Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application
As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Intern...
Gespeichert in:
Veröffentlicht in: | The Journal of supercomputing 2020-06, Vol.76 (6), p.3963-3983 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3983 |
---|---|
container_issue | 6 |
container_start_page | 3963 |
container_title | The Journal of supercomputing |
container_volume | 76 |
creator | Kumar, Priyan Malarvizhi Gandhi, Usha Devi |
description | As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of
ClientHello
messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every
ClientHello
message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS. |
doi_str_mv | 10.1007/s11227-017-2169-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2407767493</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2407767493</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-1f27a2c95a720a59ea60b9a69f8ef3c59ce03ba2a4f931544b26fee351c8e1ef3</originalsourceid><addsrcrecordid>eNp1kMtKQzEQhoMoWC8P4C7gOprrSbMstV6goGBdh5w46TmlzalJivj2prTgytUwP983Az9CN4zeMUr1fWaMc00o04SzxhB1gkZMaUGoHMtTNKKGUzJWkp-ji5xXlFIptBihbhY7Fz184ofF_B1_96XD02HyRlqXa-h2pYNYeu9KP0ScfQcbwGFIuOa4jwVShIKHUPc-LnONcAduXTrvEmC33a6P7hU6C26d4fo4L9HH42wxfSbz16eX6WROvGBNISxw7bg3ymlOnTLgGtoa15gwhiC8Mh6oaB13MhjBlJQtbwKAUMyPgVXkEt0e7m7T8LWDXOxq2KVYX1ouqdaNlkZUih0on4acEwS7Tf3GpR_LqN0Xag-F2lqo3RdqVXX4wcmVjUtIf5f_l34BXd95Pg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2407767493</pqid></control><display><type>article</type><title>Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application</title><source>Springer Nature - Complete Springer Journals</source><creator>Kumar, Priyan Malarvizhi ; Gandhi, Usha Devi</creator><creatorcontrib>Kumar, Priyan Malarvizhi ; Gandhi, Usha Devi</creatorcontrib><description>As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of
ClientHello
messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every
ClientHello
message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.</description><identifier>ISSN: 0920-8542</identifier><identifier>EISSN: 1573-0484</identifier><identifier>DOI: 10.1007/s11227-017-2169-5</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Bandwidths ; Compilers ; Computer networks ; Computer Science ; Data transmission ; Denial of service attacks ; Encryption ; Gateways ; Handshaking protocols ; Internet of Things ; Interpreters ; Mathematical analysis ; Messages ; Performance evaluation ; Processor Architectures ; Programming Languages ; Servers</subject><ispartof>The Journal of supercomputing, 2020-06, Vol.76 (6), p.3963-3983</ispartof><rights>Springer Science+Business Media, LLC 2017</rights><rights>Springer Science+Business Media, LLC 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-1f27a2c95a720a59ea60b9a69f8ef3c59ce03ba2a4f931544b26fee351c8e1ef3</citedby><cites>FETCH-LOGICAL-c316t-1f27a2c95a720a59ea60b9a69f8ef3c59ce03ba2a4f931544b26fee351c8e1ef3</cites><orcidid>0000-0001-6149-2705</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11227-017-2169-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11227-017-2169-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Kumar, Priyan Malarvizhi</creatorcontrib><creatorcontrib>Gandhi, Usha Devi</creatorcontrib><title>Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application</title><title>The Journal of supercomputing</title><addtitle>J Supercomput</addtitle><description>As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of
ClientHello
messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every
ClientHello
message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.</description><subject>Bandwidths</subject><subject>Compilers</subject><subject>Computer networks</subject><subject>Computer Science</subject><subject>Data transmission</subject><subject>Denial of service attacks</subject><subject>Encryption</subject><subject>Gateways</subject><subject>Handshaking protocols</subject><subject>Internet of Things</subject><subject>Interpreters</subject><subject>Mathematical analysis</subject><subject>Messages</subject><subject>Performance evaluation</subject><subject>Processor Architectures</subject><subject>Programming Languages</subject><subject>Servers</subject><issn>0920-8542</issn><issn>1573-0484</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNp1kMtKQzEQhoMoWC8P4C7gOprrSbMstV6goGBdh5w46TmlzalJivj2prTgytUwP983Az9CN4zeMUr1fWaMc00o04SzxhB1gkZMaUGoHMtTNKKGUzJWkp-ji5xXlFIptBihbhY7Fz184ofF_B1_96XD02HyRlqXa-h2pYNYeu9KP0ScfQcbwGFIuOa4jwVShIKHUPc-LnONcAduXTrvEmC33a6P7hU6C26d4fo4L9HH42wxfSbz16eX6WROvGBNISxw7bg3ymlOnTLgGtoa15gwhiC8Mh6oaB13MhjBlJQtbwKAUMyPgVXkEt0e7m7T8LWDXOxq2KVYX1ouqdaNlkZUih0on4acEwS7Tf3GpR_LqN0Xag-F2lqo3RdqVXX4wcmVjUtIf5f_l34BXd95Pg</recordid><startdate>20200601</startdate><enddate>20200601</enddate><creator>Kumar, Priyan Malarvizhi</creator><creator>Gandhi, Usha Devi</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-6149-2705</orcidid></search><sort><creationdate>20200601</creationdate><title>Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application</title><author>Kumar, Priyan Malarvizhi ; Gandhi, Usha Devi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-1f27a2c95a720a59ea60b9a69f8ef3c59ce03ba2a4f931544b26fee351c8e1ef3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Bandwidths</topic><topic>Compilers</topic><topic>Computer networks</topic><topic>Computer Science</topic><topic>Data transmission</topic><topic>Denial of service attacks</topic><topic>Encryption</topic><topic>Gateways</topic><topic>Handshaking protocols</topic><topic>Internet of Things</topic><topic>Interpreters</topic><topic>Mathematical analysis</topic><topic>Messages</topic><topic>Performance evaluation</topic><topic>Processor Architectures</topic><topic>Programming Languages</topic><topic>Servers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumar, Priyan Malarvizhi</creatorcontrib><creatorcontrib>Gandhi, Usha Devi</creatorcontrib><collection>CrossRef</collection><jtitle>The Journal of supercomputing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumar, Priyan Malarvizhi</au><au>Gandhi, Usha Devi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application</atitle><jtitle>The Journal of supercomputing</jtitle><stitle>J Supercomput</stitle><date>2020-06-01</date><risdate>2020</risdate><volume>76</volume><issue>6</issue><spage>3963</spage><epage>3983</epage><pages>3963-3983</pages><issn>0920-8542</issn><eissn>1573-0484</eissn><abstract>As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of
ClientHello
messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every
ClientHello
message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11227-017-2169-5</doi><tpages>21</tpages><orcidid>https://orcid.org/0000-0001-6149-2705</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0920-8542 |
ispartof | The Journal of supercomputing, 2020-06, Vol.76 (6), p.3963-3983 |
issn | 0920-8542 1573-0484 |
language | eng |
recordid | cdi_proquest_journals_2407767493 |
source | Springer Nature - Complete Springer Journals |
subjects | Bandwidths Compilers Computer networks Computer Science Data transmission Denial of service attacks Encryption Gateways Handshaking protocols Internet of Things Interpreters Mathematical analysis Messages Performance evaluation Processor Architectures Programming Languages Servers |
title | Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T16%3A26%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhanced%20DTLS%20with%20CoAP-based%20authentication%20scheme%20for%20the%20internet%20of%20things%20in%20healthcare%20application&rft.jtitle=The%20Journal%20of%20supercomputing&rft.au=Kumar,%20Priyan%20Malarvizhi&rft.date=2020-06-01&rft.volume=76&rft.issue=6&rft.spage=3963&rft.epage=3983&rft.pages=3963-3983&rft.issn=0920-8542&rft.eissn=1573-0484&rft_id=info:doi/10.1007/s11227-017-2169-5&rft_dat=%3Cproquest_cross%3E2407767493%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2407767493&rft_id=info:pmid/&rfr_iscdi=true |