Open Access iconOpen Access

ARTICLE

crossmark

Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks

by V. Balaji*, P. Selvaraj

Department of Computing Technologies, College of Engineering and Technology, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, 603203, Tamilnadu, India

* Corresponding Author: V. Balaji. Email: email

Computer Systems Science and Engineering 2022, 42(3), 1289-1303. https://doi.org/10.32604/csse.2022.023609

Abstract

Reliable transmission is vital to the success of the next generation of communications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters the maintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wireless network and constantly needs to be self-configured to provide consistent and efficient data transmission. The medical devices need to be connected with sophisticated protocols and architecture to handle the synergy of the monitoring devices. Today, one of the commonly used algorithms in D2D communication is the Optimized Link State Routing protocol (OLSR). The OLSR is considerably good at effectively utilizing the bandwidth and reserving the paths. One of the major attack against the OLSR is the Node isolation attack, also known as the Gray hole denial of service attack. The Gray hole attack exploits the vulnerabilities present with sharing the topological information of the network. The attackers may use this topological information to maliciously disconnect the target nodes from the existing network and stops rendering the communication services to the victim node. Hence, considering the sensitivity and security concerns of the data used in e-Health applications, these types of attacks must be detected and disabled proactively. In this work, a novel Node Authentication (NA) with OLSR is proposed. The simulation experiments illustrated that the proposed protocol has an excellent Packet Delivery Ratio, minimal End-End delay, and minimal Packet loss when compared to the Ad-hoc On-Demand Distance Victor (AODV) protocol and the proposed authentication scheme was able to protect the OLSR protocol from a node isolation attack.

Keywords


Cite This Article

APA Style
Balaji, V., Selvaraj, P. (2022). Gray-hole attack minimization in iomt with 5G based D2D networks. Computer Systems Science and Engineering, 42(3), 1289-1303. https://doi.org/10.32604/csse.2022.023609
Vancouver Style
Balaji V, Selvaraj P. Gray-hole attack minimization in iomt with 5G based D2D networks. Comput Syst Sci Eng. 2022;42(3):1289-1303 https://doi.org/10.32604/csse.2022.023609
IEEE Style
V. Balaji and P. Selvaraj, “Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks,” Comput. Syst. Sci. Eng., vol. 42, no. 3, pp. 1289-1303, 2022. https://doi.org/10.32604/csse.2022.023609



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2423

    View

  • 1035

    Download

  • 0

    Like

Share Link