Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application
- PDF / 2,221,328 Bytes
- 21 Pages / 439.37 x 666.142 pts Page_size
- 0 Downloads / 188 Views
Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application Priyan Malarvizhi Kumar1
· Usha Devi Gandhi1
© Springer Science+Business Media, LLC 2017
Abstract As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of ClientHello messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every ClientHello message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.
B 1
Priyan Malarvizhi Kumar [email protected] School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India
123
P. M. Kumar, U. D. Gandhi
Keywords Security · Internet of Things · Denial of service (DOS) · Constrained application protocol (CoAP) · Datagram transport layer security (DTLS) · Healthcare
1 Introduction In recent years, securing the network is found to be a significant issue. TLS protocol is significantly overcome the various security issues in network traffic. The most popular applications of the TLS protocol include HTTP and various e-mail protocols [1]. In particular, POP and IMAP are the most significant platforms which effectively use TLS to secure the resources from an unauthorized and malicious attacker. The security feature can be implemented on any platform with the help of TLS. More specifically, TLS can be installed in between the network layer and the application layer [2]. In general, TLS requires a secure transport protocol to provide high security between the sources to destina
Data Loading...