Skip to main content
Top
Published in: Cluster Computing 3/2019

28-02-2018

Tiger hash based AdaBoost machine learning classifier for secured multicasting in mobile healthcare system

Authors: Rajagopal Venkatesan, Balakrishnan Srinivasan, Periyasamy Rajendiran

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secure multicast routing is an important in mobile healthcare system. Few research works have been developed to prevent malicious behaviors from disclosing integrity of data in mobile healthcare systems using machine learning technique. But, the performance of conventional machine learning technique was not effectual. In order to overcome this limitation, Tiger hashing based AdaBoost with SVM classifier (TH-ASVMC) technique is proposed. The TH-ASVMC technique is designed to improve the security of multicast routing in MANETs with higher data integrity rate and therefore reducing the time taken. The TH-ASVMC technique initially used Tiger hash function which converts the patient data to be transmitted over a wireless network into a hash value for maintaining the data integrity during the process of multicasting in mobile healthcare system. After that, TH-ASVMC technique used AdaBoost with SVM classifier to classify the nodes in mobile healthcare system as authentic or unauthentic based on measurement of trust value for securing multicast routing with minimum communication overhead. Thus, TH-ASVMC technique choose the only an authentic node for routing the hash value of patient data to multiple destination nodes in mobile healthcare system. This process results in enhanced reliability and scalability of secured multicast routing. The TH-ASVMC technique conducts the simulations works on metrics such as data integrity rate, scalability, reliability and communication overhead. The simulation results shows that the TH-ASVMC technique is able to improve the reliability and data integrity rate of multicast routing as compared to state-of-the-art works.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xia, H., Jia, Z., Sha, E.H.-M.: Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur. 8(2), 88–103 (2014)CrossRef Xia, H., Jia, Z., Sha, E.H.-M.: Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf. Secur. 8(2), 88–103 (2014)CrossRef
2.
go back to reference Abdulwahid, H., Dai, B., Huang, B., Chen, Z.: Scheduled-links multicast routing protocol in MANETs. J. Netw. Comput. Appl., 63, 56–67 (2016)CrossRef Abdulwahid, H., Dai, B., Huang, B., Chen, Z.: Scheduled-links multicast routing protocol in MANETs. J. Netw. Comput. Appl., 63, 56–67 (2016)CrossRef
3.
go back to reference Arthur, M.P., Kannan, K.: Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wirel. Netw. 22(3), 1035–1059 (2016)CrossRef Arthur, M.P., Kannan, K.: Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wirel. Netw. 22(3), 1035–1059 (2016)CrossRef
4.
go back to reference Moamen, A.A., Hamza, H.S., Saroit, I.A.: Secure multicast routing protocols in mobile ad-hoc networks. Int. J. Commun Syst 27(11), 2808–2831 (2014) Moamen, A.A., Hamza, H.S., Saroit, I.A.: Secure multicast routing protocols in mobile ad-hoc networks. Int. J. Commun Syst 27(11), 2808–2831 (2014)
6.
go back to reference Gopinatha, S., Nagarajan, N.: Energy based reliable multicast routing protocol for packet forwarding in MANET. J. Appl. Res. Technol. 13(3), 374–381 (2015)CrossRef Gopinatha, S., Nagarajan, N.: Energy based reliable multicast routing protocol for packet forwarding in MANET. J. Appl. Res. Technol. 13(3), 374–381 (2015)CrossRef
7.
go back to reference Singh, K., Yadav, R.S.: Dynamic security scheme for multicast source authentication. Procedia Technol 4, 515–521 (2012)CrossRef Singh, K., Yadav, R.S.: Dynamic security scheme for multicast source authentication. Procedia Technol 4, 515–521 (2012)CrossRef
9.
go back to reference Chopra, Amit, Kumar, Rajneesh: Self-organized hash based secure multicast routing over ad hoc networks. Int. J. Adv. Comput. Sci. Appl. 7(2), 155–163 (2016) Chopra, Amit, Kumar, Rajneesh: Self-organized hash based secure multicast routing over ad hoc networks. Int. J. Adv. Comput. Sci. Appl. 7(2), 155–163 (2016)
10.
go back to reference Arumugam, A., Jayakumar, C.: Secure multicast tree construction using bacterial foraging optimization (BFO) for MANET. Circuits Syst. 7, 4154–4168 (2016)CrossRef Arumugam, A., Jayakumar, C.: Secure multicast tree construction using bacterial foraging optimization (BFO) for MANET. Circuits Syst. 7, 4154–4168 (2016)CrossRef
12.
go back to reference Yadav, A.K., Soni, S.: Secure multicast key distribution in mobile ad hoc networks. Adv. Wirel. Mobile Commun. 10(4), 781–792 (2017) Yadav, A.K., Soni, S.: Secure multicast key distribution in mobile ad hoc networks. Adv. Wirel. Mobile Commun. 10(4), 781–792 (2017)
14.
go back to reference Singh, T., Singh, J., Sharma, S.: Energy efficient secured routing protocol for MANETs. Wirel. Netw. 23(4), 1001–1009 (2017)CrossRef Singh, T., Singh, J., Sharma, S.: Energy efficient secured routing protocol for MANETs. Wirel. Netw. 23(4), 1001–1009 (2017)CrossRef
15.
go back to reference Vadivel, R., Murali Bhaskaran, V.: Energy efficient with secured reliable routing protocol (EESRRP) for mobile ad-hoc networks. Procedia Technol. 4, 703–707 (2012)CrossRef Vadivel, R., Murali Bhaskaran, V.: Energy efficient with secured reliable routing protocol (EESRRP) for mobile ad-hoc networks. Procedia Technol. 4, 703–707 (2012)CrossRef
16.
go back to reference Javad Vazifehdan, R., Prasad, V., Niemegeers, I.: Energy-efficient reliable routing considering residual energy in wireless ad hoc networks. IEEE Trans. Mobile Comput. 13(2), 434–447 (2014)CrossRef Javad Vazifehdan, R., Prasad, V., Niemegeers, I.: Energy-efficient reliable routing considering residual energy in wireless ad hoc networks. IEEE Trans. Mobile Comput. 13(2), 434–447 (2014)CrossRef
17.
go back to reference Biradar, R.C., Manvi, S.S.: Neighbor supported reliable multipath multicast routing in MANETs. J. Netw. Comput. Appl. 35(3), 1074–1085 (2012)CrossRef Biradar, R.C., Manvi, S.S.: Neighbor supported reliable multipath multicast routing in MANETs. J. Netw. Comput. Appl. 35(3), 1074–1085 (2012)CrossRef
18.
go back to reference Kushwaha, D.S., Singh, V.K., Singh, S., Sharma, S.: Secure communication against malicious deeds in multicast routing in MANET (survey). Int. J. Adv. Comput. Eng. Netw. 3(3), 15–19 (2015) Kushwaha, D.S., Singh, V.K., Singh, S., Sharma, S.: Secure communication against malicious deeds in multicast routing in MANET (survey). Int. J. Adv. Comput. Eng. Netw. 3(3), 15–19 (2015)
19.
go back to reference Chhabra, A., Arora, G.: Secure routing in multicast routing protocol for MANET’s. Int. J. Innov. Eng. Technol. (IJIET) 2(3), 1–8 (2013) Chhabra, A., Arora, G.: Secure routing in multicast routing protocol for MANET’s. Int. J. Innov. Eng. Technol. (IJIET) 2(3), 1–8 (2013)
20.
go back to reference Ellcy Priana, M.: Trust based clustering and secure authentication for multicast in ad-hoc. Int. J. Comput. Appl. 108(19), 9–10 (2014) Ellcy Priana, M.: Trust based clustering and secure authentication for multicast in ad-hoc. Int. J. Comput. Appl. 108(19), 9–10 (2014)
21.
go back to reference Parthiban, S., Rodrigues, P.: A hyper-geometric trust factor based markov prediction mechanism for compromised rendezvous point in MANET. Arab. J. Sci. Eng. 41(8), 3187–3199 (2016)CrossRef Parthiban, S., Rodrigues, P.: A hyper-geometric trust factor based markov prediction mechanism for compromised rendezvous point in MANET. Arab. J. Sci. Eng. 41(8), 3187–3199 (2016)CrossRef
22.
go back to reference Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., Kannan, A.: An intelligent secured and energy efficient routing algorithm for MANETs. Wirel. Pers. Commun. 96(2), 1753–1769 (2017)CrossRef Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., Kannan, A.: An intelligent secured and energy efficient routing algorithm for MANETs. Wirel. Pers. Commun. 96(2), 1753–1769 (2017)CrossRef
23.
go back to reference Sethukkarasi, R., Ganapathy, S., Yogesh, P., Kannan, A.: An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. J. Intell. Fuzzy Syst. 26(3), 1167–1178 (2014)MATH Sethukkarasi, R., Ganapathy, S., Yogesh, P., Kannan, A.: An intelligent neuro fuzzy temporal knowledge representation model for mining temporal patterns. J. Intell. Fuzzy Syst. 26(3), 1167–1178 (2014)MATH
24.
go back to reference Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 271(1), 1–16 (2013) Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 271(1), 1–16 (2013)
27.
go back to reference Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Depend. Secure Comput. 11(5), 467–479 (2014)CrossRef Rahulamathavan, Y., Phan, R.C.W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Depend. Secure Comput. 11(5), 467–479 (2014)CrossRef
Metadata
Title
Tiger hash based AdaBoost machine learning classifier for secured multicasting in mobile healthcare system
Authors
Rajagopal Venkatesan
Balakrishnan Srinivasan
Periyasamy Rajendiran
Publication date
28-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2241-9

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner