Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

General Research Article

Big Data Analytics for MANET Based Sustainable Smart Healthcare Solution

Author(s): Ashu Gautam*, Rashima Mahajan and Sherin Zafar

Volume 15, Issue 4, 2022

Published on: 22 September, 2020

Article ID: e220322186191 Pages: 10

DOI: 10.2174/2666255813999200922143324

Price: $65

conference banner
Abstract

Objective: Collaboration of most promising upcoming technologies like big data and Internet of Things (IoT) plays a significant role in the sustainable development of the smart world. One of the important applications is the amalgamation of such technology in the e-healthcare sector, where private information is being transferred from one end device to other equipment. Sensors and different other instruments engaged in the e-healthcare sector, for transferring important vital information of the patients, are categorized as Wireless Mesh Networks (WMN). An attacker can introduce many malicious activities via different types of attacks; ultimately, such activities can produce an outturn in Denial of Service (DoS) of important routines which need to be completed in stipulated time. Therefore, it is important to showcase the effect of various attacks affecting the routing methodology of the protocols of such networks.

Methods: In this research study, the most suitable routing protocol to handle DDoS attacks is simulated and estimated for the Quality of Service (QoS) in smart network infrastructure in terms of energy consumption and jitter in changing nodes scenario, which aids in providing implications to enhance existing protocols and alleviate the consequence of DDoS instigated by such attacks.

Results: The performance of AODV (Adhoc on Demand Vector), SAODV (Secured Adhoc On Demand) and HWMP (Hybrid Wireless Mesh Protocol) is compared and tabularized, which are the most popularly utilized protocols in the healthcare environment.

Conclusion: The simulation results show that the HWMP outperformed well than the other two routing protocols in terms of evaluation metrics, namely energy consumption and jitter, which could be considered much less vulnerable against DDoS attacks prevailing in the sustainable healthcare sector.

Keywords: Big data, IoT- MANET, AODV, SAODV, HWMP, energy consumption and jitter in ad hoc networks for e-healthcare.

Graphical Abstract

[1]
R. Atat, L. Liu, J. Wu, G. Li, C. Ye, and Y. Yang, "Big data meet cyber-physical systems: A panoramic survey", IEEE Access, vol. 6, pp. 73603-73636, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2878681]
[2]
J. Wu, S. Guo, H. Huang, W. Liu, and Y. Xiang, "Information and communications technologies for sustainable development goals: State-of-the-art, needs and perspectives", IEEE Comm. Surv. and Tutor., vol. 20, no. 3, pp. 2389-2406, 2018.
[http://dx.doi.org/10.1109/COMST.2018.2812301]
[3]
D. Kobialka, “Kaspersky Lab study: Average cost of enterprise DDoS attack totals $2M,” Msspalert.com, 25-Feb-2018. [Online]. Available from: https://www.msspalert.com/cybersecurity-research/kaspersky-lab-study-average-cost-of-enterprise-ddos-attack-totals-2m/’ [Accessed:20-Sep-2021].
[4]
H. Song, J. Bai, Y. Yi, J. Wu, and L. Liu, "Artificial intelligence enabled internet of things: Network architecture and spectrum access", IEEE Comput. Intell. Mag., vol. 15, no. 1, pp. 44-51, 2020.
[http://dx.doi.org/10.1109/MCI.2019.2954643]
[5]
N. Padmaja, T. Sudha, and S.S. Saurab, "Application of big data in forecasting the travel behaviour of international tourists", International Conference On Computational And Bio Engineering. Cham: Springer International Publishing, 2019, pp. 263-271.
[6]
J. Wu, S. Guo, J. Li, and D. Zeng, "Big data meet green challenges: Big data toward green applications", IEEE Syst. J., vol. 10, no. 3, pp. 888-900, 2016.
[http://dx.doi.org/10.1109/JSYST.2016.2550530]
[7]
S.R. Islam, D. Kwak, M.H. Kabir, M. Hossain, and K.S. Kwak, "The internet of things for health care: A comprehensive survey", IEEE Access, vol. 3, pp. 678-708, 2015.
[http://dx.doi.org/10.1109/ACCESS.2015.2437951]
[8]
L. Hong, M. Luo, R. Wang, P. Lu, W. Lu, and L. Lu, "Big data in health care: Applications and challenges", Data Inf. Manag., vol. 2, no. 3, pp. 175-197, 2018.
[http://dx.doi.org/10.2478/dim-2018-0014]
[9]
P. Yadav, and R.A. Agrawal, "Multi-homing based framework against denial of service open threat signaling in healthcare environment", Int. J. Contr. Autom., vol. 11, no. 11, pp. 1-8, 2018.
[10]
C. Brill, and T. Nash, "A comparative analysis of MANET routing protocols through simulation", In", 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). 2017, pp. 244-247.
[http://dx.doi.org/10.23919/ICITST.2017.8356392]
[11]
V. Liagkou, V. Kavvadas, S.K. Chronopoulos, D. Tafiadis, V. Christofilakis, and K.P. Peppas, "Attack detection for healthcare monitoring systems using mechanical learning in virtual private networks over optical transport layer architecture", Computation, vol. 7, no. 2, p. 24, 2019.
[http://dx.doi.org/10.3390/computation7020024]
[12]
Y. Fu, and Z. Ding, "Hybrid channel access with CSMA/CA and SOTDMA to improve the performance of MANE In", 2017 IEEE 17th International Conference on Communication Technology 2017, pp. 793-799.
[13]
T. Clausen, C. Dearlove, and B. Adamson, “Jitter considerations in mobile ad hoc networks (MANETs)”. Informational, 2008. http://www.ietf.org/rfc/rfc5148 [Accessed: 20-Sep-2021].
[14]
A. Degirmencioglu, H.T. Erdogan, M.A. Mizani, and O. Yılmaz, "A classification approach for adaptive mitigation of SYN flood attacks: Preventing performance loss due to SYN flood attacks", In", NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, p. pp. 1109-1112, 2016.
[http://dx.doi.org/10.1109/NOMS.2016.7502971]
[15]
E. Džaferović, A. Sokol, A.A. Almisreb, and S.M. Norzeli, "DoS and DDoS vulnerability of IoT: A review", Sustain. Eng. Innov., vol. 1, no. 1, pp. 43-48, 2019.
[16]
J. Govindasamy, and S. Punniakody, "A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack", J. Electr. Syst. Inf. Technol., vol. 5, no. 3, pp. 735-744, 2018.
[http://dx.doi.org/10.1016/j.jesit.2017.02.002]
[17]
C. Alippi, V. D’Alto, M. Falchetto, D. Pau, and M. Roveri, "Detecting changes at the sensor level in cyber-physical systems: Methodology and technological implementation In", 2017 International Joint Conference on Neural Networks, 2017pp. 1780-1786
[http://dx.doi.org/10.1109/IJCNN.2017.7966066]
[18]
J. Alvarez, S. Maag, and F. Zaidi, "Monitoring dynamic mobile adhoc networks: A fully distributed hybrid architecture", In", 2017 IEEE 31st International Conference on Advanced Information Networking and Applications, 2017p. pp. 407-414
[http://dx.doi.org/10.1109/AINA.2017.74]
[19]
C. Brill, and T. Nash, "A comparative analysis of MANET routing protocols through simulation In", 2017 12th International Conference for Internet Technology and Secured Transactions, p. pp. 244-247, 2017.
[http://dx.doi.org/10.23919/ICITST.2017.8356392]
[20]
K. Chelli, "Security issues in wireless sensor networks: Attacks and countermeasures In", Proceedings of the World Congress on Engineering. Vol. 1, No. 20, pp. 876-3423, 2015.
[21]
A.K. Jain, and V. Tokekar, "Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks In", 2015 International Conference on Pervasive Computing, 2015pp. 1-6
[http://dx.doi.org/10.1109/PERVASIVE.2015.7087174]
[22]
A.K. Sharma, and M.C. Trivedi, "Performance comparison of AODV, ZRP and AODVDR routing protocols in MANET In", 2016 Second International Conference on Computational Intelligence & Communication Technology, pp. 231-236, 2016.
[http://dx.doi.org/10.1109/CICT.2016.53]
[23]
G.A. Walikar, and R.C. Biradar, "A survey on hybrid routing mechanisms in mobile ad hoc networks", J. Netw. Comput. Appl., vol. 77, pp. 48-63, 2017.
[http://dx.doi.org/10.1016/j.jnca.2016.10.014]
[24]
M.R. Ashu, and S. Zafar, "Implementing blockchain security to prevent DDoS attacks in networks", Int. J. Secur. Appl. Vol. 13, No. 4, pp. 27-40, 2019. ISSN:1738-9976(Print);2207-9629(Online) NADIA
[25]
A. Guatam, R. Mahajan, and S. Zafar, "Repercussions of DDoS attack on MANET based healthcare sector routing protocols performance and ANOVA assessment", Int. J. Adv. Sci. Technol., vol. 29, no. 5, pp. 12157-12177, 2020.
[26]
R. Sharma, T. Sharma, and A. Kalia, "A comparative review on routing protocols in MANET", Int. J. Comput. Appl., vol. 133, no. 1, pp. 33-38, 2016.
[27]
A.K. Sharma, and M.C. Trivedi, "Performance comparison of AODV, ZRP and AODVDR routing protocols in MANET In", 2016 Second International Conference on Computational Intelligence & Communication, pp. 231-236, 2016.
[http://dx.doi.org/10.1109/CICT.2016.53]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy