Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT

Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

[1]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  A. Rameez Mohammed,et al.  Defense mechanism against selective forwarding attack in wireless sensor networks , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[4]  Saikat Saha,et al.  Issues in Transmitting Physical Health Information in m-Healthcare , 2013 .

[5]  Wen Gao,et al.  Watermark detection schemes with high security , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[6]  Xingming Sun,et al.  Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[7]  Peter Xiaoping Liu,et al.  Data gathering communication in wireless sensor networks using ant colony optimization , 2004, 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[8]  Adam Dunkels,et al.  Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .

[9]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[10]  Adam Dunkels,et al.  The ContikiMAC Radio Duty Cycling Protocol , 2011 .

[11]  Feng Wang,et al.  Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches , 2011, IEEE Communications Surveys & Tutorials.

[12]  Chao Xu,et al.  Detecting selective forwarding attacks in WSNs using watermark , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[13]  Nikita V. Mahajan,et al.  Securing Multipath Routing Protocol Using Authentication Approach for Wireless Sensor Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[14]  Qijun Gu,et al.  Denial of Service Attacks , 2012 .

[15]  Avijit Mathur,et al.  Medical WSN: Power, routing and selective forwarding defense , 2015, 2015 13th International Conference on Telecommunications (ConTEL).

[16]  Kay Römer,et al.  The Use of Body Sensor Networks in Clinical Settings and Medical Research , 2013 .

[17]  Hugo V. Bitencourt,et al.  Simulation Domains for Networked Embedded Systems , 2012 .

[18]  Jangeun Jun,et al.  MRP: Wireless mesh networks routing protocol , 2008, Comput. Commun..

[19]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[20]  Steffen Lochmann,et al.  Prototype of a secure wireless patient monitoring system for the medical community , 2011 .

[21]  Dauda Ayanda Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach , 2014 .

[22]  Zhan Yong-zhao,et al.  Lightweight defense scheme against selective forwarding attacks in wireless sensor networks , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[23]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[24]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[25]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[26]  Vincent F. Taylor,et al.  Mitigating black hole attacks in wireless sensor networks using node-resident expert systems , 2014, 2014 Wireless Telecommunications Symposium.

[27]  Fredrik Österlind,et al.  A Sensor Network Simulator for the Contiki OS , 2006 .

[28]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[29]  Chenyang Lu,et al.  Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit , 2010, SenSys '10.

[30]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[31]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[32]  Neelam Khemariya,et al.  An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs , 2013 .

[33]  Xiaorui Wang,et al.  Geographic and energy-aware routing in Wireless Sensor Networks , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[34]  Habib Youssef,et al.  Secure Data Transmission Protocol for Medical Wireless Sensor Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[35]  Tobias Reusing,et al.  Comparison of Operating Systems TinyOS and Contiki , 2012 .