An Intelligent Healthcare System Using IoT in Wireless Sensor Network
<p>Architecture of wireless sensor networks.</p> "> Figure 2
<p>Conceptual Workflow of Proposed Genetic-based System on WSN.</p> "> Figure 3
<p>Example String 1.</p> "> Figure 4
<p>Genetically Cryptographic algorithm for data security.</p> "> Figure 5
<p>Authentication Process for Smooth Data Transmission.</p> "> Figure 6
<p>Encryption Time Complexity.</p> "> Figure 7
<p>Decryption Time Complexity.</p> "> Figure 8
<p>Comparison Analysis of Encryption Time Complexity.</p> "> Figure 9
<p>Comparison Analysis of Decryption Time Complexity.</p> "> Figure 10
<p>Comparison Analysis of Total Computation Cost of System.</p> ">
Abstract
:1. Introduction
1.1. Contributions and Novelty
- This work introduces a novel cryptography technique based on a genetic-based technique with a logical–mathematical model.
- In this article, security analysis and experimental findings of the proposed technique are presented to validate its efficacy over existing techniques.
- A strong authentication process is proposed to smooth data transmission and avoid malicious node attacks. IoT devices share the sensor data they collect by connecting to an IoT gateway.
- Resultant comparisons of the proposed technique are presented to analyze the time efficiency parameters.
- To explain the most recent developments in intelligent healthcare systems using the internet of things.
- Encourage the transmission of encrypted, safe data via a trustworthy, lightweight route to improve the networks’ performance.
- To evade third party attackers and hackers from accessing the data over the wireless channel.
1.2. Literature Review
2. Materials and Methods
Mathematical Modelling
3. Security Analysis
3.1. Blackhole
3.2. Selective Forwarding
3.3. Sybil Attack
3.4. Hello Flood Attack
4. Results and Discussion
4.1. Encryption Time Complexity
4.2. Decryption Time Complexity
4.3. Comparison Analysis of Encryption Time Complexity
4.4. Comparison Analysis of Decryption Time Complexity
4.5. Comparison Analysis of Total Cost Computation
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, J.C.-W. Applications of Wireless Sensor Networks, and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors 2022, 22, 2087. [Google Scholar] [CrossRef] [PubMed]
- Akyildiz, I.F.; Su, W.; Subramaniam, Y.S.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
- Estrin, D.; Culler, D.; Pister, K.; Sukhatme, G. Connecting the physical world with pervasive networks. IEEE Pervasive Comput. 2002, 7, 59–69. [Google Scholar] [CrossRef]
- Akyildiz, I.; Jornet, F. Electromagnetic wireless nano sensor networks. Nano Commun. Netw. 2010, 1, 3–19. [Google Scholar] [CrossRef]
- Akyildiz, I.; Kasimoglu, F. Wireless sensor and actor networks: Research challenges. Ad Hoc Netw. 2014, 2, 351–367. [Google Scholar] [CrossRef]
- Salau, A.O.; Marriwala, N.; Athaee, M. Data Security in Wireless Sensor Networks: Attacks and Countermeasures. In Mobile Radio Communications and 5G Networks; Springer: Singapore, 2021. [Google Scholar]
- Lien, Y.N. Hop-by-Hop TCP for Sensor Networks. Int. J. Comput. Netw. Commun. 2009, 1, 1–16. [Google Scholar]
- Basagni, S.; Conti, M.; Giordano, S. Mobile Ad Hoc Networking: Cutting Edge Directions, 2nd ed.; Wiley-IEEE Press: Hoboken, NJ, USA, 2013. [Google Scholar]
- Yu, X.; Wu, P.; Han, W.; Zhang, Z. Overview of wireless underground sensor networks for agriculture. Afr. J. Biotechnol. 2014, 11, 3942–3948. [Google Scholar]
- Huanan, Z.; Suping, X.; Jiannan, W. Security and application of wireless sensor network. Procedia Comput. Sci. 2021, 183, 486–492. [Google Scholar] [CrossRef]
- Tian, J.; Gao, M. Wireless sensor network node optimal coverage based on improved genetic algorithm and binary ant colony algorithm. J. Wirel. Com. Netw. 2016, 2016, 104. [Google Scholar] [CrossRef]
- Alotaibi, M. Security to wireless sensor networks against malicious attacks using Hamming residue method. J. Wirel. Com. Netw. 2019, 2019, 8. [Google Scholar] [CrossRef]
- Ahmed, R.; Ali, R.W.; Ain, T.A. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 2022, 22, 4730. [Google Scholar] [CrossRef] [PubMed]
- Praveena, A. Achieving data security in wireless sensor networks using ultra encryption standard version—IV algorithm. In Proceedings of the International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), Coimbatore, India, 16–18 March 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Panda, M. Data security in wireless sensor networks via AES algorithm. In Proceedings of the 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 9–10 January 2015; pp. 1–5. [Google Scholar] [CrossRef]
- Acharya, S.; Tripathy, C.R. An ANN Approach for Fault Tolerant Wireless Sensor Networks. In Emerging ICT for Bridging the Future, Proceedings of the 49th Annual Convention of the Computer Society of India, Hyderabad, India, 11–15 December 2014; CSI Springer International Publishing: Berlin/Heidelberg, Germany, 2015; Volume 2, pp. 475–483. [Google Scholar]
- Lajevardi, A.; Haghighat, A.T.; Eghbali, A.N. Extending directed diffusion routing algorithm to support sink mobility in wireless sensor networks. In Proceedings of the Communications (MICC), 2009 IEEE 9th Malaysia International Conference, Kuala Lumpur, Malaysia, 15–17 December 2009; pp. 541–546. [Google Scholar]
- Stann, F.; Heidemann, J. RMST: Reliable data transport in sensor networks. In Proceedings of the IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, 11 May 2003. [Google Scholar]
- Pereira, P.R.; Grilo, A.; Rocha, F.; Nunes, M.S.; Casaca, A.; Chaudet, C.; Almström, P.; Johansson, M. End-To-End Reliability in Wireless Sensor Networks: Survey and Research Challenges. In Proceedings of the Euro FGI Workshop on IP QoS and Traffic Control, Ghent, Belgium, 6–7 December 2007; pp. 1–8. [Google Scholar]
- Madaan, S.; Kumar, D.; Khurana, R. An Enhanced Approach for Synchronization in WSN. Int. J. Comput. Appl. 2014, 94, 51–56. [Google Scholar] [CrossRef]
- Dorothy, A.B.; Kumar, S.B.R. An approach for IoT security using quantum key distribution. Int. J. Sci. Technol. Res. 2019, 8, 9. [Google Scholar]
- Seyfollahi, A.; Ghaffari, A. Reliable data dissemination for the Internet of Things using Harris hawks optimization. Peer-to-Peer Netw. Appl. 2020, 13, 1886–1902. [Google Scholar] [CrossRef]
- Seyfollahi, A.; Moodi, M.; Ghaffari, A. MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput. Stand. Interfaces 2022, 82, 15. [Google Scholar] [CrossRef]
- Riga, N.; Matta, I.; Medina, A.; Partridge, C.; Redi, J. An energy-conscious transport protocol for multi-hop wireless networks. In Proceedings of the 2007 ACM Context Conference, New York, NY, USA, 13–14 June 2007. [Google Scholar]
- Azeem, A.M.; Ashraf, H.; Alaboudi, A.A.; Humayun, M.; Jhanji, N.Z. Secure Healthcare Data Aggregation and Transmission in IoT-A Survey. IEEE Access 2021, 9, 16849–16865. [Google Scholar]
- Jabeen, T.; Ashraf, H.; Ullah, A. A Survey on Healthcare Data Security in Wireless Body Area Network. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 9841–9854. [Google Scholar] [CrossRef] [PubMed]
- Saqib, M.; Jasra, B.; Moon, A.H. A lightweight three factor authentication framework for IoT based critical applications. J. King Saud Univ. Comput. Inf. Sci. 2021, 34, 6925–6937. [Google Scholar] [CrossRef]
- Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.-J.; Yoo, K.-Y. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Niu, J.; Wu, F.; Liao, J.; Choo, K.-K.R. A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J. 2017, 5, 1606–1615. [Google Scholar] [CrossRef]
Chromosomes Bits | Reproduction | Chromosomes Bits | Reproduction |
---|---|---|---|
0000 | T | 1100 | P |
0001 | E | 1101 | S |
0010 | Y | 1110 | U |
0100 | A | 1010 | V |
0101 | H | 1011 | W |
0110 | R | 1001 | X |
0111 | M | 1111 | Y |
1000 | D | 0011 | Z |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jabeen, T.; Jabeen, I.; Ashraf, H.; Jhanjhi, N.Z.; Yassine, A.; Hossain, M.S. An Intelligent Healthcare System Using IoT in Wireless Sensor Network. Sensors 2023, 23, 5055. https://doi.org/10.3390/s23115055
Jabeen T, Jabeen I, Ashraf H, Jhanjhi NZ, Yassine A, Hossain MS. An Intelligent Healthcare System Using IoT in Wireless Sensor Network. Sensors. 2023; 23(11):5055. https://doi.org/10.3390/s23115055
Chicago/Turabian StyleJabeen, Tallat, Ishrat Jabeen, Humaira Ashraf, N. Z. Jhanjhi, Abdulsalam Yassine, and M. Shamim Hossain. 2023. "An Intelligent Healthcare System Using IoT in Wireless Sensor Network" Sensors 23, no. 11: 5055. https://doi.org/10.3390/s23115055
APA StyleJabeen, T., Jabeen, I., Ashraf, H., Jhanjhi, N. Z., Yassine, A., & Hossain, M. S. (2023). An Intelligent Healthcare System Using IoT in Wireless Sensor Network. Sensors, 23(11), 5055. https://doi.org/10.3390/s23115055