Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.62Keywords:
Wireless Body Area Networks, Cloud, Brouwer Fixed Point, Blowfish Nash Equilibrium, Stochastic Neural NetworkDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The trending technology in Wireless Sensor Networks (WSN) is to improve the healthcare system by using Wireless Body Area Networks (WBANs). Implantable Sensor and wearable sensors are inexpensive technology, which are designed to track the body signals and to get intermediate physical activity status. This is considered as an unremarkable choice for continuous health monitoring. In recent years, various routing protocols had been designed to provide reliable data transmission in WBAN. However, many of these protocols are not focused more on security aspects such as data confidentiality and data integrity in medical data transmission. And also, the energy efficient communication methods have significantly vulnerable to various attacks due to the lack of computationally efficient authentication and authorization process. To rectify the drawbacks of existing system a new approach Brower Blowfish Nash-secured Stochastic Neural Network-based (Brower BNSNN) is proposed for medical data transmission through WBAN in cloud environment. The Brower BNSNN method is designed to perform data collection, compression, encryption/decryption and anomaly detection for medical WBAN disease diagnosis in cloud environment. First, distinct numbers of sensor nodes that are attached in the bodies of multiple patients collected for further validation and anomaly detection. Secondly Fixed Point-based compression is performed in the cloud by the cloud user. The sensor nodes compress their sensed data into WBAN messages and sent to cloud server for further processing and from this data confidentiality and data integrity are ensured. Third step is Blowfish Nash Equilibrium-based encryption and decryption is applied to the compressed data to ensure security during the communication between devices or cloud server. Finally, Stochastic Neural Network-based anomaly detection model is designed to perform anomaly detection via authorization process. The designed network performs two-stage authorization such as validating sub-keys and checking kernel process attacks and network logs attacks. Simulations are performed to measure and validate the performance metrics in terms of data confidentiality, data integrity, disease diagnosis accuracy, authentication, in Health Monitoring System.Abstract
How to Cite
Downloads
Similar Articles
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- P. Pattunnarajam, Janani G, A. Vijayaraj, Sathiya Priya S, Enhanced routing strategy of wireless sensor network based on fifth generation communication technology , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- M. Prabhu, A. Chandrabose, Improving the resource allocation with enhanced learning in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Chinnadurai U, A. Vinayagam, Energy efficient routing with cluster approach in wireless networks – A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Deepa, I.S. Arafat, M. Sathya Priya, S. Saravanan, An improved spectrum sharing strategy evaluation over wireless network framework to perform error free communications , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- V. Selvi, T. S. Poornappriya, R. Balasubramani, Cloud computing research productivity and collaboration: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Aruljothi Rajasekaran, Jemima Priyadarsini R., ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper