Skip to main content
Erschienen in: Wireless Personal Communications 1/2019

28.09.2018

Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks

verfasst von: Dinesh Kumar Anguraj, S. Smys

Erschienen in: Wireless Personal Communications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

For most of the tele-health applications body area networks (BANs) have become a favouring and significant technology. This application domain is exclusive so assuring security and obtaining the trustworthy details of the patients’ physiological signs is difficult. To rectify this issue, an attack-resilient malicious node detection scheme (BAN-Trust) is brought-in in the current system, which can identify the malignant attacks on BANs. In this BAN-Trust scheme, malignant nodes is identified according to the nature acquired through the nodes by their own and approvals shared by various nodes. Nevertheless, BAN-Trust conceives the common behaviour among the nodes and it doesn’t conceive the energy of the nodes and gather the information for measuring the trust. So, here, trust-based intrusion detection and clustering is proposed in order to identify the malignant nodes and broadcast the energy-effective data. In our work, trust-based intrusion detection model is brought-in for identifying the malignant nodes. Different varieties of trusts were conceives, namely energy, data and communication trust, which can be developed among two sensor nodes. Once after identifying the malignant nodes, the rest of the nodes in the network were gathered in order to create the cluster. Every cluster has one cluster head (CH) that is chosen by utilizing the multi objective firefly algorithm. The target function of this system is to reduce the delay, increase the broadcast energy and throughput. The multiple body sensor nodes were in-charge for gathering different varieties of data that were sent to the CH. The CH then forwards the gathered data to the sink and sends the details to the system via gateway. By utilizing a hybrid encryption algorithm, the system’s data is encrypted and forwarded to the hospital server. Decrypting is done on the server side to disclose the exact data. The proposed methodology is executed by utilizing an NS-2 simulator. The experimental output provides that the proposed system accomplishes good performance when distinguished with the current system in terms of precision, recall, throughput, packet delivery ratio and end to end delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ghamari, M., Janko, B., Sherratt, R. S., Harwin, W., Piechockic, R., & Soltanpur, C. (2016). A survey on wireless body area networks for e healthcare systems in residential environments. Sensors, 16(6), 831.CrossRef Ghamari, M., Janko, B., Sherratt, R. S., Harwin, W., Piechockic, R., & Soltanpur, C. (2016). A survey on wireless body area networks for e healthcare systems in residential environments. Sensors, 16(6), 831.CrossRef
2.
Zurück zum Zitat Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. IJ Network Security, 12(2), 75–83. Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. IJ Network Security, 12(2), 75–83.
3.
Zurück zum Zitat Contaldo, M., Banerjee, B., Ruffieux, D., Chabloz, J., Le Roux, E., & Enz, C. (2010). A 2.4-GHz BAW-based transceiver for wireless body area networks. IEEE Transactions on Biomedical Circuits and Systems, 4(6), 391–399.CrossRef Contaldo, M., Banerjee, B., Ruffieux, D., Chabloz, J., Le Roux, E., & Enz, C. (2010). A 2.4-GHz BAW-based transceiver for wireless body area networks. IEEE Transactions on Biomedical Circuits and Systems, 4(6), 391–399.CrossRef
4.
Zurück zum Zitat Javaid, N., Ahmad, A., Rahim, A., Khan, Z. A., Ishfaq, M., & Qasim, U. (2014). Adaptive medium access control protocol for wireless body area networks. International Journal of Distributed Sensor Networks, 10(3), 254397.CrossRef Javaid, N., Ahmad, A., Rahim, A., Khan, Z. A., Ishfaq, M., & Qasim, U. (2014). Adaptive medium access control protocol for wireless body area networks. International Journal of Distributed Sensor Networks, 10(3), 254397.CrossRef
5.
Zurück zum Zitat Latré, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.CrossRef Latré, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.CrossRef
6.
Zurück zum Zitat Movassaghi, S., Abolhasan, M., Lipman, J., et al. (2014). Wireless body area networks: A survey. IEEE Communications Surveys and Tutorials, 16, 1658–1686.CrossRef Movassaghi, S., Abolhasan, M., Lipman, J., et al. (2014). Wireless body area networks: A survey. IEEE Communications Surveys and Tutorials, 16, 1658–1686.CrossRef
7.
Zurück zum Zitat Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.CrossRef Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.CrossRef
8.
Zurück zum Zitat Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. Wireless Communications, IEEE, 17, 51–58.CrossRef Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. Wireless Communications, IEEE, 17, 51–58.CrossRef
9.
Zurück zum Zitat Liang, X. H., Li, X., Shen, Q. H., Lu, R. X., Lin, X. D., Shen, X. M., et al. (2012). Exploiting prediction to enable secure and reliable routing in wireless body area networks. IEEE INFOCOM: In Proc.CrossRef Liang, X. H., Li, X., Shen, Q. H., Lu, R. X., Lin, X. D., Shen, X. M., et al. (2012). Exploiting prediction to enable secure and reliable routing in wireless body area networks. IEEE INFOCOM: In Proc.CrossRef
10.
Zurück zum Zitat Fang, G., Dutkiewicz, E., Yu, K., Vesilo, R., & Yu, Y. (2010). December. Distributed inter-network interference coordination for wireless body area networks. In Global telecommunications conference (GLOBECOM 2010), IEEE (pp. 1–5). Fang, G., Dutkiewicz, E., Yu, K., Vesilo, R., & Yu, Y. (2010). December. Distributed inter-network interference coordination for wireless body area networks. In Global telecommunications conference (GLOBECOM 2010), IEEE (pp. 1–5).
11.
Zurück zum Zitat Shi, L., Li, M., Yu, S., & Yuan, J. (2013). BANA: Body area network authentication exploiting channel characteristics. IEEE J. Select. Areas Commun., 31(9), 1803–1816.CrossRef Shi, L., Li, M., Yu, S., & Yuan, J. (2013). BANA: Body area network authentication exploiting channel characteristics. IEEE J. Select. Areas Commun., 31(9), 1803–1816.CrossRef
12.
Zurück zum Zitat Liu, J., Kwak, K. S. (2010). Hybrid security mechanisms for wireless body area networks. In Proceeding of the 2nd International Conference on Ubiquitous and Future Networks (ICUFN, 2010) (pp. 98–103). Jeju Island, Korea (South). Liu, J., Kwak, K. S. (2010). Hybrid security mechanisms for wireless body area networks. In Proceeding of the 2nd International Conference on Ubiquitous and Future Networks (ICUFN, 2010) (pp. 98–103). Jeju Island, Korea (South).
14.
Zurück zum Zitat Iqbal, J., Amin, N. U., & Umar, A. I. (2013). Authenticated key agreement and cluster head selection for Wireless Body Area Networks. In 2013 2nd national conference on information assurance (NCIA). IEEE. Iqbal, J., Amin, N. U., & Umar, A. I. (2013). Authenticated key agreement and cluster head selection for Wireless Body Area Networks. In 2013 2nd national conference on information assurance (NCIA). IEEE.
15.
Zurück zum Zitat Huque, M. T. I., Munasinghe, K. S., Abolhasan, M., &Jamalipour, A. (2013). SEA-BAN: Semi-autonomous adaptive routing in wireless body area networks. In 2013 7th international conference on signal processing and communication systems (ICSPCS) (pp. 1–7). IEEE. Huque, M. T. I., Munasinghe, K. S., Abolhasan, M., &Jamalipour, A. (2013). SEA-BAN: Semi-autonomous adaptive routing in wireless body area networks. In 2013 7th international conference on signal processing and communication systems (ICSPCS) (pp. 1–7). IEEE.
16.
Zurück zum Zitat Salem, O., Liu, Y., Mehaoua, A., & Boutaba, R. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE journal of biomedical and health informatics, 18(5), 1541–1551.CrossRef Salem, O., Liu, Y., Mehaoua, A., & Boutaba, R. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE journal of biomedical and health informatics, 18(5), 1541–1551.CrossRef
17.
Zurück zum Zitat Thamilarasu, G., & Ma, Z. (2015). Autonomous mobile agent based intrusion detection framework in wireless body area networks. In 2015 IEEE 16th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM) (pp. 1–3). IEEE. Thamilarasu, G., & Ma, Z. (2015). Autonomous mobile agent based intrusion detection framework in wireless body area networks. In 2015 IEEE 16th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM) (pp. 1–3). IEEE.
18.
Zurück zum Zitat Ramli, S.N. (2013). A biometric-based security for data authentication in wireless body area network (WBAN). In IEEE. Ramli, S.N. (2013). A biometric-based security for data authentication in wireless body area network (WBAN). In IEEE.
19.
Zurück zum Zitat Sharma, R., Ryait, H. S., & Gupta, A. K. (2015). Clustering based routing protocol to increase the stability in WBAN. International Journal of Innovations in Engineering and Technology, 6(1), 119–125. Sharma, R., Ryait, H. S., & Gupta, A. K. (2015). Clustering based routing protocol to increase the stability in WBAN. International Journal of Innovations in Engineering and Technology, 6(1), 119–125.
20.
Zurück zum Zitat He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590–2601.CrossRef He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590–2601.CrossRef
21.
Zurück zum Zitat Alghamdi, T. A. (2016). Cluster based energy efficient routing protocol for wireless body area networks. Trends in Applied Sciences Research, 11(1), 12.MathSciNetCrossRef Alghamdi, T. A. (2016). Cluster based energy efficient routing protocol for wireless body area networks. Trends in Applied Sciences Research, 11(1), 12.MathSciNetCrossRef
22.
Zurück zum Zitat Ali, A., & Khan, F. A. (2013). Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–19.CrossRef Ali, A., & Khan, F. A. (2013). Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–19.CrossRef
Metadaten
Titel
Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
verfasst von
Dinesh Kumar Anguraj
S. Smys
Publikationsdatum
28.09.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6005-x

Weitere Artikel der Ausgabe 1/2019

Wireless Personal Communications 1/2019 Zur Ausgabe