Abstract
Recently the entire world is witnessing the pandemic outbreak of COVID 19, which creates havoc in the healthcare industry. Error tolerance may lead to death threats for the patient in the healthcare system. However, practically the healthcare industry faces many manual error incidences, inadequate staffing, aging population, etc. These challenges will increase the stress level and disturbs the psychological as well as physical health of the healthcare practitioner. Internet of things (IoT) technique is adept to tackle such outbreaks by providing complete digitization of healthcare systems. However, IoT application deployment comes with many security threats and attacks challenges. Here it is worth mentioning that to implement a robust security solution, the comprehensive analysis of attack must carry out. This paper contributes by analyzing two preeminent attacks, the Denial of service (DoS) and version Number attack on the healthcare system. DoS rapidly destroy the network whereas version number haltingly takes control of the network. The paper further critically analyzes the performance and severity of these two attacks based on discrete parameters like routing metric, power consumption, number of packets received, number of expected transmissions, beacon interval, and proposes the robust solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kushalnagar N, Montenegro G, Schumacher C (2016) IPv6 over low-power wireless personal area networks (6LoWPANs (Online). Available https://tools.ietf.org/html/rfc4919
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL- based Internet of Things. Int J Netw Secur 18(3):459–473
Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based Internet of Things. Int J Distrib Sens Netw, Sage, pp 1–11
Dhumane A, Prasad R, Prasad J (2016) Routing issues in Internet of Things: a surve. In: Proceedings of the international multi conference of engineers and computer scientists, pp 16–18, Mar 2016
Ambarkar SS, Shekokar N (2020) Toward smart and secure IoT based healthcare system. In: Dey N, Mahalle P, Shafi P, Kimabahune V, Hassanien A (eds) Studies in systems, decision and control Internet of Things, smart computing and technology: a roadmap ahead, vol 266, Springer, Cham
Mangla M, Akhare R, Ambarkar S (2019) Context-aware automation based energy conservation techniques for IoT ecosystem. In: Mittal M, Tanwar S, Agarwal B, Goyal L (eds) Studies in systems, decision and control energy conservation for IoT devices, vol 206, Springer, Singapore
Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: International conference on emerging trends and innovation in ICT (ICEI), Pune, pp 33–39
Fatima A, Colomo-Palacios R (2018) Security aspects in healthcare information systems: A systematic mapping. Procedia Comput Sci 138:12–19. ISSN 1877-0509
Bradley C, El-Tawab S, Heydari MH (2018) Security analysis of an IoT system used for indoor localization in healthcare facilities. Syst Inf Eng Des Symp (SIEDS), Charlottesville, VA, pp 147–152. https://doi.org/10.1109/SIEDS.2018.8374726
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA 2003:113–127. https://doi.org/10.1109/SNPA.2003.1203362
Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based Internet of Things. Int J Distrib Sens Netw. https://doi.org/10.1155/2013/794326
Farzaneh B, Montazeri MA, Jamali S (2019) An anomaly-based IDS for detecting attacks in RPL-based Internet of Things. In: 5th international conference on web research (ICWR), Tehran, Iran, pp 61–66
Mayzaud A, Badonnel R, Chrisment I (2017) A distributed monitoring strategy for detecting version number attacks in rpl-based networks. In: IEEE transactions on network and service management, vol 14, no 2, pp 472–486. https://doi.org/10.1109/TNSM.2017.2705290
Dvir A, Buttyan L (2011) VeRA-version number and rank authentication in RPL. In: IEEE 8th international conference on mobile adhoc and sensor systems (MASS), pp 709–714, 17 Oct 2011
Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusiondetection in the Internet of Things. Ad Hoc Netw 11(8):2661–2674
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ambarkar, S.S., Shekokar, N. (2021). Critical and Comparative Analysis of DoS and Version Number Attack in Healthcare IoT System. In: Patil, V.H., Dey, N., N. Mahalle, P., Shafi Pathan, M., Kimbahune, V.V. (eds) Proceeding of First Doctoral Symposium on Natural Computing Research. Lecture Notes in Networks and Systems, vol 169. Springer, Singapore. https://doi.org/10.1007/978-981-33-4073-2_29
Download citation
DOI: https://doi.org/10.1007/978-981-33-4073-2_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4072-5
Online ISBN: 978-981-33-4073-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)