Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.62Keywords:
Wireless Body Area Networks, Cloud, Brouwer Fixed Point, Blowfish Nash Equilibrium, Stochastic Neural NetworkDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The trending technology in Wireless Sensor Networks (WSN) is to improve the healthcare system by using Wireless Body Area Networks (WBANs). Implantable Sensor and wearable sensors are inexpensive technology, which are designed to track the body signals and to get intermediate physical activity status. This is considered as an unremarkable choice for continuous health monitoring. In recent years, various routing protocols had been designed to provide reliable data transmission in WBAN. However, many of these protocols are not focused more on security aspects such as data confidentiality and data integrity in medical data transmission. And also, the energy efficient communication methods have significantly vulnerable to various attacks due to the lack of computationally efficient authentication and authorization process. To rectify the drawbacks of existing system a new approach Brower Blowfish Nash-secured Stochastic Neural Network-based (Brower BNSNN) is proposed for medical data transmission through WBAN in cloud environment. The Brower BNSNN method is designed to perform data collection, compression, encryption/decryption and anomaly detection for medical WBAN disease diagnosis in cloud environment. First, distinct numbers of sensor nodes that are attached in the bodies of multiple patients collected for further validation and anomaly detection. Secondly Fixed Point-based compression is performed in the cloud by the cloud user. The sensor nodes compress their sensed data into WBAN messages and sent to cloud server for further processing and from this data confidentiality and data integrity are ensured. Third step is Blowfish Nash Equilibrium-based encryption and decryption is applied to the compressed data to ensure security during the communication between devices or cloud server. Finally, Stochastic Neural Network-based anomaly detection model is designed to perform anomaly detection via authorization process. The designed network performs two-stage authorization such as validating sub-keys and checking kernel process attacks and network logs attacks. Simulations are performed to measure and validate the performance metrics in terms of data confidentiality, data integrity, disease diagnosis accuracy, authentication, in Health Monitoring System.Abstract
How to Cite
Downloads
Similar Articles
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- K. Akila, Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- P. J. Robinson, S. W. A. Prakash, Stochastic artificial neural network for magdm problem solving in intuitionistic fuzzy environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Sreenath M.V. Reddy, D. Annapurna, Anand Narasimhamurthy, Influence node analysis based on neighborhood influence vote rank method in social network , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, Cost-based resource allocation method for efficient allocation of resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rajesh Kumar Singh, Abhishek Kumar Mishra, Ramapati Mishra, Hand Gesture Identification for Improving Accuracy Using Convolutional Neural Network(CNN) , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper