Conference PaperPDF Available

Wireless Body Region Networks Abnormality Identification And Energy Saving A Study

Authors:

Abstract

Current advances in wireless body networking technologies help to escape any of the healthcare industry-related problems. Wearable biomedical devices and their related innovations are in vogue lately, with constant health surveillance being mandatory for many chronic patients. Energy conservation is critical in wireless body area networks (WBANs) since the sensor nodes are energy constraint devices. Energy conservation through data reduction approaches in WBANs is a comparatively less explored area in which the detection of probabilistic anomaly models is becoming inevitable for the prevention of serious health problems. This paper reviews wireless body area networks for anomaly detection in various applications and discusses how models can be made for the energy conservation of WBAN devices. Keywords-wireless body area networks (WBANs), radio frequency (RF), Network Manager (NM), coordinator node (CN).
WIRELESS BODY REGION NETWORKS ABNORMALITY
IDENTIFICATION AND ENERGY SAVING A STUDY
Abstract
Current advances in wireless body networking
technologies help to escape any of the healthcare industry-
related problems. Wearable biomedical devices and their
related innovations are in vogue lately, with constant health
surveillance being mandatory for many chronic patients.
Energy conservation is critical in wireless body area
networks ( WBANs) since the sensor nodes are energy
constraint devices. Energy conservation through data
reduction approaches in WBANs is a comparatively less
explored area in which the detection of probabilistic
anomaly models is becoming inevitable for the prevention of
serious health problems. This paper reviews wireless body
area networks for anomaly detection in various applications
and discusses how models can be made for the energy
conservation of WBAN devices.
Keywords—
wireless body area networks (WBANs), radio
frequency ( RF), Network Manager (NM), coordinator node (CN).
I.
I
NTRODUCTION
The global growth in life expectancy and the growth of chronic
and coronary diseases has contributed to a growing interest in
the advancement of telecare and medical telemonitoring
services[1]. With the use of medical on-body sensor networks,
also called wireless body-area networks (WBANs), these
devices can be realized. They consist of medical sensor
networks positioned within, on, or outside the human body[2].
The sensors are attached to a body-based central coordinator
node (CN) that gathers the incoming data and normally
transmits it to an access point ( AP). In exchange, this latter
carries out preprocessing on these data before transferring
them, e.g. to a medical centre, where the medical staff stores
and analyzes them[3]. Medical WBANs have unique
specifications that separate them from other networks,
including low energy consumption and high data protection and
high reliability. They can also maintain a low basic absorption
rate (SAR) level when relying on radio frequency ( RF)
technologies, as considered in the IEEE 802.15.6 standard.
There is a high chance of electromagnetic interference with the
other existing networks as most currently planned WBAN
systems use RF waves in the unlicensed commercial, science,
and medical (ISM) frequency range[4].
In addition, RF connections are more commonly prone to
differences in channel time due primarily to small-scale fading.
The investigation of alternative (or complementary) solutions
such as optical wireless communications (OWC) for medical
WBANs has been driven by these factors. Here, OWC's key
benefits include its sensitivity to environmental intrusion, not
being impacted by small-scale (multi-path) fading, and its
intrinsic protection due to light containment in indoor
spaces.The health services have expanded and are readily open
to a wide population. The provision of medication for different
illnesses that have affected the lives of thousands of people in
the past has raised the average age of people around the world
in developing countries[5]. This aspect further indicates that
elderly people seeking health care services would be plentiful in
the immediate future. Similarly , in order for better care to be
given, different diseases require constant supervision. This will
surely need additional services for health care and will therefore
put a pressure on the current services available. To deal with this
circumstance, very small, intelligent sensing instruments may be
installed in the close vicinity of the human body , i.e. embedded
in the human body, installed on or around the human body,
capable of recording / collecting data and transmitting it to any
distant location. Such small devices, including sensors and
actuators, form a Wireless Body Area Network (WBAN)
network[6]. Zimmerman first proposed the idea of Wireless
Body area networks, which consists of multiple smart sensors
that consume low energy, located in or near the patient's body.
This network is capable of detecting a person's (patient's) real-
time data, forwarding it to the health care professional
concerned, and also offering medical assistance through
administering the necessary volume of medication into the
human body utilizing actuators[7]. This smart network would
definitely reduce the burden on health care services and allow
patients to be tracked on time. Patients also do not need to attend
the primary care center for check-up purposes[8]. IEEE 802.15.6
has been proposed to standardize this new technology globally
to provide safe and trustworthy connectivity due to the
significance of the functionality of WBANs due to the criticality
of the quality of data transmitted through the wireless channel.
This norm guarantees the applicability of instruments that are
inserted in, mounted in or near the human body for secure
transfer to the human body[9].
SAIF MOHAMED BARAA AL-SABTI
Department of Electrical And Computer
Engineering Altinbas University
saifbraa@yahoo.com
ALAA AMJED ABDULATEEF
Trade Directorate, Ministry of Trade,
Iraq
Aaan1990@gmail.com
CAGDAS ATILLA
Department of Electrical And Computer
Engineering Altinbas University
cagdas.atilla@altinbas.edu.tr
ALAA HAMID MOHAMMED
Department of Computer Engineering,
Karabuk University, Turkey
Aallaaha12@gmail.com
978-1-7281-9090-7/20/$31.00 ©2020 IEEE
Authorized licensed use limited to: ULAKBIM UASL - Altinbas Universitesi. Downloaded on November 22,2020 at 15:19:34 UTC from IEEE Xplore. Restrictions apply.
Depending upon the purpose of the program, these systems
accept data speeds from 75.9 kbps to 15.6 Mbps. Figure 1
demonstrates the WBAN model for the method of building up
the contact structure in compliance with our proposed scheme.
It is the responsibility of the customer (C) in this model to[10].
Figure 1: Network model of WBAN
Give the essential WBAN patient / user details to the supplier
of the application. The application provider (AP) is normally in
a health center at a remote location. The Network Manager
(NM) is a trusted third-party server used to authenticate secure
web-based communication between the client and the
application provider. Both the client and AP are identified by
the NM and essential information about both is kept. Using the
internet, the client can connect with the application server and
the Network Manager. WBANs have the potential to connect
with the internet and connect with a broad variety of currently
available devices, such as Bluetooth , Zigbee, and smartphone
networks and wireless sensor networks, respectively. This
suggests that WBAN implementations are no longer linked to
personal wellbeing, but can be applied to large areas of life. The
applicability of WBANs in the real world, however, presents
some challenges, such as communication delays, device
performance, device uptime, protection, privacy and
compatibility with current technologies, etc. In WBANs, the
essential authentication information transmitted over the
network must be protected and also provide the data owner with
privacy. In the recent past, numerous anonymous
authentication mechanisms that include authentication have
been proposed in order to protect this knowledge. Privacy also
relies on these anonymous verification mechanisms. However,
by applying stringent policies and security controls, the
efficiency of these networks is significantly degraded. The goal
of this thesis is to enhance the understanding of WBANs by
analyzing the recent research work.
II.
LITERATURE REVIEW
OUSSAMA HADDAD
[11] During a walking situation,
we explored channel modeling and characterization for optical
intra-WBAN connections, i.e., between a collection of SNs and
a CN. The presented research gives valuable insights into the
impact of mobility of local and global consumers and the
related shadowing of the beam. Using a practical dynamic
model based on a 3D animation of the walking period and
adjusted RWP agility, these results were investigated.
Simulations based on MCRT were then conducted using the
Opticstudio program to acquire the CIRs at various moments of
the walk scenario for a collection of SN and CN configurations.
The configurations considered cover the most likely positions
for the realistic application of a medical WBAN by the CN and
the SNs. On channel first- and second-order statistics, we
provided detailed numerical results, namely the DC gain, delay
distribution, ACF, and coherence time. It was observed that the
positions and orientations of SNs and CNs along with the
geometry of the body had a major effect on the statistics for
channel gain. Overall, however, when using basic OOK
signaling, for instance, the channel can be considered as
frequency non-selective for data rates up to 5 Mbps. For most
medical WBAN implementations, ISI may also be overlooked.
Syed Jawad Hussain [12] The use of sensors to gather
medical data is growing broadly over time. Using these
machines provides the patient with some protection and privacy
challenges and can be fatal for the life of the user. The security
of WBAN communication has been a major concern, but due to
its low capacity, computer-restricted atmosphere and signal
problems, the network is small. Previous work in this field has
concentrated on topics of security and privacy. They boost safety
but, on the other hand, degrade WBAN performance. Our
proposed scheme greatly increases the efficiency of WBANs,
preserving the whole system's protection and privacy. The
contrast of our scheme with the current anonymous
authentication scheme reveals that our scheme increases
performance and may also extend the network 's lifespan. The
informal review of defense proves the.
PENGTAO LIU [13] In this paper, by evaluating the link
quality of sensor nodes, we presented an Energy Aware Routing
(EAR) protocol to minimize energy utilization and select the
preferred next hop. Residual energy and connection efficiency
have been introduced as routing indicators for routing decisions
in the proposed protocol. The next forwarder is chosen via the
weighting score feature to route the data to the sink node in the
WBAN. In terms of energy consumption, data distribution ratio,
delay and throughput, the proposed protocol has been tested in
simulation. The tests performed are focused on the number of
nodes, simulation time and scale of the network. The findings
reveal that ERP has improved efficiency compared to state-of-
the-art protocols to meet all WBAN routing criteria. The
proposed protocol has less overhead and an efficient mechanism
of computation. We would consider node versatility in the future
to produce the best results.
Mohammed Ramadan [14] WBAN apps present the
medical and healthcare industries with numerous advantages
and obstacles. A suitable atmosphere that can track the everyday
lives and medical needs of patients at any time, anywhere, and
without restrictions, is one of the most valuable advantages.
When it comes to problems, though, one of the most critical ones
is precisely linked to low security levels in all WBAN
applications. This not only makes the privacy of the patient weak
and vulnerable, but also endangers the life of the patient by
exposing his or her information to potential adversaries. To
recap, a new IBEET-RSA scheme without pairing was
introduced in this article. The performance assessment was
performed to show that the proposed method is reliable and safe
against one-way open and selected identity and chosen-
ciphertext attacks (OW-ID-CCA) under the assumption of DDH.
Authorized licensed use limited to: ULAKBIM UASL - Altinbas Universitesi. Downloaded on November 22,2020 at 15:19:34 UTC from IEEE Xplore. Restrictions apply.
Amit Choudhary [15] For WBAN, an energy-efficient
data routing protocol is of vital importance since bio-sensor
nodes use a large amount of allocated node energy for data
transfer to other nodes. A clustering-based protocol offers
inexpensive data error rates and network latency with an
energy-efficient data routing scheme. A new clustering
protocol for WBANs using a hybrid Fuzzy-Genetic MADM
algorithm (EB-fgMADM) for the selection of dynamic cluster
heads was suggested in this article. Simulation results
confirmed that, relative to current classical MADM-based
routing protocols, the EB-fg MADM protocol has an elongated
network lifetime and stability period of 14,410 and 8420
transmission rounds, respectively. A consistent allocation of
routing load between network nodes is given by the proposed
protocol, resulting in an increased stability duration and
network lifespan.
OMAR AHMED [16] This article centers around building
up an energy-proficient and temperature-delicate directing
calculation for SDN-based WBAN, which additionally
incorporates blockage control to give ideal execution. To
accomplish this objective, three fundamental issues,
specifically, power utilization, warm dissemination of hubs and
street clog, were contemplated and a productive arrangement
was introduced in the proposed directing calculation. The
proposed EOCC-TARA guiding calculation at first recognizes
force and temperature controlling hubs as need targets and does
exclude the high temperature directing hub. The cost model is
then inferred utilizing lingering power, interface dependability,
way misfortune and line length to choose the ideal steering
ways utilizing EMSMO. The reproduction results show that the
proposed EOCC-TARA directing calculation is beating the
customary SDN-based WBAN steering models. The proposed
technique demonstrated improved energy investment funds,
less impediment and high effectiveness alongside a consistent
temperature of the wax just as of the patient's body. Future
work incorporates considering the unsafe natural variables and
portability gives that will be related with the down to earth use
of WBANs dependent on networks characterized in the band.
MENGXIA SHUAI [17] To move physiological
information safely over WBANs, this article proposes an
effective and security safeguarding verification plot for
WBANs. Public key cryptography innovation, which has lower
computational prerequisites, littler key size and shorter
boundary length, is embraced in our graph rather than
substantial number related activities like twofold direct
matches. The proposed protection confirmation plot has
demonstrated phonetically safe under Oracle's broadly
acknowledged randomized model. The nitty gritty security
investigation shows that the proposed plot isn't just ready to
give the necessary security highlights, however it is
additionally withstand all possible assaults. The proposed
verification plan to keep up protection gives better
computational effectiveness contrasted with the five
confirmation frameworks included. Hence, the proposed plot is
more appropriate for functional applications.
GARRETT NEWELL [18] A calculation has been created
and actualized to control the steering and transmission intensity
of remote body region networks that diminish power utilization
to a base. Sensor hubs in the organization work as per the
client's body development, which should be repeating, for
example, strolling and exercise based recuperation, and the
calculation utilizes inertial estimation units to show the
development of every sensor. This model is utilized to
characterize the steering table and transmission abilities that
upgrade the force expended to move parcels from every sensor
hub to a base station. The calculation lessens power utilization
under the requirement that the parcel transmission rate is
equivalent to or more noteworthy than a specific least. Test
results show that the reduction in power utilization relies upon
the development of the client, the situation of the sensor on the
client's body, and the good ways from the client to the sump.
The decrease in power utilization for the transmission at the
consistent most extreme force went from 23.4% to 50.4% and
the PDR was inside 5.6% of the objective PDR. Contending
calculations depend on RSSI estimations sent from accepting
sensors to transmission sensors to deliver results that are no in a
way that is better than the proposed calculation. These
exchanges, which are not needed by the proposed calculation,
devour more force and transmission capacity. The energy
utilization overhead of the proposed calculation in this article
can be as little as 11% of the energy utilization overhead of the
contending calculations.
. GULZAR MEHMOOD [19] In a couple of fast years,
WBAN-based advances are opening another method of
telehealth. WBAN is an intriguing innovation that comprises of
a restricted organization of biosensors. The biosensors
distinguished indispensable signs and sent them to the clinical
worker for essential clinical dissects. Information handling is
basic and WBAN requires trust-based provisioning in telehealth
applications. Consequently, a trust-based distant patient
checking and energy-proficient framework were proposed in
this examination to expand certainty and unwavering quality.
The attention is on trust-based clinical administrations to
perform medical services exercises on the opposite side of the
entryway for medical care clients. The proposed investigation is
another medical services thought in WABNs. Initial, a trust-
based model has been proposed to make trust esteems. After
this, a collective correspondence framework dependent on trust
is created dependent on the estimation of trust. At last, a
cryptography-based arrangement has been proposed to
guarantee unwavering quality and protection. The proposed
arrangement has attempted to improve solid help without
blunders for medical services clients. Additionally, the proposed
conspire expanded dependability and unwavering quality with
insignificant force utilization. Moreover, the normal association
administration delay is diminished for basic information
interchanges. The EDAS-based Logic Sequence exhibits that the
proposed plot is better than the current scaling plans.
NAVEEN BILAND [20] In this paper, the utilization of the
flow PSO calculation was effectively evolved by consolidating
a nearby hunt based instrument known as SA. The proposed
cross breed PSO-SA was tried in three distinct stages. In the
primary stage, the creators approved the exhibition of the
proposed hPSO-SA calculation in eighteen distinctive
measured capacities; Then, in the second period of the
examination, the proposed hPSO-SA viability was investigated
for five designing plan issues, lastly, the proposed calculation
for choosing the transfer hub in the WBAN model was applied
to decrease the complete force utilization. By contrasting the
outcomes and an assortment of cutting edge heuristic
Authorized licensed use limited to: ULAKBIM UASL - Altinbas Universitesi. Downloaded on November 22,2020 at 15:19:34 UTC from IEEE Xplore. Restrictions apply.
calculations, the outcomes obviously exhibit the prevalent
presentation of the proposed hPSO-SA calculation in each of
the three phases of the assessment. The trial results indicated
that the proposed calculation helps in expanding the
organization life and intensity of the WBAN transfer hub
choice issue contrasted with different calculations. Later on,
this work could be extended to lessen calculation time and
diminish hand-off hub determination in a situation with more
sensor hubs sent.
MAHDI FOTOUHI [21] In this article, we proposed a
lightweight two-factor confirmation plan for remote body
region organizations. The proposed conspire gives amazing
forward mystery and other security prerequisites, for example,
significant security protection from interruption assault and
meeting explicit transient data assaults. We talked about the
wellbeing and proficiency of the proposed arrangement and
contrasted it with some related plans. Additionally, we exhibit
formal security for our arrangement utilizing Real-Or-
Random (ROR) Model. At long last, we exhibited the security
highlights of our product with ProVerif, a generally utilized
security examination instrument, and reproduced our plan
utilizing the OPNET network emulator. The outcomes show
that executing our arrangement in medical services settings is
more secure and more productive.
BANDER A. ALZAHRANI [22] In this article, we have
given a survey of a patient approval and wellbeing checking
convention intended for a WBAN climate by Xu et al. While
this is a computationally compelling plan for utilizing light
tasks, this article uncovers some security weaknesses. We've
indicated that Plan Xu and others are helpless against
numerous dangers, including reboots, KCI assaults, and
protection concerns. Considering these inadequacies, we
proposed another Certification Key Agreement Protocol for
Wireless Body Area Networks. Security highlights are
formally approved and approved under BAN rationale
investigation and ProVerif robotized reproduction apparatus.
Later on, we will investigate more efficiencies and
enhancements in WBAN's confirmation convention
corresponding to cloud-based systems.
OSAMA AMJAD [23] Energy reserve funds are critical in
WBAN plan because of sensor's restricted battery life.
Therefore, improved energy effectiveness empowers
proficient utilization of restricted energy sensors. This article
figures another enhancement issue pointed toward decreasing
the force effectiveness (estimated in J/bits) of a WBAN by
advancing sensor bandwidth and encoding rate while thinking
about interferences and bundle retransmission. Reenactment
results show that the proposed calculation for L = 50 pieces
parcel length is 47% more energy productive contrasted with
L = 500 pieces. Consequently, it is desirable over send the
data in littler bundles to abstain from mentioning
retransmission of any erroneously gotten bits along these lines
sparing generally WBAN power.
GUANGSONG YANG1 [24] Body territory networks
have one of a kind highlights, for example, restricted force,
distinctive information rates, and complex channel conditions
(because of the sensor mount places that might be inside or
outside the human body). In this way, the correspondence
conventions utilized in open remote organizations might be
less viable or illogical for body territory organizations. In this
paper, an energy productive convention for remote body
territory networks is proposed. In the introduction phase of the
convention, the quantity of transmission floods is decreased by
the separation between the hubs and the CN, which diminishes
an opportunity to gather network data. In the directing
readiness stage, adjusted force cycles are dictated by
considering the hub area, channel condition and hub type. In
the space assignment stage, the schedule opening is dispersed
by the hub information prerequisites and need. The aftereffects
of the investigation and reproductions show that the proposed
convention can consider the trouble of changing sensor hubs in
the human body; Therefore, our convention fundamentally
broadens network life while meeting crisis recognition
information data transfer capacity prerequisites.
BHAWNA NARWAL [25] This article presents another
plan for common confirmation and Energy Efficient Mutual
Key (SEEMAKA) for a two-layer WBAN geography.
SEEMAKA accomplishes required security includes and
forestalls different security assaults by utilizing less hash calls
and single XOR preparing, which well fulfills the requirement
for restricted limit sensor hubs. SEEMAKA's security is
assessed utilizing a vigorous casual investigation and
AVISPA. Boycott Logic is utilized to check the precision of
SEEMAKA. For a superior comprehension, SEEMAKA is
assessed on NS2 with identical full postponement and business
volume equal plans. Various far reaching similar breaks down
were performed among SEEMAKA and other new approval
frameworks, and the outcomes demonstrated that SEEMAKA
gives prevalent effectiveness as far as overhead dealing with,
power appropriation, and security highlights. As per Li et al. ,
SEEMAKA performs better at a decrease of 2.
III. CONCLUSION
The requirement for constant observing utilizing remote body
territory networks has gotten inescapable because of the
expanding request in the medical services industry. Early
expectation or recognition of oddities can prompt patients
tolerating this method. Since concealed Markov models are
successful models for anticipating information and recognizing
inconsistencies, it was fascinating to review on application-
explicit peculiarity recognition. Since sparing force at the
sensor hub is basic to forestalling crisis information misfortune
in ceaseless checking applications, it is useful to examine how
energy investment funds can be accomplished. From the
overview, it was discovered that the energy sparing is
essentially accomplished by lessening information
transmission and forestalling signal impedance. Rather than
sending total crude information to the gathering, just
significant information is sent when an irregularity is available.
Along these lines, the energy that is used on retransmission can
be evaded by lessening the sign obstruction. Nonetheless, the
energy spent on detecting and processing for model
advancement can likewise be thought of. This article lays the
reason for a further refinement of the models by clarifying the
revelation of peculiarities and deformities of different
applications.
Authorized licensed use limited to: ULAKBIM UASL - Altinbas Universitesi. Downloaded on November 22,2020 at 15:19:34 UTC from IEEE Xplore. Restrictions apply.
REFERENCES
[1] A. H. Mohammed, “A REVIEW SOFTWARE
DEFINED NETWORKING FOR INTERNET OF
THINGS,” 2020 Int. Congr. Human-Computer Interact.
Optim. Robot. Appl., no. August, 2020.
[2] M. M. Hamdi, L. Audah, S. A. Rashid, A. H.
Mohammed, S. Alani, and A. S. Mustafa, “A Review of
Applications, Characteristics and Challenges in
Vehicular Ad Hoc Networks (VANETs),” in 2020
International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2020, pp. 1–7.
[3] A. H. Mohammed, “An Optimum Design of Square
Microstrip Patch Antenna Based on Fuzzy Logic Rules,”
2nd Int. Congr. Human-Computer Interact. Optim.
Robot. Appl., 2020.
[4] A. H. Ahmed, A. T. Al-Heety, B. Al-Khateeb, and A. H.
Mohammed, “Energy Efficiency in 5G Massive MIMO
for Mobile Wireless Network,” in 2020 International
Congress on Human-Computer Interaction,
Optimization and Robotic Applications (HORA), 2020,
pp. 1–6.
[5] Z. A. Sahib, O. N. Uçan, M. A. Talab, M. T. Alnaseeri,
A. H. Mohammed, and H. A. Sahib, “Hybrid Method
Using EDMS & Gabor for Shape and Texture,” in 2020
International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2020, pp. 1–6.
[6] A. M. Shantaf, S. Kurnaz, and A. H. Mohammed,
“Performance Evaluation of Three Mobile Ad-hoc
Network Routing Protocols in Different Environments,”
in 2020 International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2020, pp. 1–6.
[7] A. G. Mushref, A. H. Mohammed, and O. Bayat,
“Rayleigh Leistungs Relation and Rician Fading
Channels in Qam Using Simulink Environment,” in
2020 International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2020, pp. 1–5.
[8] S. KURNAZ and A. H. Mohammed, “Secure Pin
Authentication in Java Smart Card Using Honey
Encryption,” in 2020 International Congress on Human-
Computer Interaction, Optimization and Robotic
Applications (HORA), 2020, pp. 1–4.
[9] A. H. Mohammed, R. M. KHALEEFAH, and A. H.
AlMarzoogee, “The Method Of Calibration
Compensation For Fiber Nonlinearity-A Review,” in
2020 International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2020, pp. 1–8.
[10] A. H. Mohammed and M. K. Shantaf, Ahmed Muhi,
“THE PROBE INTO REFLECTION MOBILE RADIO
PROPAGATION,” 2020 Int. Congr. Human-Computer
Interact. Optim. Robot. Appl., no. August, 2020.
[11] S. Zvanovec and M. Adel, “Channel Characterization
and Modeling for Optical Wireless Body-Area
Networks,” vol. 1, no. June, 2020.
[12] S. Jawad, H. Muhammad, I. N. Z. Jhanjhi, and K.
Hussain, “Performance Enhancement in Wireless Body
Area Networks with Secure Communication,” Wirel.
Pers. Commun., no. 0123456789, 2020.
[13] K. N. Qureshi, S. Din, G. Jeon, and F. Piccialli, “Cloud
computing security: protecting cloud-based smart city
applications,” Comput. Commun., 2019.
[14] M. Ramadan, Y. Liao, F. Li, S. Zhou, and H. Abdalla,
“IBEET-RSA: Identity-Based Encryption with Equality
Test over RSA for Wireless Body Area Networks,” 2019.
[15] A. Choudhary, M. N. Vibhav, and K. Sachan, “A Hybrid
Fuzzy-Genetic Algorithm for Performance Optimization
of Cyber Physical Wireless Body Area Networks,” Int. J.
Fuzzy Syst., 2019.
[16] O. Ahmed, F. Ren, and Y. Al-sharabi, “Energy Optimized
Congestion Control-Based Temperature Aware Routing
Algorithm for Software Defined Wireless Body Area
Networks,” IEEE Access, vol. 8, pp. 41085–41099, 2020.
[17] M. Shuai, B. Liu, N. Yu, L. Xiong, and C. Wang, “Journal
of Information Security and Applications Efficient and
privacy-preserving authentication scheme for wireless
body area networks,” J. Inf. Secur. Appl., vol. 52, p.
102499, 2020.
[18] G. Newell and G. Vejarano, “Motion-Based Routing and
Transmission Power,” IEEE Open J. Commun. Soc., vol.
1, no. February, pp. 444–461, 2020.
[19] G. Mehmood, M. Z. Khan, A. Waheed, M. Zareei, and E.
M. Mohamed, “A Trust-Based Energy-Efficient and
Reliable Communication Scheme ( Trust-Based ERCS )
for Remote Patient Monitoring in Wireless Body Area
Networks,” pp. 1–17, 2020.
[20] N. Bilandi, H. K. Verma, and R. Dhir, “hPSO-SA: hybrid
particle swarm optimization-simulated annealing
algorithm for relay node selection in wireless body area
networks,” 2020.
[21] M. Fotouhi, M. Bayat, and A. K. Das, “A lightweight and
secure two-factor authentication scheme for wireless
body area networks in health-care IoT,” Comput.
Networks, p. 107333, 2020.
[22] B. A. Alzahrani, A. Irshad, A. Albeshri, and K. Alsubhi,
“A Provably Secure and Lightweight Patient 
Healthcare Authentication Protocol in Wireless Body
Area Networks,” Wirel. Pers. Commun., no. 0123456789,
2020.
[23] O. Amjad, E. Bedeer, N. A. Ali, and S. Ikki, “Robust
Energy Efficiency Optimization Algorithm for Health
Monitoring System with Wireless Body Area Networks,”
vol. 7798, no. c, pp. 8–11, 2020.
[24] G. Yang, “Energy efficient protocol for routing and
scheduling in wireless body area networks,” Wirel.
Networks, vol. 0123456789, 2019.
[25] B. Narwal and A. Kumar, “SEEMAKA: Secured Energy
 Efficient Mutual Authentication and Key Agreement
Scheme for Wireless Body Area Networks,” Wirel. Pers.
Commun., no. 0123456789, 2020.
Authorized licensed use limited to: ULAKBIM UASL - Altinbas Universitesi. Downloaded on November 22,2020 at 15:19:34 UTC from IEEE Xplore. Restrictions apply.
... The application of GAs for data assurance inside WBANs is -48 49 inventive. Reference [7] tended to vitality preservation through data diminishment in WBANs employing a GAbased data security arrangement. This range, significant for anticipating serious wellbeing issues related to the distinguishing proof of probabilistic unusual models, remains moderately unexplored. ...
Article
Full-text available
Wireless Body Area Networks (WBANs) have risen as a promising innovation for checking humanphysiological parameters in real time. Be that as it may, the unwavering quality and precision of WBANs dependon the right working of sensor hubs. The distinguishing proof of defective sensor hubs is vital for guaranteeing thequality of information collected by WBANs. In this paper, we propose a novel approach to recognizing faultysensor hubs in WBAN employing a hereditarily linked artificial neural organize (GLANN). The GLANN isprepared to employ a crossbreed fuzzy-genetic calculation to optimize its execution in distinguishing defectivesensor hubs. The proposed approach is assessed employing a dataset collected from a real-world WBAN. Thecomes about appears that the GLANN-based approach beats existing strategies in terms of exactness andproficiency. The proposed approach has potential applications within the field of healthcare, where exact and solidobserving of human physiological parameters is basic for conclusion and treatment. By and large, this ponderpresents a promising approach to progressing the unwavering quality and exactness of WBANs by identifyingflawed sensor hubs utilizing GLANN .
... The detected data is sent to the sink via wireless communication links on the body. The sink processes information collected by the sensor node and transfers it to an Internet cloud network for remote review by health care providers [4], [5]. ...
... Uncertainty in the control coefficient matrices caused by nonaffine nonlinearities renders the quantized-state-based neural network adaptive control strategies given in unable to guarantee stability analysis of closed-loop systems based on the boundedness of quantization errors [11]. To ensure that close-loop quantization errors are contained in the presence of unknown control coefficient matrices, adaptive compensation approaches based on quantized states are necessary for tuning neural network approximators [13]. ...
Conference Paper
Full-text available
In the case of state quantizers for MIMO nonlinear block-triangular pure-feedback systems, there is a certain sort of uncertainty that may be tolerated, we describe a quantized state feedback tracking mechanism. All state variables that may be measured for feedback are thought to benefit from uniform quantizers. In this study, we focus on the problem of tracking of output for a certain kind of MIMO nonlinear systems composed of interconnected modules with widely varying degrees of uncertainty. To begin, the total disturbance in the subsystems' control channels is refined to account for all uncertainties impacting the performance of the controlled outputs, such as internal unmodeled dynamics, external disturbances, and unknown nonlinear interactions between subsystems. It is shown that the total disturbance level is low enough for a real-time estimate to be made by an extended state observer (ESO) utilising the observed outputs from the separate subsystems. Stability study of the closed-loop system with quantized state feedback is also performed using the Lyapunov stability theorem. Finally, illustrative simulation examples, such as a network of inverted pendulums, are shown to prove that the suggested control approach works as intended.
... If you do, you'll have to use more precise wavelength controls on your optical senders since nonlinear effects like cross-phase modulation (XPM) and four-wave mixing (FWM) will be harsher. WDM network repeaters, cable TV power amplifiers, and in-line amplifiers are all examples of applications where EDFAs have arisen as key components for optical fibre networks [7], [8]. EDFAs may also be used to expand the number of channels. ...
... The automatic speech processing began in the 1930s, although the first more widely used ASR systems appeared in the '70s [3]. Initially, speech recognition systems could not recognize more than a few hundred words, and often required the breaks between words spoken in sequence [4]. The accelerated development of computers in the '90s has resulted in several complex ASR systems based on Hidden Markov Models (HMM) [5]. ...
... The second challenge that Due to the very large array dimensions, massive MIMO relies heavily on the availability of cheap and power efficient base-band hardware. [19] A. Ultra Dense Networks (UDNs) Generations The major aim for the densification of microcell BSs in the third generation (3G) cellular networks is mainly to improve the rate of transmission in partial areas (such as the deployment of macrocell BSs in the urban areas) [20]. Recent advances have seen the development of frequency reuse and sectorized BS technologies for microcell densification in a bid to solve the issue of adjacent macrocell BS interferences, where the macrocell BS density is about 4-5 BS/km2. ...
Conference Paper
Full-text available
The growth demand in wireless communication and its application leads to a great effort should be into researcher's consideration to meet the future requirement of wireless network architecture. It's expected that the traffic will reaches multiple of hundreds than this in nowadays and to increase the capacity of the network with high and efficient energy efficiency. This can be reached by the use of small cell configuration like micro and pico cells, and use massive MIMO (Massive Multiple-input Multiple-output) with low-cost components which are prone to hardware impairments. This configuration leads to high energy efficiency for large number of base stations and user density. This article focuses in simulating an area covered by random deployment of small cells to serve hundreds of users in the simulation area. The results show that the (Energy efficiency) decreases as the SINR values increases, which is why it is important to specify a target SINR; otherwise the energy efficiency maximizing operation point might be very spectrally inefficient, and the efficient energy can be greatly improved by increasing the base station density, meaning that small cells are a promising solution for maximal energy efficiency deployment.
Chapter
The financial sector has relied on traditional payment methods that involve middlemen such as banks to facilitate transactions between parties. With the introduction of distributed ledger technology (DLT), which provides a decentralized, secure, and transparent alternative to traditional systems, its shortcomings have, however, become more obvious. A distributed ledger is used by DLT to keep a tamper-proof record of transactions while a consensus algorithm is used to validate transactions and protect them using public key cryptography. Ether Pay is a great way to transfer ether safely and efficiently. It's a decentralized application built on the Ethereum blockchain that uses smart contracts to eliminate middlemen, lower transaction costs, and increase security and privacy. By utilizing DLT, Ether Pay ensures that transfers are secure and transparent. It's a great example of how cryptocurrencies like Ether can increase efficiency and reduce costs for foreign currency exchange.
Article
Full-text available
In the modern world, wireless body area networks (WBANs) play an essential role in psychological and biomedical applications. The use of WBANs in medical applications is limited due to various issues related to the sensors, viz., irregularity in data production, replacement and recharging of their batteries and the energy consumed by the networks. This manuscript addresses how these problems can be solved along with optimization of the energy consumption through efficient design of the system by applying routing protocols and heuristic-based optimization algorithms. In this paper, the particle swarm optimization (PSO) algorithm is a heuristic search algorithm that relies on an upgrade mechanism of the velocity and position of swarms. Although PSO has excellent exploration capability in global search, it becomes quickly stuck in local minima. To enhance the local search function of the current PSO algorithm, a simulated annealing (SA) algorithm has been incorporated in the exploitation phase. The newly developed hybrid PSO-SA (hPSO-SA) algorithm is validated with other state-of-the-art nature-inspired algorithms on eighteen benchmarks and five real engineering design problems. The statistical results of the proposed hPSO-SA algorithm are promising and indicate very good efficiency. The paper also aims at the application of the proposed algorithm to the WBAN design problem for minimization of the energy consumption through better selection of the relay node. The proposed hPSO-SA algorithm outperforms twelve other metaheuristic algorithms, taking hybrid variants for comparison.
Article
Full-text available
Over the years, the performance of devices used to gather sensitive medical information about individuals has increased substantially. These include implanted devices in the body, placed on or around the body, creating a Wireless body area network. Security and privacy have been a greater concern over a period of time due to the sensitive nature of the data collected and transmitted by the network. It has been noticed that various techniques have been applied to secure the data and provide privacy in WBANs but with a tradeoff of execution overhead. Although the latest available anonymous authentication schemes provide privacy and security but due to the limited computation capacity of WBAN devices, these schemes show greater time cost for authentication and consume more processing time. We review two latest anonymous authentication schemes for the WBAN environment in terms of computation cost. These two schemes provide anonymous authentication and use encryption to secure the data and ensure privacy. Then we analyze a recent lightweight authentication scheme proposed for wearable devices which provides anonymity and privacy along with security with very low computation cost. This scheme uses hash functions in order to obtain authentication and anonymity and doesn’t use encryption in the authentication process. This scheme is not proposed for the WBAN environment, but it can be applied on the WBAN environment with necessary variations. The comparison of these available schemes shows clearly that the computation cost is considerably decreased by applying the latest authentication scheme in the WBAN environment. We propose a new authentication scheme for the WBAN environment based on the light-weight scheme proposed for wearable devices. The detailed analysis shows that our proposed scheme minimizes the computation cost and maintains the privacy and security along with anonymous authentication.
Conference Paper
Full-text available
Versatile correspondence framework. Reflection happens when an electromagnetic wave faces an article a lot bigger than the recurrence of an electromagnetic wave. The quality picked up (or its extra catastrophe) is commonly the most significant parameter anticipated from enormous scope engendering models that rely upon the material study of reflection. In this article, we draw an end that isn't equivalent to topical posts. Trigonometric vectors from the vector E_TOT (d), the got vitality can be yield
Conference Paper
Full-text available
Mobile ad-hoc wireless networks give us the high probability and high properties to create networks, without any central management or infrastructure, independent and temporary network, that is means wide ubiquitous networks. The intermediate nodes should be able to communicate between them to send and receive the data with ability using at any time and anywhere, the mobility of the intermediate node between the source and destination gives us unstable topology maybe the connection between the nodes will be break often. Therefore, the strategies to design any wireless depend on path routing and protocol selection. In this paper we study and evaluate the effect of mobility on the routing protocols DSDV, AODV and DSR in two different scenarios, the density of nodes and different area in NS2.35 simulation by using three performance metrics in the evaluating the routing protocols are Average Throughput, Packet Delivery Ratio and Average End-to-End Delay.