Advertisement

Wireless Personal Communications

, Volume 104, Issue 1, pp 1–20 | Cite as

Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks

  • Dinesh Kumar Anguraj
  • S. Smys
Article
  • 56 Downloads

Abstract

For most of the tele-health applications body area networks (BANs) have become a favouring and significant technology. This application domain is exclusive so assuring security and obtaining the trustworthy details of the patients’ physiological signs is difficult. To rectify this issue, an attack-resilient malicious node detection scheme (BAN-Trust) is brought-in in the current system, which can identify the malignant attacks on BANs. In this BAN-Trust scheme, malignant nodes is identified according to the nature acquired through the nodes by their own and approvals shared by various nodes. Nevertheless, BAN-Trust conceives the common behaviour among the nodes and it doesn’t conceive the energy of the nodes and gather the information for measuring the trust. So, here, trust-based intrusion detection and clustering is proposed in order to identify the malignant nodes and broadcast the energy-effective data. In our work, trust-based intrusion detection model is brought-in for identifying the malignant nodes. Different varieties of trusts were conceives, namely energy, data and communication trust, which can be developed among two sensor nodes. Once after identifying the malignant nodes, the rest of the nodes in the network were gathered in order to create the cluster. Every cluster has one cluster head (CH) that is chosen by utilizing the multi objective firefly algorithm. The target function of this system is to reduce the delay, increase the broadcast energy and throughput. The multiple body sensor nodes were in-charge for gathering different varieties of data that were sent to the CH. The CH then forwards the gathered data to the sink and sends the details to the system via gateway. By utilizing a hybrid encryption algorithm, the system’s data is encrypted and forwarded to the hospital server. Decrypting is done on the server side to disclose the exact data. The proposed methodology is executed by utilizing an NS-2 simulator. The experimental output provides that the proposed system accomplishes good performance when distinguished with the current system in terms of precision, recall, throughput, packet delivery ratio and end to end delay.

Keywords

Wireless body area network Clustering Direct trust Multi-objective firefly algorithm Malicious nodes 

Notes

References

  1. 1.
    Ghamari, M., Janko, B., Sherratt, R. S., Harwin, W., Piechockic, R., & Soltanpur, C. (2016). A survey on wireless body area networks for e healthcare systems in residential environments. Sensors, 16(6), 831.CrossRefGoogle Scholar
  2. 2.
    Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. IJ Network Security, 12(2), 75–83.Google Scholar
  3. 3.
    Contaldo, M., Banerjee, B., Ruffieux, D., Chabloz, J., Le Roux, E., & Enz, C. (2010). A 2.4-GHz BAW-based transceiver for wireless body area networks. IEEE Transactions on Biomedical Circuits and Systems, 4(6), 391–399.CrossRefGoogle Scholar
  4. 4.
    Javaid, N., Ahmad, A., Rahim, A., Khan, Z. A., Ishfaq, M., & Qasim, U. (2014). Adaptive medium access control protocol for wireless body area networks. International Journal of Distributed Sensor Networks, 10(3), 254397.CrossRefGoogle Scholar
  5. 5.
    Latré, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.CrossRefGoogle Scholar
  6. 6.
    Movassaghi, S., Abolhasan, M., Lipman, J., et al. (2014). Wireless body area networks: A survey. IEEE Communications Surveys and Tutorials, 16, 1658–1686.CrossRefGoogle Scholar
  7. 7.
    Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.CrossRefGoogle Scholar
  8. 8.
    Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. Wireless Communications, IEEE, 17, 51–58.CrossRefGoogle Scholar
  9. 9.
    Liang, X. H., Li, X., Shen, Q. H., Lu, R. X., Lin, X. D., Shen, X. M., et al. (2012). Exploiting prediction to enable secure and reliable routing in wireless body area networks. IEEE INFOCOM: In Proc.CrossRefGoogle Scholar
  10. 10.
    Fang, G., Dutkiewicz, E., Yu, K., Vesilo, R., & Yu, Y. (2010). December. Distributed inter-network interference coordination for wireless body area networks. In Global telecommunications conference (GLOBECOM 2010), IEEE (pp. 1–5).Google Scholar
  11. 11.
    Shi, L., Li, M., Yu, S., & Yuan, J. (2013). BANA: Body area network authentication exploiting channel characteristics. IEEE J. Select. Areas Commun., 31(9), 1803–1816.CrossRefGoogle Scholar
  12. 12.
    Liu, J., Kwak, K. S. (2010). Hybrid security mechanisms for wireless body area networks. In Proceeding of the 2nd International Conference on Ubiquitous and Future Networks (ICUFN, 2010) (pp. 98–103). Jeju Island, Korea (South).Google Scholar
  13. 13.
    Khor, K. C., Ting, C. Y., & Amnuaisuk, S. P. (2009). From feature selection to building of Bayesian classifiers: A network intrusion detection perspective. Am. J. Applied Sci., 6, 1949–1960.  https://doi.org/10.3844/.2009.1948.1959.CrossRefGoogle Scholar
  14. 14.
    Iqbal, J., Amin, N. U., & Umar, A. I. (2013). Authenticated key agreement and cluster head selection for Wireless Body Area Networks. In 2013 2nd national conference on information assurance (NCIA). IEEE.Google Scholar
  15. 15.
    Huque, M. T. I., Munasinghe, K. S., Abolhasan, M., &Jamalipour, A. (2013). SEA-BAN: Semi-autonomous adaptive routing in wireless body area networks. In 2013 7th international conference on signal processing and communication systems (ICSPCS) (pp. 1–7). IEEE.Google Scholar
  16. 16.
    Salem, O., Liu, Y., Mehaoua, A., & Boutaba, R. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE journal of biomedical and health informatics, 18(5), 1541–1551.CrossRefGoogle Scholar
  17. 17.
    Thamilarasu, G., & Ma, Z. (2015). Autonomous mobile agent based intrusion detection framework in wireless body area networks. In 2015 IEEE 16th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM) (pp. 1–3). IEEE.Google Scholar
  18. 18.
    Ramli, S.N. (2013). A biometric-based security for data authentication in wireless body area network (WBAN). In IEEE. Google Scholar
  19. 19.
    Sharma, R., Ryait, H. S., & Gupta, A. K. (2015). Clustering based routing protocol to increase the stability in WBAN. International Journal of Innovations in Engineering and Technology, 6(1), 119–125.Google Scholar
  20. 20.
    He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590–2601.CrossRefGoogle Scholar
  21. 21.
    Alghamdi, T. A. (2016). Cluster based energy efficient routing protocol for wireless body area networks. Trends in Applied Sciences Research, 11(1), 12.MathSciNetCrossRefGoogle Scholar
  22. 22.
    Ali, A., & Khan, F. A. (2013). Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–19.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Koneru Lakshmaiah Education FoundationKoneru Lakshmaiah (KL) UniversityVaddeswaram, GunturIndia
  2. 2.Department of Computer Science and EngineeringRVS Technical Campus - CoimbatoreCoimbatoreIndia

Personalised recommendations