Skip to main content

Advertisement

Log in

Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of ClientHello messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every ClientHello message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Krawczyk H, Paterson KG, Wee H (2013) On the security of the TLS protocol: a systematic analysis. In: Advances in Cryptology—CRYPTO 2013. Springer, Berlin, pp 429–448

    Chapter  Google Scholar 

  2. Jager T, Kohlar F, Schäge S, Schwenk J (2017) Authenticated confidential channel establishment and the security of TLS-DHE. J Cryptol 20:1–49

    MathSciNet  MATH  Google Scholar 

  3. Paulson LC (1999) Inductive analysis of the Internet protocol TLS. ACM Trans Inf Syst Secur (TISSEC) 2(3):332–351

    Article  Google Scholar 

  4. Santos-González I, Rivero-García A, Molina-Gil J, Caballero-Gil P (2017) Implementation and analysis of real-time streaming protocols. Sensors 17(4):846

    Article  Google Scholar 

  5. Schulzrinne H, Rosenberg J (2000) The session initiation protocol: internet-centric signaling. IEEE Commun Mag 38(10):134–141

    Article  Google Scholar 

  6. Keoh SL, Kumar SS, Tschofenig H (2014) Securing the internet of things: a standardization perspective. IEEE Internet Things J 1(3):265–275

    Article  Google Scholar 

  7. Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723

    Article  Google Scholar 

  8. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

    Article  Google Scholar 

  9. Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95

    Article  Google Scholar 

  10. Li X, Niu J, Kumari S, Wu F, Choo KKR (2017) A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Fut Gener Comput Syst. https://doi.org/10.1016/j.future.2017.04.012

    Article  Google Scholar 

  11. Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw. https://doi.org/10.1016/j.comnet.2017.03.013

    Article  Google Scholar 

  12. Alghamdi TA, Lasebae A, Aiash M (2013) Security analysis of the constrained application protocol in the internet of things. In: 2013 Second International Conference on Future Generation Communication Technology (FGCT). IEEE, pp 163–168

  13. Ishaq I, Hoebeke J, Moerman I, Demeester P (2016) Experimental evaluation of unicast and multicast coap group communication. Sensors 16(7):1137

    Article  Google Scholar 

  14. Hummen R, Wirtz H, Ziegeldorf JH, Hiller J, Wehrle K (2013) Tailoring end-to-end IP security protocols to the internet of things. In: 2013 21st Ieee International Conference on Network Protocols (ICNP). IEEE, pp 1–10

  15. Ukil A, Bandyopadhyay S, Bhattacharyya A, Pal A, Bose T (2014) Lightweight security scheme for IoT applications using CoAP. Int J Perv Comput Commun 10(4):372–392

    Google Scholar 

  16. Modadugu N, Rescorla E (2004) The design and implementation of datagram TLS. In: NDSS

  17. Rescorla E, Modadugu N (2012) Datagram transport layer security version 1.2

  18. Sehgal A, Perelman V, Kuryla S, Schonwalder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):1–6

    Article  Google Scholar 

  19. Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16

    Article  Google Scholar 

  20. Tiloca M, Gehrmann C, Seitz L (2016) On improving resistance to denial of service and key provisioning scalability of the DTLS handshake. Int J Inf Secur 17:1–21

    Google Scholar 

  21. Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sensor Netw 10(7):357–366

    Article  Google Scholar 

  22. Schonwalder J, Marinov V (2011) On the impact of security protocols on the performance of SNMP. IEEE Trans Netw Serv Manag 8(1):52–64

    Article  Google Scholar 

  23. Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31

    Article  Google Scholar 

  24. Park J, Kwon H, Kang N (2016) IoT-Cloud collaboration to establish a secure connection for lightweight devices. Wirel Netw 23:1–12

    Article  Google Scholar 

  25. Raza S, Seitz L, Sitenkov D, Selander G (2016) S3K: scalable security with symmetric keys–DTLS key establishment for the internet of things. IEEE Trans Autom Sci Eng 13(3):1270–1280

    Article  Google Scholar 

  26. Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398

    Article  Google Scholar 

  27. Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 16(2):62–67

    Article  Google Scholar 

  28. Shelby Z (2010) Embedded web services. IEEE Wirel Commun 17(6):234–249

    Google Scholar 

  29. Ludovici A, Moreno P, Calveras A (2013) TinyCoAP: a novel constrained application protocol (CoAP) implementation for embedding RESTful web services in wireless sensor networks based on TinyOS. J Sensor Actuator Netw 2(2):288–315

    Article  Google Scholar 

  30. Sheng Z, Yang S, Yu Y, Vasilakos A, Mccann J, Leung K (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98

    Article  Google Scholar 

  31. Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720

    Article  Google Scholar 

  32. Karagiannis V, Chatzimisios P, Vazquez-Gallego F, Alonso-Zarate J (2015) A survey on application layer protocols for the internet of things. Trans IoT Cloud Comput 3(1):11–17

    Google Scholar 

  33. Ge M, Hong JB, Guttmann W, Kim DS (2017) A framework for automating security analysis of the internet of things. J Netw Comput Appl 83:12–27

    Article  Google Scholar 

  34. Maleh Y, Ezzati A, Belaissaoui M (2016, October) An enhanced DTLS protocol for internet of things applications. In: 2016 International Conference On Wireless Networks and Mobile Communications (WINCOM). IEEE, pp 168–173

  35. Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks. IEEE, pp 641–648

  36. Maleh Y, Abdellah E, Belaissaoui M (2016) DoS attacks analysis and improvement in DTLS protocol for internet of things. In: ACM International Conference on Big Data and Advanced Wireless Technologies (BDAW’2016)

  37. Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the IP-based internet of things with HIP and DTLS. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, pp 119–124

  38. Kang N, Park J, Kwon H, Jung S (2015) ESSE: efficient secure session establishment for internet-integrated wireless sensor networks. Int J Distrib Sensor Netw 11(8):43–54

    Article  Google Scholar 

  39. Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459

    Article  Google Scholar 

  40. Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Fut Gener Comput Syst 64:108–124

    Article  Google Scholar 

  41. Schmitt C, Noack M, Hu W, Kothmayr T, Stiller B (2015) Two-way authentication for the internet-of-things. In: Alzaid H, Alomair B, Almotiri S, Nasser N (eds) Securing the internet of things through progressive threat detection and management. Book Series on Advances in Information Security, Privacy, and Ethics (AISPE). IGI Global

  42. Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for industry 4.0. Springer, USA, pp 103–126

    Google Scholar 

  43. Granjal J, Monteiro E (2016) End-to-end transparent transport-layer security for internet-integrated mobile sensing devices. In: IFIP Networking Conference (IFIP Networking) and Workshops, 2016. IEEE, pp 306–314

  44. Hummen R, Shafagh H, Raza S, Voig T, Wehrle K (2014) Delegation-based authentication and authorization for the IP-based internet of things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, pp 284–292

  45. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl

  46. Chen X (2014) Constrained application protocol for internet of things. http://www1.cse.wustl.edu/~jain/cse574-14/ftp/coap

  47. Thota C, Manogaran G, Lopez D, Vijayakumar V (2017) Big data security framework for distributed cloud data centers. In: Cybersecurity breaches and issues surrounding online threat protection. IGI Global, USA pp 288–310

    Chapter  Google Scholar 

  48. Priyan MK, Devi GU (2017) Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. Clust Comput 1–15

  49. Kumar PM, Gandhi UD (2017) A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng

  50. Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10

  51. Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed Tools Appl 1–21

  52. Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System. In: Exploring the Convergence of Big Data and the Internet of Things. IGI Global, pp 141–154

  53. Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017) An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput Electr Eng

  54. Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr Eng

  55. Manogaran G, Lopez D (2017) A Gaussian process based big data processing framework in cluster computing environment. Clust Comput 1–16

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyan Malarvizhi Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, P.M., Gandhi, U.D. Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. J Supercomput 76, 3963–3983 (2020). https://doi.org/10.1007/s11227-017-2169-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-017-2169-5

Keywords

Navigation