A Certificate Based Authorization and Protected Application Layer Protocol For IoT

被引:0
|
作者
Premalatha, T. [1 ]
Duraisamy, S. [2 ]
机构
[1] VLBJCAS, Dept Comp Sci, Coimbatore 42, Tamil Nadu, India
[2] Chikkanna Govt Arts Coll, Dept Comp Sci, Tiruppur, India
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2017年
关键词
CoAP; IoT; DTLS; 6LoWPAN; DoS; SECURITY; INTERNET; THINGS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Safety communication is very important in emerging intelligent constrained world. In order to enhance secure communication, it is essential to enhance the unreliable Constrained Application Protocol(CoAP) by adding compressed Datagram Transport Layer Security(DTLS) Protocol based on 6LoWPAN standard. The purpose of Compressed DTLS is to minimize the length of packet and to prevent from disjunction. Along with this, the certificate based authorization encryption mechanism is added for enforcing authorized access to keep away from Denial of Service (DoS) Attacks. Finding report illustrate that CoAPs with certification afford secure message communication between the dissimilar multi vendor surroundings in intelligent world and the impact of Denial of Service Attack is reduced.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Comparing application layer protocols for video transmission in IoT low power lossy networks: an analytic comparison
    Ghotbou, Arvin
    Khansari, Mohammad
    WIRELESS NETWORKS, 2021, 27 (01) : 269 - 283
  • [32] A Review of Application Layer Communication Protocols for the IoT Edge Cloud Continuum
    Kampars, Janis
    Tropins, Dainis
    Matisons, Ralfs
    2021 62ND INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT SCIENCE OF RIGA TECHNICAL UNIVERSITY (ITMS), 2021,
  • [33] PUF Based Authentication Protocol for IoT
    Braeken, An
    SYMMETRY-BASEL, 2018, 10 (08):
  • [34] Resilient Intermediary-Based Key Exchange Protocol for IoT
    Hu, Zhangxiang
    Li, Jun
    Wilson, Christopher
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2024, 5 (01):
  • [35] Blockchain-Based Context-Aware Authorization Management as a Service in IoT
    Sylla, Tidiane
    Mendiboure, Leo
    Chalouf, Mohamed Aymen
    Krief, Francine
    SENSORS, 2021, 21 (22)
  • [36] IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function"
    Bendavid, Ygal
    Bagheri, Nasour
    Safkhani, Masoumeh
    Rostampour, Samad
    SENSORS, 2018, 18 (12)
  • [37] A Two-Layer-Consensus Based Blockchain Architecture for IoT
    Bai, He
    Xia, Geming
    Fu, Shaojing
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 277 - 282
  • [38] Protection of IoT Transaction Using ID-KEM Based on Three-Pass Protocol Countermeasure
    Boujezza, Hajer
    Kaffel-Ben Ayed, Hella
    Saidane, Leila Azouz
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 423 - 428
  • [39] DAG blockchain-based lightweight authentication and authorization schemefor IoT devices
    Wang, Shangping
    Li, Huan
    Chen, Juanjuan
    Wang, Jifang
    Deng, Yingjuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [40] Trusted Authentication Mechanism of IoT Terminal Based on Authorization Consensus and Reputation Evaluation
    Rui, Lanlan
    Zhao, Liangchen
    Yan, Jingyang
    Qiu, Xuesong
    Guo, Shaoyong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23961 - 23976