Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

27-06-2021

An Experimental Study of Distributed Denial of Service and Sink Hole Attacks on IoT based Healthcare Applications

Authors: Manorama Mohapatro, Itu Snigdh

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid growth of the Internet-of-Things (IoT) in healthcare and the challenging task of achieving communication between two devices working on different protocols, concerns about the security of its devices also become an essential aspect. Amelioration in healthcare infrastructure in developing economies increases cost-effective medical devices, high research and development investments by major medical companies, and growing IoT infrastructure in health care. Since the communication is wireless and consists of low latency-based sensors and actuators, they are susceptible to frequent attacks. Two of the most common attacks are the DDoS (Distributed Denial of service) and Sinkhole attack, which are discussed in context to AODV and RPL protocols, usually employed for wireless-based IoT healthcare applications. We present network models under such attacks and depict their impact on the network parameters, namely, throughput, delay and packet delivery ratio. Our article presents an experimental study on the impacts of DDoS and Sinkhole attacks and suggests detection strategies on the basis of channel congestion and energy consumption for an IoT-based healthcare network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mohapatro, M., & Snigdh, I. (2020). 11 Security in IoT. In S. K. Sharma, B. Bhushan, & N. C. Debnath (Eds.), IoT security paradigms and applications: Research and practices (p. 237). CRC Press.CrossRef Mohapatro, M., & Snigdh, I. (2020). 11 Security in IoT. In S. K. Sharma, B. Bhushan, & N. C. Debnath (Eds.), IoT security paradigms and applications: Research and practices (p. 237). CRC Press.CrossRef
2.
go back to reference Butt, SA., Diaz-Martinez, J.L., Jamal, T., Ali, A., De-La-Hoz-Franco, E., Shoaib, M., (2019) IoT smart health security threats. In: 2019 19th international conference on computational science and its applications (ICCSA). Butt, SA., Diaz-Martinez, J.L., Jamal, T., Ali, A., De-La-Hoz-Franco, E., Shoaib, M., (2019) IoT smart health security threats. In: 2019 19th international conference on computational science and its applications (ICCSA).
3.
go back to reference Yuchen, Y., et al. (2017). A survey on security and privacy issues in Internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef Yuchen, Y., et al. (2017). A survey on security and privacy issues in Internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef
4.
go back to reference Aggarwal, C. C., Ashish, N., & Sheth, A. (2013). The internet of things: A survey from the data-centric perspective. In C. C. Aggarwal (Ed.), Managing and mining sensor data (pp. 383–428). Springer.CrossRef Aggarwal, C. C., Ashish, N., & Sheth, A. (2013). The internet of things: A survey from the data-centric perspective. In C. C. Aggarwal (Ed.), Managing and mining sensor data (pp. 383–428). Springer.CrossRef
5.
go back to reference Catherwood, P. A., Steele, D., Little, M., Mccomb, S., & Mclaughlin, J. (2018). A community-based IoT personalized wireless healthcare solution trial. IEEE Journal of Translational Engineering in Health and Medicine, 6, 1–13.CrossRef Catherwood, P. A., Steele, D., Little, M., Mccomb, S., & Mclaughlin, J. (2018). A community-based IoT personalized wireless healthcare solution trial. IEEE Journal of Translational Engineering in Health and Medicine, 6, 1–13.CrossRef
6.
go back to reference Wu, F., Taiyang, Wu., & Yuce, M. (2019). An internet-of-things (IoT) network system for connected safety and health monitoring applications. Sensors, 19(1), 21.CrossRef Wu, F., Taiyang, Wu., & Yuce, M. (2019). An internet-of-things (IoT) network system for connected safety and health monitoring applications. Sensors, 19(1), 21.CrossRef
7.
go back to reference Borgohain, T., U Kumar, and S Sanyal. (2015) Survey of security and privacy issues of internet of things. arXiv preprint. Borgohain, T., U Kumar, and S Sanyal. (2015) Survey of security and privacy issues of internet of things. arXiv preprint.
8.
go back to reference Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 20–26.CrossRef Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11), 20–26.CrossRef
9.
go back to reference Bhargavi, M., & Rao, M. N. (2018). Security Issues and Challenges in IOT: A comprehensive study. International Journal of Engineering & Technology, 7, 298.CrossRef Bhargavi, M., & Rao, M. N. (2018). Security Issues and Challenges in IOT: A comprehensive study. International Journal of Engineering & Technology, 7, 298.CrossRef
10.
go back to reference Sahu, N. K., Patnaik, M., & Snigdh, I. (2021). Data analytics and its applications in brief. In S. Goundar & P. K. Rayani (Eds.), Applications of big data in large-and small-scale systems (pp. 115–125). IGI Global.CrossRef Sahu, N. K., Patnaik, M., & Snigdh, I. (2021). Data analytics and its applications in brief. In S. Goundar & P. K. Rayani (Eds.), Applications of big data in large-and small-scale systems (pp. 115–125). IGI Global.CrossRef
11.
go back to reference Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.CrossRef Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.CrossRef
12.
go back to reference Swamy, SN., Jadhav, D., and Kulkarni, N., (2017) Security threats in the application layer in IOT applications. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE. Swamy, SN., Jadhav, D., and Kulkarni, N., (2017) Security threats in the application layer in IOT applications. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE.
13.
go back to reference Roosta, T., Shieh, S., and Sastry, S., (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: The first IEEE international conference on system integration and reliability improvements. Vol. 25. Roosta, T., Shieh, S., and Sastry, S., (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: The first IEEE international conference on system integration and reliability improvements. Vol. 25.
14.
go back to reference Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147–165.CrossRef Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67, 147–165.CrossRef
15.
go back to reference Bhushan, B., & Sahoo, G. (2020). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communications, 111(3), 1667–1694.CrossRef Bhushan, B., & Sahoo, G. (2020). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communications, 111(3), 1667–1694.CrossRef
16.
go back to reference Kenney, M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis, 59(1), 111–128.CrossRef Kenney, M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis, 59(1), 111–128.CrossRef
17.
go back to reference Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201–207.CrossRef Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201–207.CrossRef
18.
go back to reference Radlein, Anton Stephen, Nathan Alan Dye, Craig Wesley Howard, and HarvoReyzell Jones. (2018) Mitigating network attacks. U.S. Patent Application 15/714,993, filed April 19. Radlein, Anton Stephen, Nathan Alan Dye, Craig Wesley Howard, and HarvoReyzell Jones. (2018) Mitigating network attacks. U.S. Patent Application 15/714,993, filed April 19.
19.
go back to reference Ramesh, C., et al. (2018) FPGA side channel attacks without physical access. In: 2018 IEEE 26th annual international symposium on field-programmable custom computing machines (FCCM), IEEE. Ramesh, C., et al. (2018) FPGA side channel attacks without physical access. In: 2018 IEEE 26th annual international symposium on field-programmable custom computing machines (FCCM), IEEE.
20.
go back to reference Wu, J., Liao, X., & Yang, Bo. (2018). Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Processing, 142, 292–300.CrossRef Wu, J., Liao, X., & Yang, Bo. (2018). Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Processing, 142, 292–300.CrossRef
21.
go back to reference Kocher, P., et al. (2018) Spectre attacks: Exploiting speculative execution. arXiv preprint. Kocher, P., et al. (2018) Spectre attacks: Exploiting speculative execution. arXiv preprint.
22.
go back to reference Razzaq, M. A., et al. (2017). Security issues in the Internet of Things (IoT): A comprehensive study. International Journal of Advanced Computer Science and Applications, 8(6), 383. Razzaq, M. A., et al. (2017). Security issues in the Internet of Things (IoT): A comprehensive study. International Journal of Advanced Computer Science and Applications, 8(6), 383.
23.
go back to reference Majumder, S., Mondal, T., & Deen, M. (2017). Wearable sensors for remote health monitoring. Sensors, 17(1), 130.CrossRef Majumder, S., Mondal, T., & Deen, M. (2017). Wearable sensors for remote health monitoring. Sensors, 17(1), 130.CrossRef
24.
go back to reference Milenković, A., Otto, C., & Jovanov, E. (2006). Wireless sensor networks for personal health monitoring: Issues and an implementation. Computer Communications, 29(13–14), 2521–2533.CrossRef Milenković, A., Otto, C., & Jovanov, E. (2006). Wireless sensor networks for personal health monitoring: Issues and an implementation. Computer Communications, 29(13–14), 2521–2533.CrossRef
25.
go back to reference Jovanov, E., et al. (2005). A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. Journal of Neuro Engineering and Rehabilitation, 2(1), 1–10.CrossRef Jovanov, E., et al. (2005). A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. Journal of Neuro Engineering and Rehabilitation, 2(1), 1–10.CrossRef
26.
go back to reference Cha, H.-J., Yang, H.-K., & Song, Y.-J. (2018). A study on the design of fog computing architecture using sensor networks. Sensors, 18(11), 3633.CrossRef Cha, H.-J., Yang, H.-K., & Song, Y.-J. (2018). A study on the design of fog computing architecture using sensor networks. Sensors, 18(11), 3633.CrossRef
27.
go back to reference Mistry, N., Jinwala, DC., and Zaveri, M., (2010) Improving AODV protocol against blackhole attacks. In: Proceedings of the international multi conference of engineers and computer scientists. Vol. 2. Mistry, N., Jinwala, DC., and Zaveri, M., (2010) Improving AODV protocol against blackhole attacks. In: Proceedings of the international multi conference of engineers and computer scientists. Vol. 2.
28.
go back to reference Gardner, MT., Beard, C., and Medhi, D., (2017) Using SEIRS epidemic models for IoT botnets attacks. In: 13th international conference DRCN 2017-design of reliable communication networks, VDE. Gardner, MT., Beard, C., and Medhi, D., (2017) Using SEIRS epidemic models for IoT botnets attacks. In: 13th international conference DRCN 2017-design of reliable communication networks, VDE.
29.
go back to reference Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef
30.
go back to reference Rai, A. K., Tewari, R. R., & Upadhyay, S. K. (2010). Different types of attacks on integrated MANET-Internet communication. International Journal of Computer Science and Security, 4(3), 265–274. Rai, A. K., Tewari, R. R., & Upadhyay, S. K. (2010). Different types of attacks on integrated MANET-Internet communication. International Journal of Computer Science and Security, 4(3), 265–274.
31.
go back to reference Verma, A., & Ranga, V. (2019). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications, 108, 1–24.CrossRef Verma, A., & Ranga, V. (2019). Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT. Wireless Personal Communications, 108, 1–24.CrossRef
32.
go back to reference Zant, M. A., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security and Communication Networks, 2019, 1–19.CrossRef Zant, M. A., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security and Communication Networks, 2019, 1–19.CrossRef
33.
go back to reference S. Alanazi, J. Al-Muhtadi, A. Derhab, K. Saleem, (2015) On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: international conference on e-health networking application & services. S. Alanazi, J. Al-Muhtadi, A. Derhab, K. Saleem, (2015) On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications. In: international conference on e-health networking application & services.
34.
go back to reference Srivastava, A., et al. (2011) A recent survey on DDoS attacks and defense mechanisms. In: International conference on parallel distributed computing technologies and applications. Springer, Berlin, Heidelberg. Srivastava, A., et al. (2011) A recent survey on DDoS attacks and defense mechanisms. In: International conference on parallel distributed computing technologies and applications. Springer, Berlin, Heidelberg.
35.
go back to reference Broch, J., et al. (1998) A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th annual ACM/IEEE international conference on mobile computing and networking. Broch, J., et al. (1998) A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th annual ACM/IEEE international conference on mobile computing and networking.
36.
go back to reference Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks, 9(8), 794326.CrossRef
37.
go back to reference Manorama M., I Snigdh (2018) Anonymity in body area sensor networks-an insight. In: 2018 IEEE world symposium on communication engineering (WSCE). Manorama M., I Snigdh (2018) Anonymity in body area sensor networks-an insight. In: 2018 IEEE world symposium on communication engineering (WSCE).
38.
go back to reference Rghiout, A., Khannous, A., & Bouhorma, M. (2014). Denial-of-service attacks on 6lowpan-RPL networks: Issues and practical solutions. Journal of Advanced Computer Science & Technology, 3(2), 143–153.CrossRef Rghiout, A., Khannous, A., & Bouhorma, M. (2014). Denial-of-service attacks on 6lowpan-RPL networks: Issues and practical solutions. Journal of Advanced Computer Science & Technology, 3(2), 143–153.CrossRef
39.
go back to reference Sundararajan, R. K., & Arumugam, U. (2015). Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors, 2015, 1–12.CrossRef Sundararajan, R. K., & Arumugam, U. (2015). Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors, 2015, 1–12.CrossRef
41.
go back to reference Nagireddy, V., & Parwekar, P. (2019). Attacks in wireless sensor networks. In S. C. Satapathy, V. Bhateja, & S. Das (Eds.), Smart intelligent computing and applications (pp. 439–447). Springer.CrossRef Nagireddy, V., & Parwekar, P. (2019). Attacks in wireless sensor networks. In S. C. Satapathy, V. Bhateja, & S. Das (Eds.), Smart intelligent computing and applications (pp. 439–447). Springer.CrossRef
42.
go back to reference Kamgueu, P. O., Nataf, E., & Ndie, T. D. (2018). Survey on RPL enhancements: A focus on topology, security and mobility. Computer Communications, 120, 10–21.CrossRef Kamgueu, P. O., Nataf, E., & Ndie, T. D. (2018). Survey on RPL enhancements: A focus on topology, security and mobility. Computer Communications, 120, 10–21.CrossRef
43.
go back to reference Alzubaidi, M., et al. (2017) Review on mechanisms for detecting sinkhole attacks on RPLs. In: 2017 8th International Conference on Information Technology (ICIT). IEEE. Alzubaidi, M., et al. (2017) Review on mechanisms for detecting sinkhole attacks on RPLs. In: 2017 8th International Conference on Information Technology (ICIT). IEEE.
44.
go back to reference Jebadurai, I. J. R., et al. (2016). EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks. International Journal of Wireless and Mobile Computing, 11(3), 171–181.CrossRef Jebadurai, I. J. R., et al. (2016). EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks. International Journal of Wireless and Mobile Computing, 11(3), 171–181.CrossRef
Metadata
Title
An Experimental Study of Distributed Denial of Service and Sink Hole Attacks on IoT based Healthcare Applications
Authors
Manorama Mohapatro
Itu Snigdh
Publication date
27-06-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08657-z

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue