The limitations in the state-of-the-art counter-measures against the security threats in H-IoT

被引:21
作者
Qadri, Yazdan Ahmad [1 ]
Ali, Rashid [2 ]
Musaddiq, Arslan [1 ]
Al-Turjman, Fadi [3 ]
Kim, Dae Wan [4 ]
Kim, Sung Won [1 ]
机构
[1] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
[2] Sejong Univ, Sch Intelligent Mechatron Engn, Seoul, South Korea
[3] Near East Univ, Dept Artificial Intelligence, TR-99138 Nicosia, Turkey
[4] Yeungnam Univ, Dept Business Adm, Gyongsan 38541, South Korea
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2020年 / 23卷 / 03期
基金
新加坡国家研究基金会;
关键词
Healthcare IoT; Selective forwarding attack; WBANs; Wormhole attack; Blockchain technology; SELECTIVE FORWARDING ATTACK; ENERGY-EFFICIENT; ROUTING PROTOCOL; BLACK-HOLE; CHALLENGES; BLOCKCHAIN;
D O I
10.1007/s10586-019-03036-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) technology is anticipated to pave the way for groundbreaking applications in a number of areas of current healthcare systems. Given the significant number of connected medical devices, the vital data generated by the patient is under several security threats. Selective Forwarding (SF) and Wormhole (WH) attacks are two critical threats that cause information deficit in the network. The SF attack drops critical data packets at compromised nodes while the WH attack creates fallacious routing tables due to the introduction of malicious routes in the network. In this paper, we focus on the security aspects of Healthcare-IoT and review the proposed counter-measures against the SF and WH attacks. We weigh the recently postulated counter-measures based on their significance and identify their limitations. Additionally, we propose a blockchain-based cryptographic framework for mitigating SF and WH attacks in H-IoT. We explore future research directions in mitigating these threats.
引用
收藏
页码:2047 / 2065
页数:19
相关论文
共 68 条
[1]  
Ahsan MS, 2017, INT CONF INF COMMUN, P58, DOI 10.1109/ICICT.2017.8320165
[2]   A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services [J].
Al Ridhawi, Ismaeel ;
Kotb, Yehia ;
Aloqaily, Moayad ;
Jararweh, Yaser ;
Baker, Thar .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) :3578-3586
[3]  
Al-Turjman F., 2019, INTERNET NANOTHINGS
[4]   Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning [J].
Al-Turjman, Fadi ;
Zahmatkesh, Hadi ;
Mostarda, Leonardo .
IEEE ACCESS, 2019, 7 :115749-115759
[5]   Energy monitoring in IoT-based ad hoc networks: An overview [J].
Al-Turjman, Fadi ;
Altrjman, Chadi ;
Din, Sadia ;
Paul, Anand .
COMPUTERS & ELECTRICAL ENGINEERING, 2019, 76 :133-142
[6]   Context-based Security and Privacy for Healthcare IoT [J].
Alagar, Vangalur ;
Alsaig, Alaa ;
Ormandjieva, Olga ;
Wan, Kaiyu .
2018 IEEE INTERNATIONAL CONFERENCE ON SMART INTERNET OF THINGS (SMARTIOT 2018), 2018, :122-128
[7]   Design of MAC Layer Resource Allocation Schemes for IEEE 802.11ax: Future Directions [J].
Ali, Rashid ;
Kim, Sung Won ;
Kim, Byung-Seo ;
Park, Yongwan .
IETE TECHNICAL REVIEW, 2018, 35 (01) :28-52
[8]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[9]   Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol [J].
Amish, Parmar ;
Vaghela, V. B. .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :700-707
[10]  
Anand S, 2017, PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P486, DOI 10.1109/ICICCT.2017.7975247