Mitigating Wormhole Attacks’ Risks within Wearable Body Network

Mohammed Abdessamad Goumidi, Ehlem Zigh, Adda Belkacem Ali-Pacha

Abstract


In this research, we sought to develop a trust and secure routing protocol based on the Ad-hoc On-Demand Distance Vector (AODV) routing to combat wormhole attacks in Wearable Body Networks (WBNs), which integrates a routing strategy that leverages the path-checking method to detect and isolate paths affected by wormhole attacks effectively, it employs a routing technique that prioritizes nodes with the most heightened remaining energy during data transmission, along with a mixed cryptographic algorithm that combines the modified One Pad Time with the modified Affine ciphers to ensure safe transmission against malicious biosensor threats. Experimental findings indicate that our proposed protocol transcends the classic AODV routing protocol across all evaluation parameters, including packet delivery ratio, throughput, and energy consumption. Its primary advantage lies in considering multiple factors, like detecting unauthorized biomedical biosensors, efficient energy utilization in the network, and secure data transmission—differentiating it from other safe routing protocols. Moreover, the mixed encryption algorithm enhances efficacy and bolsters sensitive data security compared to classic cipher methods like the One Pad Time and Affine ciphers.



Keywords


Mitigating; Risks; Wormhole attacks; Trusted secure routing protocol; Wearable body network

References


D. S. Bhatti et al., “A Survey on Wireless Wearable Body Area Networks: A Perspective of Technology and Economy,” Sensors, vol. 22, no. 20, p. 7722, Oct. 2022, doi: 10.3390/s22207722.

E. El-Adawi, E. Essa, M. Handosa, and S. Elmougy, “Wireless body area sensor networks based human activity recognition using deep learning,” Sci Rep, vol. 14, no. 1, p. 2702, Feb. 2024, doi: 10.1038/s41598-024-53069-1.

S. B, P. B, A. S, and N. J, “Wireless Body Area Networks: Survey of recent research trends on energy efficient routing protocols and guidelines,” Jul. 22, 2021. doi: 10.21203/rs.3.rs-385025/v1.

M. A. Goumidi, N. Hadj-Said, A. B. Ali-Pacha and E. Zigh, "Detection of Malicious Nodes in WBAN using a Feed Forward Back Propagation Neural Network," 2022 International Conference of Advanced Technology in Electronic and Electrical Engineering (ICATEEE), M'sila, Algeria, 2022, pp. 1-6, doi: 10.1109/ICATEEE57445.2022.10093101.

Q. Liu, K. G. Mkongwa, and C. Zhang, “Performance issues in wireless body area networks for the healthcare application: a survey and future prospects,” SN Appl. Sci., vol. 3, no. 2, p. 155, Feb. 2021, doi: 10.1007/s42452- 020-04058-2.

W. I. Khedr, A. Salama, M. M. Khashaba, and O. M. Elkomy, “Security Analysis of Wireless Body Area Network Protocols: A Survey,” 2023.

Laboratory of Coding and Security of Information (LACOSI), Department of Electronic, Faculty of Electrical Engineering, University of Sciences and Technology of ORAN- Mohamed Boudiaf (USTO-MB), Algeria, M. A. Goumidi, E. Zigh, N. Hadj-Said, and A. B. Ali-Pacha, “A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes,” IJCNIS, vol. 16, no. 2, pp. 117–133, Apr. 2024, doi: 10.5815/ijcnis.2024.02.10.

G. M. Abdessamad, Z. Ehlem, and A.-P. Adda Belkacem, “Mitigating blackhole attacks in wireless body area network,” IJEECS, vol. 36, no. 3, p. 1555, Dec. 2024, doi: 10.11591/ijeecs.v36.i3.pp1555-1563.

M. Hanif et al., “AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks,” Electronics, vol. 11, no. 15, p. 2324, Jul. 2022, doi: 10.3390/electronics11152324.

K. Jae-Dong, “A Comprehensive Analysis of Routing Vulnerabilities and Defense Strategies in IoT Networks,” Oct. 17, 2024, arXiv: arXiv:2410.13214. doi: 10.48550/arXiv.2410.13214.

M. Yaghoubi, K. Ahmed, and Y. Miao, “Wireless Body Area Network (WBAN): A Survey on Architecture, Technologies, Energy Consumption, and Security Challenges,” JSAN, vol. 11, no. 4, p. 67, Oct. 2022, doi: 10.3390/jsan11040067.

D. S. Bhatti, S. Saleem, A. Imran, H. J. Kim, K.-I. Kim, and K.-C. Lee, “Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions,” Sci Rep, vol. 14, no. 1, p. 3428, Feb. 2024, doi: 10.1038/s41598-024-53938-9.

QUEST Nawabshah, Pakistan et al., “Analysis and Countermeasures of Wormhole and Sinkhole Attacks in WBAN,” JISR-C, vol. 20, no. 1, Jun. 2022, doi: 10.31645/JISRC.22.20.1.3.

Assistant Professor, Department of Computer Science and Engineering, Sri Ramakrishna Institute of Technology, Coimbatore (Tamil Nadu), India. and Parvathy. K, “Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review,” IJRTE, vol. 10, no. 1, pp. 199–203, May 2021, doi: 10.35940/ijrte.A5873.0510121.

U. Ghugar and J. Pradhan, “Survey of wormhole attack in wireless sensor networks,” Comput. Sci. Inf. Technol., vol. 2, no. 1, pp. 33–42, Mar. 2021, doi: 10.11591/csit.v2i1.p33-42.

A. S. Rajasekaran, L. Sowmiya, A. Maria, and R. Kannadasan, “A survey on exploring the challenges and applications of wireless body area networks (WBANs),” Cyber Security and Applications, vol. 2, p. 100047, 2024, doi: 10.1016/j.csa.2024.100047.

M. A. Goumidi, E. Zigh, and A. B. Ali-Pacha, “Analytic Hierarchy Process for the Evaluation Of Attacks’ Severity Level within WBANs”.

A. Mansore and S. Koushik, “Detection and Prevention of Wormholl Attack Using AODV Protocol,” IJARCCE, vol. 4, no. 12, p. 330-331, Dec. 2015, doi:DOI 10.17148/IJARCCE.2015.41276.

Z. Zardari, K. Memon, R. Shah, S. Dehraj, and I. Ahmed, “A lightweight technique for detection and prevention of wormhole attack in MANET,” ICST Transactions on Scalable Information Systems, p. 165515, Jul. 2018, doi: 10.4108/eai.13-7-2018.165515.

A. M. J, Hassan A., S. San, and A. Y., “A combined technique of an affine cipher and transposition cipher,” Quest Journals, vol. 7, no. 10, 2021.

O. Laia, E. M. Zamzami, Sutarman, F. G. N. Larosa, and A. Gea, “Application of Linear Congruent Generator in Affine Cipher Algorithm to Produce Dynamic Encryption,” J. Phys.: Conf. Ser., vol. 1361, no. 1, p. 012001, Nov. 2019, doi: 10.1088/1742-6596/1361/1/012001.

R. P. Ritonga, M. Zarlis, and E. B. Nababan, “Modification Affine Cipher Transform Digraph to Squared the value of ‘n’ in Text Security,” in 2020 4rd International Conference on Electrical, Telecommunication and Computer Engineering (ELTICOM), Medan, Indonesia: IEEE, Sep. 2020, pp. 124–128. doi: 10.1109/ELTICOM50775.2020.9230503.

H. Mawengkang, I. L. Sitepu, and S. Efendi, “Security analysis in file with combinations One Time Pad Algorithm and Vigenere Algorithm,” IOP Conf. Ser.: Mater. Sci. Eng., vol. 420, p. 012129, Oct. 2018, doi: 10.1088/1757-899X/420/1/012129. [24] A. Ridho, A. M. Dewi, R. Siregar, M. Zarlis, and D. Hartama, “Analysis of Possibility of the Combination of Affine Cipher Algorithm with One Time Pad Cipher Using the Three-Pass Protocol Method in Text Security,” J. Phys.: Conf. Ser., vol. 1255, no. 1, p. 012028, Aug. 2019, doi: 10.1088/1742-6596/1255/1/012028. [25] A. Hassan , “A MODIFIED CEASER CIPHER,” JMSCM, vol. 5, no. 3, 2024, doi: 10.15864/jmscm.5304. [26] V. Rohit, D. S. Rohit, U. N. Varma, R. Venkatesh, and K. S. Vivek, “An Overview of AODV Routing Protocol,” vol. 08, no. 04, 2021.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats