Skip to main content
Top
Published in: The Journal of Supercomputing 6/2020

30-10-2017

Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application

Authors: Priyan Malarvizhi Kumar, Usha Devi Gandhi

Published in: The Journal of Supercomputing | Issue 6/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of ClientHello messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every ClientHello message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Krawczyk H, Paterson KG, Wee H (2013) On the security of the TLS protocol: a systematic analysis. In: Advances in Cryptology—CRYPTO 2013. Springer, Berlin, pp 429–448CrossRef Krawczyk H, Paterson KG, Wee H (2013) On the security of the TLS protocol: a systematic analysis. In: Advances in Cryptology—CRYPTO 2013. Springer, Berlin, pp 429–448CrossRef
2.
go back to reference Jager T, Kohlar F, Schäge S, Schwenk J (2017) Authenticated confidential channel establishment and the security of TLS-DHE. J Cryptol 20:1–49MathSciNetMATH Jager T, Kohlar F, Schäge S, Schwenk J (2017) Authenticated confidential channel establishment and the security of TLS-DHE. J Cryptol 20:1–49MathSciNetMATH
3.
go back to reference Paulson LC (1999) Inductive analysis of the Internet protocol TLS. ACM Trans Inf Syst Secur (TISSEC) 2(3):332–351CrossRef Paulson LC (1999) Inductive analysis of the Internet protocol TLS. ACM Trans Inf Syst Secur (TISSEC) 2(3):332–351CrossRef
4.
go back to reference Santos-González I, Rivero-García A, Molina-Gil J, Caballero-Gil P (2017) Implementation and analysis of real-time streaming protocols. Sensors 17(4):846CrossRef Santos-González I, Rivero-García A, Molina-Gil J, Caballero-Gil P (2017) Implementation and analysis of real-time streaming protocols. Sensors 17(4):846CrossRef
5.
go back to reference Schulzrinne H, Rosenberg J (2000) The session initiation protocol: internet-centric signaling. IEEE Commun Mag 38(10):134–141CrossRef Schulzrinne H, Rosenberg J (2000) The session initiation protocol: internet-centric signaling. IEEE Commun Mag 38(10):134–141CrossRef
6.
go back to reference Keoh SL, Kumar SS, Tschofenig H (2014) Securing the internet of things: a standardization perspective. IEEE Internet Things J 1(3):265–275CrossRef Keoh SL, Kumar SS, Tschofenig H (2014) Securing the internet of things: a standardization perspective. IEEE Internet Things J 1(3):265–275CrossRef
7.
go back to reference Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723CrossRef Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723CrossRef
8.
go back to reference Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371CrossRef Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371CrossRef
9.
go back to reference Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95CrossRef Li X, Ma J, Wang W, Xiong Y, Zhang J (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95CrossRef
12.
go back to reference Alghamdi TA, Lasebae A, Aiash M (2013) Security analysis of the constrained application protocol in the internet of things. In: 2013 Second International Conference on Future Generation Communication Technology (FGCT). IEEE, pp 163–168 Alghamdi TA, Lasebae A, Aiash M (2013) Security analysis of the constrained application protocol in the internet of things. In: 2013 Second International Conference on Future Generation Communication Technology (FGCT). IEEE, pp 163–168
13.
go back to reference Ishaq I, Hoebeke J, Moerman I, Demeester P (2016) Experimental evaluation of unicast and multicast coap group communication. Sensors 16(7):1137CrossRef Ishaq I, Hoebeke J, Moerman I, Demeester P (2016) Experimental evaluation of unicast and multicast coap group communication. Sensors 16(7):1137CrossRef
14.
go back to reference Hummen R, Wirtz H, Ziegeldorf JH, Hiller J, Wehrle K (2013) Tailoring end-to-end IP security protocols to the internet of things. In: 2013 21st Ieee International Conference on Network Protocols (ICNP). IEEE, pp 1–10 Hummen R, Wirtz H, Ziegeldorf JH, Hiller J, Wehrle K (2013) Tailoring end-to-end IP security protocols to the internet of things. In: 2013 21st Ieee International Conference on Network Protocols (ICNP). IEEE, pp 1–10
15.
go back to reference Ukil A, Bandyopadhyay S, Bhattacharyya A, Pal A, Bose T (2014) Lightweight security scheme for IoT applications using CoAP. Int J Perv Comput Commun 10(4):372–392 Ukil A, Bandyopadhyay S, Bhattacharyya A, Pal A, Bose T (2014) Lightweight security scheme for IoT applications using CoAP. Int J Perv Comput Commun 10(4):372–392
16.
go back to reference Modadugu N, Rescorla E (2004) The design and implementation of datagram TLS. In: NDSS Modadugu N, Rescorla E (2004) The design and implementation of datagram TLS. In: NDSS
17.
go back to reference Rescorla E, Modadugu N (2012) Datagram transport layer security version 1.2 Rescorla E, Modadugu N (2012) Datagram transport layer security version 1.2
18.
go back to reference Sehgal A, Perelman V, Kuryla S, Schonwalder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):1–6CrossRef Sehgal A, Perelman V, Kuryla S, Schonwalder J (2012) Management of resource constrained devices in the internet of things. IEEE Commun Mag 50(12):1–6CrossRef
19.
go back to reference Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16CrossRef Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16CrossRef
20.
go back to reference Tiloca M, Gehrmann C, Seitz L (2016) On improving resistance to denial of service and key provisioning scalability of the DTLS handshake. Int J Inf Secur 17:1–21 Tiloca M, Gehrmann C, Seitz L (2016) On improving resistance to denial of service and key provisioning scalability of the DTLS handshake. Int J Inf Secur 17:1–21
21.
go back to reference Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sensor Netw 10(7):357–366CrossRef Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Pauthkey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IOT applications. Int J Distrib Sensor Netw 10(7):357–366CrossRef
22.
go back to reference Schonwalder J, Marinov V (2011) On the impact of security protocols on the performance of SNMP. IEEE Trans Netw Serv Manag 8(1):52–64CrossRef Schonwalder J, Marinov V (2011) On the impact of security protocols on the performance of SNMP. IEEE Trans Netw Serv Manag 8(1):52–64CrossRef
23.
go back to reference Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31CrossRef Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31CrossRef
24.
go back to reference Park J, Kwon H, Kang N (2016) IoT-Cloud collaboration to establish a secure connection for lightweight devices. Wirel Netw 23:1–12CrossRef Park J, Kwon H, Kang N (2016) IoT-Cloud collaboration to establish a secure connection for lightweight devices. Wirel Netw 23:1–12CrossRef
25.
go back to reference Raza S, Seitz L, Sitenkov D, Selander G (2016) S3K: scalable security with symmetric keys–DTLS key establishment for the internet of things. IEEE Trans Autom Sci Eng 13(3):1270–1280CrossRef Raza S, Seitz L, Sitenkov D, Selander G (2016) S3K: scalable security with symmetric keys–DTLS key establishment for the internet of things. IEEE Trans Autom Sci Eng 13(3):1270–1280CrossRef
26.
go back to reference Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398CrossRef Hennebert C, Dos Santos J (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398CrossRef
27.
go back to reference Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 16(2):62–67CrossRef Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 16(2):62–67CrossRef
28.
go back to reference Shelby Z (2010) Embedded web services. IEEE Wirel Commun 17(6):234–249 Shelby Z (2010) Embedded web services. IEEE Wirel Commun 17(6):234–249
29.
go back to reference Ludovici A, Moreno P, Calveras A (2013) TinyCoAP: a novel constrained application protocol (CoAP) implementation for embedding RESTful web services in wireless sensor networks based on TinyOS. J Sensor Actuator Netw 2(2):288–315CrossRef Ludovici A, Moreno P, Calveras A (2013) TinyCoAP: a novel constrained application protocol (CoAP) implementation for embedding RESTful web services in wireless sensor networks based on TinyOS. J Sensor Actuator Netw 2(2):288–315CrossRef
30.
go back to reference Sheng Z, Yang S, Yu Y, Vasilakos A, Mccann J, Leung K (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98CrossRef Sheng Z, Yang S, Yu Y, Vasilakos A, Mccann J, Leung K (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98CrossRef
31.
go back to reference Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720CrossRef Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720CrossRef
32.
go back to reference Karagiannis V, Chatzimisios P, Vazquez-Gallego F, Alonso-Zarate J (2015) A survey on application layer protocols for the internet of things. Trans IoT Cloud Comput 3(1):11–17 Karagiannis V, Chatzimisios P, Vazquez-Gallego F, Alonso-Zarate J (2015) A survey on application layer protocols for the internet of things. Trans IoT Cloud Comput 3(1):11–17
33.
go back to reference Ge M, Hong JB, Guttmann W, Kim DS (2017) A framework for automating security analysis of the internet of things. J Netw Comput Appl 83:12–27CrossRef Ge M, Hong JB, Guttmann W, Kim DS (2017) A framework for automating security analysis of the internet of things. J Netw Comput Appl 83:12–27CrossRef
34.
go back to reference Maleh Y, Ezzati A, Belaissaoui M (2016, October) An enhanced DTLS protocol for internet of things applications. In: 2016 International Conference On Wireless Networks and Mobile Communications (WINCOM). IEEE, pp 168–173 Maleh Y, Ezzati A, Belaissaoui M (2016, October) An enhanced DTLS protocol for internet of things applications. In: 2016 International Conference On Wireless Networks and Mobile Communications (WINCOM). IEEE, pp 168–173
35.
go back to reference Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks. IEEE, pp 641–648 Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks. IEEE, pp 641–648
36.
go back to reference Maleh Y, Abdellah E, Belaissaoui M (2016) DoS attacks analysis and improvement in DTLS protocol for internet of things. In: ACM International Conference on Big Data and Advanced Wireless Technologies (BDAW’2016) Maleh Y, Abdellah E, Belaissaoui M (2016) DoS attacks analysis and improvement in DTLS protocol for internet of things. In: ACM International Conference on Big Data and Advanced Wireless Technologies (BDAW’2016)
37.
go back to reference Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the IP-based internet of things with HIP and DTLS. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, pp 119–124 Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the IP-based internet of things with HIP and DTLS. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, pp 119–124
38.
go back to reference Kang N, Park J, Kwon H, Jung S (2015) ESSE: efficient secure session establishment for internet-integrated wireless sensor networks. Int J Distrib Sensor Netw 11(8):43–54CrossRef Kang N, Park J, Kwon H, Jung S (2015) ESSE: efficient secure session establishment for internet-integrated wireless sensor networks. Int J Distrib Sensor Netw 11(8):43–54CrossRef
39.
go back to reference Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459CrossRef Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459CrossRef
40.
go back to reference Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Fut Gener Comput Syst 64:108–124CrossRef Moosavi SR, Gia TN, Nigussie E, Rahmani AM, Virtanen S, Tenhunen H, Isoaho J (2016) End-to-end security scheme for mobility enabled healthcare internet of things. Fut Gener Comput Syst 64:108–124CrossRef
41.
go back to reference Schmitt C, Noack M, Hu W, Kothmayr T, Stiller B (2015) Two-way authentication for the internet-of-things. In: Alzaid H, Alomair B, Almotiri S, Nasser N (eds) Securing the internet of things through progressive threat detection and management. Book Series on Advances in Information Security, Privacy, and Ethics (AISPE). IGI Global Schmitt C, Noack M, Hu W, Kothmayr T, Stiller B (2015) Two-way authentication for the internet-of-things. In: Alzaid H, Alomair B, Almotiri S, Nasser N (eds) Securing the internet of things through progressive threat detection and management. Book Series on Advances in Information Security, Privacy, and Ethics (AISPE). IGI Global
42.
go back to reference Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for industry 4.0. Springer, USA, pp 103–126 Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for industry 4.0. Springer, USA, pp 103–126
43.
go back to reference Granjal J, Monteiro E (2016) End-to-end transparent transport-layer security for internet-integrated mobile sensing devices. In: IFIP Networking Conference (IFIP Networking) and Workshops, 2016. IEEE, pp 306–314 Granjal J, Monteiro E (2016) End-to-end transparent transport-layer security for internet-integrated mobile sensing devices. In: IFIP Networking Conference (IFIP Networking) and Workshops, 2016. IEEE, pp 306–314
44.
go back to reference Hummen R, Shafagh H, Raza S, Voig T, Wehrle K (2014) Delegation-based authentication and authorization for the IP-based internet of things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, pp 284–292 Hummen R, Shafagh H, Raza S, Voig T, Wehrle K (2014) Delegation-based authentication and authorization for the IP-based internet of things. In: 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, pp 284–292
45.
go back to reference Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl
47.
go back to reference Thota C, Manogaran G, Lopez D, Vijayakumar V (2017) Big data security framework for distributed cloud data centers. In: Cybersecurity breaches and issues surrounding online threat protection. IGI Global, USA pp 288–310CrossRef Thota C, Manogaran G, Lopez D, Vijayakumar V (2017) Big data security framework for distributed cloud data centers. In: Cybersecurity breaches and issues surrounding online threat protection. IGI Global, USA pp 288–310CrossRef
48.
go back to reference Priyan MK, Devi GU (2017) Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. Clust Comput 1–15 Priyan MK, Devi GU (2017) Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. Clust Comput 1–15
49.
go back to reference Kumar PM, Gandhi UD (2017) A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng Kumar PM, Gandhi UD (2017) A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of heart diseases. Comput Electr Eng
50.
go back to reference Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10 Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust Comput 1–10
51.
go back to reference Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed Tools Appl 1–21 Varatharajan R, Manogaran G, Priyan MK, Balaş VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed Tools Appl 1–21
52.
go back to reference Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System. In: Exploring the Convergence of Big Data and the Internet of Things. IGI Global, pp 141–154 Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan MK (2018) Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System. In: Exploring the Convergence of Big Data and the Internet of Things. IGI Global, pp 141–154
53.
go back to reference Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017) An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput Electr Eng Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017) An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput Electr Eng
54.
go back to reference Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr Eng Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr Eng
55.
go back to reference Manogaran G, Lopez D (2017) A Gaussian process based big data processing framework in cluster computing environment. Clust Comput 1–16 Manogaran G, Lopez D (2017) A Gaussian process based big data processing framework in cluster computing environment. Clust Comput 1–16
Metadata
Title
Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application
Authors
Priyan Malarvizhi Kumar
Usha Devi Gandhi
Publication date
30-10-2017
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 6/2020
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2169-5

Other articles of this Issue 6/2020

The Journal of Supercomputing 6/2020 Go to the issue

Premium Partner