Prioritized Compressed Data Acquisition Framework for Securing the Data Integrity in the Medical Wireless Sensor Networks

Authors

  • B. Naresh Kumar, M. Srinivas

Keywords:

Data security, MWSNs, Compression, Encryption.

Abstract

MWSNs are essential in enhancing healthcare systems by delivering efficient and effective solutions. These allow elderly and disabled individuals to live independently while ensuring their well-being and safety. In hospitals, the data collected by the sensors deployed in these networks can be analyzed in real time. To ensure the safety and confidentiality of the data collected by MWSNs, it is important that the information is properly aggregated and transmitted to the appropriate central servers. This process should be performed with the utmost security to avoid unauthorized access and manipulation of the data. This paper proposes a prioritized compressed data acquisition framework that is designed to increase the efficacy of gathering various health information types. The framework utilizes a sampling technique known as compressed sensing to reduce the transmission overhead and power consumption. Data is then encrypted, and its integrity is protected through a cryptographic hash protocol. The priority of the information is then considered, and the transmission is performed according to the usual method. The security aspects of the proposed framework are analyzed to ensure that the data collected by the MWSNs is protected. In addition, we performed an experiment on the system's performance. The findings of the study indicate that the proposed system can help improve the quality of healthcare by allowing more accurate and timely information.

Downloads

Download data is not yet available.

References

Lounis, Ahmed, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, and Yacine Challal. "Healing on the cloud: Secure cloud architecture for medical wireless sensor networks." Future Generation Computer Systems 55 (2016): 266-277.

Agrawal, Vivek. "Security and privacy issues in wireless sensor networks for healthcare." In Internet of Things. User-Centric IoT: First International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part I, pp. 223-228. Springer International Publishing, 2015.

Bhola, Jyoti, Surender Soni, and Gagandeep Kaur Cheema. "Recent trends for security applications in wireless sensor networks–a technical review." In 2019 6th international conference on computing for sustainable global development (INDIACom), pp. 707-712. IEEE, 2019.

Prakash, Shiva. "An overview of healthcare perspective based security issues in wireless sensor networks." In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 870-875. IEEE, 2016.

Internet of Things Global Standards Initiative”. ITU. Retrieved 26 June 2018.

Natarajan, Rajesh, Gururaj Harinahallo Lokesh, Francesco Flammini, Anitha Premkumar, Vinoth Kumar Venkatesan, and Shashi Kant Gupta. "A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0." Infrastructures 8, no. 2 (2023): 22.

Chiuchisan I, Dimian M. Internet of Things for e-Health: An approach to medical applications[C]//Computational Intelligence for Multimedia Understanding (IWCIM), 2015 International Workshop on. IEEE, 2015: 1-5.

Ahmad, Rami, Raniyah Wazirali, and Tarik Abu-Ain. "Machine learning for wireless sensor networks security: An overview of challenges and issues." Sensors 22, no. 13 (2022): 4730.

Saxena, Akash, DIPANKAR MISRA, R. Ganesamoorthy, Jose Luis Arias Gonzales, Hashem Ali Almashaqbeh, and Vikas Tripathi. "Artificial Intelligence Wireless Network Data Security System For Medical Records Using Cryptography Management." In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 2555-2559. IEEE, 2022.

Yang Y. Attribute-based data retrieval with semantic keyword search for e-health cloud [J]. Journal of Cloud Computing, 2015, 4(1): 1.

J. Yang, J. Li, Y. Niu, ”A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future Generation Computer Systems. 2015, vol. 43-44, pp. 74-86.

A. Abbas, S. Khan, ”A review on the state-of-the-art privacy preserving approaches in e-health clouds,” IEEE Journal of Biomedical Health Informatics, 2014, vol. 18, pp. 1431-1441.

D. Singh, G. Tripathi, and A. J. Jara, ”A survey of Internet-of- Things: Future vision, architecture, challenges and services,” in Proc. IEEE World Forum on Internet of Things, 2014, pp. 287-292.

Bernabe J B, Ramos J L H, Gomez A F S. TACIoT: multidimensional trust-aware access control system for the Internet of Things[J]. Soft Computing, 2016, 20(5): 1763-1779.

Bae G, Shin K. An Efficient Hardware Implementation of Lightweight Block Cipher Algorithm CLEFIA for IoT Security Applications[J]. Journal of the Korea Institute of Information and Communication Engineering, 2016, 20(2): 351-358.

Khemissa H, Tandjaoui D. A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things[C]. International Conference on Next Generation Mobile Applications, Services and Technologies. 2015.

Yao X, Chen Z, Tian Y. A lightweight attribute-based encryption scheme for the Internet of Things[J]. Future Generation Computer Systems, 2015, 49(C):104-112.

Malan D, Jones TF, Welsh M, Moulton S. CodeBlue: an ad-hoc sensor network infrastructure for emergency medical care. In Workshop on Applications of Mobile Embedded Systems (WAMES 2004), Boston, MA, USA, 2004; 12–14.

Rajasekaran MP, Radhakrishnan S, Subbaraj P. Sensor grid applications in patient monitoring. Future Generation Computer Systems 2010; 26: 569–575.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, K. Fu, Plutus: Scalable secure file sharing on untrusted storage, in: Proceedings of the 2nd USENIX Conference on File and Storage Technologies, USENIX Association, Berkeley, CA, USA, 2003, pp. 29–42.

Xu, Zhiyan, Debiao He, Pandi Vijayakumar, Brij Gupta, and Jian Shen. "Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical wsns." IEEE Journal of Biomedical and Health Informatics (2021).

Saleem, Muhammad Asad, Salman Shamshad, Shafiq Ahmed, Zahid Ghaffar, and Khalid Mahmood. "Security analysis on “A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems”." IEEE Systems Journal 15, no. 4 (2021): 5557-5559.

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences 10, no. 6 (2020): 2007.

Velasco, Francisco Alcaraz, Jose Manuel Palomares, and Joaquin Olivares. "Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs." Computer Networks 199 (2021): 108470.

Yi, Fumin, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, and Dawei Zhao. "WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks." Sensors 22, no. 19 (2022): 7413.

Nandhini, A. Sunitha, and P. Vivekanandan. "A novel security and energy efficient data aggregation for medical Internet of Things using trust." Journal of Medical Imaging and Health Informatics 10, no. 1 (2020): 249-255.

Puranikmath, Veena I., Sunil S. Harakannanavar, Satyendra Kumar, and Dattaprasad Torse. "Comprehensive study of data aggregation models, challenges and security issues in wireless sensor networks." International Journal of Computer Network and Information Security 11, no. 3 (2019): 30.

Memon, Muhammad Hunain, Muhammad Hammad Memon, Syeda Munazza Marium, and Jalaluddin Khan. "Security and privacy issues of medical systems in wireless sensor networks: A survey." Asian Journal For Convergence In Technology (AJCT) ISSN-2350-1146 5, no. 3 (2019): 08-12.

Downloads

Published

26.03.2024

How to Cite

M. Srinivas, B. N. K. . (2024). Prioritized Compressed Data Acquisition Framework for Securing the Data Integrity in the Medical Wireless Sensor Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 222–228. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5413

Issue

Section

Research Article