A decentralized scalable security framework for end‐to‐end authentication of future IoT communication

Author(s):  
P.S. Febin Sheron ◽  
K.P. Sridhar ◽  
S. Baskar ◽  
P. Mohamed Shakeel
2017 ◽  
pp. 263-278
Author(s):  
Deepak Puthal ◽  
Surya Nepal ◽  
Rajiv Ranjan ◽  
Jinjun Chen

2009 ◽  
Vol 31 (4) ◽  
pp. 629-641 ◽  
Author(s):  
He Rongyu ◽  
Zhao Guolei ◽  
Chang Chaowen ◽  
Xie Hui ◽  
Qin Xi ◽  
...  

2004 ◽  
Vol 27 (5) ◽  
pp. 412-422 ◽  
Author(s):  
Sungwoo Tak ◽  
Sudhir Dixit ◽  
E.K. Park

Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 719
Author(s):  
Aamir Hussain ◽  
Tariq Ali ◽  
Faisal Althobiani ◽  
Umar Draz ◽  
Muhammad Irfan ◽  
...  

The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.


Sign in / Sign up

Export Citation Format

Share Document