Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.62Keywords:
Wireless Body Area Networks, Cloud, Brouwer Fixed Point, Blowfish Nash Equilibrium, Stochastic Neural NetworkDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The trending technology in Wireless Sensor Networks (WSN) is to improve the healthcare system by using Wireless Body Area Networks (WBANs). Implantable Sensor and wearable sensors are inexpensive technology, which are designed to track the body signals and to get intermediate physical activity status. This is considered as an unremarkable choice for continuous health monitoring. In recent years, various routing protocols had been designed to provide reliable data transmission in WBAN. However, many of these protocols are not focused more on security aspects such as data confidentiality and data integrity in medical data transmission. And also, the energy efficient communication methods have significantly vulnerable to various attacks due to the lack of computationally efficient authentication and authorization process. To rectify the drawbacks of existing system a new approach Brower Blowfish Nash-secured Stochastic Neural Network-based (Brower BNSNN) is proposed for medical data transmission through WBAN in cloud environment. The Brower BNSNN method is designed to perform data collection, compression, encryption/decryption and anomaly detection for medical WBAN disease diagnosis in cloud environment. First, distinct numbers of sensor nodes that are attached in the bodies of multiple patients collected for further validation and anomaly detection. Secondly Fixed Point-based compression is performed in the cloud by the cloud user. The sensor nodes compress their sensed data into WBAN messages and sent to cloud server for further processing and from this data confidentiality and data integrity are ensured. Third step is Blowfish Nash Equilibrium-based encryption and decryption is applied to the compressed data to ensure security during the communication between devices or cloud server. Finally, Stochastic Neural Network-based anomaly detection model is designed to perform anomaly detection via authorization process. The designed network performs two-stage authorization such as validating sub-keys and checking kernel process attacks and network logs attacks. Simulations are performed to measure and validate the performance metrics in terms of data confidentiality, data integrity, disease diagnosis accuracy, authentication, in Health Monitoring System.Abstract
How to Cite
Downloads
Similar Articles
- Archana Bansal, On the Biology of Chrysomya megacephala (Fabricius) (Diptera: Calliphoridae) , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Poojith K. D. P, Somashekhara ., Dasharatha P. Angadi, Assessing the impact of cyclonic storm Tauktae on shoreline change in Mangaluru coast using geospatial technology , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Shefali Bahadur, Rohit Kushwaha, M. Venkatesan, Ramya Singh, Manish Mishra, Strategic alignment in multispecialty hospitals: Implementing a balanced scorecard approach for optimal performance , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Suhani Singh, Neelam Panwar, A checklist of parasites collected from the zig-zag eel (Mastacembelus armatus Lacepede) from Bairaj, Bijnor, Uttar Pradesh, India , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- B. R. Jaipal, Himmat Singh, Nesting and distribution pattern of house crow (Corvus splendens) in Western Rajasthan, India , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- K. Karuppiah, Asha Sundaram, Felling of trees – The judicial trends , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Kapil ahuja, Ekta Rani, Soniya Devi, Exploring the dynamic landscape of environmental, social, and governance literature by using bibliometric analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- K. R. R. Prakash, Kishore Kunal, Designing information systems for business administration through human and computer interaction , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Teklu Hailu, Regasa Begna , Pre-extension demonstration of inter-cropping of improved forages with food and cash crops at Semen Bench Woreda, Southwest Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Deepika Tripathi, Dr Rishi Saxena, Dr Sippy Agarwal, Exploring the relationship between bacterial vaginosis and socioeconomic factors in Bundelkhand region: A cross-sectional study , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
<< < 16 17 18 19 20 21 22 23 24 25 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper