Skip to main content

Critical and Comparative Analysis of DoS and Version Number Attack in Healthcare IoT System

  • Conference paper
  • First Online:
Proceeding of First Doctoral Symposium on Natural Computing Research

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 169))

Abstract

Recently the entire world is witnessing the pandemic outbreak of COVID 19, which creates havoc in the healthcare industry. Error tolerance may lead to death threats for the patient in the healthcare system. However, practically the healthcare industry faces many manual error incidences, inadequate staffing, aging population, etc. These challenges will increase the stress level and disturbs the psychological as well as physical health of the healthcare practitioner. Internet of things (IoT) technique is adept to tackle such outbreaks by providing complete digitization of healthcare systems. However, IoT application deployment comes with many security threats and attacks challenges. Here it is worth mentioning that to implement a robust security solution, the comprehensive analysis of attack must carry out. This paper contributes by analyzing two preeminent attacks, the Denial of service (DoS) and version Number attack on the healthcare system. DoS rapidly destroy the network whereas version number haltingly takes control of the network. The paper further critically analyzes the performance and severity of these two attacks based on discrete parameters like routing metric, power consumption, number of packets received, number of expected transmissions, beacon interval, and proposes the robust solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kushalnagar N, Montenegro G, Schumacher C (2016) IPv6 over low-power wireless personal area networks (6LoWPANs (Online). Available https://tools.ietf.org/html/rfc4919

  2. Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL- based Internet of Things. Int J Netw Secur 18(3):459–473

    Google Scholar 

  3. Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based Internet of Things. Int J Distrib Sens Netw, Sage, pp 1–11

    Google Scholar 

  4. Dhumane A, Prasad R, Prasad J (2016) Routing issues in Internet of Things: a surve. In: Proceedings of the international multi conference of engineers and computer scientists, pp 16–18, Mar 2016

    Google Scholar 

  5. Ambarkar SS, Shekokar N (2020) Toward smart and secure IoT based healthcare system. In: Dey N, Mahalle P, Shafi P, Kimabahune V, Hassanien A (eds) Studies in systems, decision and control Internet of Things, smart computing and technology: a roadmap ahead, vol 266, Springer, Cham

    Google Scholar 

  6. Mangla M, Akhare R, Ambarkar S (2019) Context-aware automation based energy conservation techniques for IoT ecosystem. In: Mittal M, Tanwar S, Agarwal B, Goyal L (eds) Studies in systems, decision and control energy conservation for IoT devices, vol 206, Springer, Singapore

    Google Scholar 

  7. Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: International conference on emerging trends and innovation in ICT (ICEI), Pune, pp 33–39

    Google Scholar 

  8. Fatima A, Colomo-Palacios R (2018) Security aspects in healthcare information systems: A systematic mapping. Procedia Comput Sci 138:12–19. ISSN 1877-0509

    Google Scholar 

  9. Bradley C, El-Tawab S, Heydari MH (2018) Security analysis of an IoT system used for indoor localization in healthcare facilities. Syst Inf Eng Des Symp (SIEDS), Charlottesville, VA, pp 147–152. https://doi.org/10.1109/SIEDS.2018.8374726

  10. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA 2003:113–127. https://doi.org/10.1109/SNPA.2003.1203362

    Article  Google Scholar 

  11. Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based Internet of Things. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/794326

  12. Farzaneh B, Montazeri MA, Jamali S (2019) An anomaly-based IDS for detecting attacks in RPL-based Internet of Things. In: 5th international conference on web research (ICWR), Tehran, Iran, pp 61–66

    Google Scholar 

  13. Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in rpl-based networks. In: IEEE transactions on network and service management, vol 14, no 2, pp 472–486. https://doi.org/10.1109/TNSM.2017.2705290

  14. Dvir A, Buttyan L (2011) VeRA-version number and rank authentication in RPL. In: IEEE 8th international conference on mobile adhoc and sensor systems (MASS), pp 709–714, 17 Oct 2011

    Google Scholar 

  15. Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusiondetection in the Internet of Things. Ad Hoc Netw 11(8):2661–2674

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Smita Sanjay Ambarkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ambarkar, S.S., Shekokar, N. (2021). Critical and Comparative Analysis of DoS and Version Number Attack in Healthcare IoT System. In: Patil, V.H., Dey, N., N. Mahalle, P., Shafi Pathan, M., Kimbahune, V.V. (eds) Proceeding of First Doctoral Symposium on Natural Computing Research. Lecture Notes in Networks and Systems, vol 169. Springer, Singapore. https://doi.org/10.1007/978-981-33-4073-2_29

Download citation

Publish with us

Policies and ethics