A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks

Wireless Multimedia Sensor Networks (WMSNs) produce enormous amounts of big multimedia data. Due to large size, Multimedia Sensor Nodes (MSNs) cannot store generated multimedia data for a long time. In this scenario, mobile sinks can be utilized for data collection. However, due to vulnerable nature of wireless networks, there is a need for an efficient security scheme to authenticate both MSNs and mobile sinks. In this paper, we propose a scheme to protect an underlying WMSN during mobile multimedia data collection. The proposed scheme is a two-layer scheme. At the first layer, all MSNs are distributed into small clusters, where each cluster is represented by a single Cluster Head (CH). At the second layer, all CHs verify identities of mobile sinks before sharing multimedia data. Authentication at both layers ensures a secure data exchange. We evaluate the performance of proposed scheme through extensive simulation results. The simulation results prove that the proposed scheme performs better as compared to existing state-of-the-art approaches in terms of resilience and handshake duration. The proposed scheme is also analyzed in terms of authentication rate, data freshness, and packet delivery ratio, and has shown a better performance.

[1]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[2]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[3]  A. Chilambuchelvan,et al.  GSR: Geographic Secured Routing using SHA-3 algorithm for node and message authentication in wireless sensor networks , 2017, Future Gener. Comput. Syst..

[4]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[5]  Sipra Das Bit,et al.  A lightweight security scheme for query processing in clustered wireless sensor networks , 2015, Comput. Electr. Eng..

[6]  Kyung-Ah Shim,et al.  BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Waqar Mahmood,et al.  Internet of multimedia things: Vision and challenges , 2015, Ad Hoc Networks.

[8]  Xiong Li,et al.  A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..

[9]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[10]  Sipra Das Bit,et al.  Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN , 2010, ICCSA.

[11]  Jie Wu,et al.  A ( ${M}$ , ${m}$ ) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks , 2018, IEEE Wireless Communications Letters.

[12]  Yang Li,et al.  A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems , 2022, IEEE Transactions on Big Data.

[13]  Ping Zhang,et al.  A secure data collection scheme based on compressive sensing in wireless sensor networks , 2018, Ad Hoc Networks.

[14]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[15]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[16]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[17]  Daniel G. Costa,et al.  Wireless visual sensor networks for smart city applications: A relevance-based approach for multiple sinks mobility , 2017, Future Gener. Comput. Syst..

[18]  Muhammad Alam,et al.  A payload-based mutual authentication scheme for Internet of Things , 2017, Future Gener. Comput. Syst..

[19]  Muhammad Khurram Khan,et al.  User authentication schemes for wireless sensor networks: A review , 2015, Ad Hoc Networks.

[20]  Mehmet Hakan Karaata,et al.  Imposter detection for replication attacks in mobile sensor networks , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).

[21]  Sudip Misra,et al.  TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks , 2016, IEEE Transactions on Computers.

[22]  Fadi Al-Turjman,et al.  Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.

[23]  Xiangjian He,et al.  Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[24]  Xiangjian He,et al.  A Joint Framework for QoS and QoE for Video Transmission over Wireless Multimedia Sensor Networks , 2018, IEEE Transactions on Mobile Computing.

[25]  Mohammad Reza Meybodi,et al.  A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..