40 research outputs found

    A survey on wireless body area networks: architecture, security challenges and research opportunities.

    Get PDF
    In the era of communication technologies, wireless healthcare networks enable innovative applications to enhance the quality of patients’ lives, provide useful monitoring tools for caregivers, and allows timely intervention. However, due to the sensitive information within the Wireless Body Area Networks (WBANs), insecure data violates the patients’ privacy and may consequently lead to improper medical diagnosis and/or treatment. Achieving a high level of security and privacy in WBAN involves various challenges due to its resource limitations and critical applications. In this paper, a comprehensive survey of the WBAN technology is provided, with a particular focus on the security and privacy concerns along with their countermeasures, followed by proposed research directions and open issues

    Certificateless Algorithm for Body Sensor Network and Remote Medical Server Units Authentication over Public Wireless Channels

    Get PDF
    Wireless sensor networks process and exchange mission-critical data relating to patients’ health status. Obviously, any leakages of the sensed data can have serious consequences which can endanger the lives of patients. As such, there is need for strong security and privacy protection of the data in storage as well as the data in transit. Over the recent past, researchers have developed numerous security protocols based on digital signatures, advanced encryption standard, digital certificates and elliptic curve cryptography among other approaches. However, previous studies have shown the existence of many security and privacy gaps that can be exploited by attackers to cause some harm in these networks. In addition, some techniques such as digital certificates have high storage and computation complexities occasioned by certificate and public key management issues. In this paper, a certificateless algorithm is developed for authenticating the body sensors and remote medical server units. Security analysis has shown that it offers data privacy, secure session key agreement, untraceability and anonymity. It can also withstand typical wireless sensor networks attacks such as impersonation, packet replay and man-in-the-middle. On the other hand, it is demonstrated to have the least execution time and bandwidth requirements

    A reliable trust-aware reinforcement learning based routing protocol for wireless medical sensor networks.

    Get PDF
    Interest in the Wireless Medical Sensor Network (WMSN) is rapidly gaining attention thanks to recent advances in semiconductors and wireless communication. However, by virtue of the sensitive medical applications and the stringent resource constraints, there is a need to develop a routing protocol to fulfill WMSN requirements in terms of delivery reliability, attack resiliency, computational overhead and energy efficiency. This doctoral research therefore aims to advance the state of the art in routing by proposing a lightweight, reliable routing protocol for WMSN. Ensuring a reliable path between the source and the destination requires making trustaware routing decisions to avoid untrustworthy paths. A lightweight and effective Trust Management System (TMS) has been developed to evaluate the trust relationship between the sensor nodes with a view to differentiating between trustworthy nodes and untrustworthy ones. Moreover, a resource-conservative Reinforcement Learning (RL) model has been proposed to reduce the computational overhead, along with two updating methods to speed up the algorithm convergence. The reward function is re-defined as a punishment, combining the proposed trust management system to defend against well-known dropping attacks. Furthermore, with a view to addressing the inborn overestimation problem in Q-learning-based routing protocols, we adopted double Q-learning to overcome the positive bias of using a single estimator. An energy model is integrated with the reward function to enhance the network lifetime and balance energy consumption across the network. The proposed energy model uses only local information to avoid the resource burdens and the security concerns of exchanging energy information. Finally, a realistic trust management testbed has been developed to overcome the limitations of using numerical analysis to evaluate proposed trust management schemes, particularly in the context of WMSN. The proposed testbed has been developed as an additional module to the NS-3 simulator to fulfill usability, generalisability, flexibility, scalability and high-performance requirements

    Technology Implications of UWB on Wireless Sensor Network-A detailed Survey

    Get PDF
    In today’s high tech “SMART” world sensor based networks are widely used. The main challenge with wireless-based sensor networks is the underneath physical layer. In this survey, we have identified core obstacles of wireless sensor network when UWB is used at PHY layer. This research was done using a systematic approach to assess UWB’s effectiveness (for WSN) based on information taken from various research papers, books, technical surveys and articles. Our aim is to measure the UWB’s effectiveness for WSN and analyze the different obstacles allied with its implementation. Starting from existing solutions to proposed theories. Here we have focused only on the core concerns, e.g. spectrum, interference, synchronization etc.Our research concludes that despite all the bottlenecks and challenges, UWB’s efficient capabilities makes it an attractive PHY layer scheme for the WSN, provided we can control interference and energy problems. This survey gives a fresh start to the researchers and prototype designers to understand the technological concerns associated with UWB’s implementatio

    Particle Swarm Optimization for Interference Mitigation of Wireless Body Area Network: A Systematic Review

    Get PDF
    Wireless body area networks (WBAN) has now become an important technology in supporting services in the health sector and several other fields. Various surveys and research have been carried out massively on the use of swarm intelligent (SI) algorithms in various fields in the last ten years, but the use of SI in wireless body area networks (WBAN) in the last five years has not seen any significant progress. The aim of this research is to clarify and convince as well as to propose a answer to this problem, we have identified opportunities and topic trends using the particle swarm optimization (PSO) procedure as one of the swarm intelligence for optimizing wireless body area network interference mitigation performance. In this research, we analyzes primary studies collected using predefined exploration strings on online databases with the help of Publish or Perish and by the preferred reporting items for systematic reviews and meta-analysis (PRISMA) way. Articles were carefully selected for further analysis. It was found that very few researchers included optimization methods for swarm intelligence, especially PSO, in mitigating wireless body area network interference, whether for intra, inter, or cross-WBAN interference. This paper contributes to identifying the gap in using PSO for WBAN interference and also offers opportunities for using PSO both standalone and hybrid with other methods to further research on mitigating WBAN interference

    Energy efficiency considerations in software‐defined wireless body area networks

    Get PDF
    Wireless body area networks (WBAN) provide remote services for patient monitoring which allows healthcare practitioners to diagnose, monitor, and prescribe them without their physical presence. To address the shortcomings of WBAN, software-defined networking (SDN) is regarded as an effective approach in this prototype. However, integrating SDN into WBAN presents several challenges in terms of safe data exchange, architectural framework, and resource efficiency. Because energy expenses account for a considerable portion of network expenditures, energy efficiency has to turn out to be a crucial design criterion for modern networking methods. However, creating energy-efficient systems is difficult because they must balance energy efficiency with network performance. In this article, the energy efficiency features are discussed that can widely be used in the software-defined wireless body area network (SDWBAN). A comprehensive survey has been carried out for various modern energy efficiency models based on routing algorithms, optimization models, secure data delivery, and traffic management. A comparative assessment of all the models has also been carried out for various parameters. Furthermore, we explore important concerns and future work in SDWBAN energy efficiency

    QoS in Body Area Networks: A survey

    Get PDF

    Energy efficient in cluster head and relay node selection for wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) are defined as networks of nodes that work in a cooperative way to sense and control the surrounding environment. However, nodes contain limited energy which is the key limiting factor of the sensor network operation. In WSN architecture, the nodes are typically grouped into clusters where one node from each cluster is selected as the Cluster Head (CH) and relays utilisation to minimise energy consumption. Currently, the selection of CH based on a different combination of input variables. Example of these variables includes residual energy, communication cost, node density, mobility, cluster size and many others. Improper selection of sensor node (i.e. weak signal strength) as CH can cause an increase in energy consumption. Additionally, a direct transmission in dual-hop communication between sensor nodes (e.g. CH) with the base station (BS) uses high energy consumption. A proper selection of the relay node can assist in communication while minimising energy consumption. Therefore, the research aim is to prolong the network lifetime (i.e. reduce energy consumption) by improving the selection of CHs and relay nodes through a new combination of input variables and distance threshold approach. In CH selection, the Received Signal Strength Indicator (RSSI) scheme, residual energy, and centrality variable were proposed. Fuzzy logic was utilized in selecting the appropriate CHs based on these variables in the MATLAB. In relay node selection, the selection is based on the distance threshold according to the nearest distance with the BS. The selection of the optimal number of relay nodes is performed using K-Optimal and K-Means techniques. This ensures that all CHs are connected to at least one corresponding relay node (i.e. a 2-tier network) to execute the routing process and send the data to BS. To evaluate the proposal, the performance of Multi-Tier Protocol (MAP) and Stable Election Protocol (SEP) was compared based on 100, 200, and 800 nodes with 1 J and random energy. The simulation results showed that our proposed approach, refer to as Energy Efficient Cluster Heads and Relay Nodes (EECR) selection approach, extended the network lifetime of the wireless sensor network by 43% and 33% longer than SEP and MAP, respectively. This thesis concluded that with effective combinations of variables for CHs and relay nodes selection in static environment for data routing, EECR can effectively improve the energy efficiency of WSNs

    Challenges and Limitation Analysis of an IoT-Dependent System for Deployment in Smart Healthcare Using Communication Standards Features

    Get PDF
    The use of IoT technology is rapidly increasing in healthcare development and smart healthcare system for fitness programs, monitoring, data analysis, etc. To improve the efficiency of monitoring, various studies have been conducted in this field to achieve improved precision. The architecture proposed herein is based on IoT integrated with a cloud system in which power absorption and accuracy are major concerns. We discuss and analyze development in this domain to improve the performance of IoT systems related to health care. Standards of communication for IoT data transmission and reception can help to understand the exact power absorption in different devices to achieve improved performance for healthcare development. We also systematically analyze the use of IoT in healthcare systems using cloud features, as well as the performance and limitations of IoT in this field. Furthermore, we discuss the design of an IoT system for efficient monitoring of various healthcare issues in elderly people and limitations of an existing system in terms of resources, power absorption and security when implemented in different devices as per requirements. Blood pressure and heartbeat monitoring in pregnant women are examples of high-intensity applications of NB-IoT (narrowband IoT), technology that supports widespread communication with a very low data cost and minimum processing complexity and battery lifespan. This article also focuses on analysis of the performance of narrowband IoT in terms of delay and throughput using singleand multinode approaches. We performed analysis using the message queuing telemetry transport protocol (MQTTP), which was found to be efficient compared to the limited application protocol (LAP) in sending information from sensors.Ministerio Español de Ciencia e Innovación under project number PID2020-115570GB-C22 (DemocratAI::UGR)Cåtedra de Empresa Tecnología para las Personas (UGR-Fujitsu

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
    corecore