7 research outputs found

    Real time telemedical health care systems with wearable sensors

    Get PDF
    The time between detection and response to chronic diseases could go a long way in saving lives. The current trend in health monitoring systems is to move from the hospital centered device to eventually portable personal devices. Hence,Telemedical health care involves the remote delivery of medical care service to either out-of-hospital or admitted patients through wireless network and computer information technology. This paper systematically reviews the most recent works in telemedical health care system to propose a more efficient model. The focus is more on wearable sensors and devices with most attention given to cardiovascular patients in recent times. The huge literature available reflects the size of activity and attention given to telemedicine. The reviewed works are published within the last five years. Furthermore, the proposed systems are compared in terms of their connectivity, targeted application, type of sensor used, etc. Our study reveals Telemedicine to be a profound field with researchers from multidisciplinary sectors. However, there are still many gaps that need to be filled before maturity. Factors such as efficient wireless transmission, cyber data security, sensor design and integration, device miniaturization and intelligent algorithm for multi parameter data fusion require further considerations

    A Comprehensive Insight into Game Theory in relevance to Cyber Security

    Get PDF
    The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity

    A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)

    Get PDF
    The current era of smart computing and enabling technologies encompasses the Internet of Things (IoT) as a network of connected, intelligent objects where objects range from sensors to smartphones and wearables. Here, nodes or objects cooperate during communication scenarios to accomplish effective throughput performance. Despite the deployment of large-scale infrastructure-based communications with faster access technologies, IoT communication layers can still be affected with security vulnerabilities if nodes/objects do not cooperate and intend to take advantage of other nodes for fulfilling their malevolent interest. Therefore, it is essential to formulate an intrusion detection/prevention system that can effectively identify the malicious node and restrict it from further communication activitiesโ€”thus, the throughput, and energy performance can be maximized to a significant extent. This study introduces a combined multi-agent and multilayered game formulation where it incorporates a trust model to assess each node/object, which is participating in IoT communications from a security perspective. The experimental test scenarios are numerically evaluated, where it is observed that the proposed approach attains significantly improves intrusion detection accuracy, delay, and throughput performance as compared to the existing baseline approaches

    Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing

    No full text
    Cloud Computing is an emerging technology nowadays. Due to the accessibility, availability, and cost effectiveness, cloud computing has became essential computing system in both, private and public sectors. However, secure data transfer is still a big question where transferring link between user and server are not stabilized yet. As a result, many cloud users lost their valuable data. However, this paper proposes as integrated service of Advanced Quantum Cryptography with Cloud Computing. To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys

    MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions

    No full text
    Currently, Mobile Ad hoc Networks (MANETs) have evolved as one of the essential next-generation wireless network technologies. MANET comprises of mobile nodes that are self-configurable, and every mobile node behaves as a router for every other node allowing data to move by making use of multi-hop network routes. MANETs signify a networking class that is crucial and differs from conventional systems. Although MANETs are being popularly employed in commercial as well as academic fields, these were primarily designed for deployment in areas like military battlefields, emergency rescue and search operations, and other challenging or hostile environments. The distributed and wireless nature of MANETs paves the way for intruders to reduce MANET functionalities. MANET are susceptible to various attack at different layers since the majority of MANET routing protocols are designed with the assumption that no malicious intruder is present in the network. Therefore, recognizing those threats and finding solutions for their mitigation become essential. This study analyses various security attributes, challenges, attacks on multiple layers and countermeasures for thwarting attacks in MANET

    A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks

    No full text
    The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario, where dynamic host movement results in frequent topology changes. In MANET, nodes cooperate during route establishment, and the data packet must travel from source to destination through multi-hop intermediate links. The nodes in a MANET can be localized in a restricted zone, where manual intervention to set-up fixed infrastructural support is practically infeasible. However, cooperative packet forwarding and data transmission is quite a common scenario in the context of MANET. Still, due to dynamic topological changes, weak, intermittent links appear within one-hop communication. This leads to a higher possibility of packet drop events and also increases the retransmission scenario, which affects the energy performance of the network. Addressing this issue, the study models a novel and intelligent packet forwarding approach based on the game theory, where trust evaluation in terms of node reputation factor also plays a very vital role. The approach also enforces an incentive modelling to stimulate the cooperation between mobile nodes during the MANET routing scenario. The system is designed and developed with evolutionary game perspectives to meet the Quality of Services (QoS) requirements. The experimental analysis supports the proposed modelling design aspects. Also, it exhibits that the reputation and trust-based game increases the utility of packet-forwarding strategy with high throughput and negligible network overhead

    A comprehensive insight into game theory in relevance to cyber security

    No full text
    The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity
    corecore