Affiliation:
1. SCOPE, Vellore Institute of Technology, Vellore, India. E-mail: saisrinivas.t2016@vitstudent.ac.in
2. SITE, Vellore Institute of Technology, Vellore, India. E-mail: manivannan.ss@vit.ac.in
Abstract
In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.
Reference35 articles.
1. Prevention of Black hole attack in multicast routing protocols for mobile Ad-hoc networks using a self-organized public key infrastructure;Anita;Information Security Journal: A Global Perspective,2009
2. Black hole attack detection and performance improvement in mobile Ad-hoc network;Arunmozhi;Information Security Journal: A Global Perspective,2012
3. G. Brammya, S. Praveena, N.S.N. Preetha, R. Ramya, B.R. Rajakumar and D. Binu, Deer Hunting Optimization Algorithm: A New Nature-Inspired Meta-Heuristic Paradigm, the Computer Journal, 2019.
4. Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach;Chang;IEEE Systems Journal,2015
5. A. Chhabra, V. Vashishth and D.K. Sharma, A game theory based secure model against black hole attacks in opportunistic networks, in: 2017 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, 2017, pp. 1–6.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献