Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks

Healthcare data are becoming increasingly important in the life of people. By utilizing healthcare data in a proper and secure manner, the elderly may avoid some sudden diseases, whereas young people can monitor their health condition. In the hospital, for certain sizes of detection objects, an effective method of data transmission becomes very significant. In view of the movement of patients in the hospital, we introduce a type of network called incompletely predictable networks to describe such scenarios. The patients move in a certain trend or are only active in a certain limited range. To achieve high performance when transmitting healthcare data in such networks, a novel protocol called the direction density-based secure routing protocol is proposed in this paper. Both the moving direction and the influence of node group movement are considered. The novel protocol innovatively takes the density of the node moving direction into consideration, which makes full use of the relationships among the moving individuals. Moreover, the design of the secure routing with authenticated message transmission ensures secure healthcare data communication. The simulation shows that our protocol achieves a high packet delivery ratio with low overhead and end-to-end delay.

[1]  Anurag Tewari,et al.  Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review , 2016 .

[2]  Benjamin Fabian,et al.  Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..

[3]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[4]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[5]  Gil Eduardo de Andrade,et al.  Message routing in vehicular delay-tolerant networks based on human behavior , 2016, 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).

[6]  Zhixin Sun,et al.  A Symmetric Lookup-based Secure P2P Routing Algorithm , 2016, KSII Trans. Internet Inf. Syst..

[7]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[8]  Boleslaw K. Szymanski,et al.  Trust Based Secure Routing in Delay Tolerant Networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[9]  Ram Shringar Raw,et al.  Distance and direction-based location aided multi-hop routing protocol for vehicular ad-hoc networks , 2016, Int. J. Commun. Networks Distributed Syst..

[10]  Zhihua Xia,et al.  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.

[11]  Ren-Song Ko,et al.  Geographical model-derived grid-based directional routing for massively dense WSNs , 2016, EURASIP J. Wirel. Commun. Netw..

[12]  Min Chen,et al.  Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.

[13]  Garth V. Crosby,et al.  Wireless Body Area Networks for Healthcare: A Survey , 2012 .

[14]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..

[15]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[16]  Samira Moussaoui,et al.  Direction-based Greedy Forwarding in Mobile Wireless Sensor Networks , 2012, ICT 2012.

[17]  J. K. Mandal,et al.  DirMove: direction of movement based routing in DTN architecture for post-disaster scenario , 2016, Wirel. Networks.

[18]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[19]  Victor C. M. Leung,et al.  CAP: community activity prediction based on big data analysis , 2014, IEEE Network.

[20]  Christian Wietfeld,et al.  PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks , 2016, IEEE Transactions on Wireless Communications.

[21]  Jaime Lloret Mauri,et al.  Improved Geographical Routing in Vehicular Ad Hoc Networks , 2015, Wirel. Pers. Commun..

[22]  Jian Shen,et al.  Buffer scheme optimization of epidemic routing in delay tolerant networks , 2014, Journal of Communications and Networks.

[23]  E. Jagadeeswararao,et al.  Performance Analysis of MANET Routing Protocols - DSDV, DSR, AODV, AOMDV Using Ns-2 , 2015 .

[24]  Yue Cao,et al.  A Survey on Geographic Routing Protocols in Delay/Disruption Tolerant Networks , 2016, Int. J. Distributed Sens. Networks.

[25]  Jian Shen,et al.  A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks , 2010, IEICE Trans. Inf. Syst..

[26]  Min Chen,et al.  Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems , 2017, IEEE Communications Magazine.

[27]  Albert Levi,et al.  An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer , 2013, LightSec.

[28]  Jian Shen,et al.  Organized topology based routing protocol in incompletely predictable ad-hoc networks , 2017, Comput. Commun..

[29]  Jian Shen,et al.  Identity-based key agreement protocol employing a symmetric balanced incomplete block design , 2012, Journal of Communications and Networks.

[30]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[31]  Min Chen,et al.  Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring , 2016, Mobile Networks and Applications.

[32]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[33]  Jian Shen,et al.  Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.

[34]  Kamalrulnizam Abu Bakar,et al.  A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..

[35]  Xingming Sun,et al.  Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.

[36]  Benxiong Huang,et al.  Scheduled-links multicast routing protocol in MANETs , 2016, J. Netw. Comput. Appl..

[37]  Min Chen,et al.  AIWAC: affective interaction through wearable computing and cloud technology , 2015, IEEE Wireless Communications.

[38]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[39]  Xin Wang,et al.  Secure Routing Based on Social Similarity in Opportunistic Networks , 2016, IEEE Transactions on Wireless Communications.

[40]  Robert Simon Sherratt,et al.  A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments , 2016, Sensors.

[41]  Hitendra D. Patil,et al.  Delay Efficient Authenticated Anonymous Secure Routing for MANETs , 2016 .

[42]  Tinghuai Ma,et al.  Social Network and Tag Sources Based Augmenting Collaborative Recommender System , 2015, IEICE Trans. Inf. Syst..