Document Type : Research Paper
Authors
1 Department of ECE, MRIIRS, Faridabad, India 121001.
2 Department of CSE, MRIIRS, Faridabad, Inida,1210011.
3 Department of CSE, SEST, Jamia Hamdard, New Delhi, India 110062.
Abstract
Keywords
Introduction
The coronavirus led to a powerful negative impact on the economy, lifestyle across the globe. With lack of food, transportation and health related facilities are further adding a fuel in burning situation across 170 countries as reported by WHO (World Health Organization(Agrawal ,2014). At this point of time its becomes really important to break the conditions created in this pandemic, many researches have concluded to control this situation one of the most important step is to measure the impact of this deadly virus. Thus monitoring of symptoms is playing a key role to overcome from this current situation. It has been reported by many researchers that IoT (Internet of Thing) is proven to be the most important pillar in process of recovery and to a great extent has helped patients for speedy recovery of health(Gautam, Mahajan& Zafar,2021) .The countries of APAC (Asian Pacific and Australian Countries ) have a tremendous usage from IoT based technology for keeping the things under control and by 2023 there is going be surge of almost 253 billion USD investment in health sector related apps and devices to monitor the vital characteristics of the infected person(Islam et al.,2015). In many social media sites it has proven fact that devices like drones are helping a lot in monitoring the particular sector of a crowded place, also they are helpful in distributing the food, medicines to patients in the hospitals, where the movement of other health professionals is not possible due to limited staff and nature of disease(Yadav & Agrawal,2018). Many health related apps are helping under lockdown time period also the symptoms of the patients could be sent via apps for remote monitoring or for taking suggestion from doctor. Thus remote monitoring plays a vital role in monitoring the conditions of the patients in urban as well as rural areas where movement is not possible. This has become possible only due the advancements in the wireless network technology and its amalgamation with IoT. This present paper contributes in making utilization of the best routing protocol for fast delivery of data from patient to the doctor in terms of QoS parameter for the simulation world carried on NS-2.
MANET – IoT
The COVID-19 situations emphasized upon remote monitoring of various health parameters of symptoms as well as too make sure the social distancing is being followed for handling the pandemic. The sensors plays a crucial role in monitoring the conditions which forms the part of the WSN .These sensors could be of wide range for measuring the temperature, pulse, oxygen level etc as per the recommendation of healthcare professionals. Also the smart devices like smartphones which are equipped with many sensors due to the advancements in the embedded technology. The IoT device is basically any device connected with internet along with some computational power. Thus (Figure 1) the black nodes inside the circle explains the various smart devices which could be wearables ones like that of smart watches or wrist bands, recording our symptoms and sending these signals from one point to another either via wired technology or wirelessly through gateways Thus the wireless local area networks (WLAN) and MANET have to connect to internet to send the information of the important vital parameters. Such networks when exposed to Internet are influenced by different types of attacks which have been categorized as active and passive attacks in many of the research work carried in different researches. The chief cause for these attacks is the transitional medium, which is complete wireless access along with reticent assets. Therefore the infrastructure and various resources of such networks became unavailable for the actual users due to the susceptible nature of networks to various kinds of attacks (Brill & Nash, 2017).
Figure1. Architecture for MANET –IoT Networks
To places where network connection is an issue MANET have proven their worth for sending information from inaccessible points and has been reported by various researches specially to the military people engaged in the disaster monitoring during war ,earthquakes and many similar circumstances etc for sending data from one smart gadget to another., far off from the radio range. Thus to make the communication reliable for remote monitoring of data, routing ability is important for successful transmission of end-to-end data transfer. For finding best route for sending data many protocols were studied in different researches carried over last decade majorly and majorly focusing upon reactive ,proactive and hybrid techniques for networks. The merging of MANET and WSN, indicates that MANET is appropriate to be integrated with the Internet of Things (IoT) for various applications (Gautam, Mahajan & Zafar, 2020), ( Cai et al.,2020).
The previous section reflects the usage of MANET in layered architecture for IoT based environment. The security issues in MANET based networks can be broadly classified active and passive threats. The other criteria for classifying routing protocols in MANET are uniformity and non-uniformity of protocols completely depending upon the mobile nodes role in routing. Mobile node possessing same functionality, significance and the role forming uniformity of the protocol used used in MANET based environment and characterizing with as reactive nature or proactive one. (Figure 2)While the network in which mobile nodes (Alharbi, Aljuhani, & Liu,2018) have distinct function or significance forming non uniformity of protocols and various researchers have proposed the classification of such routing protocols (Khalaf & Abdulsahib,2020).
Routing Protocols MANET based Networks |
TABLE -DRIVEN |
ON-DEMAND |
HYBRID Routing Protocols |
Figure2. Routing Protocol Classification in MANET based networks
The communication held between two IoT devices is analogous to the routing of data among MANET nodes. The nodes are actually the smart IoT devices which are attached the patient for picking up the data of various parameters. Therefore all the different types of routing protocols sown in (Figure 2) are applicable for the IoT MANET based environment. The table driven is famously known as proactive, and on–demand is reactive category of routing protocols. Abundant arrangements for MANET routing subsists, with extensive reviews cited in (Cogliati et al., 2018). The amalgamation of nodes of IoT in MANETs and vice versa i.e. IoT gadgets attached to nodes of MANET have by standard IP(Internet Protocol) connection with Internet. This amalgamation makes the MANETs characteristically low power and lossy networks (LLNs).
The (Figure 3) represented the classification of the attacks in routing protocols of low power lossy networks on the basis of confidentiality and integrity and secondly on the availability. Among all the RPL attacks black hole attack and neighbor attacks comes under both criteria’s (Aldana et al., 2020). The multiple replicated individualities of legitimate nodes of network nodes are used by malicious devices or nodes for compromising routing ultimately making them unapproachable in sybil assaults. The disruption of routing topology and data flow rate of traffic is made by wormhole assault. This wormwhole attack is accomplished by two malicious nodes, playing among themselves by forwarding the data packets among each other. The main objective of one other category of attack called flooding assault is to exhaust the battery power (Chelli, 2015).
Figure3. Security Aspects in Complex Networks
In man-in-the middle assault, empirically inappropriate messages are addressed to the receiver. In this sort of assault messages may take either category of a false negative or a false positive (Jain & Tokekar, (2015). This may lead the operator to initiate unnecessary activities, such as breaker flipping, when it is not essential, or may also lead the operator to consider everything to be okay and therefore not to captivate an action when action is needed(Sharma & Trivedi, (2016).
Adhoc networks are extremely susceptible to distributed denial of service (DDOS) assaults (Singh & Singh, 2019). Such DDOS occurrences put away all the resources of system such as power of battery ,consumption of bandwidth, more energy consumption along with machine cycles of CPU etc .Further such attacks make assets or smart devices called nodes inaccessible to genuine users. The dynamic characteristics of mobile nodes smart phones in the considered scenario along with the topology of the MANET based environment makes them prone to these DDOS assaults causing the packet dropping while transmission. Many researchers suggested different routing protocols for the handling such attacks, but none could conclude the best routing protocol for among the existing reactive ,proactive and hybrid ones in adhoc networks(Kumari, Singh & Manjul,2020). In this research work, we are comparing the three routing protocols most widely proposed for handling data, under the influence of SYN flood attacks, which is one of the categories of DDoS assaults (Walikar & Biradar, (2017).
Introduction segment of the investigation paper has focused on impact of COVID -19 and concepts of networks and its vulnerability for various attacks in healthcare sector. Further relevant analysis has been done on the various routing protocols used in end to end transmission care sector based on MANET. The subsequent discussion is explaining the simulation model comprising the scenarios considered in simulation model for carrying the research work. The results centered on energy consumption as Quality of Service (QoS) parameter followed by ANOVA test for validification of variance among three routing protocols. The discussions and conclusion on the investigation work carried out is mentioned in research paper ,which is followed by future work of study and references are listed in the end.
The routing protocols helps to send the data from one end to other end in mobile adhoc networks [16]. The steadily expanding utilization of the web particularly during pandemics has prompted more noteworthy sharpness and consideration in upgrading the security of organizations alongside methods of directing by different scientists. For accomplishing the determination of best routing protocol, the metrics used is Quality of Service (QoS) parameters (Sanzgiri et al., (2002). In the work the researchers focused on comparing the three routing protocols for jitter ,delay ,throughput under scenario of varying number of nodes .The best commonly used reactive protocol is Ad Hoc On-Demand Distance Vector (AODV) ,as it shows and maintains paths only on demand .The exclusive feature of AODV is dynamically formation of entries of routing table.Also all the entries of table gets expired if they not in use
Secure AODV (SAODV) is more secured version of AODV with incorporation of an extension in different AODV formats of packets .Mostly digital signature are incorporated for shielding the non-mutable info in packets along with hash chains for protecting the mutable information for example hop count. Similar to AODV, SAODV too have two different mechanisms one for discovering route and second for maintenance of route. The chief difference between AODV and SAODV is the presence of more complex process for detection of route because SAODV upsurges the course of directly authenticating the endpoint node with the help of random numbers exchange (Siwach, Sehrawat & Singh (2020).
The third category of MANET routing protocols utilizes both on demand and table driven strategy and are called as Hybrid protocols due to presence of characteristics of proactive and reactive types of routing protocols for attainment of enhanced effects[22]. Such protocols exercise reactive routing in determining the route, while proactive feature is used in the maintenance of table. Although many researchers researched on several sorts of hybrid protocols being most famously utilized for discovering routes reported in their work for Adhoc networks. In one (Gautam, Mahajan & Zafar,(2019)work has been proposed to compare the three routing protocol for PDR and delay under the scenario of varying nodes .In this present research work three routing protocols have been compared for energy consumption while transferring the data in the scenario of varying speed among 30 fixed nodes.
Results and discussion
This study work is realized while utilizing mobility model for comparing most widely used hybrid, secured and reactive routing protocols. One of the important aspects for analysis is to analyse the impact of attacks of the performance of adhoc based complex networks. In this research study instead of varying the number of nodes, the comparison is based on the changes in speed variations, keeping number of nodes fixed. It is one of the significant characteristic of ad-hoc networks to form a network in varying speed scenario. Simulation setting setup for mobility based model with varying speed among fixed nodes on HWMP, SAODV and AODV is shown above in (Table 1).The number of nodes considered fixed in this case is 30.
Table1. Simulated environment with respect to changing speed among fixed 30 nodes
Parameters |
Value Used |
No. of Nodes |
30 |
Area Traffic |
1800 x 840 Constant Bit Rate |
Simulation Time |
60 Sec |
No. of Connections Traffic Rate Speed |
20 4 packets/s 10,20,30,40,50 m/s |
Packet Size |
1024 |
Energy consumption is one of the most important parameters for the design of IoT –MANET system. It is highly recommended to search for the routing protocols, having minimum energy consumption. Since most of the health app are part of the tools used against fighting COVID-19 and are widely used by masses through smartphones.
The (Table 2) reflects the energy consumption comparison among routing protocols considered in work. (Figure 4) represents the bar graphs whereas (Figure 5) and (Figure 6) are graphs for energy consumption variation for three protocols in nonappearance and in presence of DDoS attacks respectively.
Table 2.Variation of energy consumption with varying speed for fixed 30 devices as nodes for three routing protocols
Routing Protocols |
Energy consumption for varying speed for fixed 30 nodes (10,20,30,40,50)
|
|||||
|
10 |
20 |
30 |
40 |
50 |
|
AODV without Attack |
1982.38 |
2155.07 |
2265.29 |
2407.76 |
2527.42 |
|
AODV with Attack |
2318.49 |
2564.53 |
2738.31 |
2908.83 |
3013.82 |
|
SAODV without Attack |
1837.66 |
2091.54 |
2183.18 |
2278.41 |
2304.72 |
|
SAODV with Attack |
2011.35 |
2256.9 |
2437.86 |
2609.27 |
2765.86 |
|
HWMP without Attack |
967.71 |
1099.35 |
1239.02 |
1542.38 |
1784.81 |
|
HWMP with Attack |
1876.86 |
2109.82 |
2317.27 |
2462.21 |
2598.73 |
|
Figure 4. Bar Graph based assessment of total energy consumption in three protocols with changing speed connection among 30 nodes
Figure.5 Energy Consumption in absenteeism of DDoS assaults for protocols with varying speed connection among 30 nodes
Figure.6 Energy Consumption under influence of DDoS attacks for three routing protocols with varying speed connection among 30 nodes
For 50 m/s, HWMP is 41.6% better than reactive category ( AODV )and 29.12% improved than SAODV, in nonappearance of DDoS assaults . Under the influence of attack for 50m/s speed among 30 nodes, HWMP is 15.97% and 6.43% improved from AODV and SAODV, correspondingly. Thus, HWMP reasonably delivers improved outcomes than AODV and SAODV, therefore can be concluded that hybrid protocol HWMP is much more advantageous to be employed in patient healthcare environs.
One Way ANNOVA Test
In this research study we used the statistical tool of IBM –SPSS for understanding the variance within the routing protocols analyzed and also to know the variation among each other with respect to the varying speed of connections among 30 nodes. Since the number of routing protocols simulated in NS-2 for this research study was three hence we are using ANOVA test which is used for analysis of variance among more than 2 group. Thus the degree of freedom k>2 so we applied the ANNOVA test with (α=0.05).
Table 3. Descriptive for three routing protocols in absence of attacks for energy consumption
(Table 3) above illustrates s the descriptives for AODV, SAODV and HWMP ,which includes the total terms in particular routing protocols denoted by N ,Mean of individual routing protocols along with standard deviation .(Table 4) below demonstrated the ANOVA test held on three routing protocols which inludes the information of degree of freedom F critical and .There is five step procedure for the conducting and analyzing the ANOVA test. The ANNOVA hypothesis test is shown in (Table 3) and (Table 4 ).Since the Fcritical is 0.000 so we reject the null hypothesis H0 which says that µ1= µ2= µ3.
Table 4. ANOVA test for three routing protocols in absence of attacks
Table 5.Multiple Comparisons for three routing protocols in absence of attacks |
Post Hoc Tests are described in Table 5 discus the variation among each other. Thus energy consumption varies very less for the considered routing protocols under the varying condition of changing number of nodes. Table 6 discusses the descriptive like mean standard deviation for the three routing protocol under the effect of DDoS attacks.
Table 6. Descriptive for three routing protocols in presence of attacks for energy consumption
Table 7. ANOVA test for three routing protocols under influence of attacks
Table.8.Multiple Comparisons for three routing protocols in influence of attacks
(Table 7) shown below discusses the ANOVA test for the three routing protocols under the influence of DDoS attacks. This includes the information about the SSB sum of squares between groups and sum of squares within groups along with degree of freedom. We reject the null hypothesis H0. Post Hoc Tests represents the variation with respect to each other as shown in (Table 8).
The multiple comparisons for three routing protocols in the presence of attacks reflects that the mean variation in HWMP is less in comparison to the widely used reactive protocol AODV and secured protocol SAODV.
Conclusion
In this research study, the utilization of IOT-MANET based for handling the COVID -19 was emphasized in introductory section. Further to ensure optimized routing for the healthcare related data through smart phones the three routing protocols are considered and compared on the basis of average energy consumption. Thus for maintaining the privacy and patients security MANET based IoT devices could be used for handling patients to hospital management system and vice versa ; transmission of patient's complex data. This research study work scrutinized the performance of reactive (AODV, SAODV) protocols and hybrid HWMP, respectively, both in the absence and under the influence of DDoS attacks. Since monitoring the health conditions remotely is helping the healthcare professionals for tackling this novel coronavirus, thus the impact of DDoS attacks could lead to even death of patient. The simulation results of network simulator on the basis of one QoS parameter evaluates, HWMP overtakes from the two traditional routing protocols considered for different variation in speed for stable nodes number deliberated in the simulation. Under the influence of attacks for speed of 50 m/s for 30 fixed nodes, HWMP outperforms AODV and SAODV by 15.97% and 6.43% respectively for average energy consumption. The ANNOVA test, which is used one independent variable and dependent variable helps to study the correctness of result by looking at the table for both the scenario of in absence and presence of attacks. The mean plot describes that HWMP energy consumption is very less in contrast to reactive and secured protocol considered in study.
Future Work
In future the more QoS parameters like packet delivery ratio, Packet loss ratio, jitter, throughput and normalized routing load will also be compared among the three considered protocols in the investigation conducted, with different scenarios .The implementation of block chain can be worked upon in the interest of providing security majorly to the MANETS used in wireless mesh networks and in IoT MNAET based formed networks. Since the lots of emphasis has been on providing the privacy to the networks one the devices start connecting among each other via internet.
Conflict of interest
The authors declare no potential conflict of interest regarding the publication of this work. In addition, the ethical issues including plagiarism, informed consent, misconduct, data fabrication and, or falsification, double publication and, or submission, and redundancy have been completely witnessed by the authors.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.