2016
DOI: 10.3390/s16010118
|View full text |Cite
|
Sign up to set email alerts
|

Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT

Abstract: Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(38 citation statements)
references
References 29 publications
0
36
0
2
Order By: Relevance
“…Recent studies in the literature have highlighted the needs of sophisticated IDS to meet security requirements in IoT environments [3,[7][8][9][10]. In a nutshell, IDSs aim to identify attack behavior and locate an attacker within a system [3].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recent studies in the literature have highlighted the needs of sophisticated IDS to meet security requirements in IoT environments [3,[7][8][9][10]. In a nutshell, IDSs aim to identify attack behavior and locate an attacker within a system [3].…”
Section: Related Workmentioning
confidence: 99%
“…They do not present the execution time for OPCF. In [8], the authors built a solution for selective forwarding attack detection in a medical IoT Wireless Sensor Network (WSN), where sensors send data sample to an Access Point (AP). Thus, the AP can address data encryption and forward over the Internet for storing and processing them on servers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The corresponding node decreases the trust factor for its neighbor node if it is acting maliciously [2,4]. Mathur et al [8] have introduced similar approach by building a trust model against black hole. Few security solutions concern about mobile environment, network's scalability, its adaptability and node's energy [12,13,14].…”
Section: Fig 1 Hierarchical Cluster Topology In Wirelessmentioning
confidence: 99%
“…5 However, to avoid DoS attacks and maintain the good functioning of these networks, it is important to secure them by using effective solutions, such as those proposed in Refs. [6][7][8] .…”
Section: Introductionmentioning
confidence: 99%