Abstract
As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of ClientHello messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every ClientHello message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.
Similar content being viewed by others
References
Krawczyk H, Paterson KG, Wee H (2013) On the security of the TLS protocol: a systematic analysis. In: Advances in Cryptology—CRYPTO 2013. Springer, Berlin, pp 429–448
Jager T, Kohlar F, Schäge S, Schwenk J (2017) Authenticated confidential channel establishment and the security of TLS-DHE. J Cryptol 20:1–49
Paulson LC (1999) Inductive analysis of the Internet protocol TLS. ACM Trans Inf Syst Secur (TISSEC) 2(3):332–351
Santos-González I, Rivero-García A, Molina-Gil J, Caballero-Gil P (2017) Implementation and analysis of real-time streaming protocols. Sensors 17(4):846
Schulzrinne H, Rosenberg J (2000) The session initiation protocol: internet-centric signaling. IEEE Commun Mag 38(10):134–141
Keoh SL, Kumar SS, Tschofenig H (2014) Securing the internet of things: a standardization perspective. IEEE Internet Things J 1(3):265–275
Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95
Li X, Niu J, Kumari S, Wu F, Choo KKR (2017) A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Fut Gener Comput Syst. https://doi.org/10.1016/j.future.2017.04.012
Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw. https://doi.org/10.1016/j.comnet.2017.03.013
Alghamdi TA, Lasebae A, Aiash M (2013) Security analysis of the constrained application protocol in the internet of things. In: 2013 Second International Conference on Future Generation Communication Technology (FGCT). IEEE, pp 163–168
Ishaq I, Hoebeke J, Moerman I, Demeester P (2016) Experimental evaluation of unicast and multicast coap group communication. Sensors 16(7):1137
Hummen R, Wirtz H, Ziegeldorf JH, Hiller J, Wehrle K (2013) Tailoring end-to-end IP security protocols to the internet of things. In: 2013 21st Ieee International Conference on Network Protocols (ICNP). IEEE, pp 1–10
Ukil A, Bandyopadhyay S, Bhattacharyya A, Pal A, Bose T (2014) Lightweight security scheme for IoT applications using CoAP. Int J Perv Comput Commun 10(4):372–392
Modadugu N, Rescorla E (2004) The design and implementation of datagram TLS. In: NDSS
Rescorla E, Modadugu N (2012) Datagram transport layer security version 1.2
Sehgal A, Perelman V, Kuryla S, Schonwalder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):1–6
Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16
Tiloca M, Gehrmann C, Seitz L (2016) On improving resistance to denial of service and key provisioning scalability of the DTLS handshake. Int J Inf Secur 17:1–21
Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sensor Netw 10(7):357–366
Schonwalder J, Marinov V (2011) On the impact of security protocols on the performance of SNMP. IEEE Trans Netw Serv Manag 8(1):52–64
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31
Park J, Kwon H, Kang N (2016) IoT-Cloud collaboration to establish a secure connection for lightweight devices. Wirel Netw 23:1–12
Raza S, Seitz L, Sitenkov D, Selander G (2016) S3K: scalable security with symmetric keys–DTLS key establishment for the internet of things. IEEE Trans Autom Sci Eng 13(3):1270–1280
Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398
Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 16(2):62–67
Shelby Z (2010) Embedded web services. IEEE Wirel Commun 17(6):234–249
Ludovici A, Moreno P, Calveras A (2013) TinyCoAP: a novel constrained application protocol (CoAP) implementation for embedding RESTful web services in wireless sensor networks based on TinyOS. J Sensor Actuator Netw 2(2):288–315
Sheng Z, Yang S, Yu Y, Vasilakos A, Mccann J, Leung K (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98
Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720
Karagiannis V, Chatzimisios P, Vazquez-Gallego F, Alonso-Zarate J (2015) A survey on application layer protocols for the internet of things. Trans IoT Cloud Comput 3(1):11–17
Ge M, Hong JB, Guttmann W, Kim DS (2017) A framework for automating security analysis of the internet of things. J Netw Comput Appl 83:12–27
Maleh Y, Ezzati A, Belaissaoui M (2016, October) An enhanced DTLS protocol for internet of things applications. In: 2016 International Conference On Wireless Networks and Mobile Communications (WINCOM). IEEE, pp 168–173
Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks. IEEE, pp 641–648
Maleh Y, Abdellah E, Belaissaoui M (2016) DoS attacks analysis and improvement in DTLS protocol for internet of things. In: ACM International Conference on Big Data and Advanced Wireless Technologies (BDAW’2016)
Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the IP-based internet of things with HIP and DTLS. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, pp 119–124
Kang N, Park J, Kwon H, Jung S (2015) ESSE: efficient secure session establishment for internet-integrated wireless sensor networks. Int J Distrib Sensor Netw 11(8):43–54
Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459
Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Fut Gener Comput Syst 64:108–124
Schmitt C, Noack M, Hu W, Kothmayr T, Stiller B (2015) Two-way authentication for the internet-of-things. In: Alzaid H, Alomair B, Almotiri S, Nasser N (eds) Securing the internet of things through progressive threat detection and management. Book Series on Advances in Information Security, Privacy, and Ethics (AISPE). IGI Global
Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for industry 4.0. Springer, USA, pp 103–126
Granjal J, Monteiro E (2016) End-to-end transparent transport-layer security for internet-integrated mobile sensing devices. In: IFIP Networking Conference (IFIP Networking) and Workshops, 2016. IEEE, pp 306–314
Hummen R, Shafagh H, Raza S, Voig T, Wehrle K (2014) Delegation-based authentication and authorization for the IP-based internet of things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, pp 284–292
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl
Chen X (2014) Constrained application protocol for internet of things. http://www1.cse.wustl.edu/~jain/cse574-14/ftp/coap
Thota C, Manogaran G, Lopez D, Vijayakumar V (2017) Big data security framework for distributed cloud data centers. In: Cybersecurity breaches and issues surrounding online threat protection. IGI Global, USA pp 288–310
Priyan MK, Devi GU (2017) Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. Clust Comput 1–15
Kumar PM, Gandhi UD (2017) A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng
Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10
Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed Tools Appl 1–21
Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System. In: Exploring the Convergence of Big Data and the Internet of Things. IGI Global, pp 141–154
Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017) An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput Electr Eng
Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr Eng
Manogaran G, Lopez D (2017) A Gaussian process based big data processing framework in cluster computing environment. Clust Comput 1–16
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kumar, P.M., Gandhi, U.D. Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. J Supercomput 76, 3963–3983 (2020). https://doi.org/10.1007/s11227-017-2169-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2169-5