Optimized Authentication for Wireless Body Area Network
Keywords:
Cyclic redundancy check, Genetic algorithm, Wireless body area network,Abstract
In this paper, we propose a novel technique for determining the Cyclic Redundancy Code (CRC) polynomials with the help of a heuristic search (Genetic Algorithms) for Wireless Body Area Networks (WBAN). We apply the resulting CRCs and an encryption technique for improving the error detection in the WBANs. Thereafter, we compare the resulting polynomials, with or without the encryption headers with the benchmark polynomial. Since the Ad-hoc On-demand Distance Vector (AODV) routing protocol is practical in WBAN, we integrated this protocol with the proposed technique for evaluating its performance. The main objective is to improve the error detection rate, which then improves the Packet Delivery Ratio (PDR) along with the network resource usage efficiency. The results indicated that this method is very successful, as it improved the PDR while decreasing the end-to-end (E2E) delay. The overhead is seen to increase because of the use of a novel control message. Also, the energy consumption increased due to the error messages was resent and due to the retransmission of the data packets. All these increased values are acceptable and led to an 80% increase in the PDR values for the stand-up scenario and a 23% increase for the hand waving scenario.References
H. Moudni, M. Er-Rouidi, H. Mouncif, and B. E. Hadadi, “Attacks against aodv routing protocol in mobile ad-hoc networks,” in 2016 13th international conference on computer graphics, imaging and visualization (cgiv), 2016, pp. 385–389.
M. Quwaider and S. Biswas, “On-body packet routing algorithms for body sensor networks,” in Networks and communications, 2009. netcom ’09. first international conference on, 2009, pp. 171–177.
N. Jamali and L. C. Fourati, “SKEP: A secret key exchange protocol using physiological signals in wireless body area networks,” in Wireless networks and mobile communications (wincom), 2015 international conference on, 2015, pp. 1–7.
Hassan, M. H., & Muniyandi, R. C. (2017). An Improved Hybrid Technique for Energy and Delay Routing in Mobile Ad-Hoc Networks. International Journal of Applied Engineering Research, 12(1), 134-139.
Kumar, S. S., Manimegalai, P., & Karthik, S. (2018). A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks. Cluster Computing, 1-7.
D. Sethi and P. P. Bhattacharya, “A study on energy efficient and reliable data transfer (eerdt) protocol for wban,” in 2016 second international conference on computational intelligence communication technology (cict), 2016, pp. 254–258.
D. He, S. Zeadally, N. Kumar, and J. H. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, vol. PP, no. 99, pp. 1–12, 2016.
E. Abedini and A. Rezai, “A modified digital to digital encoding method to improve the wireless body area network (wban) transmission,” in 2015 2nd international conference on knowledgebased engineering and innovation (kbei), 2015, pp. 1067–1070.
B. Sansoda, S. Choomchuay, S. Timakul, and W. Khattiya, “Performance evaluation of ldpc codes on patterned wban data,” in TENCON 2014 - 2014 ieee region 10 conference, 2014, pp. 1–4.
AL-Dhief, F. T., Muniyandi, R. C., & Sabri, N. (2016). Performance Evaluation of LAR and OLSR Routing Protocols in Forest Fire Detection using Mobile Ad-Hoc Network. Indian Journal of Science and Technology, 9(48).
T. Baicheva, S. Dodunekov, and P. Kazakov, “Undetected error probability performance of cyclic redundancy-check codes of 16-bit redundancy,” IEE Proceedings - Communications, vol. 147, no. 5, pp. 253–256, Oct. 2000.
K. Zhang, C. Wang, and C. Wang, “A secure routing protocol for cluster-based wireless sensor networks using group key management,” in 2008 4th international conference on wireless communications, networking and mobile computing, 2008, pp. 1–5.
Z. Xu, Y. Jin, W. Shu, X. Liu, and J. Luo, “Sred: A secure reputationbased dynamic window scheme for disruption-tolerant networks,” in MILCOM 2009-2009 ieee military communications conference, 2009, pp. 1–7.
S. Sharma, “Energy-efficient secure routing in wireless sensor networks,” PhD thesis, National Institute of Technology Rourkela, 2009.
F. C. Lee, W. Goh, and C. K. Yeo, “A queuing mechanism to alleviate flooding attacks in probabilistic delay tolerant networks,” in Telecommunications (aict), 2010 sixth advanced international conference on, 2010, pp. 329–334.
S. Gupta, S. K. Dhurandher, I. Woungang, A. Kumar, and M. S. Obaidat, “Trust-based security protocol against blackhole attacks in opportunistic networks.” in WiMob, 2013, pp. 724–729.
S. Hyun, P. Ning, A. Liu, and W. Du, “Seluge: Secure and dosresistant code dissemination in wireless sensor networks,” in Proceedings of the 7th international conference on information processing in sensor networks, 2008, pp. 445–456.
M. Jeyalakshmi, “Location aware end-end data security using mac for secured wireless sensor networks,” in Advances in engineering, science and management (icaesm), 2012 international conference on, 2012, pp. 478–484.
E. N. Gilbert, “Capacity of a burst-noise channel,” The Bell System Technical Journal, vol. 39, no. 5, pp. 1253–1265, sept 1960.
E. O. Elliott, “Estimates of error rates for codes on burst-noise channels,” Bell system technical journal, vol. 42, no. 5, pp. 1977– 1997, 1963.
M. Mushkin and I. Bar-David, “Capacity and coding for the gilbertelliott channels,” IEEE Transactions on Information Theory, vol. 35, no. 6, pp. 1277–1290, Nov. 1989.
C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing,” 2003.
Jubair, M., & Muniyandi, R. (2016). NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET. International Journal of Applied Engineering Research, 11(23), 11394-11399.
P. Koopman and T. Chakravarty, “Cyclic redundancy code (crc) polynomial selection for embedded networks,” in Dependable systems and networks, 2004 international conference on, 2004, pp. 145–154.
V. Chea, M. V. Martin, and R. Liscano, “Hamming distance as a metric for the detection of crc-based side-channel communications in 802.11 wireless networks,” in Communications and network security (cns), 2015 ieee conference on, 2015, pp. 218–226.
Y. Wu and Y. Qiu, “The 8-bit parallel crc-32 research and implementation in usb 3.0,” in Computer science service system (csss), 2012 international conference on, 2012, pp. 1079–1082.
M. Mitchell, An introduction to genetic algorithms. Bradford Books, 1998.
S. Sivanandam and S. Deepa, Introduction to genetic algorithms. Springer Berlin Heidelberg, 2007.
“Specification for the advanced encryption standard (AES).” Federal Information Processing Standards Publication 197, 2001.
Khirbeet, A. S., & Muniyandi, R. C. (2017). New Heuristic Model for Optimal CRC Polynomial, 7(1), 521–525. https://doi.org/10.11591/ijece.v7i1.pp521-525.
Ding, W., Liu, K., Cheng, F., & Zhang, J. (2015). STFC: Spatiotemporal feature chain for skeleton-based human action recognition. Journal of Visual Communication and Image Representation, 26, 329–337. https://doi.org/10.1016/j.jvcir.2014.10.009.
Das, D., Majumder, K., & Dasgupta, A. (2015). Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory. Procedia Computer Science, 54, 92–101. https://doi.org/10.1016/j.procs.2015.06.011.
J. Toutouh, S. Nesmachnow, and E. Alba, “Fast energy-aware olsr routing in vanets by means of a parallel evolutionary algorithm,” Cluster computing, vol. 16, no. 3, pp. 435–450, 2013.
L. Xia, C. Chen, and J. Aggarwal, “View invariant human action recognition using histograms of 3D joints,” in Computer vision and pattern recognition workshops (cvprw), 2012 ieee computer society conference on, 2012, pp. 20–27.
Akkaya, K., & Younis, M. (2004). Energy‐aware delay‐constrained routing in wireless sensor networks. International Journal of Communication Systems, 17(6), 663-687.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.