Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wi...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 77; no. 14; pp. 18295 - 18325
Main Authors Mishra, Dheerendra, Vijayakumar, P., Sureshkumar, Venkatasamy, Amin, Ruhul, Islam, SK Hafizul, Gope, Prosanta
Format Journal Article
LanguageEnglish
Published New York Springer US 01.07.2018
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1380-7501
1573-7721
DOI10.1007/s11042-017-5376-4

Cover

Abstract In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols.
AbstractList In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices are connected without much constrains, the problem of security, trust and privacy remain a challenge. For multimedia communications through Wireless Sensor Network (WSN), sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, the security remains a serious issue from past many years. Only few works are available to support secure multimedia communications performed in IoT-enabled WSNs. Among the few works, Kumari and Om recently proposed an authentication protocol for multimedia communications in IoT-enabled WSNs, which is applicable in coal mine for safety monitoring. The authors claimed in their work that their contributory protocol strongly withstands several security threats such as, user impersonation attack, sensor node impersonation attack, sensor node anonymity issue and others technical design issues. However, this article proved that Kumari and Om’s protocol has some design flaws and is susceptible to various security attacks including, user and sensor node impersonation attacks. As a remedy, a robust authentication protocol using smartcard is constructed to solve the security issues found in Kumari and Om’s protocol. The proof of correctness of mutual authentication is performed using the BAN logic model. In addition, our further security investigation claimed strong protection against known security attacks. Our protocol is analyzed comprehensively and compared against the similar protocols and the results showed that it is efficient and robust than earlier protocols.
Author Vijayakumar, P.
Gope, Prosanta
Sureshkumar, Venkatasamy
Mishra, Dheerendra
Islam, SK Hafizul
Amin, Ruhul
Author_xml – sequence: 1
  givenname: Dheerendra
  surname: Mishra
  fullname: Mishra, Dheerendra
  organization: Department of Mathematics, The LNM Institute of Information Technology
– sequence: 2
  givenname: P.
  surname: Vijayakumar
  fullname: Vijayakumar, P.
  organization: Department of Computer Science and Engineering, University College of Engineering
– sequence: 3
  givenname: Venkatasamy
  surname: Sureshkumar
  fullname: Sureshkumar, Venkatasamy
  organization: Department of Applied Mathematics and Computational Sciences, PSG College of Technology
– sequence: 4
  givenname: Ruhul
  surname: Amin
  fullname: Amin, Ruhul
  organization: Department of Computer Science and Engineering, Dr. Shyama Prasad Mukherjee International Institute of Information Technology
– sequence: 5
  givenname: SK Hafizul
  surname: Islam
  fullname: Islam, SK Hafizul
  email: hafi786@gmail.com
  organization: Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani
– sequence: 6
  givenname: Prosanta
  surname: Gope
  fullname: Gope, Prosanta
  organization: Department of Computer Science, National University of Singapore
BookMark eNp9kE1LByEQhyUKev0A3YTO1ozr6n-PEb1B0KXO4rpuWbta6hJ9-6x_hwjqNDL8npnx2SWbIQZHyCHCMQKok4wIgjNAxdpGSSY2yA62qmFKcdys72YFTLWA22Q35ycAlC0XOyScj6O33oVCzVIea_XWFB8DfUmxRBsnOsZEs7NLcnRepuJnN3hDbZznJXyHM_WBXsc75oLpJzfQN5_c5HKuYMiVD668xfSc98nWaKbsDr7rHrm_OL87u2I3t5fXZ6c3zDYoCzPQKIXOQs9BuE7yoR17CRa56EfRGZSNkFJ1cgUtQDc0aiWMGaDva3dssdkjR-u59Revi8tFP8UlhbpSYydFh1JyXlO4TtkUc05u1C_Jzya9awT9qVWvteqqVX9q1aIy6hdjffmSUJLx078kX5O5bgkPLv246U_oA_Gwj2Q
CitedBy_id crossref_primary_10_1002_dac_4724
crossref_primary_10_1145_3607142
crossref_primary_10_1002_cpe_6578
crossref_primary_10_1007_s11277_023_10539_5
crossref_primary_10_1080_02564602_2022_2055671
crossref_primary_10_1109_ACCESS_2020_2966656
crossref_primary_10_1016_j_jksuci_2021_06_007
crossref_primary_10_1049_iet_net_2019_0009
crossref_primary_10_1016_j_sysarc_2018_12_005
crossref_primary_10_1155_2021_2098530
crossref_primary_10_1016_j_sysarc_2024_103245
crossref_primary_10_1109_JIOT_2021_3055827
crossref_primary_10_1109_ACCESS_2020_3000790
crossref_primary_10_1016_j_comcom_2021_01_025
crossref_primary_10_3233_JIFS_201770
crossref_primary_10_1002_ett_4218
crossref_primary_10_3390_app122412688
crossref_primary_10_1002_dac_4332
crossref_primary_10_1109_ACCESS_2019_2893918
crossref_primary_10_1155_2022_9119227
crossref_primary_10_1007_s41870_023_01314_7
crossref_primary_10_1177_18479790251318538
crossref_primary_10_1016_j_jksuci_2021_07_023
crossref_primary_10_1016_j_adhoc_2023_103089
crossref_primary_10_3390_s23125703
crossref_primary_10_1109_JIOT_2024_3484945
crossref_primary_10_1016_j_iot_2019_100061
crossref_primary_10_1016_j_comnet_2023_110133
crossref_primary_10_3390_electronics12081812
crossref_primary_10_1016_j_adhoc_2023_103159
crossref_primary_10_1002_ett_4747
crossref_primary_10_1002_ett_4664
crossref_primary_10_1007_s10723_023_09672_z
crossref_primary_10_1007_s11042_019_08369_4
crossref_primary_10_1016_j_future_2019_04_019
crossref_primary_10_4018_IJeC_299003
crossref_primary_10_1007_s11042_020_10153_8
crossref_primary_10_1007_s12083_024_01699_7
crossref_primary_10_1007_s11277_020_07385_0
crossref_primary_10_1007_s11277_020_07469_x
crossref_primary_10_1016_j_adhoc_2019_101948
crossref_primary_10_1155_2021_7142048
crossref_primary_10_1371_journal_pone_0258279
crossref_primary_10_1016_j_sysarc_2022_102650
crossref_primary_10_1002_ett_4957
crossref_primary_10_1007_s12065_020_00502_9
crossref_primary_10_1007_s10586_023_04211_7
crossref_primary_10_1038_s41598_024_73480_y
crossref_primary_10_3390_s23146460
crossref_primary_10_1016_j_iot_2023_100950
crossref_primary_10_1016_j_comnet_2020_107333
crossref_primary_10_1016_j_measen_2024_101150
crossref_primary_10_1109_ACCESS_2020_2987764
crossref_primary_10_4018_IJSSCI_291712
crossref_primary_10_1038_s41598_024_52134_z
crossref_primary_10_3390_sym14010046
crossref_primary_10_1007_s11227_021_03820_6
crossref_primary_10_1016_j_jisa_2020_102539
crossref_primary_10_1016_j_future_2019_05_058
crossref_primary_10_1007_s12083_024_01806_8
crossref_primary_10_1007_s11042_022_12088_8
crossref_primary_10_1371_journal_pone_0232277
crossref_primary_10_1109_ACCESS_2020_3047895
crossref_primary_10_1155_2022_8728397
crossref_primary_10_1007_s12083_024_01719_6
crossref_primary_10_1007_s12083_020_01038_6
Cites_doi 10.1016/j.proeng.2012.08.040
10.3390/a10020039
10.1007/s11042-015-2737-8
10.3390/s120201625
10.1016/j.future.2015.09.031
10.1109/TWC.2008.080128
10.1007/s00530-013-0346-9
10.1016/j.adhoc.2014.03.009
10.1016/j.comnet.2014.07.010
10.1016/j.adhoc.2015.07.012
10.3390/s100302450
10.1016/j.jnca.2012.03.011
10.1007/s11277-013-1543-8
10.1007/s12083-014-0285-z
10.3390/s130809589
10.1016/j.adhoc.2014.03.003
10.1007/s10916-014-0179-x
10.1016/j.adhoc.2015.05.020
10.1016/j.csi.2008.09.006
10.1016/j.comnet.2016.01.006
10.1016/j.adhoc.2015.05.014
10.3390/s140610081
10.1016/j.jnca.2012.05.010
10.4218/etrij.10.1510.0134
10.1016/j.csi.2010.03.008
10.3390/s140406443
10.3390/s110504767
10.1371/journal.pone.0116709
10.1016/j.comnet.2016.05.007
10.1109/TC.2002.1004593
10.1145/77648.77649
10.1007/s11042-014-2443-y
10.1007/s11042-013-1520-y
10.1109/TWC.2002.804190
10.1007/s10916-014-0182-2
10.1016/j.jcss.2016.12.006
10.1007/s11042-017-4701-2
10.1155/2013/730831
10.1007/3-540-48405-1_25
10.1016/j.jnca.2016.10.011
10.1109/WIMOB.2010.5645004
10.5755/j01.eee.19.6.2038
10.1002/sec.517
10.1109/GLOCOM.2007.190
10.1016/j.future.2016.12.028
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2017
Multimedia Tools and Applications is a copyright of Springer, (2017). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2017
– notice: Multimedia Tools and Applications is a copyright of Springer, (2017). All Rights Reserved.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-017-5376-4
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
ProQuest Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
ProQuest Research Library
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database (ProQuest)
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 18325
ExternalDocumentID 10_1007_s11042_017_5376_4
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c316t-a03771ec0b204e962d5fb60c124bf49a163466796805009d3784aad0bb667f513
IEDL.DBID AGYKE
ISSN 1380-7501
IngestDate Fri Jul 25 22:37:35 EDT 2025
Thu Apr 24 22:53:14 EDT 2025
Wed Oct 01 02:50:19 EDT 2025
Fri Feb 21 02:33:47 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 14
Keywords Anonymity
Sensor node
Gateway node
IoT-based WSN
Authentication
Smartcard
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-a03771ec0b204e962d5fb60c124bf49a163466796805009d3784aad0bb667f513
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1964916622
PQPubID 54626
PageCount 31
ParticipantIDs proquest_journals_1964916622
crossref_primary_10_1007_s11042_017_5376_4
crossref_citationtrail_10_1007_s11042_017_5376_4
springer_journals_10_1007_s11042_017_5376_4
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20180700
2018-7-00
20180701
PublicationDateYYYYMMDD 2018-07-01
PublicationDate_xml – month: 7
  year: 2018
  text: 20180700
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2018
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Amin, Biswas (CR1) 2016; 36
Song (CR31) 2010; 32
Khan, Alghathbar (CR22) 2010; 10
Zhang, Fu, Zhao, Li, Yang (CR48) 2012; 43
CR18
CR16
CR38
CR37
Kumari, Om (CR26) 2016; 104
Chang (CR6) 2015; 35
Chang, Kuo, Ramachandran (CR7) 2016; 57
CR12
CR33
Messerges, Dabbish, Sloan (CR28) 2002; 51
Nam, Choo, Han, Kim, Paik, Won (CR29) 2015; 10
CR32
Xu, Zhu, Feng (CR44) 2009; 31
Xu, Wu (CR43) 2015; 39
Heinzelman, Chandrakasan, Balakrishnan (CR20) 2002; 1
CR30
Xu, Wang (CR42) 2013; 8
Amin, Islam, Biswas, Khan, Leng, Kumar (CR2) 2016; 101
Das (CR10) 2009; 8
Das, Sharma, Chatterjee, Sing (CR11) 2012; 35
Jiang, Ma, Lu, Tian (CR21) 2015; 8
Ghadi, Laouamer, Moulahi (CR14) 2016; 75
Choi, Lee, Kim, Jung, Nam, Won (CR9) 2014; 14
Farash, Turkanović, Kumari, Hölbl (CR13) 2016; 36
He, Kumar, Chen, Lee, Chilamkurti, Yeo (CR19) 2015; 21
Li, Weng, Lee (CR27) 2013; 13
Turkanović, Hölbl (CR34) 2013; 19
Turkanović, Hölbl (CR35) 2014; 77
CR3
Anwar, Mohamad Zain, Zolkipli, Inayat, Khan, Anthony, Chang (CR4) 2017; 10
Chen, Shih (CR8) 2010; 32
Kumar, Lee, Lee (CR25) 2012; 12
Wang, Wang (CR39) 2014; 73
Wang, Wang (CR40) 2014; 20
CR24
Turkanović, Brumen, Hölbl (CR36) 2014; 20
CR46
Yeh, Chen, Liu, Kim, Wei (CR47) 2011; 11
CR41
Hamid, Hussain, Pyun (CR15) 2016; 75
Kim, Lee, Jeon, Lee, Won (CR23) 2014; 14
Burrows, Abadi, Needham (CR5) 1990; 8
Han, Shon (CR17) 2015; 74
Xue, Ma, Hong, Ding (CR45) 2013; 36
D He (5376_CR19) 2015; 21
TS Messerges (5376_CR28) 2002; 51
M Turkanović (5376_CR34) 2013; 19
D Wang (5376_CR40) 2014; 20
R Amin (5376_CR2) 2016; 101
J Kim (5376_CR23) 2014; 14
Y Zhang (5376_CR48) 2012; 43
M Turkanović (5376_CR35) 2014; 77
Y Choi (5376_CR9) 2014; 14
TH Chen (5376_CR8) 2010; 32
5376_CR24
M Turkanović (5376_CR36) 2014; 20
5376_CR46
J Nam (5376_CR29) 2015; 10
5376_CR41
S Xu (5376_CR42) 2013; 8
5376_CR3
K Han (5376_CR17) 2015; 74
K Xue (5376_CR45) 2013; 36
ML Das (5376_CR10) 2009; 8
AK Das (5376_CR11) 2012; 35
L Xu (5376_CR43) 2015; 39
S Anwar (5376_CR4) 2017; 10
MK Khan (5376_CR22) 2010; 10
Q Jiang (5376_CR21) 2015; 8
CT Li (5376_CR27) 2013; 13
M Burrows (5376_CR5) 1990; 8
5376_CR18
R Amin (5376_CR1) 2016; 36
WB Heinzelman (5376_CR20) 2002; 1
P Kumar (5376_CR25) 2012; 12
5376_CR37
D Wang (5376_CR39) 2014; 73
5376_CR16
5376_CR38
V Chang (5376_CR6) 2015; 35
5376_CR33
5376_CR32
MS Farash (5376_CR13) 2016; 36
5376_CR12
M Ghadi (5376_CR14) 2016; 75
HL Yeh (5376_CR47) 2011; 11
5376_CR30
S Kumari (5376_CR26) 2016; 104
R Song (5376_CR31) 2010; 32
J Xu (5376_CR44) 2009; 31
V Chang (5376_CR7) 2016; 57
Z Hamid (5376_CR15) 2016; 75
References_xml – volume: 43
  start-page: 233
  year: 2012
  end-page: 237
  ident: CR48
  article-title: Discussion on application of IoT technology in coal mine safety supervision
  publication-title: Procedia Eng
  doi: 10.1016/j.proeng.2012.08.040
– ident: CR18
– volume: 10
  start-page: 2
  year: 2017
  ident: CR4
  article-title: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions
  publication-title: Algorithms
  doi: 10.3390/a10020039
– volume: 75
  start-page: 8195
  issue: 14
  year: 2016
  end-page: 8216
  ident: CR15
  article-title: Delay and link utilization aware routing protocol for wireless multimedia sensor networks
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2737-8
– volume: 12
  start-page: 1625
  issue: 2
  year: 2012
  end-page: 1647
  ident: CR25
  article-title: E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
  publication-title: Sensors
  doi: 10.3390/s120201625
– volume: 57
  start-page: 24
  year: 2016
  end-page: 41
  ident: CR7
  article-title: Cloud computing adoption framework: a security framework for business clouds
  publication-title: Fut Gen Comput Syst
  doi: 10.1016/j.future.2015.09.031
– volume: 8
  start-page: 1086
  issue: 3
  year: 2009
  end-page: 1090
  ident: CR10
  article-title: Two-factor user authentication in wireless sensor networks
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/TWC.2008.080128
– ident: CR16
– ident: CR37
– ident: CR12
– ident: CR30
– volume: 21
  start-page: 49
  issue: 1
  year: 2015
  end-page: 60
  ident: CR19
  article-title: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
  publication-title: Multimed Syst
  doi: 10.1007/s00530-013-0346-9
– ident: CR33
– volume: 20
  start-page: 96
  year: 2014
  end-page: 112
  ident: CR36
  article-title: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2014.03.009
– volume: 73
  start-page: 41
  year: 2014
  end-page: 57
  ident: CR39
  article-title: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2014.07.010
– volume: 35
  start-page: 65
  year: 2015
  end-page: 82
  ident: CR6
  article-title: Towards a big data system disaster recovery in a private cloud
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.07.012
– volume: 10
  start-page: 2450
  issue: 3
  year: 2010
  end-page: 2459
  ident: CR22
  article-title: Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s100302450
– volume: 35
  start-page: 1646
  issue: 5
  year: 2012
  end-page: 1656
  ident: CR11
  article-title: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2012.03.011
– volume: 77
  start-page: 907
  issue: 2
  year: 2014
  end-page: 922
  ident: CR35
  article-title: Notes on a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
  publication-title: Wireless Person Commun
  doi: 10.1007/s11277-013-1543-8
– volume: 8
  start-page: 1070
  issue: 6
  year: 2015
  end-page: 1081
  ident: CR21
  article-title: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
  publication-title: Peer-to-Peer Network Appl
  doi: 10.1007/s12083-014-0285-z
– volume: 13
  start-page: 9589
  issue: 8
  year: 2013
  end-page: 9603
  ident: CR27
  article-title: An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s130809589
– volume: 20
  start-page: 1
  year: 2014
  end-page: 15
  ident: CR40
  article-title: Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2014.03.003
– volume: 39
  start-page: 1
  issue: 2
  year: 2015
  end-page: 9
  ident: CR43
  article-title: Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
  publication-title: J Med Syst
  doi: 10.1007/s10916-014-0179-x
– volume: 36
  start-page: 58
  year: 2016
  end-page: 80
  ident: CR1
  article-title: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.05.020
– volume: 8
  start-page: 197
  issue: 6
  year: 2013
  end-page: 203
  ident: CR42
  article-title: A new user authentication scheme for hierarchical wireless sensor networks
  publication-title: Int Rev Comput Softw
– volume: 31
  start-page: 723
  issue: 4
  year: 2009
  end-page: 728
  ident: CR44
  article-title: An improved smart card based password authentication scheme with provable security
  publication-title: Comput Stand Interf
  doi: 10.1016/j.csi.2008.09.006
– volume: 101
  start-page: 42
  year: 2016
  end-page: 62
  ident: CR2
  article-title: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2016.01.006
– ident: CR46
– volume: 36
  start-page: 152
  year: 2016
  end-page: 176
  ident: CR13
  article-title: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.05.014
– volume: 14
  start-page: 10,081
  issue: 6
  year: 2014
  end-page: 10,106
  ident: CR9
  article-title: Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
  publication-title: Sensors
  doi: 10.3390/s140610081
– volume: 36
  start-page: 316
  issue: 1
  year: 2013
  end-page: 323
  ident: CR45
  article-title: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2012.05.010
– volume: 32
  start-page: 704
  issue: 5
  year: 2010
  end-page: 712
  ident: CR8
  article-title: A robust mutual authentication protocol for wireless sensor networks
  publication-title: ETRI J
  doi: 10.4218/etrij.10.1510.0134
– volume: 32
  start-page: 321
  issue: 5
  year: 2010
  end-page: 325
  ident: CR31
  article-title: Advanced smart card based password authentication protocol
  publication-title: Comput Standards Interf
  doi: 10.1016/j.csi.2010.03.008
– ident: CR3
– volume: 14
  start-page: 6443
  issue: 4
  year: 2014
  end-page: 6462
  ident: CR23
  article-title: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s140406443
– ident: CR38
– volume: 19
  start-page: 109
  issue: 6
  year: 2013
  end-page: 116
  ident: CR34
  article-title: An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
  publication-title: Elektronika ir Elektrotechnika
– volume: 11
  start-page: 4767
  issue: 5
  year: 2011
  end-page: 4779
  ident: CR47
  article-title: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
  publication-title: Sensors
  doi: 10.3390/s110504767
– ident: CR32
– volume: 10
  start-page: e0116,709
  issue: 4
  year: 2015
  ident: CR29
  article-title: Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
  publication-title: PLOS One
  doi: 10.1371/journal.pone.0116709
– volume: 104
  start-page: 137
  year: 2016
  end-page: 154
  ident: CR26
  article-title: Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2016.05.007
– volume: 51
  start-page: 541
  issue: 5
  year: 2002
  end-page: 552
  ident: CR28
  article-title: Examining smart-card security under the threat of power analysis attacks
  publication-title: IEEE Trans Comput
  doi: 10.1109/TC.2002.1004593
– volume: 8
  start-page: 18
  issue: 1
  year: 1990
  end-page: 36
  ident: CR5
  article-title: A logic of authentication
  publication-title: ACM Trans Comput Syst
  doi: 10.1145/77648.77649
– ident: CR41
– ident: CR24
– volume: 75
  start-page: 3425
  issue: 6
  year: 2016
  end-page: 3451
  ident: CR14
  article-title: Securing data exchange in wireless multimedia sensor networks: perspectives and challenges
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-014-2443-y
– volume: 74
  start-page: 1541
  issue: 5
  year: 2015
  end-page: 1555
  ident: CR17
  article-title: Authentication of mobile applications through various local distributors
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-013-1520-y
– volume: 1
  start-page: 660
  issue: 4
  year: 2002
  end-page: 670
  ident: CR20
  article-title: An application-specific protocol architecture for wireless microsensor networks
  publication-title: IEEE Trans Wireless Commun
  doi: 10.1109/TWC.2002.804190
– ident: 5376_CR18
– volume: 21
  start-page: 49
  issue: 1
  year: 2015
  ident: 5376_CR19
  publication-title: Multimed Syst
  doi: 10.1007/s00530-013-0346-9
– volume: 10
  start-page: e0116,709
  issue: 4
  year: 2015
  ident: 5376_CR29
  publication-title: PLOS One
  doi: 10.1371/journal.pone.0116709
– ident: 5376_CR16
– volume: 39
  start-page: 1
  issue: 2
  year: 2015
  ident: 5376_CR43
  publication-title: J Med Syst
  doi: 10.1007/s10916-014-0182-2
– volume: 31
  start-page: 723
  issue: 4
  year: 2009
  ident: 5376_CR44
  publication-title: Comput Stand Interf
  doi: 10.1016/j.csi.2008.09.006
– volume: 11
  start-page: 4767
  issue: 5
  year: 2011
  ident: 5376_CR47
  publication-title: Sensors
  doi: 10.3390/s110504767
– volume: 10
  start-page: 2450
  issue: 3
  year: 2010
  ident: 5376_CR22
  publication-title: Sensors
  doi: 10.3390/s100302450
– volume: 35
  start-page: 65
  year: 2015
  ident: 5376_CR6
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.07.012
– volume: 8
  start-page: 18
  issue: 1
  year: 1990
  ident: 5376_CR5
  publication-title: ACM Trans Comput Syst
  doi: 10.1145/77648.77649
– volume: 104
  start-page: 137
  year: 2016
  ident: 5376_CR26
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2016.05.007
– ident: 5376_CR41
  doi: 10.1016/j.jcss.2016.12.006
– volume: 35
  start-page: 1646
  issue: 5
  year: 2012
  ident: 5376_CR11
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2012.03.011
– volume: 57
  start-page: 24
  year: 2016
  ident: 5376_CR7
  publication-title: Fut Gen Comput Syst
  doi: 10.1016/j.future.2015.09.031
– volume: 32
  start-page: 704
  issue: 5
  year: 2010
  ident: 5376_CR8
  publication-title: ETRI J
  doi: 10.4218/etrij.10.1510.0134
– volume: 75
  start-page: 8195
  issue: 14
  year: 2016
  ident: 5376_CR15
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2737-8
– ident: 5376_CR12
  doi: 10.1007/s11042-017-4701-2
– volume: 20
  start-page: 1
  year: 2014
  ident: 5376_CR40
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2014.03.003
– volume: 77
  start-page: 907
  issue: 2
  year: 2014
  ident: 5376_CR35
  publication-title: Wireless Person Commun
  doi: 10.1007/s11277-013-1543-8
– volume: 20
  start-page: 96
  year: 2014
  ident: 5376_CR36
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2014.03.009
– ident: 5376_CR30
  doi: 10.1155/2013/730831
– volume: 36
  start-page: 58
  year: 2016
  ident: 5376_CR1
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.05.020
– ident: 5376_CR24
  doi: 10.1007/3-540-48405-1_25
– volume: 43
  start-page: 233
  year: 2012
  ident: 5376_CR48
  publication-title: Procedia Eng
  doi: 10.1016/j.proeng.2012.08.040
– volume: 14
  start-page: 10,081
  issue: 6
  year: 2014
  ident: 5376_CR9
  publication-title: Sensors
  doi: 10.3390/s140610081
– volume: 12
  start-page: 1625
  issue: 2
  year: 2012
  ident: 5376_CR25
  publication-title: Sensors
  doi: 10.3390/s120201625
– volume: 8
  start-page: 197
  issue: 6
  year: 2013
  ident: 5376_CR42
  publication-title: Int Rev Comput Softw
– ident: 5376_CR46
– volume: 32
  start-page: 321
  issue: 5
  year: 2010
  ident: 5376_CR31
  publication-title: Comput Standards Interf
  doi: 10.1016/j.csi.2010.03.008
– ident: 5376_CR32
  doi: 10.1016/j.jnca.2016.10.011
– volume: 75
  start-page: 3425
  issue: 6
  year: 2016
  ident: 5376_CR14
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-014-2443-y
– volume: 101
  start-page: 42
  year: 2016
  ident: 5376_CR2
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2016.01.006
– ident: 5376_CR37
  doi: 10.1109/WIMOB.2010.5645004
– volume: 36
  start-page: 316
  issue: 1
  year: 2013
  ident: 5376_CR45
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2012.05.010
– volume: 19
  start-page: 109
  issue: 6
  year: 2013
  ident: 5376_CR34
  publication-title: Elektronika ir Elektrotechnika
  doi: 10.5755/j01.eee.19.6.2038
– ident: 5376_CR38
  doi: 10.1002/sec.517
– volume: 14
  start-page: 6443
  issue: 4
  year: 2014
  ident: 5376_CR23
  publication-title: Sensors
  doi: 10.3390/s140406443
– volume: 8
  start-page: 1086
  issue: 3
  year: 2009
  ident: 5376_CR10
  publication-title: IEEE Trans Wirel Commun
  doi: 10.1109/TWC.2008.080128
– volume: 13
  start-page: 9589
  issue: 8
  year: 2013
  ident: 5376_CR27
  publication-title: Sensors
  doi: 10.3390/s130809589
– volume: 10
  start-page: 2
  year: 2017
  ident: 5376_CR4
  publication-title: Algorithms
  doi: 10.3390/a10020039
– volume: 51
  start-page: 541
  issue: 5
  year: 2002
  ident: 5376_CR28
  publication-title: IEEE Trans Comput
  doi: 10.1109/TC.2002.1004593
– volume: 74
  start-page: 1541
  issue: 5
  year: 2015
  ident: 5376_CR17
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-013-1520-y
– volume: 8
  start-page: 1070
  issue: 6
  year: 2015
  ident: 5376_CR21
  publication-title: Peer-to-Peer Network Appl
  doi: 10.1007/s12083-014-0285-z
– volume: 1
  start-page: 660
  issue: 4
  year: 2002
  ident: 5376_CR20
  publication-title: IEEE Trans Wireless Commun
  doi: 10.1109/TWC.2002.804190
– ident: 5376_CR33
  doi: 10.1109/GLOCOM.2007.190
– volume: 73
  start-page: 41
  year: 2014
  ident: 5376_CR39
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2014.07.010
– ident: 5376_CR3
  doi: 10.1016/j.future.2016.12.028
– volume: 36
  start-page: 152
  year: 2016
  ident: 5376_CR13
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2015.05.014
SSID ssj0016524
Score 2.4491158
Snippet In current times, multimedia application includes integrated sensors, mobile networks and Internet-of-Things (IoT) services. In IoT services, if more devices...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 18295
SubjectTerms Authentication protocols
Coal mines
Computer Communication Networks
Computer Science
Data Structures and Information Theory
Environmental monitoring
Internet of Things
Multimedia
Multimedia communications
Multimedia Information Systems
Privacy
Protocol
Protocol (computers)
Remote sensors
Security
Sensors
Special Purpose and Application-Based Systems
Wireless communications
Wireless sensor networks
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwELWgLDDwUUAUCvLABLJIHMdNJ4RQS0GCqZW6RbZjS0hVWkj4_9y5TluQYE1iD3n23dN9vCPkOhUx3DHJmU1iyYSwmmXC4TR37rLEZZnyxZivb3I0ES_TdBoCblUoq2xsojfUxdxgjPwOhaOAykjO7xcfDKdGYXY1jNDYJjsxh5OEneLDp1UWQaZhqG0WMfCMcZPV9K1zMTamoI1GQRMmfvqlNdn8lR_1bmd4SPYDX6QPS4CPyJYt2-SgmcVAw9Vsk70NYcFjUg68MgQ4FKqwhL2sQ2iOoi7DHMCnQFZphcF2S31RoW8hoWazX6Si7yV9no-Z9Q1WBUVd4xmYRlhYVrC-XNaQVydkMhyMH0csTFZgBiCpmYqSXi-2JtI8ErYveZE6LSMDzl470VdA0oTECFMWpUDCiqSXCaWKSGt46tI4OSWtcl7aM0K55H1teCILXQjjMO1ppNLKaSUKw12HRM1_zU2QHcfpF7N8LZiMUOQARY5Q5KJDblZLFkvNjf8-7jZg5eH6Vfn6sHTIbQPgxuu_Njv_f7MLsgt8KVtW63ZJq_78spfASWp95Q_eN4LV3W4
  priority: 102
  providerName: ProQuest
Title Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
URI https://link.springer.com/article/10.1007/s11042-017-5376-4
https://www.proquest.com/docview/1964916622
Volume 77
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241003
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: ADMLS
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7721
  dateEnd: 20241003
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: BENPR
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241003
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: 8FG
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1380-7501
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT9swFH6CcoHDYDBEGVQ-7LTJKHEc1z120MLYQBO0EjtFtmNLiCqdSLjw1_OcOLQgNolTpPiHEvvZ77Pfe98D-JLyGNeYYNQmsaCcW00ldz6bO3MycVKq2hnz4lKcTfn5TXoT4rjL1tu9NUnWO_Ui2C32oSR-V_UUJJSvwlrqzycdWBue_vk5ejYeiDTkspURRYUYt8bMtzp5qY4WGPOVWbTWNuNNmLTf2TiZ3B09VPrIPL6icHznj2zBh4A-ybARl4-wYott2GwzO5Cw0LdhY4mmcAeKUc0zgeqJKO8QX1Thoo94loc5ihJB6EtKf3VvSe2iWAekELMcfVKS24L8mE-orcO1cuJZkme40WLDosT2ReORXn6C6Xg0OT6jIU8DNTjBFVVR0u_H1kSaRdwOBMtTp0VkEDpoxwcKIR8X_r5KRilCujzpS65UHmmNb10aJ7vQKeaF3QPCBBtowxKR65wb542oRiitnFY8N8x1IWqnKzOBxNzn0phlC_plP7oZjm7mRzfjXfj63ORvw-Dxv8oHrQxkYTGXmecsQxQtGOvCt3ZKl4r_1dn-u2p_hnUEY7JxBT6ATnX_YA8R8FS6B6tyfNpDMT-5-HXdC-KOz--jy99XWDplwycJuPup
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOQEsrFgr1AS5FVhPb8XoPCCHosksfp63UW7AdW6pUZdtmEeJP8RuZcZLuFoneek1iK8qMZ77M4xuAd4XK8YxpwYPMNVcqOG5UpGnuIhoZjbGpGPP4RE9O1fez4mwN_vS9MFRW2dvEZKiruacY-T4RRyGU0UJ8urziNDWKsqv9CI1WLQ7D71_4y9Z8nH5F-b4XYnww-zLh3VQB7vF1FtxmcjjMg8-cyFQYaVEV0enMo6NzUY0sAhSlKbpisgIBSCWHRllbZc7h1VjkEvd9AA-VlJK4-s34203WQhfdEF2TcfTEeZ9FTa16OTXCkE8gAhWubvvBJbj9Jx-b3Nz4OTzt8Cn73CrUBqyFehOe9bMfWGcKNuHJCpHhC6gPEhMFOjBmqWS-XnShQEY8EHNUNobgmDUU3A8sFTGmlhXmV_tTGnZes-l8xkNq6KoY8ShfoCnGhXWD6-u2Zr3ZgtN7-ebbsF7P6_ASmNBi5LyQunKV8pHSrF5bZ6OzqvIiDiDrv2vpO5pzmrZxUS4JmkkUJYqiJFGUagB7N0suW46Pux7e6YVVdse9KZfKOYAPvQBXbv9vs1d3b7YLjyaz46PyaHpy-BoeI1YzbaXwDqwvrn-GN4iHFu5tUkIGP-5b6_8CnBwYJw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VVEJwoFCoCBTYA1xAq9rr9cY5VKjQRA2FqEKt1JvZp4RUOaVOVfUv8quY2aybgERvvdreleWZnfk8j28A3pYyxzOmBPdFrriU3vBKBprmLkJVhKrSsRjz21QdnMgvp-XpGvzuemGorLKzidFQu5mlGPkOEUchlFFC7IRUFnG0P_54_ovTBCnKtHbjNHQas-B2I91YavI49NdX-DvX7k72UfbvhBiPjj8f8DRxgFt81TnXWTEY5N5mRmTSD5VwZTAqs-gETZBDjeBFKoq8VFmJ4MQVg0pq7TJj8Goo8wL3vQfrA-oX7cH6p9H06PtNTkOVacRulXH003mXY42NfDm1yZDHIHoVLv_2kkvo-0-2NjrB8WN4lNAr21uo2xNY880mbHSTIVgyFJvwcIXm8Ck0o8hTge6NaSqob-YpUMiIJWKGqsgQOrOWQv-exRLH2NDC7Gr3Sst-NmwyO-Y-tns5RizLZ2iocWHT4vpmUdHePoOTO_nqW9BrZo1_DkwoMTRWFMoZJ22gJKxV2uhgtHRWhD5k3XetbSJBp1kcZ_WSvplEUaMoahJFLfvw_mbJ-YIB5LaHtzth1ckYtPVSdfvwoRPgyu3_bfbi9s3ewH08AfXXyfTwJTxAIFctyoi3oTe_uPSvECzNzeukhQx-3LXi_wEW8CMB
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+authentication+protocol+for+secure+multimedia+communications+in+IoT-enabled+wireless+sensor+networks&rft.jtitle=Multimedia+tools+and+applications&rft.au=Mishra%2C+Dheerendra&rft.au=Vijayakumar%2C+P.&rft.au=Sureshkumar%2C+Venkatasamy&rft.au=Amin%2C+Ruhul&rft.date=2018-07-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=77&rft.issue=14&rft.spage=18295&rft.epage=18325&rft_id=info:doi/10.1007%2Fs11042-017-5376-4&rft.externalDocID=10_1007_s11042_017_5376_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon