The limitations in the state-of-the-art counter-measures against the security threats in H-IoT (original) (raw)
References
Alagar, V., Alsaig, A., Ormandjiva, O., Wan, K.: Context-based security and privacy for healthcare IoT. In: 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi’an, pp. 122–128 (2018). https://doi.org/10.1109/SmartIoT.2018.00-14
Ramli, S.N., Ahmad, R.: Surveying the wireless body area network in the realm of wireless communication. In: 2011 7th International Conference Information Assurance and Security (IAS), Melaka, pp. 58–61 (2011). https://doi.org/10.1109/ISIAS.2011.6122845
Suresh, P., Daniel, J.V., Parthasarathy, V., Aswathy, R.H.: A state of the art review on the Internet of Things (IoT) History, Technology and fields of deployment. In: 2014 International Conference on Science Engineering and Management (ICSEMR), Chennai, India, pp. 1–8 (2014). https://doi.org/10.1109/ICSEMR.2014.7043637
Qadri, Y.A., Musaddiq, A., Kim, D.W., Kim, S.W.: An overview of selective forwarding and wormhole attacks in healthcare IoT. In: Asia Pacific Conference on Information Communication Technology (APCICT-2018), Daegu, Korea (2018)
Naik, M.R.K., Samundiswary, P.: Wireless body area network security issues-survey. In: 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, India, pp. 190–194 (2016). https://doi.org/10.1109/ICCICCT.2016.7987943
Lin, Y.-J., Chen, H.-S., Su, M.-J.: A cloud based bluetooth low energy tracking system for dementia patients. In: 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Hakodate, pp. 88–89 (2015). https://doi.org/10.1109/ICMU.2015.7061043
He, S., Cheng, B., Wang, H., Huang, Y., Chen, J.: Proactive personalized services through fog-cloud computing in large-scale iot-based healthcare application. China Commun. 14(11), 1–16 (2017). https://doi.org/10.1109/CC.2017.8233646 Article Google Scholar
Ridhawi, I.A., Aloqaily, M., Kotb, Y., Jararweh, Y.: A profitable and energy-efficient cooperative fog solution for IoT services. In: IEEE Transactions on Industrial Informatics (Early Access) (2019). https://doi.org/10.1109/TII.2019.2922699
Buyukakkaslar, M.T., Erturk, M.A., Aydin, M.A., Vollero, L.: LoRaWAN as an e-health communication technology. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, pp. 310–313 (2017). https://doi.org/10.1109/COMPSAC.2017.162
Anand, S, Routray, S.K.: Issues and challenges in healthcare narrowband IoT. In: 2017 international conference on inventive communication and computational technologies (ICICCT), Coimbatore, pp. 486–489 (2017). https://doi.org/10.1109/ICICCT.2017.7975247
Faheem, M., Butt, R.A, Raza, B, Ashraf, M.W, Begum, S, Ngadi, M.A, Gungor, V.C: Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0. In: Transactions on Emerging Telecommunications Technologies (2018). https://doi.org/10.1002/ett.3503
Faheem, M., Gungor, V.C.: Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0. Appl. Soft Comput. 68, 910–922 (2018). https://doi.org/10.1016/j.asoc.2017.07.045 Article Google Scholar
Faheem, M., Abbas, M.Z., Tuna, G., Gungor, V.C.: EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks. J. Netw. Comput. Appl. 58, 309–326 (2015). https://doi.org/10.1016/j.jnca.2015.08.002 Article Google Scholar
Al-Turjman, F., Ever, E., Zahmatkesh, H.: Internet of nano-things (IoNT) & WBAN. In: Al-Turjman, F. (ed.) Internet of Nano-Things and Wireless Body Area Networks (WBAN). CRC Press, Baco Raton (2019) Chapter Google Scholar
Topel, S.D., Al-Turjman, F.: Nanosensors for the internet of nano-things (IoNT): an overview. In: Al-Turjman, F. (ed.) Internet of Nano-Things and Wireless Body Area Networks (WBAN). CRC Press, Boca Raton (2019) Google Scholar
Balasubramanian, V., Zaman, F., Aloqaily, M., Ridhawi, I.A., Jararweh, Y., Salameh, H.B.: A mobility management architecture for seamless delivery of 5G-IoT services. In: 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, China, pp. 1–7 (2019). https://doi.org/10.1109/ICC.2019.8761658
Salleh, A., Mamat, K., Darus, M.Y.: Integration of wireless sensor network and web of things: security perspective. In: 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, pp. 138–143 (2017). https://doi.org/10.1109/ICSGRC.2017.8070583
Goyal, S., Bhatia, T., Verma, A.K.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 1463–1468 (2015)
Prabhakar, A., Anjali, T.: Mitigating selective Gray Hole Attack in wireless multi-hop network. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, pp. 1223–1227 (2017). https://doi.org/10.1109/WiSPNET.2017.8299958
Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wireless Commun. 8(2), 736–745 (2009). https://doi.org/10.1109/TWC.2009.070536 Article Google Scholar
Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS), Rhodes Island, Greece (2006). https://doi.org/10.1109/IPDPS.2006.1639675
Mathur, A., Newe, T., Rao, M.: Healthcare WSN: cluster elections and selective forwarding defense. In: NGMAST 9th International Conference on Next Generation Mobile Applications, Services and Technologies, Cambridge, UK, pp. 341–346 (2015). https://doi.org/10.1109/NGMAST.2015.14
Ren, J., Zhang, Y., Zhang, K., Shen, X.: Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans. Wireless Commun. 15(5), 3718–3731 (2016). https://doi.org/10.1109/TWC.2016.2526601 Article Google Scholar
Gara, F., Saad, L.B., Ayed, R.B.: An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, pp. 276–281 (2017). https://doi.org/10.1109/IWCMC.2017.7986299
Ioannou, C., Vassiliou, V., Sergiou, C.: An intrusion detection system for wireless sensor networks. In: 2017 24th International Conference on Telecommunications (ICT), Limassol, Cyprus, pp. 1–5 (2017). https://doi.org/10.1109/ICT.2017.7998271
Modirkhazeni, A., Aghamahamoodi, S., Modirkhazeni, A., Niknejad, N.: Distributed approach to mitigate wormhole attack in wireless sensor network. In: 7th International Conference on Networked Computing, Gyeongsanbuk-do, Korea, pp. 122–128 v
Bendjima, M., Feham, M.: Wormhole attack detection in wireless sensor networks. In: 2016 SAI Computing Conference (SAI), London, UK, pp. 1319–1326 (2016). https://doi.org/10.1109/SAI.2016.7556151
Sharma, M.K., Joshi, B.K.: A mitigation technique for high transmission power based wormhole attack in wireless sensor networks. In: 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, pp. 1–6 (2016). https://doi.org/10.1109/ICTBIG.2016.7892698
Shukla, P.: ML-IDS: A machine learning approach to detect Wormhole attacks in Internet of Things. In: 2017 Intelligent Systems Conference (IntelliSys), London, pp. 234–240 (2017). https://doi.org/10.1109/IntelliSys.2017.8324298
Ahsan, M.S., Bhutta, M.N.M., Maqsood, M.: Wormhole attack detection in routing protocol for low power lossy networks. In: 2017 International Conference on Information and Communication Technologies (ICICT), Karachi, pp. 58–67 (2017). https://doi.org/10.1109/ICICT.2017.8320165
Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A.: Graph-based wormhole attack detection in mobile ad hoc networks (MANETs). In: 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ), Florida, USA, pp. 1–6 (2018). https://doi.org/10.1109/MOBISECSERV.2018.8311439
Zikria, Y.B., Kim, S.W., Hahm, O., Afzal, M.K., Aalsalem, M.Y.: Internet of Things (IoT) operating systems management: opportunities, challenges, and solution. Sensors 19(8), 1–10 (2019). https://doi.org/10.3390/s19081793 Article Google Scholar
Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, pp. 464–467 (2017). https://doi.org/10.23919/ICACT.2017.7890132
Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, 1st edn. O’Reilly Media, Inc., Newton (2014). ISBN:1449374042 9781449374044 Google Scholar
Virmani, C., Gupta, D.J., Choudhary, T.: Blockchain 2.0: an edge over technologies. In: Architectures and Frameworks for Developing and Applying Blockchain Technology. IGI Global, Pennsylvania (2019). https://doi.org/10.4018/978-1-5225-9257-0.ch009
Demir, S.M., Al-Turjman, F., Muhtaroglu, A.: Energy-harvesting methods for WBAN applications. In: Al-Turjman, F. (ed.) Internet of Nano-Things and Wireless Body Area Networks (WBAN). CRC Press, Boca Raton (2019) Google Scholar
Balasubramanian, V., Zaman, F., Aloqaily, M., Alrabaee, S., Gorlatova, M., Reisslein, M.: Reinforcing the edge: autonomous energy management for mobile device clouds. In: IEEE International Conference on Computer Communications, Paris, France (2019)
Al-Turjman, F., Zahmatkesh, H., Mostarda, L.: Quantifying uncertainty in internet of medical things and big-data services using intelligence and deep learning. In: IEEE Access (Early Access). https://doi.org/10.1109/ACCESS.2019.2931637
Balasubramaniam, V., Aloqaily, M., Zaman, F., Jararweh, Y.: Exploring computing at the edge: a multi-interface system architecture enabled mobile device cloud. In: 2018 IEEE 7th International Conference on Cloud Networking (CloudNet),Tokyo, Japan (2018). https://doi.org/10.1109/CloudNet.2018.8549296
Rathee, G., Sharma, A., Iqbal, R., Aloqaily, M., Jaglan, N., Kumar, R.: A blockchain framework for securing connected and autonomous vehicles. Sensors 19, 3165 (2019). https://doi.org/10.3390/s19143165 Article Google Scholar