2020 IEEE Conference on Communications and Network Security (CNS) 2020
DOI: 10.1109/cns48642.2020.9162325
|View full text |Cite
|
Sign up to set email alerts
|

ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks

Abstract: Wireless Medical Sensor Networks (WMSN) will play a significant role in the advancements of modern healthcare applications. Security concerns are still the main obstacle to the widespread adoption of this technology. Conventional security approaches, such as authentication and encryption, are able to defend against external attacks effectively. However, internally launched threats, either by compromised or selfish nodes, require further security measures to be detected. In this paper, an Effective Trend-Aware … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The traditional updating mechanism uses a single weight exponential smoothing technique, which fails to reflect any sudden malicious behavior fast because the evaluated reputation value represents the long-term expected value of the probability distribution. Therefore, it needs more time to detect any malicious behavior [9]. This drawback may be exploited by a smart adversary to launch complicated attacks such as on-off attacks.…”
Section: The Proposed Methods For In-body Snsmentioning
confidence: 99%
See 2 more Smart Citations
“…The traditional updating mechanism uses a single weight exponential smoothing technique, which fails to reflect any sudden malicious behavior fast because the evaluated reputation value represents the long-term expected value of the probability distribution. Therefore, it needs more time to detect any malicious behavior [9]. This drawback may be exploited by a smart adversary to launch complicated attacks such as on-off attacks.…”
Section: The Proposed Methods For In-body Snsmentioning
confidence: 99%
“…In [9], we have introduced a novel updating mechanism to allow fast detection of any behavior change. Although the proposed method shows prompt reaction to any sudden behavior change, smart adversaries can take advantage of the model dynamicity to launch complicated on-off attacks.…”
Section: The Proposed Methods For In-body Snsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Sinkhole Attack: The malicious or the compromised node attempts to attract all the traffic inside the WBAN and then drop it [41]. The adversary can run this kind of attack by sending fake routing updates showing itself as the shortest path to the medical server.…”
Section: Attacks On Service Availabilitymentioning
confidence: 99%
“…The first method LTMS(1), is a lightweight method used for inbody sensor nodes (SNs) as those SNs suffer from a stringent resource limitation, while LTMS(2) provides a further level of protection from on-off attacks and is designed for on-and off-body sensor nodes. Both LTMS(1) and LTMS(2) method are combined in algorithm 1, where α and β are the beta probability distribution levels, b t and d t are the slopes at the time unit t, Rep ij (t) is the reputation value maintained by the trustor i for the trustee j, thr1 is the defined threshold to differentiate between trustworthy and untrustworthy agents, which is usually set to 0.5 in the literature [17]- [20], thr2 represents the minimum trustworthiness for agents in normal operation and is set to 0.85 [18], ShRep ij (t) represents the short-term reputation value at the time unit t, and cycle and malicious are two parameters used to detect on-off attacks.…”
Section: Trust Module Implementationmentioning
confidence: 99%