Muhammad Shadi Hajar
ETAREE: an effective trend-aware reputation evaluation engine for wireless medical sensor networks.
Hajar, Muhammad Shadi; Al-Kadri, M. Omar; Kalutarage, Harsha
M. Omar Al-Kadri
Wireless Medical Sensor Networks (WMSN) will play a significant role in the advancements of modern healthcare applications. Security concerns are still the main obstacle to the widespread adoption of this technology. Conventional security approaches, such as authentication and encryption, are able to defend against external attacks effectively. However, internally launched threats, either by compromised or selfish nodes, require further security measures to be detected. In this paper, an Effective Trend-Aware Reputation Engine (ETAREE) is proposed for WMSN. ETAREE uses a novel updating mechanism to evaluate the reputation value, which makes it effective in detecting malicious nodes. Moreover, the proposed updating mechanism of ETAREE can efficiently detect on-off attacks. ETAREE security evaluations have been presented and compared with different reputation evaluation models, demonstrating faster detection of malicious behaviours.
|Start Date||Jun 29, 2020|
|Publication Date||Aug 7, 2020|
|Publisher||Institute of Electrical and Electronics Engineers|
|Institution Citation||HAJAR, M.S., AL-KADRI, M.O. and KALUTARAGE, H. 2020. ETAREE: an effective trend-aware reputation evaluation engine for wireless medical sensor networks. In Proceedings of 2020 Institute of Electrical and Electronics Engineers (IEEE) Communications and network security conference (CNS 2020), 29 June - 1 July 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9162325. Available from: https://doi.org/10.1109/CNS48642.2020.9162325|
|Keywords||Wireless medical sensor networks (WMSN); Security; Reputation evaluation; Trend-aware; Internal attacks; Beta distribution|
HAJAR 2020 ETAREE
You might also like
Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm.
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus.
Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder.
Towards a threat assessment framework for apps collusion.