Research Article

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network

Table 1

Comparison of the available solutions.

ReferenceMechanismTackled attacksSecurity analysisLimitations

WRSR [5]Statistical based: neighbors’ information and existing of alternative pathWormholeSimulation with strong adversary scenarioInefficient protection due to limited number of attacks handled

WSRPHWM [6]Cryptography based and past communication statistics Spoofed route signaling
Replay attack
Black hole
Wormhole
Grey hole
Routing disruption
Theoretical(i) Additional resources are required which is a certification authority
(ii) Overhead due to usage of public key cryptography

CSROR [7]Past communication statisticsWormhole, black hole, and grey holeNot providedInefficient protection due to limited number of attacks handled

E-SRPM [8]Link’s length information and random walk route schemeWormholeSimulationInefficient protection due to limited number of attacks handled

ARANA [9]Cryptography basedMalicious packets manipulationSimulation(i) Additional resources are required which is a certification authority
(ii) Overhead due to usage of public key cryptography
(iii) Inefficient protection due to limited number of attacks handled

SAODV [10]Cryptography basedMalicious packets manipulation of routing metric and nodes impersonationSimulation(i) Additional resources are required which is a certification authority
(ii) Overhead due to usage of public key cryptography
(iii) Inefficient protection due to limited number of attacks handled

I-SEAD [11]Cryptography basedMalicious routing updateSimulationInefficient protection due to limited number of attacks handled

SAR [12]Cryptography basedRoute discovery processTheoretical(i) Additional resources are required which is a certification authority
(ii) Overhead due to usage of public key cryptography
(iii) Inefficient protection due to limited number of attacks handled

Leak detector [13]Statistical based: neighbors’ information and existence of alternative pathSelective forwarding and black holeSimulation(i) Inefficient protection due to limited number of attacks handled
(ii) Complexity due to required integration in existing routing protocol

SeRWA [14]Neighbor information and cryptography basedWormholeSimulation(i) Additional resources are required to distribute keys
(ii) Inefficient protection due to limited number of attacks handled

CRP [15]Statistical based: neighbor information and public key cryptographyBlack hole, grey hole, packet tampering, rushing attack, and collusion attackSimulation(i) Additional resources are required which is a certification authority
(ii) Overhead due to usage of public key cryptography
(iii) Inefficient protection due to limited number of attacks handled

PASER [16]Cryptography based and GPS locationWormhole and cryptographic protection (message and node authentication, message freshness, and message confidentiality)Simulation(i) Additional resources are required which is a certification authority and GPS hardware
(ii) Overhead due to usage of public key cryptography