You are on page 1of 9

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 1

Mutual Authentication Scheme for the


Device-to-Server Communication in the Internet of
Medical Things
Jiangfeng Sun, Member, IEEE, Fazlullah Khan, Senior Member, IEEE, Junxia Li∗ , Member, IEEE, Mohammad
Dahman Alshehri, Member, IEEE, Ryan Alturki, Member, IEEE, and Mohammad Wedyan , Member, IEEE.

Abstract—Internet of Medical Things (IoMT) is an application- proper and timely medication facilities to each individual
specific extension of the generalized Internet of Things (IoT) to (patient), which is possible only if IoT is utilized effectively in
ensure reliable communication among devices Ci , designed for the medical industry [1], [2]. Therefore, the Internet of Medical
the medical industry. However, a challenging issue associated
with these networks, i.e., IoMT and IoT, is to ensure the au- Things (IoMT), a specialized branch of IoT dedicated to the
thenticity of both source and destination modules and further medical industry, is developed to ensure proper medication
guarantee the integrity of the multimodal data the emergencies facility availability in general and particularly in emergencies
such as the COVID-19 pandemic. Various mechanisms for device such as the COVID-19 pandemic. In the IoMT-enabled medical
authentication have been presented in the literature to resolve facility, smart and miniature but intelligent sensing devices Ci
both devices and data’s authenticity, integrity, and privacy. Still,
authentication of mobile device-to-server (in both homogeneous capable of collecting data and transmitting it over a distance
and heterogeneous IoMT) is not explicitly addressed for the black- are implanted in the human body or placed on or around
hole attack. In this paper, a device-to-server and vice versa mutual the human body (preferably according to disease symptoms).
authentication scheme are presented to ensure secure communi- Doctors can monitor a patient’s health status, particularly from
cation sessions among numerous mobile devices Ci and server a disease perspective [3]. Furthermore, the IoMT should play
Sj in the operational IoMT. The proposed scheme is a hybrid of
Medium Access Control (MAC) and enhanced on-demand vector a vital role in detecting various diseases as ECG signals,
(EAODV)-enabled routing schemes. In the proposed scheme, an skin resistance, and EEG signals. In emergencies such as the
offline phase is introduced to complete the registration process COVID-19 pandemic, IoMT should be focused on detecting
of member devices with the concerned server module. It blocks affected patients (preferably based on main symptoms) and
every possible entry of the potential intruder devices Ak in the tracing their origin based on data collected through intelligent
operational IoMT. A mobile device, Ci , interested in initiating a
communication session with a particular Server Sj , is needed to sensors. Generally, in the IoMT, communication between smart
pass the mutual authentication process. As a result, only registered devices (both doctors and patients) is carried out on open access
devices Ci are allowed to communicate. Additionally, a reliable network [4]. Therefore, these systems are highly susceptible
encryption and decryption scheme is used to ensure data reliability to numerous potential attacks, i.e., intruder, insider malicious,
during these communication sessions. Simulation results verify the privacy protection, and perfect secrecy [5]. Additionally, a
exceptional performance of the proposed mutual authentication
scheme in terms of authenticity, security, and integrity of both communication mechanism is designed to ensure reliable com-
devices and data in the operational IoMT. munication among authentic devices without compromising
numerous performance metrics such as average packet delivery,
Index Terms—IoMT, IoT, COVID-19, Authentication, Privacy,
Security. end-to-end delay, and throughput of the operational IoMT
networks.

I. I NTRODUCTION To resolve the issues mentioned above and develop a secure


IoMT numerous authentication and privacy schemes were pre-
The Internet of Things (IoT) is used to facilitate human sented in the literature designed to ensure the security of data
beings in improving the life stander of people worldwide by and member devices Ci . A three-factors-enabled authentication
periodically monitoring various activities. It should provide scheme is introduced to ensure the secure establishment of
session communication sessions in a multi-server environ-
J. Sun is College of Computer Science and Technology, Henan Polytechnic
University, Jiaozuo 454000, China ment based on bilinear pairing [6]. However, this approach
F. Khan is with the Department of Computer Science, Abdul Wali Khan is vulnerable to various attacks such as offline guess and
University Mardan, KPK, 23200, Pakistan key impersonation. An extended version of the three-factor-
J. Li is with the School of Physics and Electronic Information Engineering,
Henan Polytechnic University Jiaozuo 454000, China enable scheme was proposed by Wang et al. [7]. They utilized
M. Alshehri is with the Department of Computer Science, College of hashing function and fuzzy extractor to form a robust authen-
Computers and Information Technology, Taif University, 11099, Taif, Saudi tication scheme. Likewise, a biometric identification system-
Arabia
R. Alturki is with the Department of Information Science, College of based remote user authentication scheme was designed based
Computer and Information Systems, Umm Al-Qura University, Makkah, Saudi on fuzzy extractors, and ECC [8]. Although this scheme was
Arabia prune against numerous possible attacks, it was unable to
M. Wedyan is with the Faculty of Artificial Intelligence, Al-Balqa Applied
University, Jordan. deduce invalid password problems. A mutual authentication
∗ shows corresponding author. scheme for the Telecare Medical Information System (TMIS)

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 2

was presented. However, both patient and doctor use TMIS for in the three-factor-enabled mutual authentication scheme, an
establishing secure communication sessions over the Internet extended version of the original approach is proposed by Wang
[9]–[11]. TMIS facilitates patients by providing an in-door et al. [7] where hashing function and fuzzy extractor are used
(home) treatment environment. Similarly, bio-hash function instead of bilinear pairing. In addition to these approaches, a
and ECC are integrated by Kumari et al. [12] to develop a biometric identification system-enabled remote user authenti-
secure authentication system for the medical industry. However, cation scheme was designed for the resource-limited networks
known-key and critical impersonation attacks are among the where fuzzy extractors and ECC are used together to ensure
main issues associated with this scheme. In [13], a trust-enabled the authenticity of the source and destination devices [8].
and extended ad-hoc on-demand distance vector (EAODV)- Although this scheme was prune against numerous possible
based security scheme is presented. It resolves the black- intruder attacks, it could not resolve various situations such
hole issue with the resources constraint networks. Likewise, as invalid password problems. A three factors-enabled user
numerous authentication mechanisms have been proposed to authentication scheme was developed for the Telecare Medical
ensure secure communication sessions among various devices Information System (TMIS), which was explicitly focused on
in the operational IoT [11], [13], [15], [16], [18]. Although the anonymity of both doctors and patients in the operation
these mechanisms have resolved devices Ci authenticity issue networks [6]. Likewise, Gope et al. [11] have proposed a
in the operational IoT, they incur higher communication and secure, anonymous authentication scheme to ensure secure
processing cost. Therefore, a lightweight and efficient mutual data access in the wireless sensor networks. Furthermore, an
authentication scheme is needed to be developed for the IoMT. unknown authentic mechanism for body area networks was
In this paper, a lightweight mutual authentication scheme is presented to enable secure communication sessions among
presented. The proposed scheme ensures secure communication numerous authentic devices [9]. Similarly, bio-hash function
sessions between a server and static/mobile devices. The main and ECC are integrated by Kumari et al. [12] to develop a
contribution of this research work are secure authentication system for the medical industry.
1) A lightweight mutual authentication scheme for the IoMT Additionally, AODV based authentication approaches were
where mobility of member devices is supported to mimic presented to establish a secure communication session between
the hospitals’ actual operational environment. source & destination modules in the IoT and WSNs [17], [18].
2) A reliable communication or routing mechanism to en- A trusted model-enabled authenticity mechanism was presented
sure communication among member devices Ci and to resolve a scenario where a member device is captured and
servers Sj . intruder device Ak pretended as a legitimate device [19]. A
3) MAC and EAODV scheme enabled hybrid communica- forge-enabled mutual authentication and routing approach was
tion approach for the IoMT. developed to resolve various issues associated with the original
4) Smart health monitoring system with embedded secure AODV based approach [20]–[22]. In this work, the fake route
device-to-server communication in the IoMT. requests RREQ messages identified intruders in closed proxim-
The remaining manuscript is organized as follows. In sub- ity. Similarly, a behavior-based routing scheme with embedded
sequent section II, a comprehensive review of literature is security measures was developed where un-usual responses
presented. In section III, a detailed description of the proposed identify intruder devices [23]. A neighborhood node activity-
device-mutual authentication mechanism is shown, and an based authentication scheme was developed where member
informal security analysis of the proposed scheme is presented. devices store vicinity data, i.e., PREQ, MAC, PREP, and
In section V, implementation and numerous findings of the security keys [24]. Similarly, a baited-enabled authentication
proposed and existing models in terms of various performance approach was developed to resolve the black-hole issue [25].
metrics are presented. Finally, future directions and concluding In this work, a 5 usec bait timer is used by member devices
remarks are given. Ci to misguide the intruder devices. Although these models
have resolved some of the issues, complexity and application
II. R EVIEW OF L ITERATURE specificity are the closely linked problems with these models.
In IoMT, doctors can store and retrieve data about patients
using public or private networks. In these circumstances, secure III. P ROPOSED M UTUAL AUTHENTICATION A PPROACH
establishment and authentication schemes are recommended Before initiating a proper communication session, the au-
to secure the exchange of data from potential attackers or thenticity of devices Ci & Servers Sj is needed to be checked
intruders. Various authentication and security approaches were and verified in the operational IoMT to resolve the black-hole
presented in the literature to address these issues explicitly for issue. It is achieved by designing a hybrid mutual authentication
resource constraint networks such as IoT and IoMT. scheme, which utilizes the MAC address of various devices
To resolve authenticity issues associated with multi-server Ci . The EAODV-enabled approach is used to form a reliable
environment, a three-factors-based mutual authentication mech- mutual authentication scheme for the IoMT to guarantee the
anism was proposed by Amin et al. [15], which enables those authentication of the mobile devices Ci to the concerned
frameworks to establish secure communication sessions. For server or cluster head (CH) Sj . To ensure authenticity, every
this purpose, a bilinear pairing mechanism was implemented. device Ci ∈ IoM T is bounded to verify its status to the
However, vulnerability to various intruder attacks such as of- concerned server Sj . A device Ci is considered authentic if
fline guess and key impersonation are among the primary issue its MAC address is registered with a server Sj . It should
associated with this approach. To enhanced security and privacy be a proper member device of a particular server or sink

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 3

module in the operational IoMT. The device Ci registration


process with the concerned server Sj is carried out in the Off-Line Phase
offline phase, completed before the underlined IoMT networks
Mobile Device Ci Server Module Sj
are operational. To guarantee the authenticity of the operating
device Ci , every server Sj is bounded to store information Ci Generates pkt = MAC ⊕ Sj ⊕ EAODV
about Ci in tables. For example, i.e., (i) registered devices Cipher Text = Et
Server = ECDDHP
(ii) member devices. A device Ci is considered a registered Hashing = h [Sj ⊕ pkt]
Et = h [Sj ⊕ pkt]
device if its MAC address is stored in the registration table of Packet in Cipher Form
Sj . At the same time, this device does not have an entry in h[Sj ⊕ pkt]
the member table of server Sj . In the latter case, the MAC Server Module = Decipher pkt
address of a particular device Ci should be available in both Et = h [Bc ⊕ pkt]
Hash Function = h [Bc ⊕ pkt]
tables of the concerned server Sj . In the proposed approach, Sj = ECDDHP
both registered and member devices can send a request for Palin text (pkt) = [ MAC ⊕ Sj ⊕ EAODV]
Find MAC (Ci) = ARP → [Palin text]
the initiation of a communication session(s). Apart from the Sj = Store MAC of Ci
registered and member devices added in the offline phase, entry Bc = [ MAC ⊕ ds ⊕ EAODV]
Sj = ECDDHP
of other devices Ci or servers Sj is prohibited in the operational Hash Function = h [Bc ⊕ pkt]
IoMT to safeguard it from intruder devices Ak . Therefore, if Et = h [Bc ⊕ Pkt]
Packet in Cipher Form
a legitimate device Ci (which is not registered) or an intruder
h[Bc ⊕ pkt]
device Ak tries to initiate a proper communication session with Encrypted data
a particular server Sj . Their requests are not processed and
Ci = Decipher pkt
denied. The authenticity of the interested device Ci is confirmed Et = h [Bc ⊕ pkt]
by the concerned server Sj where the MAC address of this Hash Function = h [Bc ⊕ Pkt]
Bc = ECDDHP
device Ci is part of both registered and member tables of Sj . Palin text (pkt) = [ MAC ⊕ ds ⊕ EAODV]
The proposed model has three phases, i.e., (i) offline (ii) Device Ci store information of ECDDHP and routes info
Off-Line Phase of Ci completed
Authentication (iii) Operational phases as described below.
Fig. 1: Graphical Representation of the Off-line Phase
A. Phase-I: Off-line Registration Process
In this phase, each device Ci is forced to generate a request this message and add these devices to their registered devices
message (RREQ) and send it to that server module Sj , which table or class as the distance of these devices is greater than
is deployed in its communication range. To further secure this the defined threshold value (δ in this case) according to Equ.
mechanism, every message in the off-line phase is encrypted 2.
with well-known encryption mechanisms: Elliptic-curve Delfi  p
Hellman Problem (ECDDHP). The PREQ message holds the 
 ∀i=0...n Ci ∈ (Sj ) iff (xi − Sj )2 + (yi − Sj+1 )2 > δ

MAC of the intended device Ci . The concerned server module 
 p
Sj decrypt this message and adds the concerned MAC to the list ∃i=0...n Ci ∈ (Sj ) if f (xi − Sj )2 + (yi − Sj+1 )2 == δ

that holds legitimate devices’ addresses. A device Ci is added 


where S represents base station or server module

to both table iff it is deployed in the direct communication
range of the concerned server Sj according to Equ. 1. (2)
 p A graphical representation of the working methodology of

 ∀i=0...n Ci ∈ σ(Ci ) iff (xi − Sj )2 + (yi − Sj+1 )2 < δ the offline phase is shown in Figure. 1. The proposed mutual
authentication scheme allows only member devices Ci to start


 p
∃i=0...n Ci ∈ σ(Ci ) if f (xi − Sj )2 + (yi − Sj+1 )2 == δ communication sessions with the intended server Sj . In other
words, if a device, say C1 , is registered and belongs to S1 , then




where S represents base station or server module it can initiate communication session(s) with S1 only.

(1)
When a server module Sj completes the registration process
of the requesting device Ci , then it is notified with an en- B. Phase-II: Authentication Mechanism
crypted message which confirms its authenticity. Likewise, the In this phase, every device Ci ∈ IoM T should be registered
confirmation message is decrypted by the concerned device with the nearest (preferably distance-based) server Sj . The
Ci and updates its metadata accordingly. Secondly, after the process of device authentication is triggered if a device (either
registration process is completed. Every server module Sj is an intruder Ak or legitimate Ci ) sends an encrypted version of
bounded to share its (in encrypted form) authenticated device the request message (RREQ) to the concerned server module
information with other servers. It is beneficial in scenarios Sj to start communication. Initially, the concerned server Sj
where a member device Ci moves from one server, say Sj , decrypts this PREQ message to retrieve the MAC of source
to another server Sj+1 . To realize this, a message with the device Ci . Then it is compared with every entry available
concerned information (preferably about its member devices in the member device table where devices MAC are stored
Ci ) is generated and encrypted by the concerned server Sj , during the offline phase. The source device Ci is allowed to
which is shared with other servers. These servers Sj+1 decrypt start communication with the intended server. If the MAC of

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 4

this device Ci is matched within the specified table means the


source device Ci is a legitimate device. The server S1 generates
an encrypted version of the route reply message (RREP) and
Device Authentication Phase
sends it to the requesting device C1 . Once this message is
received, the requesting device C1 is allowed to start com- Mobile Device Ci Server Module Sj
munication with the concerned server S1 only. Alternatively,
Ci Generates pkt = MAC ⊕ Sj ⊕ EAODV
suppose the MAC of the source device C1 is not matched with Cipher Text = Et
the available MAC address list. In that case, it is either (i) a Server = ECDDHP
Hashing = h [Sj ⊕ pkt]
legitimate or (ii)an intruder device Ak which is clarified further Et = h [Sj ⊕ pkt]
by matching its MAC in the registered devices table. Suppose Packet in Cipher Form
h[Sj ⊕ pkt]
the MAC of the source device C1 is matched with one of
the MAC addresses available in the registered devices table. Server Module = Decipher pkt
Et = h [Bc ⊕ pkt]
In that case, this message is ignored as a legitimate device Hash Function = h [Bc ⊕ pkt]
must be available in both tables, i.e., registered and member Sj = ECDDHP
Palin text (pkt) = [ MAC ⊕ Sj ⊕ EAODV]
devices table. In case-II, the MAC of the source device does Find MAC (Ci) = ARP → [Palin text]
MAC (Ci) ∈ Registered MAC Table
have associated entries in any of these tables. It is identified Accept pkt = Ci
as an intruder Ak , and an encrypted message is shared by the Bc = [ MAC ⊕ ds ⊕ EAODV]
Sj = ECDDHP
intended server module Sj with every member device which Hash Function = h [Bc ⊕ pkt]
contains information about this intrusion. For example, suppose Et = h [Bc ⊕ Pkt]
Packet in Cipher Form
a device, say C1 , is interested in initiating a transmission
session with the concerned server, saying S1 . In that case, it h[Bc ⊕ pkt]
Encrypted data
sends a request message to its intended server module. The Ci = Decipher pkt
concerned server module S1 initially checks the authenticity Et = h [Bc ⊕ pkt]
Hash Function = h [Bc ⊕ Pkt]
of the requesting device C1 by searching the requesting device Bc = ECDDHP
C1 MAD address. If MAC of the source device C1 is found, Palin text (pkt) = [ MAC ⊕ ds ⊕ EAODV]
Ci stores Acknowledgment information
then it is a legitimate device. Otherwise, it is declared as an Authentication Phase of Ci is completed
intruder device Ak . If a device, say Ak , is identified as an
intruder, then its MAC is placed in the blacklist class of the Fig. 2: Graphical Representation of a Legitimate Device-to-
concerned server S1 . A graphical representation of the proposed Server Request and Response Mechanism in the IoMT
mutual authentication scheme authentication phase is described
in Figure 2.

C. Phase-III: Mobility of Member Devices


Mobility of numerous devices Ci is supported in the pro-
Intruder Device Authentication Phase
posed mutual authentication scheme to mimic the basic envi-
ronmental infrastructure of the IoMT as devices or sensors Ci Intruder Device Ak Server Module Sj
are needed to be attached with the patients. In the proposed ap- Ak Generates Packet = (Sj ⊕ 48 bits MAC ⊕ EAODV)
proach, if a device Ci moves from the communication range of Cipher Text = Et
Server = ECDDHP
the concerned server Sj and enters into the domain of another Hash Function = H (Sj ⊕ Pkt)
sever Sj+1 then Ci should inform the concerned server Sj via Et = H (Sj ⊕ Pkt)
Encrypted packet
an encrypted message, PREQ message in this case, before its H (Sj ⊕ Pkt)
movement. The concerned server Sj cancels membership of Encrypted packet
the requesting device Ci by deleting its MAC address from the Server Module = Decrypt Received Packet
member devices table. Once this device Ci reaches its intended Et = H (Bc ⊕ Pkt)
Hash Function = H (Bc ⊕ Pkt)
destination, then it sends an encrypted PREQ message, which Sj = ECDDHP
contains its MAC address and a membership request, to server Palin text (Pkt) = ( Sj ⊕ 48 bits MAC ⊕ EAODV)
Find MAC (Ak) = ARP → (Palin text)
Sj+1 that should be deployed in the wireless communication MAC(Ak) ∉ Registered MAC Table
range of the requesting device according to Equ 3. Denied = Ak
MAC (Ak) is added is to Class Blacklisted
p
 (xi − Sj+1 )2 + (yi − Sj+1 )2 <= δ Malicious Activity
Encrypted packet

where Sj+1 represents base station or server module



Ci Compute = Decrypt Packet
(3) Authentication Request of Ak is Denied.
The concerned server Sj+1 confirms the requesting device Ci
by finding an associated entry in the registered devices table. If
the entry is available, then the MAC of the source device Ci is Fig. 3: Graphical Representation of an Intruder Device-to-
added to the member devices table. Alternatively, suppose the Server Request and Response Mechanism in the IoMT
MAC of the source device does not have an associated entry
in the table of Sj+1 where the MAC of the member devices

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 5

are located. In that case, Ci is identified as intrude device Ak successfully and TP RES is the time for the proper acknowl-
and its request is denied by Sj+1 . edgment message. Both TP REQ and TP RES metrics are used
Theorem-1: A device-to-server Ci − Sj is possible if and by legitimate devices Ci and server module Sj to separate
only if Ci is a legitimate device. responses of numerous malicious devices Ak . In scenarios
Proof: Suppose an intruder device Ak pretends itself a le- where either the PREQ or PREP message of the requesting
gitimate device Ci and sends a request message (PREQ) to device Ci is lost, the communication session is needed to be
establish a communication session with the concerned server re-initiated using a similar procedure as described above.
Sj . Furthermore, if we assume that this intruder device Ak also
knows the encryption mechanism used by legitimate devices Ci
to encrypt the PREQ message. The concerned server Sj will Theorem-2: A server module Sj will process a request iff
allow the requesting device Ak to start this session iff it is an the request is authentic, i.e., requesting device Ci is authentic.
authentic device Ci . It is possible only if the MAC address Proof: Suppose the PREQ message of device Ci is an authentic
of this intruder device Ak is listed as a registered device. request, is intercepted by an intruder Ak . The Ak is deployed
However, in this case, the MAC of the source device, intruder in the vicinity of the source device Ci and the concerned
device Ak , does not have an associated matched value, and it server Sj . Furthermore, suppose Ak pretended as then con-
is identified as an intruder device Ak . Therefore, the concerned cerned server Sj . In that case, Ak is bounded to generate an
Sj adds MAC of the source device Ak to the blacklisted acknowledgment message, RREQ in this case, and send it to
class and sends a ciphertext to the neighboring devices Ci that the requesting device Ci . However, the requesting device Ci
Ak is an intruder device. Therefore, permission to initiate a will identify it as a malicious packet as this message will not
communication session is denied. Conversely, if the concerned be received within the defined time interval. A back-off time
device Ci is a member device and sends a PREQ message CRT T i , which Ci stored during the offline phase. Due to the
to the concerned server Sj . The concerned server module Sj limited processing capability of these devices, it is tough for
matches the MAC of the device Ci , which is requested, with an intruder device Ak to pretend itself as the concerned server.
the already stored MAC (carried out in an offline phase). A If somehow Ak generates a similar response, but it will rarely
match is encountered in this case as the source device Ci is be able to send this response within the defined stipulated time
a legitimate device, and its MAC should be there with the interval that is CRT T i in this case. Additionally, if the response
concerned Sj module. Once a device is verified, a ciphertext from a particular device Ci is intercepted by Ak and forward
is sent to it by the concerned server Sj where permission to a modified version to the intended server Sj . The concerned
initiate a communication session is granted. Hence, a request Sj will reject it as it will be delivered within the defined time
to establish a proper communication session is processed iff frame due to the unusual transmission delay. Conversely, if the
the requesting device Ci is a legitimate device. request of authenticity (PREQ) of device Ci is processed by
server Sj then acknowledgment packet(PRES) will be received
D. Phase-IV: Communication Phase by the requesting device Ci within the defined time interval,
In this phase, a detailed description of the proposed com- i.e., CRT T i .
munication approach is presented. Every device Ci should be Hence, a legitimate server module Sj can process the authen-
associated with a server Sj . If the requesting device Ci is tication request of Ci .
authentic, it can establish a communication session with the
intended server Sj . If an authentic device Ci moves from the
existing server Sj to another server Sj+1 , then the authenticity Additionally, the proposed dynamic mutual authentication
process is repeated. During offline phases, the registration and scheme bound every operational device Ci and server Sj
membership of every legitimate device Ci are confirmed and to use a 48-bits MAC addressing scheme for registration.
minimizes the entrance probability of the intruder device Ak in The registration process is performed in the offline phase as
the operational IoMT networks. It is because intruder devices described above. The MAC address of every device is listed
Ak initiates their task as soon as the underlined IoMT net- with every server Sj . Therefore, the probability that an intruder
work becomes operational. Moreover, the registration process device Ak will bypass this is negligible. It is because both
of all devices Ci is completed before the network becomes server Sj and Ci confirm the authenticity of the requesting
operational. Therefore, it is tough for an intruder device Ak devices before permitting it to start a good communication
to mimic a member device and initiate proper communication session. Furthermore, if a device Ci moves from the domain of
with any server module Sj in the operational IoMT. one server Sj to another server S − j + 1, then its authenticity
The proposed scheme bound every device Ci and server Sj is re-checked by the concerned server, i.e., S − j + 1 in this
to set a time-frame in which it will be able to receive a response case. Lastly, suppose a requesting device Ci is identified as
RREQ message from each other. In the proposed approach, the an adversary device. In that case, it is added to the blacklist
waiting time of every device is equal to the round trip time class, and neighboring devices Ci are information about it.
(RTT) of devices that are currently communicating. The RTT As described above, both the requesting device Ci and server
is computed using Equ 4. modules Sj are bounded to transmit encrypted versions of their
messages to ensure secure and reliable communication sessions.
CRT T i = TP REQ + TP RES (4) For this purpose, the ECDDHP encryption scheme is used by
where TP REQ is defined as the time needed for a particular both source and destination modules in the proposed mutual
P REQ message to reach its intended destination module authentication scheme for the IoMT.

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 6

Algorithm 1 Proposed Dynamic Mutual Authentication Algo- have a defined time interval during which successful delivery
rithm for Internet of Medical Things of the message is expected that is defined in the offline phase.
Require: Device Ci Request to establish a Communication (v) The proposed device authenticity mechanism is prone
Session against perfect forward, and backward secrecy attacks as the
Ensure: Permission Granted or Denied (Blacklisted) successful forwarding probability of the intruder device Ak
1: ClassReg ← Zero (to the concerned device and server) is significantly less. A
2: ClassM em ← Zero comprehensive analysis of the proposed device authenticity and
3: M sgenc ← ”null” existing models (concerning various possible intruder attacks)
4: ClassBlacklist ← Zero is presented in Table I.
5: Ci ← Devices in IoMT
6: Sj ← Server or Sinks in IoMT V. S IMULATION R ESULTS AND E VALUATION OF THE
7: for every Ci ∈ IoM T do P ERFORMANCE
8: Send M sgenc to Server Sj
9: if MAC (Ci ∈ ClassReg &ClassM em ) then In this section, a brief description of numerous performance
10: Ci is an authentic device metrics is presented to evaluate the performance of the pro-
11: Permit to initiate a communication session posed mutual authentication and field-proven algorithms using
12: elseif MAC address (Ci ∈ ClassReg ∈ / ClassM em ) different IoMT. For this purpose, these algorithms were imple-
then mented in OMNET++ using similar topological infrastructures
13: Ci is an authentic device i.e., same (i) number of devices Ci (ii) server(s) Sj and
14: Add Ci to ClassM em (iii) intruder device(s) Ak . These algorithms were evaluated
15: Permit to initiate a communication session extensively in terms of various performance metrics in the
16: elseif MAC address (Ci ∈ / ClassReg ∈/ ClassM em ) operational IoMT environment, such as communication cost,
then processing cost, average throughput, APDR, average end-to-
17: Ci is an intruder device end delay. At the start, random topologies with embedded
18: return Ci as intruder device delay (transmission and propagation) are used to mimic the
19: Ci is aided to class ClassBlacklist actual deployment process of the IoMT. Additionally, path loss
20: end-if ratio, propagation delay, and neighboring device interference
21: end-for are assumed to be constant in the operational IoMT as metrics
22: return Authentic and BlackListed Devices are beyond the proposed scheme scope. Numerous parameters
which are used in the simulation setup are presented in Table
II. To comply with the real deployment of the IoMT, standard
IV. S ECURITY A NALYSIS battery powers are used, such as Libelium Corporation.

In this section, a comprehensive analysis of various attacks


is performed. Also, possible attacks on the IoMT networking A. Computational Cost
infrastructure and how the proposed scheme is guaranteed to be Computational and communication costs are considered the
resilient against various attacks are presented. Furthermore, it backbone of assessment criteria used to evaluate the newly
is to be noted that these attacks may occur at different levels in developed schemes’ applicability, particularly in secure IoMT.
the IoMT networks, i.e., devices Ci level and server Sj level. A newly developed authentication scheme with the minimum
(i) The proposed device authentication model is prune against possible computational cost is considered an ideal solution.
the client impersonation attacks. It is tough for an intruder Usually, it is preferred over a computationally expensive
device Ak to pretend as a legitimate device Ci . Looking scheme provided that it does not compromise on any of the
to the limited capacities of these devices, decryption of the security measures. In this regard, a detailed and comparative
intercepted message is far beyond the operational capacities analysis (in terms of computational cost) of the proposed mu-
of these devices Ak in the IoMT. (ii) Device Impersonation tual authentication scheme with existing schemes is presented
Attack is not applicable in the proposed authenticity model. in Table III. In this table, Th is used to represent the time
Every device Ci should be connected (member) with the nearest needed to compute the hash function, and TXOR represents the
server module Sj . Therefore, if an Ak attempts to pretend number of exclusive OR operations needed. Likewise, variable
itself a legitimate and registered device, the transmission of Tran is used to describe random nonce. However, unlike the
messages must be intact to that of a compromised device Ci , traditional hash function(s), its computational cost is negligible.
which is not possible as long as Ak is a powerful device. (iii) A blank entry (empty slot) is used to depict a situation(s) where
Server Impersonation Attack is possible only if an intruder a scheme does not use it, i.e., in Vaidya. et al. authentication of
device Ak mimics the operational capabilities of the concerned sensor node or device is not needed. Therefore, it is represented
server Sj . If we assume that somehow Ak managed to mimic with ”-” as shown in Table III. In Table IV, the proposed mutual
itself as a server, but still excessive delay in its transmitted authentication scheme’s computational cost is less than existing
messages will lead to an actual identity, i.e., intruder device schemes. Moreover, these costs are computed in the presence of
Ak in this case. (iv) The proposed scheme is not vulnerable to numerous intruder devices Ak , and it shows that the proposed
eavesdropping attacks as every message is transmitted in the scheme is an ideal solution for the constraint-oriented IoMT
encrypted. Moreover, both server Sj and member devices Ci networks.

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 7

TABLE I: Comparative Analysis of Various Authentication Schemes

Security Measure [19] [27] [18] [28] [17] Proposed Sch


Client Impersonate Attack X X X X × X
Member Device Impersonate Attack X X X X × X
Edge or Server Impersonate Attack × X × X X X
Eavesdropping Attack × × X X × X
Perfect Backward & Forward Attack X × X X X X
Man-in the Middle Attack X × × X × X

TABLE II: Internet of Medical Things Simulation Conditions


AODV-Algo
EAODV Mtr-Algo
Parameters values EAODV-Algo
IoMT Deployment Area 500m * 500m 60 EAOMDV-Algo
Devices Ci 50, 100 Proposed-Algo
Server or Sink Sj One

End-to-End Delay (micro sec)


Initial on-board Battery Power (Ei ) 52000 mAh 50
Residual Energy (Er ) Ei -Econ
Power Consumption to Transmit a Packet (PTx ) 91.4 mW
Transmission-Delay (Chdelay ) 10 milliseconds
40
Power Consumption to Receive a Packet (PRx ) 59.1 mW
Idle Mode Power Consumption 1.27 mW
Transceiver Energy (Ti ) 1 mW
Transmission Range (Tr ) 450m 30
Round Trip Time (RT Tn ) 4 msec
Packet Size (Psize ) 128 bytes
Hop Count (Hc ) of Server Sj 0 20
Hop Count (Hc ) of Device Ci 1
Device Ci Sampling Rate 10 seconds
Topologies Static and Random 10
Intruder Devices Ak 5 50 100 150 200 250 300
Traffic Type CBR and UDP Devices in the Internet of Medical Things
Attack Type Black-Hole

Fig. 4: Comparative Analysis of End-to-End Delay


B. Communication Cost
Communication cost has a direct proportionality factor to collected in the environment of IoMT, where numerous mali-
the average number of messages transmitted between the cious devices Ak were introduced in the operational networks.
source and destination devices, whereas these devices should
be authentic. For this purpose, we have considered only those
messages, both in offline (if any) and on-line phases, without D. Average Throughput
which a proper communication session between a device Ci
The average throughput of the IoMT is considered a vi-
and server Sj is at risk in the operational IoMT network. A
tal factor to evaluate the performance of the communication
comparative analysis of the proposed and existing scheme in
or routing approach, specifically if devices Ci are deployed
terms of communication cost is presented in Table IV, which
randomly. Furthermore, average throughput directly correlates
depicts that the proposed scheme has minimum communication
to the average packet re-transmission ratio, i.e., maximum
overhead. In some cases, the proposed scheme has higher
average throughput means minimum packet loss. Therefore, the
communication costs, i.e., [18], [28]. However, these schemes
proposed mutual authentication and communication scheme is
are computationally expensive as shown in Table III.
designed to easily attain maximum average throughput irrespec-
tive of IoMT deployment. The simulation result presented in
C. End to End Delay Figure.5 shows that the proposed scheme performs better than
the existing approaches in terms of average through evaluation
Generally, a communication scheme with the minimum pos-
metric. Furthermore, these measures were calculated for the
sible average end-to-end delay performance metric is assumed
IoMT, where numerous malicious devices Ak were introduced
to be an ideal solution to the problem in various realistic
and were trying to interfere. Apart from it, the scalability of the
environments of IoMT. Therefore, the proposed mutual authen-
underlined IoMT does not affect the exceptional performance
tication and communication approach is designed to ensure
of the proposed scheme, particularly in terms of average
minimum possible end-to-end transmission of packet(s) from
throughput.
source device Ci to destination Sj . It is evident from Figure 4
that the proposed scheme has achieved the minimum possible
delay metric against its rival schemes. During the simulation, E. Average Packet Delivery Ratio (APDR)
it is evident that end-to-end delay is highly affected if an The APDR is defined as the ratio of generated packets to
authentication scheme is vulnerable to various possible attacks, packets received successfully by the destination device Sj in the
a black-hole attack in this case. Furthermore, these results were operational environment of the IoMT. Likewise, a scheme with

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 8

TABLE III: Comparison in terms of Algorithm’s Computational Cost

Scheme User/Client Device Ci Server Side Sj Total Cost


Proposed scheme (Mobile Devices) 2Th - 2Th + 6TRAN 4Th + 6TRAN
Gupta. et al. [28] 7Th + 4TXOR 4Th + 4TXOR 5Th + 3TXOR 16Th + 11TXOR
Abdelshafy. et al. [17] 5Th + 5TXOR 2Th + 1TXOR 2Th + 6TXOR 6th + 11TXOR
Makhalouf. et al. [18] - 2Th + 6TXOR 7Th + 7TXOR 9Th + 13TXOR
Liu. et al. [19] - 2Th + 2TXOR 1Th + 2TXOR 3Th + 4TXOR
Hasan. et al. [27] 2Th + 6TXOR 2Th + 5TXOR 3Th + 3TXOR 7Th + 14TXOR

TABLE IV: Comparative Analysis of the Communication Cost


AODV-Algo
Scheme Number of Messages Number of Bits EAODV Mtr-Algo
Proposed Scheme(Mobile Devices Ci ) 8 8,192 98.4 EAODV-Algo
Liu. [19] 60 30,620 97.6 EAOMDV-Algo
96.8 Proposed-Algo
Abdelshafy. [17] 5 24,546

Average Packet Delivery Ratio (%)


Gupta. [28] 5 3,038 96.0
Hasan. [27] 6 32,000 95.2
Makhalouf. [18] 5 6,144 94.4
93.6
92.8
92.0
91.2
90.4
AODV-Algo
40000 89.6
EAOMDV-Algo
88.8
EAODV-Algo
EAODV Mtr-Algo 88.0
35000
Proposed-Algo 87.2
86.4
30000
Average Throuput

50 100 150 200 250 300


Devices in the Internet of Medical Things
25000

20000 Fig. 6: Comparative Analysis of Average Packet Delivery Ratio

15000

IoMT is not operational yet. In phase-II (authentication), the


10000 formation of various communication sessions of Ci with Sj
100 150 200 250 300
is bounded to the device’s mutual authenticity. The server Sj
Devices in the Internet of Medical Things confirms the authenticity of the source device if the MAC of
Ci is available with Sj . Then it is a legitimate device that is
allowed in Phase-III to start a communication with the intended
Fig. 5: Comparative Analysis Average Throughput server. Additionally, every message is encrypted to safeguard
its contents from potential intruders. Simulation results have
shown that the proposed mechanism is an ideal solution for
maximum APDR is preferred. It indicates the minimum packet
IoMT than existing schemes considering its convincing pro-
loss ratio and re-transmission of packets in the IoMT. The
cessing and communication overheads.
proposed scheme has achieved maximum possible APDR than
its rival scheme, depicted in Figure 6. Additionally, these results
were computed in the realistic environments of IoMT, where the ACKNOWLEDGMENT
possibility of numerous malicious devices Ak was maximum.
This research is supported by Taif University Researchers
However, as the proposed scheme is prone to these attacks, the
Supporting Project number (TURSP-2020/126), Taif Univer-
proposed scheme’s performance is not compromised.
sity, Taif, Saudi Arabia.
VI. C ONCLUSION AND F UTURE W ORK
In this paper, a lightweight mutual authentication scheme R EFERENCES
is developed that ensures numerous communication sessions [1] F. Wei, P. Vijayakumar, N. Kumar, R. Zhang, and Q. Cheng, “Privacy-
between a member device Ci and server Sj in the operational preserving implicit authentication protocol using cosine similarity for inter-
environment of IoMT. The proposed approach utilizes the MAC net of things,” IEEE Internet of Things Journal, 2020.
[2] V. P. Yanambaka, S. P. Mohanty, E. Kougianos, and D. Puthal, “Pmsec:
and EAODV-enabled approaches to form a robust authentica- Physical unclonable function-based robust and lightweight authentication in
tion scheme divided into three phases. In phase-I (offline), every the internet of medical things,” IEEE Transactions on Consumer Electronics,
device Ci is bounded to register with the nearest server module vol. 65, no. 3, pp. 388–397, 2019.
[3] R. K. Mahendran and P. Velusamy, “A secure fuzzy extractor based
Sj . Therefore, as this phase is offline, the probability that an biometric key authentication scheme for body sensor network in internet of
intruder device Ak will be registered is zero as the underlined medical things,” Computer Communications, vol. 153, pp. 545–552, 2020.

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2021.3078702, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL VOL. XX, NO. XX, 2021 9

[4] Q. Chen, M. Li, X. Yang, R. Alturki, Ryan, MD. and Alshehri, F. Khan, [27] M. R. Hasan, Y. Zhao, Y. Luo, G. Wang, and R. M. Winter, “An effective
Fazlullah “Impact of Residual Hardware Impairment on the IoT Secrecy aodv-based flooding detection and prevention for smart meter network,”
Performance of RIS-Assisted NOMA Networks,” IEEE Access, vol. 9, no. 4, Procedia Computer Science, vol. 129, pp. 454–460, 2018.
pp. 42583–42592, 2021. [28] A. Gupta, M. Tripathi, T. J. Shaikh, and A. Sharma, “A lightweight
[5] M. N. Aman, M. H. Basheer, and B. Sikdar, “A lightweight protocol for anonymous user authentication and key establishment scheme for wearable
secure data provenance in the internet of things using wireless fingerprints,” devices,” Computer Networks, vol. 149, pp. 29–42, 2019.
IEEE Systems Journal, 2020.
[6] F. Khan, A. U. Rehman, Z. Yanliang, S. Mastorakis, H. Song, M. A. Jan,
and K. Dev, “A Secured and Reliable Continuous Transmission scheme
in Cognitive HARQ-aided Internet of Things,’ ’ IEEE Internet of Things
Journal, Early Access, 2021.
[7] C. Wang, X. Zhang, and Z. Zheng, “Cryptanalysis and improvement of
a biometric-based multi-server authentication and key agreement scheme,”
Plos one, vol. 11, no. 2, p. e0149173, 2016.
[8] D. He and D. Wang, “Robust biometrics-based authentication scheme for
multiserver environment,” IEEE Systems Journal, vol. 9, no. 3, pp. 816–823,
2014.
[9] D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication
for wireless body area networks with provable security,” IEEE Systems
Journal, vol. 11, no. 4, pp. 2590–2601, 2016.
[10] D. Giri, R. S. Sherratt, T. Maitra, and R. Amin, “Efficient biometric
and password based mutual authentication for consumer usb mass storage
devices,” IEEE Transactions on Consumer Electronics, vol. 61, no. 4, pp.
491–499, 2015.
[11] F. Khan, M. A. Jan, A. U. Rehman, S. Mastorakis, M. Alazab, and
P. Watters, “A Secured and Intelligent Communication Scheme for IIoT-
enabled Pervasive Edge Computing.” IEEE Transactions on Industrial
Informatics, Early Access, 2021.
[12] M.A. Jan, F. Khan, R. Khan, S. Mastorakis, V.G. Menon, P. Watters, and
M. Alazab, “A Lightweight Mutual Authentication and Privacy-preservation
Scheme for Intelligent Wearable Devices in Industrial-CPS,” IEEE Trans-
actions on Industrial Informatics, Early Access, 2021.
[13] Q. M. Yaseen and M. Aldwairi, “An enhanced aodv protocol for avoiding
black holes in manet,” Procedia Computer Science, vol. 134, pp. 371–376,
2018.
[14] A. M. Makhlouf and M. Guizani, “Se-aomdv: secure and efficient aomdv
routing protocol for vehicular communications,” International Journal of
Information Security, vol. 18, no. 5, pp. 665–676, 2019.
[15] R. Amin and G. Biswas, “A secure light weight scheme for user
authentication and key agreement in multi-gateway based wireless sensor
networks,” Ad Hoc Networks, vol. 36, pp. 58–80, 2016.
[16] J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multi-layer
authentication protocol for wireless body area networks,” Future Generation
Computer Systems, vol. 78, pp. 956–963, 2018.
[17] M. A. Abdelshafy and P. J. King, “Aodv and saodv under attack:
Performance comparison,” in International Conference on Ad-Hoc Networks
and Wireless. Springer, 2014, pp. 318–331.
[18] A. M. Makhlouf and M. Guizani, “Se-aomdv: secure and efficient aomdv
routing protocol for vehicular communications,” International Journal of
Information Security, pp. 1–12, 2019.
[19] Y. Liu, M. Dong, K. Ota, and A. Liu, “Activetrust: Secure and trustable
routing in wireless sensor networks,” IEEE Transactions on Information
Forensics and Security, vol. 11, no. 9, pp. 2013–2027, 2016.
[20] M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM
SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3,
pp. 106–107, 2002.
[21] M.D. Alshehri, F.K. Hussain, O.K. Hussain, “Clustering-driven intel-
ligent trust management methodology for the internet of things” Mobile
networks and applications, vol. 23, no. 3, pp. 419–431, 2018, Springer
[22] T. Delkesh and M. A. J. Jamali, “Eaodv: detection and removal of multiple
black hole attacks through sending forged packets in manets,” Journal of
Ambient Intelligence and Humanized Computing, vol. 10, no. 5, pp. 1897–
1914, 2019.
[23] S. Shahabi, M. Ghazvini, and M. Bakhtiarian, “A modified algorithm
to improve security and performance of aodv protocol against black hole
attack,” Wireless Networks, vol. 22, no. 5, pp. 1505–1511, 2016.
[24] P. Ndajah, A. O. Matine, and M. N. Hounkonnou, “Black hole attack
prevention in wireless peer-to-peer networks: A new strategy,” International
Journal of Wireless Information Networks, vol. 26, no. 1, pp. 48–60, 2019.
[25] A. Yasin and M. Abu Zant, “Detecting and isolating black-hole attacks in
manet using timer based baited technique,” Wireless Communications and
Mobile Computing, vol. 2018, 2018.
[26] R. K. Bar, J. K. Mandal, and M. M. Singh, “Qos of manet through trust
based aodv routing protocol by exclusion of black hole attack,” Procedia
Technology, vol. 10, pp. 530–537, 2013.

2327-4662 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Univ of Calif Santa Barbara. Downloaded on June 21,2021 at 21:42:48 UTC from IEEE Xplore. Restrictions apply.

You might also like