A Secure Model to Protect Healthcare IoT System from Version Number and Rank Attack

  • Sanjay Ambarkar S
  • et al.
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Recently the entire world is witnessing a pandemic outbreak of COVID-19. Resultantly, the healthcare sector battles the challenges like inadequacy of staff members, feeble patient monitoring services, etc. IoT technology provides complete digitization. However, this healthcare IoT falls prey to various attacks and security threats. The main cause of the attacks is the IoT communication and routing protocols. Routing protocol for low power lossy network (RPL) provides the potent routing mechanism in the 6LoWPAN network. However, RPL is an unsecured protocol; hence providing security to IPV6-RPL connected devices is a challenging task. This paper modeled the rules for RPL protocol signatures like ETX, beacon interval, and energy consumption in a novel attack detection system. The simulation results proved that the proposed system detects the conventional as well as RPL specific attacks precisely version number and rank attacks in healthcare IoT systems with higher accuracy and detection rate.

Cite

CITATION STYLE

APA

Sanjay Ambarkar, S., & Shekokar, N. (2021). A Secure Model to Protect Healthcare IoT System from Version Number and Rank Attack. Journal of University of Shanghai for Science and Technology, 23(07), 502–515. https://doi.org/10.51201/jusst/21/07162

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free