| Literature DB >> 26797620 |
Avijit Mathur1, Thomas Newe2, Muzaffar Rao3.
Abstract
Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.Entities:
Keywords: IoT-Internet of Things; black hole; medical WSN; routing attacks; selective forwarding; sensor networks
Year: 2016 PMID: 26797620 PMCID: PMC4732151 DOI: 10.3390/s16010118
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System model.
Figure 2System overview.
Figure 3Network model.
Figure 4Black hole attack simulation on Cooja simulator (Contiki): (a) nodes layout. Source node green “2”, destination is blue “1”, and malicious node is red “5”; and (b) Mote output: node “2” sending data packets to node “1” via node “5”, but these packets never reach their destination.
Figure 5Pre-Deployment process: The access points receiving their respective unique random numbers from the BS.
Figure 6Routing Phase: (a) AODV protocol; (b) data direction; and (c) modification for our system.
Figure 7RREQ Packet.
Figure 8Neighbour monitoring process.
Figure 9Packets: (a) data Packet; and (b) ACK packet.
Figure 10Selective forwarding: (a) detection and correction process; and (b) new path formation.
Figure 11Fix for scenario when malicious node drops CPs.
Flags Bit Array—Pass I.
| S | S + 1 | S + 2 | S + 3 | S + 4 | BS | |
|---|---|---|---|---|---|---|
| P1 | 1 | 1 | 1 | 0 | - 2 | 1 |
| PM | 9 | 9 | 5 | X 1 | - 2 | 4 |
1 Analysis of CP received from suspected malicious node is skipped; 2 No decision.
Flags Bit Array—Pass II.
| BS | S + 4 | S + 3 | S + 2 | S + 1 | S | |
|---|---|---|---|---|---|---|
| P2 | 1 | 1 | 0 | - 2 | 1 | 1 |
| AM | 5 | 8 | X 1 | 8 | - 2 | - 2 |
1 Analysis of CP received from suspected malicious node is skipped, 2 No decision.
Figure 12Testbed layout. The arrows represent DATA packets, and the bolts represent monitoring the neighbour node’s DATA sending habit.
Figure 13Network Stack.
Figure 14Power consumption for protocol—normal operation.
Figure 15Power consumption for protocol—detection phase.
Figure 16Experimental setup of the network.
Figure 17Current consumption of OpenMote running modified protocol during detection phase—nullrdc.
Figure 18Current consumption of OpenMote running modified protocol during normal phase.
Figure 19Memory footprint for the program on an OpenMote.
Single Selective Forwarding.
| Type | No. of Nodes | Node ID | Detection at (ms) (D) | Mal Info Received (ms) (M) | Latency (ms) M − D |
|---|---|---|---|---|---|
| Single SF | 4 | 722,223 | 725,201 | 2978 | |
| 6 | 722,268 | 724,013 | 1745 | ||
| 5 | 722,311 | 723,345 | 1034 | ||
| 2 | 722,399 | 722,506 | 107 | ||
| Single SF | 4 | 742,919 | 747,686 | 4767 | |
| 6 | 742,970 | 746,498 | 3528 | ||
| 9 | 743,021 | 745,795 | 2774 | ||
| 5 | 743,071 | 745,127 | 2056 | ||
| 2 | 743,173 | 743,295 | 122 | ||
| Single SF1 | 4 | 719,981 | 739,631 | 19,650 | |
| 6 | 720,026 | 738,591 | 18,565 | ||
| 5 | 720,069 | 737,921 | 17,852 | ||
| 2 | 736,383 (with netflood) | 736,482 | 99 |
* Malicious Node; 1 Malicious node drops control packets.
Collaborative Selective Forwarding.
| Type | No. of Nodes | Node ID | Detection at (ms) (D) | Mal Info Received (ms) (M) | Latency (ms) M − D |
|---|---|---|---|---|---|
| Collaborative SF | 4 | 734,278 | 737,233 | 2955 | |
| 6 | 734,323 | 737,057 | 2734 | ||
| 2 | 734,454 | 734,561 | 107 | ||
| Collaborative SF Round 1 | 4 | 698,901 | 703,183 | 4282 | |
| 2 | 699,077 | 699,184 | 107 | ||
| Round 2 | Orig: 4 → 6* → 8* → 7 → 2 → 1 | 4 | 1,710,799 | 1,712,192 | 1393 |
| 7 | 1,710,931 | 1,711,184 | 253 | ||
| 2 | 1,710,975 | 1,711,082 | 107 |
* Malicious Node.
Accuraccy check for single SF—nullrdc.
| Original Path | New Path | Detection | Observations |
|---|---|---|---|
| 4, 2, 3*, 1 | 4, 2, 5, 1 | Yes | 1 attempt |
| 4, 3*, 7, 6, 2, 5, 1 | 4, 8, 7, 6, 2, 5, 1 | Yes | 1 attempt |
| 4, 8, 7, 3*, 5, 6, 2, 9, 1 | 4, 8, 7, 10, 5, 6, 2, 9, 1 | Yes | 2 attempts |
| 4, 6, 3*, 8, 7, 5, 10, 2, 9, 1 | 4, 6, 12, 8, 7, 11, 10, 2, 9, 1 | Yes & False Positive: ID 5 | 1 attempt |
| 4, 10, 9, 5, 7, 8, 6, 2, 3*, 1 | 4, 10, 9, 5, 7, 8, 6, 2, 11, 1 | Yes | 2 attempts |
| 4, 3*, 6, 1 | 4, 2, 6, 1 | Yes | 1 attempt |
| 4, 6, 3*, 1 | X | No: False Negative | N/A |
| 4, 3*, 2, 6, 1 | X | Yes | N/A—Due to limitations on no of nodes |
A* Represents the malicious node; A Represents the redundant node.
Accuracy check for Single SF—ContikiMAC RDC.
| Original Path | New Path | Detection | Observations |
|---|---|---|---|
| 4, 2, 3*, 7, 5, 1 | 4, 2, 8, 7, 5, 1 | Yes | 1 attempt: |
| 4, 2, 3*, 7, 5, 8, 9, 10, 1 | 4, 2, 11, 7, 5, 8, 9, 10, 1 | Yes | 1 attempt: |
| 4, 2, 7, 5, 3*, 9, 10, 1 | X | Yes | N/A |
| 4, 2, 5, 9, 8, 3*, 10, 1 | 4, 2, 5, 8, 8, 7, 10, 1 | Yes | 3 attempts: |
| 4, 2, 5, 9, 8, 7, 3*, 10, 11, 1 | 4, 2, 5, 9, 8, 7, 12, 10, 11, 1 | Yes | 1 attempt |
| 4, 2, 5, 9, 8, 7, 3*, 12, 10, 11, 1 | 4, 2, 5, 9, 8, 7, 13, 12, 10, 11, 1 | Yes | 4 attempts |
| 4, 2, 5, 7, 8, 9, 3*, 12, 10, 11, 13, 1 | 4, 2, 5, 7, 8, 9, 14, 12, 10, 11, 13, 1 | Yes | 1 attempt |
A* Represents the malicious node; A Represents the redundant node.
Accuracy check for collaborative SF—nullrdc.
| Original Path | New Path | Detection | Observations |
|---|---|---|---|
| 4, 6, | 4, 6, 8, 7, 2, 1 | Yes | 3 attempts |
| 4, 6, 5, | 4, 6, 5, | Yes | 1 attempt |
| 4, 2, 7, 5, | 4, 2, 7, 5, | Yes | 3 attempts |
| 4, 6, | 4, 6, | Yes | 1 attempt, 1 Error |
| 4, 6, 11, | 4, 6, 11, | Yes | 2 attempts |
| 4, 7, 11, | 4, 7, 11, | Yes | 3 attempts |
| 4, 12, 11, | 4, 12, 11, | Yes | 1 attempt, 1 Error |
| 4, 12, | 4, 12, | Yes | 3 attempts |
| 4, 5, | 4, 5, | Yes | 2 attempts |
| 4, 9, | 4, 9, | Yes | 5 attempts |
| 4, 2, 7, | 4, 2, 7, | Yes | 3 attempts |
| (I) 4, 2, 10, | (I) 4, 2, 10, | (I) Yes: 5 & 9 | 1 attempt |
| Mal node 7 infiltrates | |||
| (II) 4, 2, 10, | (II) 4, 2, 10, | (II) Yes: 7 | 2 attempts |
| 4, | 4, | Yes | 2 attempts |
| 4, | 4, | Yes | 1 attempt |
A* Represents the malicious node; A Represents the redundant node; 1 Error node not identified as malicious; 2 Infiltration during the detection process.