Optimized authentication for wireless body area network

In this paper, we propose a novel technique for determining the Cyclic Redundancy Code (CRC) polynomials with the help of a heuristic search (Genetic Algorithms) for Wireless Body Area Networks (WBAN). We apply the resulting CRCs and an encryption technique for improving the error detection in the WBANs. Thereafter, we compare the resulting polynomials, with or without the encryption headers with the benchmark polynomial. Since the Ad-hoc On-demand Distance Vector (AODV) routing protocol is practical in WBAN, we integrated this protocol with the proposed technique for evaluating its performance. The main objective is to improve the error detection rate, which then improves the Packet Delivery Ratio (PDR) along with the network resource usage efficiency. The results indicated that this method is very successful, as it improved the PDR while decreasing the end-to-end (E2E) delay. The overhead is seen to increase because of the use of a novel control message. Also, the energy consumption increased due to the error messages was resent and due to the retransmission of the data packets. All these increased values are acceptable and led to an 80% increase in the PDR values for the stand-up scenario and a 23% increase for the hand waving scenario.

[1]  E. Gilbert Capacity of a burst-noise channel , 1960 .

[2]  Mustafa Hamid Hassan,et al.  An improved hybrid technique for energy and delay routing in mobile ad-hoc networks , 2017 .

[3]  S. Karthik,et al.  A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks , 2018, Cluster Computing.

[4]  Jake K. Aggarwal,et al.  View invariant human action recognition using histograms of 3D joints , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[5]  Sekson Timakul,et al.  Performance evaluation of LDPC codes on patterned WBAN data , 2014, TENCON 2014 - 2014 IEEE Region 10 Conference.

[6]  Subir Biswas,et al.  On-body Packet Routing Algorithms for Body Sensor Networks , 2009, 2009 First International Conference on Networks & Communications.

[7]  Xue Liu,et al.  SReD: A Secure REputation-based Dynamic Window Scheme for disruption-tolerant networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[8]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[9]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  Fahad Taha AL-Dhief,et al.  Performance Evaluation of LAR and OLSR Routing Protocols in Forest Fire Detection using Mobile Ad-Hoc Network , 2016 .

[11]  Shriram Sharma Energy-Efficient Secure Routing in Wireless Sensor Networks , 2009 .

[12]  Mohammad S. Obaidat,et al.  Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[13]  S. Dodunekov,et al.  Undetected error probability performance of cyclic redundancy-check codes of 16-bit redundancy , 2000 .

[14]  Abdalhossein Rezai,et al.  A modified digital to digital encoding method to improve the Wireless Body Area Network (WBAN) transmission , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).

[15]  E. O. Elliott Estimates of error rates for codes on burst-noise channels , 1963 .

[16]  Mohamed F. Younis,et al.  Energy‐aware delay‐constrained routing in wireless sensor networks , 2004, Int. J. Commun. Syst..

[17]  Houda Moudni,et al.  Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks , 2016, 2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV).

[18]  M. Jeyalakshmi Location aware end-end data security using mac for secured wireless sensor networks , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[19]  Ying Wu,et al.  The 8-bit Parallel CRC-32 Research and Implementation in USB 3.0 , 2012, 2012 International Conference on Computer Science and Service System.

[20]  Miguel Vargas Martin,et al.  Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[21]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[22]  Deepak Sethi,et al.  A Study on Energy Efficient and Reliable Data Transfer (EERDT) Protocol for WBAN , 2016, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT).

[23]  Lamia Chaari,et al.  SKEP: A secret key exchange protocol using physiological signals in wireless body area networks , 2015, 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[24]  Enrique Alba,et al.  Fast energy-aware OLSR routing in VANETs by means of a parallel evolutionary algorithm , 2012, Cluster Computing.

[25]  Chai Kiat Yeo,et al.  A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks , 2010, 2010 Sixth Advanced International Conference on Telecommunications.

[26]  M. A. Jubair,et al.  NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET , 2016 .

[27]  Jin Zhang,et al.  STFC: Spatio-temporal feature chain for skeleton-based human action recognition , 2015, J. Vis. Commun. Image Represent..

[28]  Dorothea Heiss-Czedik,et al.  An Introduction to Genetic Algorithms. , 1997, Artificial Life.

[29]  Ravie Chandren Muniyandi,et al.  New Heuristic Model for Optimal CRC Polynomial , 2017 .

[30]  Israel Bar-David,et al.  Capacity and coding for the Gilbert-Elliot channels , 1989, IEEE Trans. Inf. Theory.

[31]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[32]  Philip Koopman,et al.  Cyclic redundancy code (CRC) polynomial selection for embedded networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[33]  Koushik Majumder,et al.  Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .