TY - GEN
T1 - Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks
AU - Usman, Muhammad
AU - Asghar, Muhammad Rizwan
AU - Ansari, Imran Shafique
AU - Granelli, Fabrizio
AU - Qaraqe, Marwa
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/5
Y1 - 2019/5
N2 - Medical implants are an important part of Wireless Body Area Networks (WBANs) and play an important role to monitor, diagnose, and control various medical conditions. These tiny sensors are injected inside human body to measure and communicate various vital signs of a human body. Since the information transmitted by implants is very sensitive and critical in nature, both availability and confidentiality of such information are of prime importance. A possible security threat in medical implants that can breach the availability of the medical implants is a Denial of Service (DoS) attack. In this work, we propose a solution to mitigate DoS attack in the Medical Implant Communication Service (MICS) network. We propose a three-level trust model for a MICS network based on its environment and couple a threshold of maximum allowed data rate to each environment. The simulation results show that DoS attacks can be seamlessly mitigated in many MICS settings.
AB - Medical implants are an important part of Wireless Body Area Networks (WBANs) and play an important role to monitor, diagnose, and control various medical conditions. These tiny sensors are injected inside human body to measure and communicate various vital signs of a human body. Since the information transmitted by implants is very sensitive and critical in nature, both availability and confidentiality of such information are of prime importance. A possible security threat in medical implants that can breach the availability of the medical implants is a Denial of Service (DoS) attack. In this work, we propose a solution to mitigate DoS attack in the Medical Implant Communication Service (MICS) network. We propose a three-level trust model for a MICS network based on its environment and couple a threshold of maximum allowed data rate to each environment. The simulation results show that DoS attacks can be seamlessly mitigated in many MICS settings.
UR - http://www.scopus.com/inward/record.url?scp=85070241798&partnerID=8YFLogxK
U2 - 10.1109/ICC.2019.8761504
DO - 10.1109/ICC.2019.8761504
M3 - Conference contribution
AN - SCOPUS:85070241798
T3 - IEEE International Conference on Communications
BT - 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE International Conference on Communications, ICC 2019
Y2 - 20 May 2019 through 24 May 2019
ER -