A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks

Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Jinjun Chen

Research output: Journal PublicationArticlepeer-review

24 Citations (Scopus)


Wireless Multimedia Sensor Networks (WMSNs) produce enormous amounts of big multimedia data. Due to large size, Multimedia Sensor Nodes (MSNs) cannot store generated multimedia data for a long time. In this scenario, mobile sinks can be utilized for data collection. However, due to vulnerable nature of wireless networks, there is a need for an efficient security scheme to authenticate both MSNs and mobile sinks. In this paper, we propose a scheme to protect an underlying WMSN during mobile multimedia data collection. The proposed scheme is a two-layer scheme. At the first layer, all MSNs are distributed into small clusters, where each cluster is represented by a single Cluster Head (CH). At the second layer, all CHs verify identities of mobile sinks before sharing multimedia data. Authentication at both layers ensures a secure data exchange. We evaluate the performance of proposed scheme through extensive simulation results. The simulation results prove that the proposed scheme performs better as compared to existing state-of-the-art approaches in terms of resilience and handshake duration. The proposed scheme is also analyzed in terms of authentication rate, data freshness, and packet delivery ratio, and has shown a better performance.

Original languageEnglish
Article number8428452
Pages (from-to)274-284
Number of pages11
JournalIEEE Transactions on Network Science and Engineering
Issue number1
Publication statusPublished - 1 Jan 2020
Externally publishedYes


  • MSNs
  • WMSNs
  • authentication
  • clusters
  • multimedia
  • security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science Applications
  • Computer Networks and Communications


Dive into the research topics of 'A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks'. Together they form a unique fingerprint.

Cite this