Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing

IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
T. Srinivas, S. Manivannan
{"title":"Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing","authors":"T. Srinivas, S. Manivannan","doi":"10.3233/AIS-210591","DOIUrl":null,"url":null,"abstract":"In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"69 1","pages":"133-156"},"PeriodicalIF":1.8000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Ambient Intelligence and Smart Environments","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.3233/AIS-210591","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 7

Abstract

In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.
医疗行业物联网中的黑洞和选择性转发攻击检测与预防:基于混合元启发式的最短路径路由
在当前的医疗保健场景中,安全是具有更多设备或节点的物联网wsn的主要关注点。物联网基础设施中的攻击或异常检测在医疗物联网领域日益受到困扰。随着物联网基础设施在各省的大量使用,这些基础设施的威胁和攻击也相应增加。针对医疗物联网wsn的黑洞攻击和选择性转发攻击,提出了一种检测和防范的安全机制。本文提出的安全策略分为五个阶段:第一阶段是簇头的选择,第二阶段是生成k-路由路径,第三阶段是防止黑洞攻击的安全性,第四阶段是防止选择性转发攻击的安全性,最后阶段是选择最优最短路由路径。最初,开发了用于查找簇头和发现最佳路由的拓扑。在下一阶段,黑洞攻击被诱饵过程检测和阻止。在检测选择性转发攻击时,通过对发送的报文和接收的报文进行验证。为了提高报文的安全性,部署了基于ECC (Elliptic Curve Cryptography)的哈希函数。本文的主要贡献是将猎鹿优化算法(Deer Hunting Optimization algorithm, DHOA)与蜻蜓算法(DragonFly algorithm, DA)相结合,通过考虑目标模型中的信任、距离、延迟或延迟、丢包率等参数,确定最优最短路径,称为基于蜻蜓的DHOA (D-DHOA)。因此,整个阶段将非常积极地检测和防止医疗保健领域的黑洞和物联网wsn选择性转发这两种基本攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Ambient Intelligence and Smart Environments
Journal of Ambient Intelligence and Smart Environments COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, INFORMATION SYSTEMS
CiteScore
4.30
自引率
17.60%
发文量
23
审稿时长
>12 weeks
期刊介绍: The Journal of Ambient Intelligence and Smart Environments (JAISE) serves as a forum to discuss the latest developments on Ambient Intelligence (AmI) and Smart Environments (SmE). Given the multi-disciplinary nature of the areas involved, the journal aims to promote participation from several different communities covering topics ranging from enabling technologies such as multi-modal sensing and vision processing, to algorithmic aspects in interpretive and reasoning domains, to application-oriented efforts in human-centered services, as well as contributions from the fields of robotics, networking, HCI, mobile, collaborative and pervasive computing. This diversity stems from the fact that smart environments can be defined with a variety of different characteristics based on the applications they serve, their interaction models with humans, the practical system design aspects, as well as the multi-faceted conceptual and algorithmic considerations that would enable them to operate seamlessly and unobtrusively. The Journal of Ambient Intelligence and Smart Environments will focus on both the technical and application aspects of these.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信