Ruhul |
Author_xml | – sequence: 1 givenname: Dheerendra surname: Mishra fullname: Mishra, Dheerendra organization: Department of Mathematics, The LNM Institute of Information Technology – sequence: 2 givenname: P. surname: Vijayakumar fullname: Vijayakumar, P. organization: Department of Computer Science and Engineering, University College of Engineering – sequence: 3 givenname: Venkatasamy surname: Sureshkumar fullname: Sureshkumar, Venkatasamy organization: Department of Applied Mathematics and Computational Sciences, PSG College of Technology – sequence: 4 givenname: Ruhul surname: Amin fullname: Amin, Ruhul organization: Department of Computer Science and Engineering, Dr. Shyama Prasad Mukherjee International Institute of Information Technology – sequence: 5 givenname: SK Hafizul surname: Islam fullname: Islam, SK Hafizul email: hafi786@gmail.com organization: Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani – sequence: 6 givenname: Prosanta surname: Gope fullname: Gope, Prosanta organization: Department of Computer Science, National University of Singapore |
BookMark | eNp9kE1LByEQhyUKev0A3YTO1ozr6n-PEb1B0KXO4rpuWbta6hJ9-6x_hwjqNDL8npnx2SWbIQZHyCHCMQKok4wIgjNAxdpGSSY2yA62qmFKcdys72YFTLWA22Q35ycAlC0XOyScj6O33oVCzVIea_XWFB8DfUmxRBsnOsZEs7NLcnRepuJnN3hDbZznJXyHM_WBXsc75oLpJzfQN5_c5HKuYMiVD668xfSc98nWaKbsDr7rHrm_OL87u2I3t5fXZ6c3zDYoCzPQKIXOQs9BuE7yoR17CRa56EfRGZSNkFJ1cgUtQDc0aiWMGaDva3dssdkjR-u59Revi8tFP8UlhbpSYydFh1JyXlO4TtkUc05u1C_Jzya9awT9qVWvteqqVX9q1aIy6hdjffmSUJLx078kX5O5bgkPLv246U_oA_Gwj2Q |
CitedBy_id | crossref_primary_10_1002_dac_4724 crossref_primary_10_1145_3607142 crossref_primary_10_1002_cpe_6578 crossref_primary_10_1007_s11277_023_10539_5 crossref_primary_10_1080_02564602_2022_2055671 crossref_primary_10_1109_ACCESS_2020_2966656 crossref_primary_10_1016_j_jksuci_2021_06_007 crossref_primary_10_1049_iet_net_2019_0009 crossref_primary_10_1016_j_sysarc_2018_12_005 crossref_primary_10_1155_2021_2098530 crossref_primary_10_1016_j_sysarc_2024_103245 crossref_primary_10_1109_JIOT_2021_3055827 crossref_primary_10_1109_ACCESS_2020_3000790 crossref_primary_10_1016_j_comcom_2021_01_025 crossref_primary_10_3233_JIFS_201770 crossref_primary_10_1002_ett_4218 crossref_primary_10_3390_app122412688 crossref_primary_10_1002_dac_4332 crossref_primary_10_1109_ACCESS_2019_2893918 crossref_primary_10_1155_2022_9119227 crossref_primary_10_1007_s41870_023_01314_7 crossref_primary_10_1177_18479790251318538 crossref_primary_10_1016_j_jksuci_2021_07_023 crossref_primary_10_1016_j_adhoc_2023_103089 crossref_primary_10_3390_s23125703 crossref_primary_10_1109_JIOT_2024_3484945 crossref_primary_10_1016_j_iot_2019_100061 crossref_primary_10_1016_j_comnet_2023_110133 crossref_primary_10_3390_electronics12081812 crossref_primary_10_1016_j_adhoc_2023_103159 crossref_primary_10_1002_ett_4747 crossref_primary_10_1002_ett_4664 crossref_primary_10_1007_s10723_023_09672_z crossref_primary_10_1007_s11042_019_08369_4 crossref_primary_10_1016_j_future_2019_04_019 crossref_primary_10_4018_IJeC_299003 crossref_primary_10_1007_s11042_020_10153_8 crossref_primary_10_1007_s12083_024_01699_7 crossref_primary_10_1007_s11277_020_07385_0 crossref_primary_10_1007_s11277_020_07469_x crossref_primary_10_1016_j_adhoc_2019_101948 crossref_primary_10_1155_2021_7142048 crossref_primary_10_1371_journal_pone_0258279 crossref_primary_10_1016_j_sysarc_2022_102650 crossref_primary_10_1002_ett_4957 crossref_primary_10_1007_s12065_020_00502_9 crossref_primary_10_1007_s10586_023_04211_7 crossref_primary_10_1038_s41598_024_73480_y crossref_primary_10_3390_s23146460 crossref_primary_10_1016_j_iot_2023_100950 crossref_primary_10_1016_j_comnet_2020_107333 crossref_primary_10_1016_j_measen_2024_101150 crossref_primary_10_1109_ACCESS_2020_2987764 crossref_primary_10_4018_IJSSCI_291712 crossref_primary_10_1038_s41598_024_52134_z crossref_primary_10_3390_sym14010046 crossref_primary_10_1007_s11227_021_03820_6 crossref_primary_10_1016_j_jisa_2020_102539 crossref_primary_10_1016_j_future_2019_05_058 crossref_primary_10_1007_s12083_024_01806_8 crossref_primary_10_1007_s11042_022_12088_8 crossref_primary_10_1371_journal_pone_0232277 crossref_primary_10_1109_ACCESS_2020_3047895 crossref_primary_10_1155_2022_8728397 crossref_primary_10_1007_s12083_024_01719_6 crossref_primary_10_1007_s12083_020_01038_6 |
Cites_doi | 10.1016/j.proeng.2012.08.040 10.3390/a10020039 10.1007/s11042-015-2737-8 10.3390/s120201625 10.1016/j.future.2015.09.031 10.1109/TWC.2008.080128 10.1007/s00530-013-0346-9 10.1016/j.adhoc.2014.03.009 10.1016/j.comnet.2014.07.010 10.1016/j.adhoc.2015.07.012 10.3390/s100302450 10.1016/j.jnca.2012.03.011 10.1007/s11277-013-1543-8 10.1007/s12083-014-0285-z 10.3390/s130809589 10.1016/j.adhoc.2014.03.003 10.1007/s10916-014-0179-x 10.1016/j.adhoc.2015.05.020 10.1016/j.csi.2008.09.006 10.1016/j.comnet.2016.01.006 10.1016/j.adhoc.2015.05.014 10.3390/s140610081 10.1016/j.jnca.2012.05.010 10.4218/etrij.10.1510.0134 10.1016/j.csi.2010.03.008 10.3390/s140406443 10.3390/s110504767 10.1371/journal.pone.0116709 10.1016/j.comnet.2016.05.007 10.1109/TC.2002.1004593 10.1145/77648.77649 10.1007/s11042-014-2443-y 10.1007/s11042-013-1520-y 10.1109/TWC.2002.804190 10.1007/s10916-014-0182-2 10.1016/j.jcss.2016.12.006 10.1007/s11042-017-4701-2 10.1155/2013/730831 10.1007/3-540-48405-1_25 10.1016/j.jnca.2016.10.011 10.1109/WIMOB.2010.5645004 10.5755/j01.eee.19.6.2038 10.1002/sec.517 10.1109/GLOCOM.2007.190 10.1016/j.future.2016.12.028 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2017 Multimedia Tools and Applications is a copyright of Springer, (2017). All Rights Reserved. |
Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2017 – notice: Multimedia Tools and Applications is a copyright of Springer, (2017). All Rights Reserved. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
DOI | 10.1007/s11042-017-5376-4 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest Research Library SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database (ProQuest) ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1573-7721 |
EndPage | 18325 |
ExternalDocumentID | 10_1007_s11042_017_5376_4 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQUKI Q9U |
ID | FETCH-LOGICAL-c316t-a03771ec0b204e962d5fb60c124bf49a163466796805009d3784aad0bb667f513 |
IEDL.DBID | AGYKE |
ISSN | 1380-7501 |
IngestDate | Fri Jul 25 22:37:35 EDT 2025 Thu Apr 24 22:53:14 EDT 2025 Wed Oct 01 02:50:19 EDT 2025 Fri Feb 21 02:33:47 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 14 |
Keywords | Anonymity Sensor node Gateway node IoT-based WSN Authentication Smartcard |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-a03771ec0b204e962d5fb60c124bf49a163466796805009d3784aad0bb667f513 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1964916622 |
PQPubID | 54626 |
PageCount | 31 |
ParticipantIDs | proquest_journals_1964916622 crossref_primary_10_1007_s11042_017_5376_4 crossref_citationtrail_10_1007_s11042_017_5376_4 springer_journals_10_1007_s11042_017_5376_4 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20180700 2018-7-00 20180701 |
PublicationDateYYYYMMDD | 2018-07-01 |
PublicationDate_xml | – month: 7 year: 2018 text: 20180700 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Multimedia tools and applications |
PublicationTitleAbbrev | Multimed Tools Appl |
PublicationYear | 2018 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Amin, Biswas (CR1) 2016; 36 Song (CR31) 2010; 32 Khan, Alghathbar (CR22) 2010; 10 Zhang, Fu, Zhao, Li, Yang (CR48) 2012; 43 CR18 CR16 CR38 CR37 Kumari, Om (CR26) 2016; 104 Chang (CR6) 2015; 35 Chang, Kuo, Ramachandran (CR7) 2016; 57 CR12 CR33 Messerges, Dabbish, Sloan (CR28) 2002; 51 Nam, Choo, Han, Kim, Paik, Won (CR29) 2015; 10 CR32 Xu, Zhu, Feng (CR44) 2009; 31 Xu, Wu (CR43) 2015; 39 Heinzelman, Chandrakasan, Balakrishnan (CR20) 2002; 1 CR30 Xu, Wang (CR42) 2013; 8 Amin, Islam, Biswas, Khan, Leng, Kumar (CR2) 2016; 101 Das (CR10) 2009; 8 Das, Sharma, Chatterjee, Sing (CR11) 2012; 35 Jiang, Ma, Lu, Tian (CR21) 2015; 8 Ghadi, Laouamer, Moulahi (CR14) 2016; 75 Choi, Lee, Kim, Jung, Nam, Won (CR9) 2014; 14 Farash, Turkanović, Kumari, Hölbl (CR13) 2016; 36 He, Kumar, Chen, Lee, Chilamkurti, Yeo (CR19) 2015; 21 Li, Weng, Lee (CR27) 2013; 13 Turkanović, Hölbl (CR34) 2013; 19 Turkanović, Hölbl (CR35) 2014; 77 CR3 Anwar, Mohamad Zain, Zolkipli, Inayat, Khan, Anthony, Chang (CR4) 2017; 10 Chen, Shih (CR8) 2010; 32 Kumar, Lee, Lee (CR25) 2012; 12 Wang, Wang (CR39) 2014; 73 Wang, Wang (CR40) 2014; 20 CR24 Turkanović, Brumen, Hölbl (CR36) 2014; 20 CR46 Yeh, Chen, Liu, Kim, Wei (CR47) 2011; 11 CR41 Hamid, Hussain, Pyun (CR15) 2016; 75 Kim, Lee, Jeon, Lee, Won (CR23) 2014; 14 Burrows, Abadi, Needham (CR5) 1990; 8 Han, Shon (CR17) 2015; 74 Xue, Ma, Hong, Ding (CR45) 2013; 36 D He (5376_CR19) 2015; 21 TS Messerges (5376_CR28) 2002; 51 M Turkanović (5376_CR34) 2013; 19 D Wang (5376_CR40) 2014; 20 R Amin (5376_CR2) 2016; 101 J Kim (5376_CR23) 2014; 14 Y Zhang (5376_CR48) 2012; 43 M Turkanović (5376_CR35) 2014; 77 Y Choi (5376_CR9) 2014; 14 TH Chen (5376_CR8) 2010; 32 5376_CR24 M Turkanović (5376_CR36) 2014; 20 5376_CR46 J Nam (5376_CR29) 2015; 10 5376_CR41 S Xu (5376_CR42) 2013; 8 5376_CR3 K Han (5376_CR17) 2015; 74 K Xue (5376_CR45) 2013; 36 ML Das (5376_CR10) 2009; 8 AK Das (5376_CR11) 2012; 35 L Xu (5376_CR43) 2015; 39 S Anwar (5376_CR4) 2017; 10 MK Khan (5376_CR22) 2010; 10 Q Jiang (5376_CR21) 2015; 8 CT Li (5376_CR27) 2013; 13 M Burrows (5376_CR5) 1990; 8 5376_CR18 R Amin (5376_CR1) 2016; 36 WB Heinzelman (5376_CR20) 2002; 1 P Kumar (5376_CR25) 2012; 12 5376_CR37 D Wang (5376_CR39) 2014; 73 5376_CR16 5376_CR38 V Chang (5376_CR6) 2015; 35 5376_CR33 5376_CR32 MS Farash (5376_CR13) 2016; 36 5376_CR12 M Ghadi (5376_CR14) 2016; 75 HL Yeh (5376_CR47) 2011; 11 5376_CR30 S Kumari (5376_CR26) 2016; 104 R Song (5376_CR31) 2010; 32 J Xu (5376_CR44) 2009; 31 V Chang (5376_CR7) 2016; 57 Z Hamid (5376_CR15) 2016; 75 |
References_xml | – volume: 43 start-page: 233 year: 2012 end-page: 237 ident: CR48 article-title: Discussion on application of IoT technology in coal mine safety supervision publication-title: Procedia Eng doi: 10.1016/j.proeng.2012.08.040 – ident: CR18 – volume: 10 start-page: 2 year: 2017 ident: CR4 article-title: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions publication-title: Algorithms doi: 10.3390/a10020039 – volume: 75 start-page: 8195 issue: 14 year: 2016 end-page: 8216 ident: CR15 article-title: Delay and link utilization aware routing protocol for wireless multimedia sensor networks publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2737-8 – volume: 12 start-page: 1625 issue: 2 year: 2012 end-page: 1647 ident: CR25 article-title: E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks publication-title: Sensors doi: 10.3390/s120201625 – volume: 57 start-page: 24 year: 2016 end-page: 41 ident: CR7 article-title: Cloud computing adoption framework: a security framework for business clouds publication-title: Fut Gen Comput Syst doi: 10.1016/j.future.2015.09.031 – volume: 8 start-page: 1086 issue: 3 year: 2009 end-page: 1090 ident: CR10 article-title: Two-factor user authentication in wireless sensor networks publication-title: IEEE Trans Wirel Commun doi: 10.1109/TWC.2008.080128 – ident: CR16 – ident: CR37 – ident: CR12 – ident: CR30 – volume: 21 start-page: 49 issue: 1 year: 2015 end-page: 60 ident: CR19 article-title: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks publication-title: Multimed Syst doi: 10.1007/s00530-013-0346-9 – ident: CR33 – volume: 20 start-page: 96 year: 2014 end-page: 112 ident: CR36 article-title: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2014.03.009 – volume: 73 start-page: 41 year: 2014 end-page: 57 ident: CR39 article-title: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions publication-title: Comput Netw doi: 10.1016/j.comnet.2014.07.010 – volume: 35 start-page: 65 year: 2015 end-page: 82 ident: CR6 article-title: Towards a big data system disaster recovery in a private cloud publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.07.012 – volume: 10 start-page: 2450 issue: 3 year: 2010 end-page: 2459 ident: CR22 article-title: Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks publication-title: Sensors doi: 10.3390/s100302450 – volume: 35 start-page: 1646 issue: 5 year: 2012 end-page: 1656 ident: CR11 article-title: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2012.03.011 – volume: 77 start-page: 907 issue: 2 year: 2014 end-page: 922 ident: CR35 article-title: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks publication-title: Wireless Person Commun doi: 10.1007/s11277-013-1543-8 – volume: 8 start-page: 1070 issue: 6 year: 2015 end-page: 1081 ident: CR21 article-title: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks publication-title: Peer-to-Peer Network Appl doi: 10.1007/s12083-014-0285-z – volume: 13 start-page: 9589 issue: 8 year: 2013 end-page: 9603 ident: CR27 article-title: An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks publication-title: Sensors doi: 10.3390/s130809589 – volume: 20 start-page: 1 year: 2014 end-page: 15 ident: CR40 article-title: Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2014.03.003 – volume: 39 start-page: 1 issue: 2 year: 2015 end-page: 9 ident: CR43 article-title: Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care publication-title: J Med Syst doi: 10.1007/s10916-014-0179-x – volume: 36 start-page: 58 year: 2016 end-page: 80 ident: CR1 article-title: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.05.020 – volume: 8 start-page: 197 issue: 6 year: 2013 end-page: 203 ident: CR42 article-title: A new user authentication scheme for hierarchical wireless sensor networks publication-title: Int Rev Comput Softw – volume: 31 start-page: 723 issue: 4 year: 2009 end-page: 728 ident: CR44 article-title: An improved smart card based password authentication scheme with provable security publication-title: Comput Stand Interf doi: 10.1016/j.csi.2008.09.006 – volume: 101 start-page: 42 year: 2016 end-page: 62 ident: CR2 article-title: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks publication-title: Comput Netw doi: 10.1016/j.comnet.2016.01.006 – ident: CR46 – volume: 36 start-page: 152 year: 2016 end-page: 176 ident: CR13 article-title: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.05.014 – volume: 14 start-page: 10,081 issue: 6 year: 2014 end-page: 10,106 ident: CR9 article-title: Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography publication-title: Sensors doi: 10.3390/s140610081 – volume: 36 start-page: 316 issue: 1 year: 2013 end-page: 323 ident: CR45 article-title: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2012.05.010 – volume: 32 start-page: 704 issue: 5 year: 2010 end-page: 712 ident: CR8 article-title: A robust mutual authentication protocol for wireless sensor networks publication-title: ETRI J doi: 10.4218/etrij.10.1510.0134 – volume: 32 start-page: 321 issue: 5 year: 2010 end-page: 325 ident: CR31 article-title: Advanced smart card based password authentication protocol publication-title: Comput Standards Interf doi: 10.1016/j.csi.2010.03.008 – ident: CR3 – volume: 14 start-page: 6443 issue: 4 year: 2014 end-page: 6462 ident: CR23 article-title: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks publication-title: Sensors doi: 10.3390/s140406443 – ident: CR38 – volume: 19 start-page: 109 issue: 6 year: 2013 end-page: 116 ident: CR34 article-title: An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks publication-title: Elektronika ir Elektrotechnika – volume: 11 start-page: 4767 issue: 5 year: 2011 end-page: 4779 ident: CR47 article-title: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography publication-title: Sensors doi: 10.3390/s110504767 – ident: CR32 – volume: 10 start-page: e0116,709 issue: 4 year: 2015 ident: CR29 article-title: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation publication-title: PLOS One doi: 10.1371/journal.pone.0116709 – volume: 104 start-page: 137 year: 2016 end-page: 154 ident: CR26 article-title: Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines publication-title: Comput Netw doi: 10.1016/j.comnet.2016.05.007 – volume: 51 start-page: 541 issue: 5 year: 2002 end-page: 552 ident: CR28 article-title: Examining smart-card security under the threat of power analysis attacks publication-title: IEEE Trans Comput doi: 10.1109/TC.2002.1004593 – volume: 8 start-page: 18 issue: 1 year: 1990 end-page: 36 ident: CR5 article-title: A logic of authentication publication-title: ACM Trans Comput Syst doi: 10.1145/77648.77649 – ident: CR41 – ident: CR24 – volume: 75 start-page: 3425 issue: 6 year: 2016 end-page: 3451 ident: CR14 article-title: Securing data exchange in wireless multimedia sensor networks: perspectives and challenges publication-title: Multimed Tools Appl doi: 10.1007/s11042-014-2443-y – volume: 74 start-page: 1541 issue: 5 year: 2015 end-page: 1555 ident: CR17 article-title: Authentication of mobile applications through various local distributors publication-title: Multimed Tools Appl doi: 10.1007/s11042-013-1520-y – volume: 1 start-page: 660 issue: 4 year: 2002 end-page: 670 ident: CR20 article-title: An application-specific protocol architecture for wireless microsensor networks publication-title: IEEE Trans Wireless Commun doi: 10.1109/TWC.2002.804190 – ident: 5376_CR18 – volume: 21 start-page: 49 issue: 1 year: 2015 ident: 5376_CR19 publication-title: Multimed Syst doi: 10.1007/s00530-013-0346-9 – volume: 10 start-page: e0116,709 issue: 4 year: 2015 ident: 5376_CR29 publication-title: PLOS One doi: 10.1371/journal.pone.0116709 – ident: 5376_CR16 – volume: 39 start-page: 1 issue: 2 year: 2015 ident: 5376_CR43 publication-title: J Med Syst doi: 10.1007/s10916-014-0182-2 – volume: 31 start-page: 723 issue: 4 year: 2009 ident: 5376_CR44 publication-title: Comput Stand Interf doi: 10.1016/j.csi.2008.09.006 – volume: 11 start-page: 4767 issue: 5 year: 2011 ident: 5376_CR47 publication-title: Sensors doi: 10.3390/s110504767 – volume: 10 start-page: 2450 issue: 3 year: 2010 ident: 5376_CR22 publication-title: Sensors doi: 10.3390/s100302450 – volume: 35 start-page: 65 year: 2015 ident: 5376_CR6 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.07.012 – volume: 8 start-page: 18 issue: 1 year: 1990 ident: 5376_CR5 publication-title: ACM Trans Comput Syst doi: 10.1145/77648.77649 – volume: 104 start-page: 137 year: 2016 ident: 5376_CR26 publication-title: Comput Netw doi: 10.1016/j.comnet.2016.05.007 – ident: 5376_CR41 doi: 10.1016/j.jcss.2016.12.006 – volume: 35 start-page: 1646 issue: 5 year: 2012 ident: 5376_CR11 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2012.03.011 – volume: 57 start-page: 24 year: 2016 ident: 5376_CR7 publication-title: Fut Gen Comput Syst doi: 10.1016/j.future.2015.09.031 – volume: 32 start-page: 704 issue: 5 year: 2010 ident: 5376_CR8 publication-title: ETRI J doi: 10.4218/etrij.10.1510.0134 – volume: 75 start-page: 8195 issue: 14 year: 2016 ident: 5376_CR15 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2737-8 – ident: 5376_CR12 doi: 10.1007/s11042-017-4701-2 – volume: 20 start-page: 1 year: 2014 ident: 5376_CR40 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2014.03.003 – volume: 77 start-page: 907 issue: 2 year: 2014 ident: 5376_CR35 publication-title: Wireless Person Commun doi: 10.1007/s11277-013-1543-8 – volume: 20 start-page: 96 year: 2014 ident: 5376_CR36 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2014.03.009 – ident: 5376_CR30 doi: 10.1155/2013/730831 – volume: 36 start-page: 58 year: 2016 ident: 5376_CR1 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.05.020 – ident: 5376_CR24 doi: 10.1007/3-540-48405-1_25 – volume: 43 start-page: 233 year: 2012 ident: 5376_CR48 publication-title: Procedia Eng doi: 10.1016/j.proeng.2012.08.040 – volume: 14 start-page: 10,081 issue: 6 year: 2014 ident: 5376_CR9 publication-title: Sensors doi: 10.3390/s140610081 – volume: 12 start-page: 1625 issue: 2 year: 2012 ident: 5376_CR25 publication-title: Sensors doi: 10.3390/s120201625 – volume: 8 start-page: 197 issue: 6 year: 2013 ident: 5376_CR42 publication-title: Int Rev Comput Softw – ident: 5376_CR46 – volume: 32 start-page: 321 issue: 5 year: 2010 ident: 5376_CR31 publication-title: Comput Standards Interf doi: 10.1016/j.csi.2010.03.008 – ident: 5376_CR32 doi: 10.1016/j.jnca.2016.10.011 – volume: 75 start-page: 3425 issue: 6 year: 2016 ident: 5376_CR14 publication-title: Multimed Tools Appl doi: 10.1007/s11042-014-2443-y – volume: 101 start-page: 42 year: 2016 ident: 5376_CR2 publication-title: Comput Netw doi: 10.1016/j.comnet.2016.01.006 – ident: 5376_CR37 doi: 10.1109/WIMOB.2010.5645004 – volume: 36 start-page: 316 issue: 1 year: 2013 ident: 5376_CR45 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2012.05.010 – volume: 19 start-page: 109 issue: 6 year: 2013 ident: 5376_CR34 publication-title: Elektronika ir Elektrotechnika doi: 10.5755/j01.eee.19.6.2038 – ident: 5376_CR38 doi: 10.1002/sec.517 – volume: 14 start-page: 6443 issue: 4 year: 2014 ident: 5376_CR23 publication-title: Sensors doi: 10.3390/s140406443 – volume: 8 start-page: 1086 issue: 3 year: 2009 ident: 5376_CR10 publication-title: IEEE Trans Wirel Commun doi: 10.1109/TWC.2008.080128 – volume: 13 start-page: 9589 issue: 8 year: 2013 ident: 5376_CR27 publication-title: Sensors doi: 10.3390/s130809589 – volume: 10 start-page: 2 year: 2017 ident: 5376_CR4 publication-title: Algorithms doi: 10.3390/a10020039 – volume: 51 start-page: 541 issue: 5 year: 2002 ident: 5376_CR28 publication-title: IEEE Trans Comput doi: 10.1109/TC.2002.1004593 – volume: 74 start-page: 1541 issue: 5 year: 2015 ident: 5376_CR17 publication-title: Multimed Tools Appl doi: 10.1007/s11042-013-1520-y – volume: 8 start-page: 1070 issue: 6 year: 2015 ident: 5376_CR21 publication-title: Peer-to-Peer Network Appl doi: 10.1007/s12083-014-0285-z – volume: 1 start-page: 660 issue: 4 year: 2002 ident: 5376_CR20 publication-title: IEEE Trans Wireless Commun doi: 10.1109/TWC.2002.804190 – ident: 5376_CR33 doi: 10.1109/GLOCOM.2007.190 – volume: 73 start-page: 41 year: 2014 ident: 5376_CR39 publication-title: Comput Netw doi: 10.1016/j.comnet.2014.07.010 – ident: 5376_CR3 doi: 10.1016/j.future.2016.12.028 – volume: 36 start-page: 152 year: 2016 ident: 5376_CR13 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2015.05.014 |
SSID | ssj0016524 |
Score | 2.4491158 |
Snippet | In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 18295 |
SubjectTerms | Authentication protocols Coal mines Computer Communication Networks Computer Science Data Structures and Information Theory Environmental monitoring Internet of Things Multimedia Multimedia communications Multimedia Information Systems Privacy Protocol Protocol (computers) Remote sensors Security Sensors Special Purpose and Application-Based Systems Wireless communications Wireless sensor networks |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwELWgLDDwUUAUCvLABLJIHMdNJ4RQS0GCqZW6RbZjS0hVWkj4_9y5TluQYE1iD3n23dN9vCPkOhUx3DHJmU1iyYSwmmXC4TR37rLEZZnyxZivb3I0ES_TdBoCblUoq2xsojfUxdxgjPwOhaOAykjO7xcfDKdGYXY1jNDYJjsxh5OEneLDp1UWQaZhqG0WMfCMcZPV9K1zMTamoI1GQRMmfvqlNdn8lR_1bmd4SPYDX6QPS4CPyJYt2-SgmcVAw9Vsk70NYcFjUg68MgQ4FKqwhL2sQ2iOoi7DHMCnQFZphcF2S31RoW8hoWazX6Si7yV9no-Z9Q1WBUVd4xmYRlhYVrC-XNaQVydkMhyMH0csTFZgBiCpmYqSXi-2JtI8ErYveZE6LSMDzl470VdA0oTECFMWpUDCiqSXCaWKSGt46tI4OSWtcl7aM0K55H1teCILXQjjMO1ppNLKaSUKw12HRM1_zU2QHcfpF7N8LZiMUOQARY5Q5KJDblZLFkvNjf8-7jZg5eH6Vfn6sHTIbQPgxuu_Njv_f7MLsgt8KVtW63ZJq_78spfASWp95Q_eN4LV3W4 priority: 102 providerName: ProQuest |
Title | Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks |
URI | https://link.springer.com/article/10.1007/s11042-017-5376-4 https://www.proquest.com/docview/1964916622 |
Volume | 77 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1573-7721 dateEnd: 20241003 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: ADMLS dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7721 dateEnd: 20241003 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: BENPR dateStart: 19970101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7721 dateEnd: 20241003 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: 8FG dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016524 issn: 1380-7501 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT9swFH6CcoHDYDBEGVQ-7LTJKHEc1z120MLYQBO0EjtFtmNLiCqdSLjw1_OcOLQgNolTpPiHEvvZ77Pfe98D-JLyGNeYYNQmsaCcW00ldz6bO3MycVKq2hnz4lKcTfn5TXoT4rjL1tu9NUnWO_Ui2C32oSR-V_UUJJSvwlrqzycdWBue_vk5ejYeiDTkspURRYUYt8bMtzp5qY4WGPOVWbTWNuNNmLTf2TiZ3B09VPrIPL6icHznj2zBh4A-ybARl4-wYott2GwzO5Cw0LdhY4mmcAeKUc0zgeqJKO8QX1Thoo94loc5ihJB6EtKf3VvSe2iWAekELMcfVKS24L8mE-orcO1cuJZkme40WLDosT2ReORXn6C6Xg0OT6jIU8DNTjBFVVR0u_H1kSaRdwOBMtTp0VkEDpoxwcKIR8X_r5KRilCujzpS65UHmmNb10aJ7vQKeaF3QPCBBtowxKR65wb542oRiitnFY8N8x1IWqnKzOBxNzn0phlC_plP7oZjm7mRzfjXfj63ORvw-Dxv8oHrQxkYTGXmecsQxQtGOvCt3ZKl4r_1dn-u2p_hnUEY7JxBT6ATnX_YA8R8FS6B6tyfNpDMT-5-HXdC-KOz--jy99XWDplwycJuPup |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOQEsrFgr1AS5FVhPb8XoPCCHosksfp63UW7AdW6pUZdtmEeJP8RuZcZLuFoneek1iK8qMZ77M4xuAd4XK8YxpwYPMNVcqOG5UpGnuIhoZjbGpGPP4RE9O1fez4mwN_vS9MFRW2dvEZKiruacY-T4RRyGU0UJ8urziNDWKsqv9CI1WLQ7D71_4y9Z8nH5F-b4XYnww-zLh3VQB7vF1FtxmcjjMg8-cyFQYaVEV0enMo6NzUY0sAhSlKbpisgIBSCWHRllbZc7h1VjkEvd9AA-VlJK4-s34203WQhfdEF2TcfTEeZ9FTa16OTXCkE8gAhWubvvBJbj9Jx-b3Nz4OTzt8Cn73CrUBqyFehOe9bMfWGcKNuHJCpHhC6gPEhMFOjBmqWS-XnShQEY8EHNUNobgmDUU3A8sFTGmlhXmV_tTGnZes-l8xkNq6KoY8ShfoCnGhXWD6-u2Zr3ZgtN7-ebbsF7P6_ASmNBi5LyQunKV8pHSrF5bZ6OzqvIiDiDrv2vpO5pzmrZxUS4JmkkUJYqiJFGUagB7N0suW46Pux7e6YVVdse9KZfKOYAPvQBXbv9vs1d3b7YLjyaz46PyaHpy-BoeI1YzbaXwDqwvrn-GN4iHFu5tUkIGP-5b6_8CnBwYJw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VVEJwoFCoCBTYA1xAq9rr9cY5VKjQRA2FqEKt1JvZp4RUOaVOVfUv8quY2aybgERvvdreleWZnfk8j28A3pYyxzOmBPdFrriU3vBKBprmLkJVhKrSsRjz21QdnMgvp-XpGvzuemGorLKzidFQu5mlGPkOEUchlFFC7IRUFnG0P_54_ovTBCnKtHbjNHQas-B2I91YavI49NdX-DvX7k72UfbvhBiPjj8f8DRxgFt81TnXWTEY5N5mRmTSD5VwZTAqs-gETZBDjeBFKoq8VFmJ4MQVg0pq7TJj8Goo8wL3vQfrA-oX7cH6p9H06PtNTkOVacRulXH003mXY42NfDm1yZDHIHoVLv_2kkvo-0-2NjrB8WN4lNAr21uo2xNY880mbHSTIVgyFJvwcIXm8Ck0o8hTge6NaSqob-YpUMiIJWKGqsgQOrOWQv-exRLH2NDC7Gr3Sst-NmwyO-Y-tns5RizLZ2iocWHT4vpmUdHePoOTO_nqW9BrZo1_DkwoMTRWFMoZJ22gJKxV2uhgtHRWhD5k3XetbSJBp1kcZ_WSvplEUaMoahJFLfvw_mbJ-YIB5LaHtzth1ckYtPVSdfvwoRPgyu3_bfbi9s3ewH08AfXXyfTwJTxAIFctyoi3oTe_uPSvECzNzeukhQx-3LXi_wEW8CMB |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+authentication+protocol+for+secure+multimedia+communications+in+IoT-enabled+wireless+sensor+networks&rft.jtitle=Multimedia+tools+and+applications&rft.au=Mishra%2C+Dheerendra&rft.au=Vijayakumar%2C+P.&rft.au=Sureshkumar%2C+Venkatasamy&rft.au=Amin%2C+Ruhul&rft.date=2018-07-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=77&rft.issue=14&rft.spage=18295&rft.epage=18325&rft_id=info:doi/10.1007%2Fs11042-017-5376-4&rft.externalDocID=10_1007_s11042_017_5376_4 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |