Skip to main content

Advertisement

Log in

IC-MADS: IoT Enabled Cross Layer Man-in-Middle Attack Detection System for Smart Healthcare Application

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Smart healthcare is one of the core applications of the Internet of Things (IoT) technology in which the body sensors capture the patient's periodic data and transmit seamlessly over the wireless communications to remote monitoring stations. Due to the open nature of wireless communications, privacy-preserving and security are the biggest concern for IoT enabled healthcare systems. Several trust-based and cryptography-based solutions proposed to achieve the privacy-preserving and data security, however, such layered solutions failed to address the cross-layer attacks such as Man-in-Middle Attack (MIMA). Thus we believe that cross-layer attack detection methods achieve effective protection against such attacks. This paper proposed the novel lightweight cross-layer trust computation algorithm for MIMA attacker detection called IC-MADS. The IC-MADS consists of two main contributions such as energy-efficient clustering and cross-layer attack detection. The clustering algorithm proposed for optimal Cluster Head (CH) selection using the probability computation and evaluation approach. Each sensor node probability is computed using the parameters like residual energy, distance to Base Station, and node degree parameters. The node with a higher probability value becomes the CH. This solves the energy imbalance and load balancing problems. The cross-layer trust evaluation approach introduced node evaluation to detect the MIMA attackers in the network. The trust computation of each node is performed by using the sensor nodes parameters across the different layers such as network, physical, and MAC layers. The aggregate trust value of each sensor node is then compared with the threshold value to check whether the node is an attacker. The simulation results prove that IC-MADS achieves better protection against MIMA attacks with minimum overhead and energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Mahajan, H. B., & Badarla, A. (2018). Application of internet of things for smart precision farming: solutions and challenges. International Journal of Advanced Science and Technology,2018, 37–45.

    Google Scholar 

  2. Mahajan, H. B., & Badarla, A. (2019). Experimental analysis of recent clustering algorithms for wireless sensor network: Application of IoT based smart precision farming. Journal of Advanced Research in Dynamical and Control Systems,11(9), 116–125.

    Article  Google Scholar 

  3. Mahajan, H. B., & Badarla, A. (2020). Detecting HTTP vulnerabilities in IoT-based precision farming connected with cloud environment using artificial intelligence. International Journal of Advanced Science and Technology,29(3), 214–226.

    Google Scholar 

  4. Sarita, A., & Manik, L. D. (2011). Internet of Things—A Paradigm Shift of Future Internet Applications (pp. 1–7). Ahmedabad: Institute of Technology Nirma University.

    Google Scholar 

  5. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys and Tutorials,17(4), 2347–2376.

    Article  Google Scholar 

  6. Rabaey, J., Ammer, J., Silva, J. L., Patel, D. (2000). PicoRadio: Ad hoc wireless networking of ubiquitous low-energy sensor/monitor nodes. In: Workshop on VLSI (pp. 9–14).

  7. Idrees, S. K., Chee-Onn, C., Hiroshi, I., & Tanveer, A. Z. (2010). Threat models and security issues in wireless sensor networks. In: Proceedings of the (ICINC 2010), vol. 1 (pp. 384–389). Kuala Lumpur, Malaysia.

  8. https://gigaom.com/2011/10/13/internet-of-things-will-have-24-billiondevices-by-2020/.

  9. The Mobile Economy, GSMA (2013).

  10. Sliman, J. B., Song, Y.-Q., Koubâa, A. & Frikha, M. (2009). A three-tiered architecture for large-scale wireless hospital sensor networks. In: Workshop Mobi Health Infin conjunction with BIOSTEC (p. 64).

  11. Kirby, K. K. (2015). Hours per patient day: not the problem, nor the solution. Nursing Economics,33(1), 64.

    Google Scholar 

  12. Prakash, R., Ganesh, A. B., & Girish, S. V. (2016). Cooperative wireless network control based health and activity monitoring system. Journal of Medical Systems,40(10), 216.

    Article  Google Scholar 

  13. Prakash, R., Ganesh, A. B., & Sivabalan, S. (2017). Network coded cooperative communication in a real-time wireless hospital sensor network. Journal of Medical Systems,41(5), 72.

    Article  Google Scholar 

  14. Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2004). Reputation based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop security ad hoc sensor network, Washington, DC, USA, 25–29 October 2004 (pp. 66–77).

  15. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of the IEEE international conference on mobile ad hoc and sensor system, Vancouver, BC, Canada, 9–12 October 2006 (pp. 437–446).

  16. Atakli, I. M., Hu, H., Chen, Y., Ku, W. S., & Su, Z. (2008). Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the symposium on simulation of systems security, Ottawa, ON, Canada, 14–17 April 2008 (pp. 836–843).

  17. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,20, 1698–1712.

    Article  Google Scholar 

  18. Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors,11, 1345–1360.

    Article  Google Scholar 

  19. Wu, R., Deng, X., Lu, R., & Shen, X. (2012). Trust-based anomaly detection in wireless sensor networks. In: Proceedings of the 1st IEEE international conference on communications in China: Communications theory and security, Beijing, China, 15–17 August 2012 (pp. 203–207).

  20. Bao, F., Chen, I. R., Chang, M., & Chao, J. H. (2011). Trust-based intrusion detection in wireless sensor networks. In: Proceedings of the IEEE international conference on communications, Kyoto, Japan, 5–9 June 2011 (pp. 1–6).

  21. Bao, F., Chen, I. R., Chang, M., & Chao, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management,9, 169–183.

    Article  Google Scholar 

  22. Li, X., Zhou, F., & Du, J. (2013). A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security,8, 924–935.

    Article  Google Scholar 

  23. Shao, N., Zhou, Z., & Sun, Z. (2015) A lightweight and dependable trust model for clustered wireless sensor networks. In: Proceedings of the international conference on cloud computing and security, Nanjing, China, 13–15 August 2015 (pp. 157–168).

  24. Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,26, 1228–1237.

    Article  Google Scholar 

  25. Ishmanov, F., Kim, S. W., & Nam, S. Y. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors,15, 7040–7061.

    Article  Google Scholar 

  26. Luo, W., Ma, W., & Gao, Q. (2016). A dynamic trust management system for wireless sensor networks. Security and Communication Networks,9, 613–621.

    Article  Google Scholar 

  27. Zhang, T., Yan, L., & Yang, Y. (2016). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks,24, 777–797.

    Article  Google Scholar 

  28. Rajeshkumar, G., & Valluvan, K. R. (2016). An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wireless Personal Communications,94, 1993–2007.

    Article  Google Scholar 

  29. Ghugar, U., Pradhan, J., Bhoi, S. K., Sahoo, R. R., & Panda, S. K. (2018). PL-IDS: Physical layer trust based intrusion detection system for wireless sensor networks. International Journal of Information Technology,10(4), 489–494.

    Article  Google Scholar 

  30. Amouri, A., Morgera, S. D., Bencherifm, M. A., & Manthena, R. (2018). A cross-layer, anomaly-based IDS for WSN and MANET. Sensors,18, 651. https://doi.org/10.3390/s18020651.

    Article  Google Scholar 

  31. Liyang, Z., Restuccia, F., Melodia, T., & Pudlewski, S. M. (2019). Taming cross-layer attacks in wireless networks: A Bayesian learning approach. IEEE Transactions on Mobile Computing,18(7), 1688–1702.

    Article  Google Scholar 

  32. Arya, I. S., & Binu, G. S. (2017). Cross layer approach for detection and prevention of sinkhole attack using a mobile agent. In: Proceedings of the 2nd international conference on communication and electronics systems (ICCES 2017). IEEE Xplorer.

  33. Gawdan, I. S., Chow, C.-O., Zia, T. A., & Gawdan, Q. I. (2011). Cross-layer based security solutions for wireless sensor networks. International Journal of the Physical Sciences,6(17), 4245–4254.

    Google Scholar 

  34. Resner, D., de Araujo, G. M., & Fröhlich, A. A. (2018). Design and implementation of a cross-layer IoT protocol. Science of Computer Programming,165(1), 24–37.

    Article  Google Scholar 

  35. Sharavanan, P. T., Sridharan, D., & Kumar, R. (2018). A privacy preservation secure cross layer protocol design for IoT based wireless body area networks using ECDSA framework. Journal of Medical Systems,42, 196.

    Article  Google Scholar 

  36. Wang, J., Jiang, S., & Fapojuwo, A. O. (2017). A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors,17, 1227. https://doi.org/10.3390/s17061227.

    Article  Google Scholar 

  37. Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019) LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Hindawi Journal of Computer Networks and Communications, 2019, Article ID 2054298.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashwini Kore.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kore, A., Patil, S. IC-MADS: IoT Enabled Cross Layer Man-in-Middle Attack Detection System for Smart Healthcare Application. Wireless Pers Commun 113, 727–746 (2020). https://doi.org/10.1007/s11277-020-07250-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07250-0

Keywords

Navigation