期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Paillier Cryptography Based Message Authentication Code for IoMT Security
1
作者 S.Siamala Devi chandrakala kuruba +1 位作者 Yunyoung Nam Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2209-2223,共15页
Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication syst... Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of devices.The digital technology-based communication system is widely used in all application.Internet of medical thing(IoMT)assisted health-care application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation.These smart medical devices may consume with limited resources and also the data generated by these devices are large in size.These IoMT based applications suffer from the issues such as security,anonymity,privacy,and interoper-ability.To overcome these issues,data aggregation methods are the solution that can concatenate the data generated by the sensors and forward it into the base station through fog node with efficient encryption and decryption.This article proposed a well-organized data aggregation and secured transmission approach.The data generated by the sensor are collected and compressed.Aggregator nodes(AN)received the compressed data and concatenate it.The concatenated and encrypted data is forward to fog node using the enhanced Paillier cryptogra-phy-based encryption with Message Authentication code(MAC).Fog node extracts the forwarded data from AN using Fog message extractor method(FME)with decryption.The proposed system ensures data integrity,security and also protects from security threats.This proposed model is simulated in Net-work Simulator 2.35 and the evaluated simulation results proves that the aggregation with MAC code will ensures the security,privacy and also reduces the communication cost.Fog node usages in between Aggregator and base station,will reduce the cloud server/base station computational overhead and storage cost.The proposed ideology is compared with existing data aggregation schemes in terms of computational cost,storage cost,communication cost and energy cost.Cost of communication takes 18.7 ms which is much lesser than existing schemes. 展开更多
关键词 FOG IoMT wireless sensor network cloud AGGREGATION ENCRYPTION DECRYPTION energy
下载PDF
Hybrid Optimisation with Black Hole Algorithm for Improving Network Lifespan
2
作者 S.Siamala Devi chandrakala kuruba +1 位作者 Yunyoung Nam Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1873-1887,共15页
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the future.The fundamental problem with WSN is that it has afinite lifespan.Clustering a network is a common strategy for increasing t... Wireless sensor networks(WSNs)are projected to have a wide range of applications in the future.The fundamental problem with WSN is that it has afinite lifespan.Clustering a network is a common strategy for increasing the life-time of WSNs and,as a result,allowing for faster data transmission.The cluster-ing algorithm’s goal is to select the best cluster head(CH).In the existing system,Hybrid grey wolf sunflower optimization algorithm(HGWSFO)and optimal clus-ter head selection method is used.It does not provide better competence and out-put in the network.Therefore,the proposed Hybrid Grey Wolf Ant Colony Optimisation(HGWACO)algorithm is used for reducing the energy utilization and enhances the lifespan of the network.Black hole method is used for selecting the cluster heads(CHs).The ant colony optimization(ACO)technique is used tofind the route among origin CH and destination.The open cache of nodes,trans-mission power,and proximity are used to improve the CH selection.The grey wolf optimisation(GWO)technique is the most recent and well-known optimiser module which deals with grey wolves’hunting activity(GWs).These GWs have the ability to track down and encircle food.The GWO method was inspired by this hunting habit.The proposed HGWACO improves the duration of the net-work,minimizes the power consumption,also it works with the large-scale net-works.The HGWACO method achieves 25.64%of residual energy,25.64%of alive nodes,40.65%of dead nodes also it enhances the lifetime of the network. 展开更多
关键词 Energy efficiency power consumption lifespan of the network black hole method ant colony optimisation routing and cluster heads(CHs)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部