A Certificate Based Authorization and Protected Application Layer Protocol For IoT

被引:0
|
作者
Premalatha, T. [1 ]
Duraisamy, S. [2 ]
机构
[1] VLBJCAS, Dept Comp Sci, Coimbatore 42, Tamil Nadu, India
[2] Chikkanna Govt Arts Coll, Dept Comp Sci, Tiruppur, India
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2017年
关键词
CoAP; IoT; DTLS; 6LoWPAN; DoS; SECURITY; INTERNET; THINGS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Safety communication is very important in emerging intelligent constrained world. In order to enhance secure communication, it is essential to enhance the unreliable Constrained Application Protocol(CoAP) by adding compressed Datagram Transport Layer Security(DTLS) Protocol based on 6LoWPAN standard. The purpose of Compressed DTLS is to minimize the length of packet and to prevent from disjunction. Along with this, the certificate based authorization encryption mechanism is added for enforcing authorized access to keep away from Denial of Service (DoS) Attacks. Finding report illustrate that CoAPs with certification afford secure message communication between the dissimilar multi vendor surroundings in intelligent world and the impact of Denial of Service Attack is reduced.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects
    Lakshminarayana, Sujitha
    Praseed, Amit
    Thilagam, P. Santhi
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (04): : 2510 - 2546
  • [2] Security of IoT Application Layer Protocols: Challenges and Findings
    Nebbione, Giuseppe
    Calzarossa, Maria Carla
    FUTURE INTERNET, 2020, 12 (03):
  • [3] Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT
    Chavan, Ajit A.
    Nighot, Mininath K.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 646 - 651
  • [4] LICE: Lightweight certificate enrollment for IoT using application layer security
    Hoglund, Joel
    Raza, Shahid
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 19 - 28
  • [5] Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems
    Idrissi, Hind
    Palmieri, Paolo
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (05) : 6622 - 6660
  • [6] CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks
    Hossain, Mahmud
    Kayas, Golam
    Karim, Yasser
    Hasan, Ragib
    Payton, Jamie
    Islam, S. M. Riazul
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) : 1667 - 1682
  • [7] Trust-Based Blockchain Authorization for IoT
    Putra, Guntur Dharma
    Dedeoglu, Volkan
    Kanhere, Salil S.
    Jurdak, Raja
    Ignjatovic, Aleksandar
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1646 - 1658
  • [8] VE-CoAP: A constrained application layer protocol for IoT video transmission
    Ghotbou, Arvin
    Khansari, Mohammad
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 173
  • [9] Application layer protocol for IoT using Wireless Sensor Networks communication protocols
    Stangaciu, Valentin
    Stanciu, Madalina
    Lupu, Loredana
    Micea, Mihai V.
    Cretu, Vladimir
    2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 425 - 430
  • [10] A Certificate-Less Key Exchange Protocol for IoT
    Kome, Ivan Marco Lobe
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Frey, Vincent
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, 2019, 11391 : 65 - 79