Smart Wireless Sensor Technology for Healthcare Monitoring System Using Cognitive Radio Networks

被引:3
作者
Jabeen, Tallat [1 ]
Jabeen, Ishrat [2 ]
Ashraf, Humaira [3 ]
Ullah, Ata [4 ]
Jhanjhi, N. Z. [5 ]
Ghoniem, Rania M. [6 ]
Ray, Sayan Kumar [5 ]
机构
[1] Univ Technol Sydney UTS, Fac Engn & Informat Technol, Sydney, Vic 2007, Australia
[2] NUST, Sch Interdisciplinary Engn & Sci SINES, Islamabad 44000, Pakistan
[3] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 44000, Pakistan
[4] Natl Univ Modern Languages NUML, Dept Comp Sci, Islamabad 44000, Pakistan
[5] Taylors Univ, Sch Comp Sci SCS, Subang Jaya 47500, Malaysia
[6] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
关键词
smart sensor; sensing system; wearable sensor; health monitoring; encryption; AUTHENTICATION SCHEME; INTERNET; TRANSMISSION; THINGS;
D O I
10.3390/s23136104
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In a Wireless Body Area Network (WBAN), for example, patients' health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against attacks. To that end, the literature is rich with security schemes that include the advanced encryption standard, secure hashing algorithm, and digital signatures that aim to secure the data exchange. However, such schemes elevate the time complexity, rendering the data transmission slower. Cognitive radio technology with a medical body area network system involves communication links between WBAN gateways, server and nano sensors, which renders the entire system vulnerable to security attacks. In this paper, a novel DNA-based encryption technique is proposed to secure medical data sharing between sensing devices and central repositories. It has less computational time throughout authentication, encryption, and decryption. Our analysis of experimental attack scenarios shows that our technique is better than its counterparts.
引用
收藏
页数:17
相关论文
共 38 条
  • [1] Abdelfattah Roayat Ismail, 2020, Journal of Physics: Conference Series, V1447, DOI 10.1088/1742-6596/1447/1/012053
  • [2] Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective
    Aijaz, Adnan
    Aghvami, A. Hamid
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (02): : 103 - 112
  • [3] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [4] Ali A, 2015, IEEE COMMUN MAG, V53, P18, DOI 10.1109/MCOM.2015.7263368
  • [5] Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey
    Amjad, Muhammad
    Rehmani, Mubashir Husain
    Mao, Shiwen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1056 - 1103
  • [6] Anwar M., 2018, TECH J, V23, P50
  • [7] Bhattarai Sudeep, 2016, IEEE Transactions on Cognitive Communications and Network, V2, P110, DOI 10.1109/TCCN.2016.2592921
  • [8] Bozorgchami B., 2017, P 2017 IEEE INT S ME
  • [9] On the Route Priority for Cognitive Radio Networks
    Cacciapuoti, Angela Sara
    Caleffi, Marcello
    Marino, Francesco
    Paura, Luigi
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (09) : 3103 - 3117
  • [10] Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment
    Darabkh, Khalid A.
    Amro, Oswa M.
    Al-Zubi, Raed T.
    Salameh, Haythem Bany
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 173