scholarly journals Enabling Clustering for Privacy-Aware Data Dissemination Based on Medical Healthcare-IoTs (MH-IoTs) for Wireless Body Area Network

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Fasee Ullah ◽  
Izhar Ullah ◽  
Atif Khan ◽  
M. Irfan Uddin ◽  
Hashem Alyami ◽  
...  

There is a need to develop an effective data preservation scheme with minimal information loss when the patient’s data are shared in public interest for different research activities. Prior studies have devised different approaches for data preservation in healthcare domains; however, there is still room for improvement in the design of an elegant data preservation approach. With that motivation behind, this study has proposed a medical healthcare-IoTs-based infrastructure with restricted access. The infrastructure comprises two algorithms. The first algorithm protects the sensitivity information of a patient with quantifying minimum information loss during the anonymization process. The algorithm has also designed the access polices comprising the public access, doctor access, and the nurse access, to access the sensitivity information of a patient based on the clustering concept. The second suggested algorithm is K-anonymity privacy preservation based on local coding, which is based on cell suppression. This algorithm utilizes a mapping method to classify the data into different regions in such a manner that the data of the same group are placed in the same region. The benefit of using local coding is to restrict third-party users, such as doctors and nurses, when trying to insert incorrect values in order to access real patient data. Efficiency of the proposed algorithm is evaluated against the state-of-the-art algorithm by performing extensive simulations. Simulation results demonstrate benefits of the proposed algorithms in terms of efficient cluster formation in minimum time, minimum information loss, and execution time for data dissemination.

Author(s):  
Prof. Pradeep Kumar

Wireless body area network can manage patient through doctors through app on smart phones and security to data can be given by one-time password (OTP generation) like banking system. 6G protocols can make one time password more effective as all financial technology are dependent on one time password. Because transfer is mutual and one time password is best secure handshake between servers and containers are best security tempo for client server programmers. It depends on size of transfer means in the form of money in the transaction that size of container security code used for three way handshakes like third party or on the emergency for group client server model. Control logic  is conditional enforcement of profitable rules to follow that is word access in computer science and that in the form of Intel processors till now but these Intel processors are in production in as general for as possible means one kind of Intel processor for whole world as processor generation paradigm. Can finance technological companies is eligible for creating more secure hardware for their trillions of transactions, I think word trillion is taken from word truth. Smartphone can handle data from sensor on body sensor through wireless with in distance limit and as data get uploaded it can reach to doctor by protecting it through OTP. In this as banking system can depend on OTP in the same way wireless health system may depend on this system.


Author(s):  
Hadda Ben Elhadj ◽  
Lamia Chaari ◽  
Saadi Boudjit ◽  
Lotfi Kamoun

In this paper, the authors present a Node Management Entity (NME) and a Hub Management Entity (HME) architectures based on the Wireless Body Area Network (WBAN) standard. The proposed HME and NME combine cross and modular design architecture to ensure network reliability and enhance the WBAN Quality of Service (QoS). Furthermore, the authors propose an Adaptive Two-hop Routing protocol, termed ATR, a simple but yet efficient algorithm to provide reliable data dissemination in WBANs. The proposed ATR is evaluated under layered architecture and NME and HME entities. Simulation results show that both entities perform well 802.15.6 standard and WBAN QoS requirements than layered architecture.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Junsong Zhang ◽  
Qikun Zhang ◽  
Zhigang Li ◽  
Xianling Lu ◽  
Yong Gan

The recent development of wireless body area network (WBAN) technology plays a significant role in the modern healthcare system for patient health monitoring. However, owing to the open nature of the wireless channel and the sensitivity of the transmitted messages, the data security and privacy threats in WBAN have been widely discussed and must be solved. In recent years, many authentication protocols had been proposed to provide security and privacy protection in WBANs. However, many of these schemes are not computationally efficient in the authentication process. Inspired by these studies, a lightweight and secure anonymous authentication protocol is presented to provide data security and privacy for WBANs. The proposed scheme adopts a random value and hash function to provide user anonymity. Besides, the proposed protocol can provide user authentication without a trusted third party, which makes the proposed scheme have no computational bottleneck in terms of architecture. Finally, the security and performance analyses demonstrate that the proposed scheme can meet security requirements with low computational and communication costs.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1638 ◽  
Author(s):  
Yating Qu ◽  
Guoqiang Zheng ◽  
Huahong Ma ◽  
Xintong Wang ◽  
Baofeng Ji ◽  
...  

The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks, stimulates many research activities. Designing such a scheme of critical events while preserving the energy efficiency is a challenging task, due to the dynamic of the network topology, severe constraints on the power supply, and the limited computation power. The design of routing protocols becomes an essential part of WBANs and plays an important role in the communication stacks and has a significant impact on the network performance. In this paper, we briefly introduce WBAN and focus on the analysis of the routing protocol, classify, and compare the advantages and disadvantages of various routing protocols. Lastly, we put forward some problems and suggestions, which provides ideas for the follow-up routing design.


Sign in / Sign up

Export Citation Format

Share Document