Man-in-the-Middle Attack Mitigation in Internet of Medical Things

被引:48
作者
Salem, Osman [1 ]
Alsubhi, Khalid [2 ]
Shaafi, Aymen [1 ]
Gheryani, Mostafa [1 ]
Mehaoua, Ahmed [1 ]
Boutaba, Raouf [3 ]
机构
[1] Univ Paris, Borelli Res Ctr, CNRS UMR, F-75006 Paris, France
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 21441, Saudi Arabia
[3] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
Monitoring; Biomedical monitoring; Jamming; Switches; Support vector machines; Radio frequency; Informatics; Anomaly detection; authentication; Bluetooth Low Energy (BLE); cyber-attacks; healthcare; Internet of Medical Things (IoMT); wireless body area networks (WBANs); wireless security;
D O I
10.1109/TII.2021.3089462
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Medical Things are susceptible to Man-in-the-Middle (MitM) attack, which can identify healthcare emergency of monitored patients and replay normal physiological data to prevent the system from raising an alarm. In this article, we propose a framework to prevent a MitM from disrupting the operations and prohibiting the raise of alarms by the remote healthcare monitoring system. To reduce energy consumption for normal data transmission, and preserve the privacy of health data, our framework transmits a smaller size signature derived from acquired data with message authentication code, where the key is derived from received signal strength indication. Our experimental results for emergency detection show that our approach can achieve a high detection accuracy with a low false alarm rate of 3%.
引用
收藏
页码:2053 / 2062
页数:10
相关论文
共 24 条
[1]  
[Anonymous], 2018, CORR
[2]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[3]   A Comparison Analysis of BLE-Based Algorithms for Localization in Industrial Environments [J].
Cannizzaro, Davide ;
Zafiri, Marina ;
Pagliari, Daniele Jahier ;
Patti, Edoardo ;
Macii, Enrico ;
Poncino, Massimo ;
Acquaviva, Andrea .
ELECTRONICS, 2020, 9 (01)
[4]  
Cayre R., 2019, S SEC TECHN INF COMM, P229
[5]   Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness [J].
Djuraev, Sirojiddin ;
Nam, Seung Yeob .
ELECTRONICS, 2020, 9 (11) :1-20
[6]  
Garbelini ME, 2020, PROCEEDINGS OF THE 2020 USENIX ANNUAL TECHNICAL CONFERENCE, P911
[7]  
Gorce J.-M., 2020, Report
[8]   Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems [J].
Guo, Cheng ;
Tian, Pengxu ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) :1948-1957
[9]   Failures in Large Scale Systems: Long-term Measurement, Analysis, and Implications [J].
Gupta, Saurabh ;
Patel, Tirthak ;
Engelmann, Christian ;
Tiwari, Devesh .
SC'17: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS, 2017,
[10]   IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge [J].
Hafeez, Ibbad ;
Antikainen, Markku ;
Ding, Aaron Yi ;
Tarkoma, Sasu .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :45-59