A Certificate Based Authorization and Protected Application Layer Protocol For IoT

被引:0
作者
Premalatha, T. [1 ]
Duraisamy, S. [2 ]
机构
[1] VLBJCAS, Dept Comp Sci, Coimbatore 42, Tamil Nadu, India
[2] Chikkanna Govt Arts Coll, Dept Comp Sci, Tiruppur, India
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2017年
关键词
CoAP; IoT; DTLS; 6LoWPAN; DoS; SECURITY; INTERNET; THINGS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Safety communication is very important in emerging intelligent constrained world. In order to enhance secure communication, it is essential to enhance the unreliable Constrained Application Protocol(CoAP) by adding compressed Datagram Transport Layer Security(DTLS) Protocol based on 6LoWPAN standard. The purpose of Compressed DTLS is to minimize the length of packet and to prevent from disjunction. Along with this, the certificate based authorization encryption mechanism is added for enforcing authorized access to keep away from Denial of Service (DoS) Attacks. Finding report illustrate that CoAPs with certification afford secure message communication between the dissimilar multi vendor surroundings in intelligent world and the impact of Denial of Service Attack is reduced.
引用
收藏
页数:5
相关论文
共 24 条
[11]  
GRANJAL J, 2012, P IEEE 37 C LCN OCT, P228
[12]   Network-layer security for the Internet of Things using TinyOS and BLIP [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) :1938-1963
[13]  
Hui J., 2011, RFC 6282
[14]  
Keoh S., 2013, IN PRESS
[15]   DTLS based security and two-way authentication for the Internet of Things [J].
Kothmayr, Thomas ;
Schmitt, Corinna ;
Hu, Wen ;
Bruenig, Michael ;
Carle, Georg .
AD HOC NETWORKS, 2013, 11 (08) :2710-2723
[16]  
Kothmayr T, 2012, PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), P956, DOI 10.1109/LCNW.2012.6424088
[17]   Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier [J].
Marin, Leandro ;
Jara, Antonio ;
Skarmeta Gomez, Antonio .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) :1155-1174
[18]  
McGrew D., 2013, IN PRESS
[19]   End-to-end security scheme for mobility enabled healthcare Internet of Things [J].
Moosavi, Sanaz Rahimi ;
Tuan Nguyen Gia ;
Nigussie, Ethiopia ;
Rahmani, Amir M. ;
Virtanen, Seppo ;
Tenhunen, Hannu ;
Isoaho, Jouni .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 :108-124
[20]  
*RFC, 1981, 793 RFC