Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 1
Abstract—Internet of Medical Things (IoMT) is an application- proper and timely medication facilities to each individual
specific extension of the generalized Internet of Things (IoT) to (patient), which is possible only if IoT is utilized effectively in
ensure reliable communication among devices Ci , designed for the medical industry [1], [2]. Therefore, the Internet of Medical
the medical industry. However, a challenging issue associated
with these networks, i.e., IoMT and IoT, is to ensure the au- Things (IoMT), a specialized branch of IoT dedicated to the
thenticity of both source and destination modules and further medical industry, is developed to ensure proper medication
guarantee the integrity of the multimodal data the emergencies facility availability in general and particularly in emergencies
such as the COVID-19 pandemic. Various mechanisms for device such as the COVID-19 pandemic. In the IoMT-enabled medical
authentication have been presented in the literature to resolve facility, smart and miniature but intelligent sensing devices Ci
both devices and data’s authenticity, integrity, and privacy. Still,
authentication of mobile device-to-server (in both homogeneous capable of collecting data and transmitting it over a distance
and heterogeneous IoMT) is not explicitly addressed for the black- are implanted in the human body or placed on or around
hole attack. In this paper, a device-to-server and vice versa mutual the human body (preferably according to disease symptoms).
authentication scheme are presented to ensure secure communi- Doctors can monitor a patient’s health status, particularly from
cation sessions among numerous mobile devices Ci and server a disease perspective [3]. Furthermore, the IoMT should play
Sj in the operational IoMT. The proposed scheme is a hybrid of
Medium Access Control (MAC) and enhanced on-demand vector a vital role in detecting various diseases as ECG signals,
(EAODV)-enabled routing schemes. In the proposed scheme, an skin resistance, and EEG signals. In emergencies such as the
offline phase is introduced to complete the registration process COVID-19 pandemic, IoMT should be focused on detecting
of member devices with the concerned server module. It blocks affected patients (preferably based on main symptoms) and
every possible entry of the potential intruder devices Ak in the tracing their origin based on data collected through intelligent
operational IoMT. A mobile device, Ci , interested in initiating a
communication session with a particular Server Sj , is needed to sensors. Generally, in the IoMT, communication between smart
pass the mutual authentication process. As a result, only registered devices (both doctors and patients) is carried out on open access
devices Ci are allowed to communicate. Additionally, a reliable network [4]. Therefore, these systems are highly susceptible
encryption and decryption scheme is used to ensure data reliability to numerous potential attacks, i.e., intruder, insider malicious,
during these communication sessions. Simulation results verify the privacy protection, and perfect secrecy [5]. Additionally, a
exceptional performance of the proposed mutual authentication
scheme in terms of authenticity, security, and integrity of both communication mechanism is designed to ensure reliable com-
devices and data in the operational IoMT. munication among authentic devices without compromising
numerous performance metrics such as average packet delivery,
Index Terms—IoMT, IoT, COVID-19, Authentication, Privacy,
Security. end-to-end delay, and throughput of the operational IoMT
networks.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 2
was presented. However, both patient and doctor use TMIS for in the three-factor-enabled mutual authentication scheme, an
establishing secure communication sessions over the Internet extended version of the original approach is proposed by Wang
[9]–[11]. TMIS facilitates patients by providing an in-door et al. [7] where hashing function and fuzzy extractor are used
(home) treatment environment. Similarly, bio-hash function instead of bilinear pairing. In addition to these approaches, a
and ECC are integrated by Kumari et al. [12] to develop a biometric identification system-enabled remote user authenti-
secure authentication system for the medical industry. However, cation scheme was designed for the resource-limited networks
known-key and critical impersonation attacks are among the where fuzzy extractors and ECC are used together to ensure
main issues associated with this scheme. In [13], a trust-enabled the authenticity of the source and destination devices [8].
and extended ad-hoc on-demand distance vector (EAODV)- Although this scheme was prune against numerous possible
based security scheme is presented. It resolves the black- intruder attacks, it could not resolve various situations such
hole issue with the resources constraint networks. Likewise, as invalid password problems. A three factors-enabled user
numerous authentication mechanisms have been proposed to authentication scheme was developed for the Telecare Medical
ensure secure communication sessions among various devices Information System (TMIS), which was explicitly focused on
in the operational IoT [11], [13], [15], [16], [18]. Although the anonymity of both doctors and patients in the operation
these mechanisms have resolved devices Ci authenticity issue networks [6]. Likewise, Gope et al. [11] have proposed a
in the operational IoT, they incur higher communication and secure, anonymous authentication scheme to ensure secure
processing cost. Therefore, a lightweight and efficient mutual data access in the wireless sensor networks. Furthermore, an
authentication scheme is needed to be developed for the IoMT. unknown authentic mechanism for body area networks was
In this paper, a lightweight mutual authentication scheme is presented to enable secure communication sessions among
presented. The proposed scheme ensures secure communication numerous authentic devices [9]. Similarly, bio-hash function
sessions between a server and static/mobile devices. The main and ECC are integrated by Kumari et al. [12] to develop a
contribution of this research work are secure authentication system for the medical industry.
1) A lightweight mutual authentication scheme for the IoMT Additionally, AODV based authentication approaches were
where mobility of member devices is supported to mimic presented to establish a secure communication session between
the hospitals’ actual operational environment. source & destination modules in the IoT and WSNs [17], [18].
2) A reliable communication or routing mechanism to en- A trusted model-enabled authenticity mechanism was presented
sure communication among member devices Ci and to resolve a scenario where a member device is captured and
servers Sj . intruder device Ak pretended as a legitimate device [19]. A
3) MAC and EAODV scheme enabled hybrid communica- forge-enabled mutual authentication and routing approach was
tion approach for the IoMT. developed to resolve various issues associated with the original
4) Smart health monitoring system with embedded secure AODV based approach [20]–[22]. In this work, the fake route
device-to-server communication in the IoMT. requests RREQ messages identified intruders in closed proxim-
The remaining manuscript is organized as follows. In sub- ity. Similarly, a behavior-based routing scheme with embedded
sequent section II, a comprehensive review of literature is security measures was developed where un-usual responses
presented. In section III, a detailed description of the proposed identify intruder devices [23]. A neighborhood node activity-
device-mutual authentication mechanism is shown, and an based authentication scheme was developed where member
informal security analysis of the proposed scheme is presented. devices store vicinity data, i.e., PREQ, MAC, PREP, and
In section V, implementation and numerous findings of the security keys [24]. Similarly, a baited-enabled authentication
proposed and existing models in terms of various performance approach was developed to resolve the black-hole issue [25].
metrics are presented. Finally, future directions and concluding In this work, a 5 usec bait timer is used by member devices
remarks are given. Ci to misguide the intruder devices. Although these models
have resolved some of the issues, complexity and application
II. R EVIEW OF L ITERATURE specificity are the closely linked problems with these models.
In IoMT, doctors can store and retrieve data about patients
using public or private networks. In these circumstances, secure III. P ROPOSED M UTUAL AUTHENTICATION A PPROACH
establishment and authentication schemes are recommended Before initiating a proper communication session, the au-
to secure the exchange of data from potential attackers or thenticity of devices Ci & Servers Sj is needed to be checked
intruders. Various authentication and security approaches were and verified in the operational IoMT to resolve the black-hole
presented in the literature to address these issues explicitly for issue. It is achieved by designing a hybrid mutual authentication
resource constraint networks such as IoT and IoMT. scheme, which utilizes the MAC address of various devices
To resolve authenticity issues associated with multi-server Ci . The EAODV-enabled approach is used to form a reliable
environment, a three-factors-based mutual authentication mech- mutual authentication scheme for the IoMT to guarantee the
anism was proposed by Amin et al. [15], which enables those authentication of the mobile devices Ci to the concerned
frameworks to establish secure communication sessions. For server or cluster head (CH) Sj . To ensure authenticity, every
this purpose, a bilinear pairing mechanism was implemented. device Ci ∈ IoM T is bounded to verify its status to the
However, vulnerability to various intruder attacks such as of- concerned server Sj . A device Ci is considered authentic if
fline guess and key impersonation are among the primary issue its MAC address is registered with a server Sj . It should
associated with this approach. To enhanced security and privacy be a proper member device of a particular server or sink
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 3
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 4
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 5
are located. In that case, Ci is identified as intrude device Ak successfully and TP RES is the time for the proper acknowl-
and its request is denied by Sj+1 . edgment message. Both TP REQ and TP RES metrics are used
Theorem-1: A device-to-server Ci − Sj is possible if and by legitimate devices Ci and server module Sj to separate
only if Ci is a legitimate device. responses of numerous malicious devices Ak . In scenarios
Proof: Suppose an intruder device Ak pretends itself a le- where either the PREQ or PREP message of the requesting
gitimate device Ci and sends a request message (PREQ) to device Ci is lost, the communication session is needed to be
establish a communication session with the concerned server re-initiated using a similar procedure as described above.
Sj . Furthermore, if we assume that this intruder device Ak also
knows the encryption mechanism used by legitimate devices Ci
to encrypt the PREQ message. The concerned server Sj will Theorem-2: A server module Sj will process a request iff
allow the requesting device Ak to start this session iff it is an the request is authentic, i.e., requesting device Ci is authentic.
authentic device Ci . It is possible only if the MAC address Proof: Suppose the PREQ message of device Ci is an authentic
of this intruder device Ak is listed as a registered device. request, is intercepted by an intruder Ak . The Ak is deployed
However, in this case, the MAC of the source device, intruder in the vicinity of the source device Ci and the concerned
device Ak , does not have an associated matched value, and it server Sj . Furthermore, suppose Ak pretended as then con-
is identified as an intruder device Ak . Therefore, the concerned cerned server Sj . In that case, Ak is bounded to generate an
Sj adds MAC of the source device Ak to the blacklisted acknowledgment message, RREQ in this case, and send it to
class and sends a ciphertext to the neighboring devices Ci that the requesting device Ci . However, the requesting device Ci
Ak is an intruder device. Therefore, permission to initiate a will identify it as a malicious packet as this message will not
communication session is denied. Conversely, if the concerned be received within the defined time interval. A back-off time
device Ci is a member device and sends a PREQ message CRT T i , which Ci stored during the offline phase. Due to the
to the concerned server Sj . The concerned server module Sj limited processing capability of these devices, it is tough for
matches the MAC of the device Ci , which is requested, with an intruder device Ak to pretend itself as the concerned server.
the already stored MAC (carried out in an offline phase). A If somehow Ak generates a similar response, but it will rarely
match is encountered in this case as the source device Ci is be able to send this response within the defined stipulated time
a legitimate device, and its MAC should be there with the interval that is CRT T i in this case. Additionally, if the response
concerned Sj module. Once a device is verified, a ciphertext from a particular device Ci is intercepted by Ak and forward
is sent to it by the concerned server Sj where permission to a modified version to the intended server Sj . The concerned
initiate a communication session is granted. Hence, a request Sj will reject it as it will be delivered within the defined time
to establish a proper communication session is processed iff frame due to the unusual transmission delay. Conversely, if the
the requesting device Ci is a legitimate device. request of authenticity (PREQ) of device Ci is processed by
server Sj then acknowledgment packet(PRES) will be received
D. Phase-IV: Communication Phase by the requesting device Ci within the defined time interval,
In this phase, a detailed description of the proposed com- i.e., CRT T i .
munication approach is presented. Every device Ci should be Hence, a legitimate server module Sj can process the authen-
associated with a server Sj . If the requesting device Ci is tication request of Ci .
authentic, it can establish a communication session with the
intended server Sj . If an authentic device Ci moves from the
existing server Sj to another server Sj+1 , then the authenticity Additionally, the proposed dynamic mutual authentication
process is repeated. During offline phases, the registration and scheme bound every operational device Ci and server Sj
membership of every legitimate device Ci are confirmed and to use a 48-bits MAC addressing scheme for registration.
minimizes the entrance probability of the intruder device Ak in The registration process is performed in the offline phase as
the operational IoMT networks. It is because intruder devices described above. The MAC address of every device is listed
Ak initiates their task as soon as the underlined IoMT net- with every server Sj . Therefore, the probability that an intruder
work becomes operational. Moreover, the registration process device Ak will bypass this is negligible. It is because both
of all devices Ci is completed before the network becomes server Sj and Ci confirm the authenticity of the requesting
operational. Therefore, it is tough for an intruder device Ak devices before permitting it to start a good communication
to mimic a member device and initiate proper communication session. Furthermore, if a device Ci moves from the domain of
with any server module Sj in the operational IoMT. one server Sj to another server S − j + 1, then its authenticity
The proposed scheme bound every device Ci and server Sj is re-checked by the concerned server, i.e., S − j + 1 in this
to set a time-frame in which it will be able to receive a response case. Lastly, suppose a requesting device Ci is identified as
RREQ message from each other. In the proposed approach, the an adversary device. In that case, it is added to the blacklist
waiting time of every device is equal to the round trip time class, and neighboring devices Ci are information about it.
(RTT) of devices that are currently communicating. The RTT As described above, both the requesting device Ci and server
is computed using Equ 4. modules Sj are bounded to transmit encrypted versions of their
messages to ensure secure and reliable communication sessions.
CRT T i = TP REQ + TP RES (4) For this purpose, the ECDDHP encryption scheme is used by
where TP REQ is defined as the time needed for a particular both source and destination modules in the proposed mutual
P REQ message to reach its intended destination module authentication scheme for the IoMT.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 6
Algorithm 1 Proposed Dynamic Mutual Authentication Algo- have a defined time interval during which successful delivery
rithm for Internet of Medical Things of the message is expected that is defined in the offline phase.
Require: Device Ci Request to establish a Communication (v) The proposed device authenticity mechanism is prone
Session against perfect forward, and backward secrecy attacks as the
Ensure: Permission Granted or Denied (Blacklisted) successful forwarding probability of the intruder device Ak
1: ClassReg ← Zero (to the concerned device and server) is significantly less. A
2: ClassM em ← Zero comprehensive analysis of the proposed device authenticity and
3: M sgenc ← ”null” existing models (concerning various possible intruder attacks)
4: ClassBlacklist ← Zero is presented in Table I.
5: Ci ← Devices in IoMT
6: Sj ← Server or Sinks in IoMT V. S IMULATION R ESULTS AND E VALUATION OF THE
7: for every Ci ∈ IoM T do P ERFORMANCE
8: Send M sgenc to Server Sj
9: if MAC (Ci ∈ ClassReg &ClassM em ) then In this section, a brief description of numerous performance
10: Ci is an authentic device metrics is presented to evaluate the performance of the pro-
11: Permit to initiate a communication session posed mutual authentication and field-proven algorithms using
12: elseif MAC address (Ci ∈ ClassReg ∈ / ClassM em ) different IoMT. For this purpose, these algorithms were imple-
then mented in OMNET++ using similar topological infrastructures
13: Ci is an authentic device i.e., same (i) number of devices Ci (ii) server(s) Sj and
14: Add Ci to ClassM em (iii) intruder device(s) Ak . These algorithms were evaluated
15: Permit to initiate a communication session extensively in terms of various performance metrics in the
16: elseif MAC address (Ci ∈ / ClassReg ∈/ ClassM em ) operational IoMT environment, such as communication cost,
then processing cost, average throughput, APDR, average end-to-
17: Ci is an intruder device end delay. At the start, random topologies with embedded
18: return Ci as intruder device delay (transmission and propagation) are used to mimic the
19: Ci is aided to class ClassBlacklist actual deployment process of the IoMT. Additionally, path loss
20: end-if ratio, propagation delay, and neighboring device interference
21: end-for are assumed to be constant in the operational IoMT as metrics
22: return Authentic and BlackListed Devices are beyond the proposed scheme scope. Numerous parameters
which are used in the simulation setup are presented in Table
II. To comply with the real deployment of the IoMT, standard
IV. S ECURITY A NALYSIS battery powers are used, such as Libelium Corporation.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 7
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 8
15000
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 9
[4] Q. Chen, M. Li, X. Yang, R. Alturki, Ryan, MD. and Alshehri, F. Khan, [27] M. R. Hasan, Y. Zhao, Y. Luo, G. Wang, and R. M. Winter, “An effective
Fazlullah “Impact of Residual Hardware Impairment on the IoT Secrecy aodv-based flooding detection and prevention for smart meter network,”
Performance of RIS-Assisted NOMA Networks,” IEEE Access, vol. 9, no. 4, Procedia Computer Science, vol. 129, pp. 454–460, 2018.
pp. 42583–42592, 2021. [28] A. Gupta, M. Tripathi, T. J. Shaikh, and A. Sharma, “A lightweight
[5] M. N. Aman, M. H. Basheer, and B. Sikdar, “A lightweight protocol for anonymous user authentication and key establishment scheme for wearable
secure data provenance in the internet of things using wireless fingerprints,” devices,” Computer Networks, vol. 149, pp. 29–42, 2019.
IEEE Systems Journal, 2020.
[6] F. Khan, A. U. Rehman, Z. Yanliang, S. Mastorakis, H. Song, M. A. Jan,
and K. Dev, “A Secured and Reliable Continuous Transmission scheme
in Cognitive HARQ-aided Internet of Things,’ ’ IEEE Internet of Things
Journal, Early Access, 2021.
[7] C. Wang, X. Zhang, and Z. Zheng, “Cryptanalysis and improvement of
a biometric-based multi-server authentication and key agreement scheme,”
Plos one, vol. 11, no. 2, p. e0149173, 2016.
[8] D. He and D. Wang, “Robust biometrics-based authentication scheme for
multiserver environment,” IEEE Systems Journal, vol. 9, no. 3, pp. 816–823,
2014.
[9] D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication
for wireless body area networks with provable security,” IEEE Systems
Journal, vol. 11, no. 4, pp. 2590–2601, 2016.
[10] D. Giri, R. S. Sherratt, T. Maitra, and R. Amin, “Efficient biometric
and password based mutual authentication for consumer usb mass storage
devices,” IEEE Transactions on Consumer Electronics, vol. 61, no. 4, pp.
491–499, 2015.
[11] F. Khan, M. A. Jan, A. U. Rehman, S. Mastorakis, M. Alazab, and
P. Watters, “A Secured and Intelligent Communication Scheme for IIoT-
enabled Pervasive Edge Computing.” IEEE Transactions on Industrial
Informatics, Early Access, 2021.
[12] M.A. Jan, F. Khan, R. Khan, S. Mastorakis, V.G. Menon, P. Watters, and
M. Alazab, “A Lightweight Mutual Authentication and Privacy-preservation
Scheme for Intelligent Wearable Devices in Industrial-CPS,” IEEE Trans-
actions on Industrial Informatics, Early Access, 2021.
[13] Q. M. Yaseen and M. Aldwairi, “An enhanced aodv protocol for avoiding
black holes in manet,” Procedia Computer Science, vol. 134, pp. 371–376,
2018.
[14] A. M. Makhlouf and M. Guizani, “Se-aomdv: secure and efficient aomdv
routing protocol for vehicular communications,” International Journal of
Information Security, vol. 18, no. 5, pp. 665–676, 2019.
[15] R. Amin and G. Biswas, “A secure light weight scheme for user
authentication and key agreement in multi-gateway based wireless sensor
networks,” Ad Hoc Networks, vol. 36, pp. 58–80, 2016.
[16] J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multi-layer
authentication protocol for wireless body area networks,” Future Generation
Computer Systems, vol. 78, pp. 956–963, 2018.
[17] M. A. Abdelshafy and P. J. King, “Aodv and saodv under attack:
Performance comparison,” in International Conference on Ad-Hoc Networks
and Wireless. Springer, 2014, pp. 318–331.
[18] A. M. Makhlouf and M. Guizani, “Se-aomdv: secure and efficient aomdv
routing protocol for vehicular communications,” International Journal of
Information Security, pp. 1–12, 2019.
[19] Y. Liu, M. Dong, K. Ota, and A. Liu, “Activetrust: Secure and trustable
routing in wireless sensor networks,” IEEE Transactions on Information
Forensics and Security, vol. 11, no. 9, pp. 2013–2027, 2016.
[20] M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM
SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3,
pp. 106–107, 2002.
[21] M.D. Alshehri, F.K. Hussain, O.K. Hussain, “Clustering-driven intel-
ligent trust management methodology for the internet of things” Mobile
networks and applications, vol. 23, no. 3, pp. 419–431, 2018, Springer
[22] T. Delkesh and M. A. J. Jamali, “Eaodv: detection and removal of multiple
black hole attacks through sending forged packets in manets,” Journal of
Ambient Intelligence and Humanized Computing, vol. 10, no. 5, pp. 1897–
1914, 2019.
[23] S. Shahabi, M. Ghazvini, and M. Bakhtiarian, “A modified algorithm
to improve security and performance of aodv protocol against black hole
attack,” Wireless Networks, vol. 22, no. 5, pp. 1505–1511, 2016.
[24] P. Ndajah, A. O. Matine, and M. N. Hounkonnou, “Black hole attack
prevention in wireless peer-to-peer networks: A new strategy,” International
Journal of Wireless Information Networks, vol. 26, no. 1, pp. 48–60, 2019.
[25] A. Yasin and M. Abu Zant, “Detecting and isolating black-hole attacks in
manet using timer based baited technique,” Wireless Communications and
Mobile Computing, vol. 2018, 2018.
[26] R. K. Bar, J. K. Mandal, and M. M. Singh, “Qos of manet through trust
based aodv routing protocol by exclusion of black hole attack,” Procedia
Technology, vol. 10, pp. 530–537, 2013.
2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.