Abstract
Smart healthcare is one of the core applications of the Internet of Things (IoT) technology in which the body sensors capture the patient's periodic data and transmit seamlessly over the wireless communications to remote monitoring stations. Due to the open nature of wireless communications, privacy-preserving and security are the biggest concern for IoT enabled healthcare systems. Several trust-based and cryptography-based solutions proposed to achieve the privacy-preserving and data security, however, such layered solutions failed to address the cross-layer attacks such as Man-in-Middle Attack (MIMA). Thus we believe that cross-layer attack detection methods achieve effective protection against such attacks. This paper proposed the novel lightweight cross-layer trust computation algorithm for MIMA attacker detection called IC-MADS. The IC-MADS consists of two main contributions such as energy-efficient clustering and cross-layer attack detection. The clustering algorithm proposed for optimal Cluster Head (CH) selection using the probability computation and evaluation approach. Each sensor node probability is computed using the parameters like residual energy, distance to Base Station, and node degree parameters. The node with a higher probability value becomes the CH. This solves the energy imbalance and load balancing problems. The cross-layer trust evaluation approach introduced node evaluation to detect the MIMA attackers in the network. The trust computation of each node is performed by using the sensor nodes parameters across the different layers such as network, physical, and MAC layers. The aggregate trust value of each sensor node is then compared with the threshold value to check whether the node is an attacker. The simulation results prove that IC-MADS achieves better protection against MIMA attacks with minimum overhead and energy consumption.











Similar content being viewed by others
References
Mahajan, H. B., & Badarla, A. (2018). Application of internet of things for smart precision farming: solutions and challenges. International Journal of Advanced Science and Technology,2018, 37–45.
Mahajan, H. B., & Badarla, A. (2019). Experimental analysis of recent clustering algorithms for wireless sensor network: Application of IoT based smart precision farming. Journal of Advanced Research in Dynamical and Control Systems,11(9), 116–125.
Mahajan, H. B., & Badarla, A. (2020). Detecting HTTP vulnerabilities in IoT-based precision farming connected with cloud environment using artificial intelligence. International Journal of Advanced Science and Technology,29(3), 214–226.
Sarita, A., & Manik, L. D. (2011). Internet of Things—A Paradigm Shift of Future Internet Applications (pp. 1–7). Ahmedabad: Institute of Technology Nirma University.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys and Tutorials,17(4), 2347–2376.
Rabaey, J., Ammer, J., Silva, J. L., Patel, D. (2000). PicoRadio: Ad hoc wireless networking of ubiquitous low-energy sensor/monitor nodes. In: Workshop on VLSI (pp. 9–14).
Idrees, S. K., Chee-Onn, C., Hiroshi, I., & Tanveer, A. Z. (2010). Threat models and security issues in wireless sensor networks. In: Proceedings of the (ICINC 2010), vol. 1 (pp. 384–389). Kuala Lumpur, Malaysia.
https://gigaom.com/2011/10/13/internet-of-things-will-have-24-billiondevices-by-2020/.
The Mobile Economy, GSMA (2013).
Sliman, J. B., Song, Y.-Q., Koubâa, A. & Frikha, M. (2009). A three-tiered architecture for large-scale wireless hospital sensor networks. In: Workshop Mobi Health Infin conjunction with BIOSTEC (p. 64).
Kirby, K. K. (2015). Hours per patient day: not the problem, nor the solution. Nursing Economics,33(1), 64.
Prakash, R., Ganesh, A. B., & Girish, S. V. (2016). Cooperative wireless network control based health and activity monitoring system. Journal of Medical Systems,40(10), 216.
Prakash, R., Ganesh, A. B., & Sivabalan, S. (2017). Network coded cooperative communication in a real-time wireless hospital sensor network. Journal of Medical Systems,41(5), 72.
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2004). Reputation based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop security ad hoc sensor network, Washington, DC, USA, 25–29 October 2004 (pp. 66–77).
Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of the IEEE international conference on mobile ad hoc and sensor system, Vancouver, BC, Canada, 9–12 October 2006 (pp. 437–446).
Atakli, I. M., Hu, H., Chen, Y., Ku, W. S., & Su, Z. (2008). Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the symposium on simulation of systems security, Ottawa, ON, Canada, 14–17 April 2008 (pp. 836–843).
Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,20, 1698–1712.
Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors,11, 1345–1360.
Wu, R., Deng, X., Lu, R., & Shen, X. (2012). Trust-based anomaly detection in wireless sensor networks. In: Proceedings of the 1st IEEE international conference on communications in China: Communications theory and security, Beijing, China, 15–17 August 2012 (pp. 203–207).
Bao, F., Chen, I. R., Chang, M., & Chao, J. H. (2011). Trust-based intrusion detection in wireless sensor networks. In: Proceedings of the IEEE international conference on communications, Kyoto, Japan, 5–9 June 2011 (pp. 1–6).
Bao, F., Chen, I. R., Chang, M., & Chao, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management,9, 169–183.
Li, X., Zhou, F., & Du, J. (2013). A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security,8, 924–935.
Shao, N., Zhou, Z., & Sun, Z. (2015) A lightweight and dependable trust model for clustered wireless sensor networks. In: Proceedings of the international conference on cloud computing and security, Nanjing, China, 13–15 August 2015 (pp. 157–168).
Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,26, 1228–1237.
Ishmanov, F., Kim, S. W., & Nam, S. Y. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors,15, 7040–7061.
Luo, W., Ma, W., & Gao, Q. (2016). A dynamic trust management system for wireless sensor networks. Security and Communication Networks,9, 613–621.
Zhang, T., Yan, L., & Yang, Y. (2016). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks,24, 777–797.
Rajeshkumar, G., & Valluvan, K. R. (2016). An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wireless Personal Communications,94, 1993–2007.
Ghugar, U., Pradhan, J., Bhoi, S. K., Sahoo, R. R., & Panda, S. K. (2018). PL-IDS: Physical layer trust based intrusion detection system for wireless sensor networks. International Journal of Information Technology,10(4), 489–494.
Amouri, A., Morgera, S. D., Bencherifm, M. A., & Manthena, R. (2018). A cross-layer, anomaly-based IDS for WSN and MANET. Sensors,18, 651. https://doi.org/10.3390/s18020651.
Liyang, Z., Restuccia, F., Melodia, T., & Pudlewski, S. M. (2019). Taming cross-layer attacks in wireless networks: A Bayesian learning approach. IEEE Transactions on Mobile Computing,18(7), 1688–1702.
Arya, I. S., & Binu, G. S. (2017). Cross layer approach for detection and prevention of sinkhole attack using a mobile agent. In: Proceedings of the 2nd international conference on communication and electronics systems (ICCES 2017). IEEE Xplorer.
Gawdan, I. S., Chow, C.-O., Zia, T. A., & Gawdan, Q. I. (2011). Cross-layer based security solutions for wireless sensor networks. International Journal of the Physical Sciences,6(17), 4245–4254.
Resner, D., de Araujo, G. M., & Fröhlich, A. A. (2018). Design and implementation of a cross-layer IoT protocol. Science of Computer Programming,165(1), 24–37.
Sharavanan, P. T., Sridharan, D., & Kumar, R. (2018). A privacy preservation secure cross layer protocol design for IoT based wireless body area networks using ECDSA framework. Journal of Medical Systems,42, 196.
Wang, J., Jiang, S., & Fapojuwo, A. O. (2017). A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors,17, 1227. https://doi.org/10.3390/s17061227.
Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019) LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Hindawi Journal of Computer Networks and Communications, 2019, Article ID 2054298.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kore, A., Patil, S. IC-MADS: IoT Enabled Cross Layer Man-in-Middle Attack Detection System for Smart Healthcare Application. Wireless Pers Commun 113, 727–746 (2020). https://doi.org/10.1007/s11277-020-07250-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07250-0