Secured energy efficient machine -to-machine communication for telerobotic system

Abstract Machine-to-Machine (M2M) communication refers to applications that run on intelligent devices or machines. It allows smart devices to communicate directly with each other with little or no human intervention.In a telerobotic system, medical devices interact with each other and exchange information automatically to provide visual assistance to physicians during surgery. Wireless communication provides attackers with numerous options to gain access to sensitive data and carry out malicious operations.A small communication delay in the telerobotic system can have a significant impact on the performance of medical equipment, potentially putting the patient's life in danger. Additionally, it can slow down the entire system in an operating room. Here, an energy-efficient and secured M2M network is presented to make the system robust.The system is designed with Event-Driven Duty Cycling (EDDC) routing protocol for enhancing the energy of medical sensor nodes. A Denial-of-Service (DoS) attack is performed and network performance is measured through Quality of Service (QoS) parameters. The results of the proposed routing protocol are compared with those of the LEACH and ECFU.The EDDC protocol outperforms even when attacks are launched.

[1]  David Kotz,et al.  Privacy in mobile technology for personal healthcare , 2012, CSUR.

[2]  Abdelkamel Tari,et al.  QoS-based routing in Wireless Body Area Networks: a survey and taxonomy , 2018, Computing.

[3]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[4]  Madhumita Kathuria,et al.  Dynamic priority-based packet handling protocol for healthcare wireless body area network system , 2018 .

[5]  Guoqiang Hu,et al.  Cloud robotics: architecture, challenges and applications , 2012, IEEE Network.

[6]  Junjie Yan,et al.  To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.

[7]  Bharat Bhushan,et al.  Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[8]  Yunsi Fei,et al.  QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[9]  Antonio Bicchi,et al.  On the security of linear consensus networks , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[10]  Vijay M. Wadhai,et al.  ADAPTIVE REAL TIME DATA MINING METHODOLOGY FOR WIRELESS BODY AREA NETWORK BASED HEALTHCARE APPLICATIONS , 2012 .

[11]  Tin Yu Wu,et al.  An energy-efficient low-SAR pathfinding mechanism for WBAN , 2020 .

[12]  Kah Phooi Seng,et al.  Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..

[13]  Israr Ullah,et al.  BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks , 2012, Inf. Sci..

[14]  Meghana P.Lokhande,et al.  Access Control Approaches in Internet of Things , 2019 .

[15]  Martin Eian,et al.  The modeling and comparison of wireless network denial of service attacks , 2011, MobiHeld '11.

[16]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[17]  Dipti Patil,et al.  5G Enabled Tactile Internet for Tele-Robotic Surgery , 2020 .

[18]  Davood Gharavian,et al.  An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks , 2015, Wireless Networks.

[19]  Xuedong Liang,et al.  A reinforcement learning based routing protocol with QoS support for biomedical sensor networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.

[20]  Dipti D. Patil,et al.  Network Performance Measurement through Machine to Machine Communication in TeleRobotics System , 2021, Tehnički glasnik.

[21]  Xin Huang,et al.  A Denial of Service Attack Method for an IoT System , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).

[22]  Jayashree Agarkhed,et al.  Energy efficient service differentiated QoS aware routing in cluster-based wireless sensor network , 2019, International Journal of Hybrid Intelligence.

[23]  Bechir Hamdaoui,et al.  A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks , 2012, IEEE Communications Surveys & Tutorials.

[24]  Fadi Al-Turjman,et al.  A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks , 2017, IEEE Communications Surveys & Tutorials.

[25]  M. N. Shanmukha Swamy,et al.  A survey and analysis of multipath routing protocols in wireless multimedia sensor networks , 2017, Wirel. Networks.

[26]  Vipul R. Patel,et al.  History of robotic surgery , 2010, Journal of robotic surgery.

[27]  Vijay R. Ghorpade,et al.  Survey of QoS Routing Protocols in Wireless Multimedia Sensor Networks , 2015, J. Comput. Networks Commun..

[28]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[29]  Imran Khan,et al.  RARZ: Ring-Zone Based Routing Protocol for Wireless Sensor Networks , 2018 .

[30]  Wei Zhang,et al.  A survey on intelligent routing protocols in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[31]  Attahiru Sule Alfa,et al.  A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks , 2017, Sensors.

[32]  Gianluca Dini,et al.  ASF: An attack simulation framework for wireless sensor networks , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[33]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[34]  Kathleen M. Carley,et al.  Characterization of defense mechanisms against distributed denial of service attacks , 2004, Comput. Secur..

[35]  Junho Bang,et al.  The State-of-the-Art of Knowledge-Intensive Agriculture: A Review on Applied Sensing Systems and Data Analytics , 2018, J. Sensors.

[36]  Farzad Kiani,et al.  Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[37]  Amir H. Gandomi,et al.  Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application , 2019, IEEE Internet of Things Journal.

[38]  Khaled Elleithy,et al.  Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis , 2015, Sensors.

[39]  Mohamed Elhoseny,et al.  Dynamic Clustering of Heterogeneous Wireless Sensor Networks using a Genetic Algorithm, Towards Balancing Energy Exhaustion , 2015 .

[40]  P. Rangarajan,et al.  On improving the lifespan of wireless sensor networks with fuzzy based clustering and machine learning based data reduction , 2019, Appl. Soft Comput..

[41]  Mohammad Hammoudeh,et al.  Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance , 2015, Inf. Fusion.

[42]  Muhammad Naeem,et al.  Energy-efficient MAC protocols for wireless BANs: comparison, classification, applications and challenges , 2017, Int. J. Sens. Networks.

[43]  Dilip Kumar,et al.  Computational intelligence-based energy efficient routing protocols with QoS assurance for wireless sensor networks: a survey , 2019, Int. J. Wirel. Mob. Comput..

[44]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[45]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[46]  Ian F. Akyildiz,et al.  A survey on wireless sensor networks for smart grid , 2015, Comput. Commun..

[47]  Nana Zhang,et al.  Multipath Routing Algorithm Based on Ant Colony Optimization and Energy Awareness , 2017, Wirel. Pers. Commun..

[48]  Bharat Gupta,et al.  Wireless body area networks towards empowering real-time healthcare monitoring: a survey , 2016 .

[49]  Ivan Stojmenovic,et al.  Robot to Robot , 2010, IEEE Robotics & Automation Magazine.

[50]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[51]  S. K. Mohapatra,et al.  Energy-efficient modified LEACH protocol for IoT application , 2018, IET Wirel. Sens. Syst..

[52]  Wei Zhang,et al.  A Unified Framework for Street-View Panorama Stitching , 2016, Sensors.