Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment

Authors

  • Parvathy S Vels Institute of Science, Technology and Advanced Studies, Chennai
  • Packialatha A

DOI:

https://doi.org/10.22399/ijcesen.490

Keywords:

Wireless Body Area Network, Internet of Things, Scroll Chaotic maps

Abstract

Recently, the Wireless Body Area Networks (WBAN) have become a promising and practical option in the tele-care medicine information system that aids for the better clinical monitoring and diagnosis.  The trend of using Internet of Things (IoT) has propelled the WBAN technology to new dimension in terms of its network characteristics and efficient data transmission. However, these networks demand the strong authentication protocol to enhance the confidentiality, integrity, recoverability and dependability against the emerging cyber-physical attacks owing to the exposure of the IoT ecosystem and the confidentiality of biometric data. Hence this study proposes the Fog based WBAN infrastructure which incorporates the hybrid symmetric cryptography schemes with the chaotic maps and feed forward networks to achieve the physiological data info security without consuming the characteristics of power hungry WBAN devices. In the proposed model, scroll chaotic maps are iterated to produce the high dynamic keys streams for the real time applications and feed-forward layers are leveraged to align the complex input-output associations of cipher data for subsequent mathematical tasks. The feed forward layers are constructed which relies on the principle of Adaptive Extreme Learning Machines (AELM) thereby increasing randomness in the cipher keys thereby increasing its defensive nature against the different cyber-physical attacks and ensuring the high secured encrypted-decrypted data communication between the users and fog nodes. The real time analysis is conducted during live scenarios. BAN-IoT test beds interfaced with the heterogeneous healthcare sensors and various security metrics are analysed and compared with the various residing cryptographic algorithms. Results demonstrates that the recommended methodology has exhibited the high randomness characteristics and low computational overhead compared with the other traditional BAN oriented cryptography protocol schemes

References

S. M. R. Islam, D. Kwak, M. D. H. Kabir, M. Hossain, and K.-S. Kwak, (2015). The internet of things for health care: a comprehensive survey, IEEE access, 3;678–708. doi: 10.1109/ACCESS.2015.2437951

A. M. Rahmani et al., (2018). Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach, Futur. Gener. Comput. Syst., 78;641–658, 2018.

S. Tuli, N. Basumatary, and R. Buyya, (2019). Edgelens: Deep learning-based object detection in integrated iot, fog and cloud computing environments,” 4th International Conference on Information Systems and Computer Networks (ISCON), 2019, pp. 496–502.

S. S. Gill, R. C. Arya, G. S. Wander, and R. Buyya, (2018). Fog-based smart healthcare as a big data and cloud service for heart patients using IoT, International Conference on Intelligent Data Communication Technologies and Internet of Things, pp. 1376–1383.

S. He, B. Cheng, H. Wang, Y. Huang, and J. Chen, (2017). Proactive personalized services through fog-cloud computing in largescale IoT-based healthcare application,” China Commun., 14(11); 1–16, 2017.

I. Abdullahi, S. Arif, and S. Hassan, (2015) “Ubiquitous shift with information centric network caching using fog computing,” Computational intelligence in information systems, Springer, pp. 327–335.

M. Satyanarayanan, (2017). The emergence of edge computing,” Computer (Long. Beach. Calif)., 50(1); 30–39.

A. Goyal et al., (2019). Seasonal variation in 24 h blood pressure profile in healthy adults-A prospective observational study, J. Hum. Hypertens., 33(8); 626–633 DOI: 10.1038/s41371-019-0173-3

A. A. Omala, A. S. Mbandu, K. D. Mutiria, C. Jin, and F. Li, (2018). Provably secure heterogeneous access control scheme for wireless body area network, Journal of Medical Systems, 42(6);108. DOI: 10.1007/s10916-018-0964-z

G. Gao, X. Peng, and L. Jin, (2019). Efficient access control scheme with certificateless signcryption for wireless body area networks, International Journal of Network Security, 21;428–437.

I. Ullah, A. Alomari, N. Ul Amin, M. A. Khan, and H. Khattak, (2019). An energy efficient and formally secured certificate-based signcryption for wireless body area networks with the internet of things, Electronics, 8(10);1171, 2019.

J. Iqbal, A. I. Umar, N. Amin, and A. Waheed, (2019). Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain, International Journal of Distributed Sensor Networks, 15(9).

H. Xiong, Y. Hou, X. Huang, Y. Zhao, and C. -M. Chen, (2021). Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs,” IEEE Systems Journal, pp. 1–10.

I. Ullah, N. U. Amin, J. Khan et al., (2019). A novel provable secured signcryption scheme: a hyper-elliptic curve-based approach,” Mathematics, 7(8); 686.

M. Asghar Khan, I. Ullah, A. Alkhalifah et al., (2021). A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems, IEEE Transactions on Industrial Informatics, p. 1, 2021.

M. Khan, I. Ullah, N. Kumar et al., (2021). An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks, IEEE Transactions on Vehicular Technology, 70(5);4839–4851.

M. A. Khan, I. Ullah, S. Nisar et al., (2020). Multiaccess edge computing empowered flying ad hoc networks with secure deployment using identity-based generalized signcryption, Mobile Information Systems, 2020;8861947

M. A. Khan, H. Shah, S. U. Rehman et al., (2021). Securing internet of drones with identity-based proxy signcryption, IEEE Access, 9;89133–89142.

N. U. Amin, J. Iqbal, and A. R. Abbasi,(2014). Secure key establishment and cluster head selection for body area networks based on signcryption, Journal of Applied Environmental and Biological Sciences, 4;210–216

Y. Lu, X. Wang, C. Hu, H. Li, and Y. Huo, (2018). A traceable threshold attribute-based signcryption for mHealthcare social network, International Journal of Sensor Networks, 26(1);43–53.

A. Arul Jothi and B. Srinivasan, (2016). Security analysis in body area networks using attribute-based ring signcryption scheme, Research Journal of Applied Sciences, Engineering and Technology, 13(1);48–56.

S. Prameela, (2018). Enhanced certificateless security improved anonymous access control with obfuscated quality-aware confidential data discovery and dissemination protocol in WBAN, International Journal of Pure and Applied Mathematics, 118;2627–2635.

M. A. Khan, I. Ullah, S. Nisar et al., (2020). Multiaccess edge computing empowered flying ad hoc networks with secure deployment using identity-based generalized signcryption,” Mobile Information Systems, 2020;8861947.

S. Amudha; M. Murali,(2022). F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment, International Journal of Ad Hoc and Ubiquitous Computing, 40(1,2,3);67–79, DOI: 10.1504/IJAHUC.2022.10048192

L. A. Demidova and A. V. Gorchakov, (2020). A study of chaotic maps producing symmetric distributions in the fish school search optimization algorithm with exponential step decay, Symmetry 12(5);784

Wang B, Huang S, Qiu J, et al. (2015). Parallel online sequential extreme learning machine based on Map Reduce. Neurocomputing 149: 224-32.

https://www.celerium.com/nist-800171

Cryptographic Technology Guideline (Lightweight Cryptography). [Online]. Available: https://www.cryptrec.go.jp/report/cryptrecgl-2003-2016en.pd.

Maheshwari, R.U., Kumarganesh, S., K V M, S. et al. (2020). Advanced Plasmonic Resonance-enhanced Biosensor for Comprehensive Real-time Detection and Analysis of Deepfake Content. Plasmonics. https://doi.org/10.1007/s11468-024-02407-0

Maheshwari, R. U., Paulchamy, B., Arun, M., Selvaraj, V., & Saranya, N. N. (2024). Deepfake Detection using Integrate-backward-integrate Logic Optimization Algorithm with CNN. International Journal of Electrical and Electronics Research, 12(2), 696-710. https://doi.org/10.37391/IJEER.120248

Maheshwari, R. U., & Paulchamy, B. (2024). Securing online integrity: a hybrid approach to deepfake detection and removal using Explainable AI and Adversarial Robustness Training. Automatika, 65(4), 1517-1532.

M, P., B, J., B, B., G, S., & S, P. (2024). Energy-efficient and location-aware IoT and WSN-based precision agricultural frameworks. International Journal of Computational and Experimental Science and Engineering, 10(4);585-591. https://doi.org/10.22399/ijcesen.480

Guven, M. (2024). A Comprehensive Review of Large Language Models in Cyber Security. International Journal of Computational and Experimental Science and Engineering, 10(3);507-516. https://doi.org/10.22399/ijcesen.469

Agnihotri, A., & Kohli, N. (2024). A novel lightweight deep learning model based on SqueezeNet architecture for viral lung disease classification in X-ray and CT images. International Journal of Computational and Experimental Science and Engineering, 10(4);592-613. https://doi.org/10.22399/ijcesen.425

ÇOŞGUN, A. (2024). Estimation Of Turkey’s Carbon Dioxide Emission with Machine Learning. International Journal of Computational and Experimental Science and Engineering, 10(1);95-101. https://doi.org/10.22399/ijcesen.302

Türkmen, G., Sezen, A., & Şengül, G. (2024). Comparative Analysis of Programming Languages Utilized in Artificial Intelligence Applications: Features, Performance, and Suitability. International Journal of Computational and Experimental Science and Engineering, 10(3);461-469. https://doi.org/10.22399/ijcesen.342

guven, mesut. (2024). Dynamic Malware Analysis Using a Sandbox Environment, Network Traffic Logs, and Artificial Intelligence. International Journal of Computational and Experimental Science and Engineering, 10(3);480-490. https://doi.org/10.22399/ijcesen.460

S, P. S., N. R., W. B., R, R. K., & S, K. (2024). Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3);341-349. https://doi.org/10.22399/ijcesen.395

Polatoglu, A. (2024). Observation of the Long-Term Relationship Between Cosmic Rays and Solar Activity Parameters and Analysis of Cosmic Ray Data with Machine Learning. International Journal of Computational and Experimental Science and Engineering, 10(2);189-199. https://doi.org/10.22399/ijcesen.324

Downloads

Published

2024-10-11

How to Cite

S, P., & A, P. (2024). Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.490

Issue

Section

Research Article