Conference PaperPDF Available

Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Networks

Authors:
  • Gururkula Kangri Vishwavidyalaya Haridwar India

Abstract and Figures

Today, WSNs are spread in both industry and academia; they are focusing their research efforts in order to enhance their appliances. One of the first concerns to solve in order to acquire that expected enrichment is to assure relieve a minimum level of security in such a prohibitive environment. This study concentrates on trust and reputation system management. The proposed approach titled enhanced bio-inspired trust and reputation model (EBTRM) is Bio-inspired extending Trust and Reputation Model. The aim of the proposed algorithm is to provide an adequate security solution to collusion network of BTRM, which can provide a high level of security and energy preserving ability Keywords Wireless sensor networks Security Trust and reputation system BTRM Accuracy Path length and energy consumption
Content may be subject to copyright.
Enhanced Bio-inspired Trust
and Reputation Model for Wireless
Sensor Networks
Vivek Arya, Sita Rani, and Nilam Choudhary
Abstract Today, WSNs are spread in both industry and academia; they are focusing
their research efforts in order to enhance their appliances. One of the first concerns
to solve in order to acquire that expected enrichment is to assure relieve a minimum
level of security in such a prohibitive environment. This study concentrates on trust
and reputation system management. The proposed approach titled enhanced bio-
inspired trust and reputation model (EBTRM) is Bio-inspired extending Trust and
Reputation Model. The aim of the proposed algorithm is to provide an adequate
security solution to collusion network of BTRM, which can provide a high level of
security and energy preserving ability
Keywords Wireless sensor networks ·Security ·Trust and reputation system ·
BTRM ·Accuracy ·Path length and energy consumption
1 Introduction
In last few years, researchers and scientists pay more attention to the area of WSNs
[1]. WSNs are composed of large number of sensor nodes. These sensor nodes are
small in size and battery powered [2,3]. In WSNs, sensor node senses the data,
collect, process and transmit the data to other nodes to complete a task in distributed
manner. In WSNs [4,5], result is based on sensor nodes cooperation. WSNs use
wide variety of applications, for example, industrial process control, ecological and
habitat monitoring, home automation, health care system, weather forecasting, traffic
control, etc. Generally, WSNs are deployed in an outdoor environment, where the
V. A r y a ( B)
Department of ECE (FET), Gurukula Kangri (Deemed To Be University), Haridwar 249404, India
S. Rani
Department of Computer Science and Engineering, Gulzar Group of Institutes, Khanna, Punjab
141401, India
N. Choudhary
Department of CSE, JECRC, Jaipur, India
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022
D. Gupta et al. (eds.), Proceedings of Second Doctoral Symposium on Computational
Intelligence, Advances in Intelligent Systems and Computing 1374,
https://doi.org/10.1007/978-981- 16-3346- 1_46
569
570 V. Arya et al.
possibility of an adversary [6] always more than in an indoor environment. These
malevolent nodes may transmit wrong information in the network; due to malevolent
nodes the performance of the system is decreased. There are a lot of techniques or
method to detect a malicious nodes in the WSNs, and cryptography is one of the tech-
niques which protect our network from attacks or malevolent nodes. Major drawback
of cryptography technique is complex computation [7]. Trust and reputation model
(TRM) is a creative solution for sustaining a lowest security level between two
objects having transactions and interactions with in dispersed system. Many trust
and reputation models were introduced in the past. Some models provide cluster
head selection, secure routing, data aggregation and synchronized trust management
[810]. In the fraudulent environment, malevolent node assigns maximum value to
the malevolent node and minimum value to the benevolent node [11]. In current
era, the need of hour is to enhance the data rate and security over the network. For
data rate enhancement, we generally apply data compression techniques [1217].
We proposed enhanced bio-inspired trust and reputation system which increases the
security level. Our proposed approach is presented, and a performance comparison
between our model and the original one is carried out, followed by conclusion and
future work.
2 Trust and Reputation System
Trust and reputation system (TRS) management is a creative solution for sustaining a
lowest security level between two objects having transactions or interactions within
a distributed system. Trust is a particular level of the subjective possibility with
which an agent will perform a particular action, while a reputation is an expectation
about behavior of an agent based on information about it or considerations of its
prior behavior. In most cases, these two conditions are distinguished definitely and
could be used changeably. In WSNs transactions, if we define the sensors asking for
services as client sensors and sensors providing services as server sensors, then the
client sensors will find out whether to have transactions with a server sensor based
on its trustworthiness or reputation. Trust and reputation model is usually composed
of five components: gathering info, scoring and ranking, selecting objects, having
transaction and reward or punishment. Gathering information, the first element of a
trust and reputation system, is responsible for collecting behavioral information about
other objects, for example, peers, agents or paths. The information collected might
come from different objects. It could be absolute observation or own experience or
information provided by nodes. Once information about an object has been perfectly
assemble and weighed, and a reputation score is then estimated and given base on
certain algorithm. The main aim of this process is to provide the clients a determinable
approach to decide which server node is most trustworthy. The next step is that a
client selects the most trustworthy or reputable server object in the society providing
certain applicability, and then, adequately has intercommunication with it. After
receiving the service provided, the client will access the result and give a score of
Enhanced Bio-inspired Trust and Reputation Model 571
satisfaction. Based on the satisfaction occurred, the final step, punishing or rewarding,
is carried out. If a server node is unsuccessful in making the client satisfied with
service provider, its reputation score will be affected, and the client is less likely to
have transaction with it again.
3 Bio-inspired Trust and Reputation Model (BTRM)
BTRM-WSN [18] carries out the selection of the most trustworthy node through the
most reputable path offering a certain service. It is based on bio-inspired algorithm
called ant colony system (ACS), where ants form paths in order to fulfill some condi-
tions graphically. Pheromone traces of ants that help coming ants to discover and
come from those paths. These pheromone values will help ants to discover the optimal
path solutions since the optimal path will have the maximum amount of pheromone
value. When we apply this ACS algorithm on to trust and reputation system, trust-
worthiness of sensors is represented by pheromone value. In this BTRM-WSN, each
sensor node holds contains pheromone traces for its neighbors [0,1]), which
find out possibility for an ant to select a path as well as the sensor the path leading
to as a solution. In other words, τcan be considered as the trust that a sensor gives
another. The steps of algorithm of BTRM are as follows:
3.1 Gathering Information
A set of imitation ants are developed, and then, they leave the client sensor. When
an ant proceeds from a node ito node j, it gives an instruction for these two sensor
nodes to improve the pheromone value of the path between them through Eqs. (1)
and (2),
τij =(1ϕ)
ij +ϕ. (1)
=1+(1ϕ).1τij
ij(2)
τij is the pheromone value of the path between sensor iand sensor j,is the
convergence value of τij and ϕis a parameter controlling the amount of pheromone
left by the ants.
When ant moving in a network searching for the most trustworthy path to the
server providing good service, each ant must decide whether to stop and return the
solution to the client or continue to discover another one, based on the reputability
of the server that is discovered. When ant kreaches at sensors, server situations
may occur. The first is that sensor shas more neighbors not visited by ant k; then,
kestimates average pheromone value (τk)of the path come next by ant kfrom the
572 V. Arya et al.
client until the sensor s.Ifτkis greater than described transition threshold TraTh
(transition threshold), then ant k stops and returns the solution or vice versa. Another
situation is that sdoes not provide any services. If sensor shas more neighbors not
visited by ant k, then k decides the next node to move. If sensor s has visited all the
neighbors, then ant k reaches a dead end. It has to go back to the route that it has
form until it reaches at sensor offering the requested service, a sensor not offering
the requested service but having more neighbors not visited yet [19].
3.2 Score and Rank
Client will test and determine the quality of the solution brought back by each
launched ant. The quality of path could be computed by Eq. (3),
Q(Sk)=τk
Length(Sk)PLF..%Ak(3)
τij is the pheromone value of the path between sensor iand sensor j;is the
convergence value of τij and ϕis an amount of pheromone traces left by ants. Sk
designates the solution brought back by ant k.Q(Sk)defines the quality of path Sk;τk
designates the average path pheromone of path Skfound by ant k; PLF [0,1]define
a path length factor and % Akdenote the percentage of ants that have selected the same
solution as ant k. After estimating the path quality of all solution brought back by ants,
the client selects the path with maximum score and collect it as Current_Best solution.
Then, the client compares the route quality with the best solution (Global_Best) found
by earlier transactions. If Current_Best solution is even better, then the client will
take the place of the previous Global_Best with the Current_Best solution. Then, an
extra ant is sent to improve the pheromone value of the current Global_Best.
3.3 Ants Transaction
After the client selects the Global_Best solution, it will have transaction with the
selected sensor. It with the default service which the client expects to obtain, after
receiving the service. There might be two conditions: first, the selected server sensor
might be completely trustworthy and provide the accurate service as it is assumed to
or it could be totally malicious and provide highly difference service. In the earlier
condition, the client is convinced and will give a satisfaction value (Sat) is find out as
an irregular number between PunTh and 1; while in the last condition, the satisfaction
value (Sat) is found out as an irregular number between 0 and PunTh as the client is
considered as unsatisfiable. PunTh is predefined punishment threshold value.
Enhanced Bio-inspired Trust and Reputation Model 573
3.4 Punish and Reward
A client will demand the desired service to what it objects to be the most reputable
server through the most trustworthy path. Then, punish or reward will be given to
all connection in this path based on whether the client is satisfied with the service
provided by the server. This is done by increasing or decreasing the pheromone value
of the path [2023].
4 Enhanced Bio-inspired Trust and Reputation Model
This section introduced an enhanced bio-inspired trust and reputation system inspired
by BTRM tested in prior section. In EBTRM algorithm, we modify the parameters
values of bio-inspired algorithm. Flow chart and improvements in BTRM algorithm
(EBTRM) are as shown in Fig. 1.
4.1 EBTRM Algorithm
As described in earlier, the criterion that BTRM-WSN used to determine whether
a sensor is trustworthy is the value of the solution route from the client sensor to
the selected sensor. Similarly, the quality of each solution is estimated based on the
value of average pheromone. This approach has been proven to be effective, and the
performance of this system may get improved if the condition of the server sensors
could be taken into account and examine modify some aspects of the original system.
In the first modification, we try to make system secure, we should need to increase
path quality of the system, so, we enhance security of system. In EBTRM algorithm,
Q(Sk)=τk
Length (Sk).%Ak
where PLF =1, we have selected those paths, which are as short as possible. In
second modification, we enhance the radio range and take the radio range maximum
because maximum radio range provides security. Suppose, two nodes communicate
with each other, if radio range is maximum then they can directly communicate but
its range is minimum then they cannot communicate directly with each other and
possibility of interference of malicious node is increased. The last modification is
in the value of qo(=0.6335), and the possibility of choosing deterministically the
most trustworthy next node is increased which increases the accuracy of the system.
574 V. Arya et al.
Q(Current _Best) >
Q(global _Best)
START
Initialized Number of
Sensor Best Path
Q(Sk) >
Q(Current Best )
NO Wait for Timeout
Expire
Current Best Sk Num Returned Ants <
% of Number of Ants
Pheromone
Global Updating
Pheromone
Local Updating
End
End
Yes
NO
Yes
Fig. 1 Flow chart of EBTRM
5 Simulation Results
In our proposed work, we consider ten networks composed of 10–100 sensor nodes,
each for 10 executions in two-dimensional areas. Sensor nodes in a cluster with
particular radio range transmit the data to the cluster head and then to the base
station within the entire network. In collusion network, every malicious node will give
the maximum rating for every other malicious node and minimum rating for every
benevolent one. We used Java based event driven TRMSim—WSN [24] simulator
version 0.5 for WSNs allowing the researchers to simulate and represent random
network distributions and provide statistics of different data dissemination policies
including the provision to test the different strategies of trust and reputation models.
Many networks like collusion, oscillating and dynamic networks, the percentage
of nodes, malicious nodes and so forth, can be implemented and tested over it. In
our experiment, we concentrated on collusion network and enhance the accuracy of
Enhanced Bio-inspired Trust and Reputation Model 575
Tabl e 1 Parameters of
BTRM and EBTRM Parameters BTRM values EBTRM values
Phi 0.01 0.01
Rho 0.87 0.87
q0 0.45 0.6335
Num ants 0.35 0.35
Num iterations 0.59 0.59
Alpha 1.0 1.0
Beta 1.0 1.0
Initial pheromone 0.85 0.85
Punishment threshold 0.48 0.48
Path length factor 0.71 1
Transition threshold 0.66 0.66
Radio range 12 m 50 m
BTRM algorithm in collusion network. Table 1shows the simulation parameters of
BTRM and EBTRM algorithms.
TRMSim-0.5 WSN is a Java-based trust and reputation models simulator aiming
at providing easy way to test a trust and reputation model (BTRM) over WSNs
and to compare it with EBTRM. We design a WSN template using the network
parameter settings in TRM-WSN as: clients =15%, number of nodes =100, number
of networks =10, number of executions =10. Then, the simulator will randomly
create WSN for experiments based on this template.
5.1 Accuracy with Varying Number of Malicious Nodes
In our work, we have used the concept of accuracy to evaluate the reliability and
level of security provided by the trust and reputation system is represented by the
percentage that the number of times when it is successfully selected trustworthy
sensors out of the total number of transactions. A better trust and reputation should
have a good control of the negative influence in which the malicious nodes have on
the WSN. Figure 2shows the comparison of accuracy BTRM and EBTRM algorithm
with varying number of malicious nodes.
5.2 Path Length with Varying Number of Malicious Nodes
Path length is the average hops leading to the most trustworthy sensors which are
selected by the client in a WSN applying certain type of trust and reputation system.
It is assumed that less average path indicates a better performance in efficiency and
576 V. Arya et al.
Fig. 2 Graphical representation of accuracy of BTRM and EBTRM
Fig. 3 Graphical representation of path length of BTRM and EBTRM
easiness in searching for trustworthy sensors of a trust and reputation system. Figure 3
represents path length of BTRM and EBTRM algorithm graphically.
5.3 Energy Consumption with Varying Number of Malicious
Nodes
Energy consumption of the network is the overall energy consumed in: client nodes
sending request messages, server nodes sending response services, energy consumed
Enhanced Bio-inspired Trust and Reputation Model 577
Fig. 4 Graphical representation of energy consumption of BTRM and EBTRM
by malicious node which provides bad services, relay nodes which do not provide
services, the energy to execute the trustworthy sensor searching process of a certain
trust and reputation system. For WSN, researcher’s major problem is how to effec-
tively reduce energy consumption. Figure 4shows EBTRM has lowest energy
consumption.
6 Conclusions
Our proposed EBTRM system successfully increases the accuracy in trust and repu-
tation system. Therefore, the level of security of the original BTRM-WSN without
sacrificing its advantages in finding trustworthy sensors efficiently and the extra
amount of energy for those add-ons is acceptable EBTRM is proven to be able
to accurately distinguish benevolent sensor from malicious sensor and thus protect
WSNs from attackers. And most important thing is level of security it provides not
influenced by the number of attackers as much as its two competitors do. When the
network is in a relatively secured status, it becomes more complicated and less energy
efficient to search for trustworthy sensors because of the extra conditioning and
computation overall the modification in BTRM a successful. Our proposed EBTRM
provides better solution to WSNs, where a high level of security is required while
future work will keep on developing the algorithms searching for trustworthy sensors
to improve the easiness in finding trustworthy sensors as well as energy efficiency.
EBTRM provides a higher level of security for WSNs without sacrificing the effi-
ciency of the original approach and does not require huge amount of energy for the
extra consumption.
578 V. Arya et al.
References
1. Farahani, S. (2008). Zig Bee Wireless Networks and Transceivers. Elsevier.
2. Alkalbani, A., Mantoro, T., & Tap, A. O. Md. (2012). Improving the lifetime of wireless sensor
networks based on routing power factors. In Networked Digital Technologies, Communications
in Computer and Information Science (vol. 293, pp. 565–576).
3. Chen, H., Wu, H., Zhou, X., & Gao, C. (2007). Reputation based trust in wireless sensor
networks. In Proceedings of the International Conference on Multimedia and Ubiquitous
Engineering (pp. 603–607).
4. Chong, C. Y., & Kumar, S. P. (2003). Sensor Networks: Evolution opportunities and challenges.
Proceedings of the IEEE, 91(8), 1247–1256.
5. Akyildiz, I. F., Sankarasubramaniam, W. Su., & Cayirci, E. (2002). A survey on sensor
networks. IEEE Communications Magazine, 40(8), 102–114.
6. Hurt, J., Lee, Y., Yoont,H., Choi, D., & Jin, S. (2005). Trust evaluation model for wireless sensor
networks. In Proceedings of the seventhInternational Conference on Advanced Communication
Technology (pp. 491–496).
7. Jing, Q., Tang, L. Y., & Chen, Z. (2008). Trust management in wireless sensor networks.
Journal of Software, 19(7), 1716–1730.
8. Hur, J., Lee, Y., Hong, S., & Yoon, H. (2005). Trust based secure aggregation wireless sensor
networks. In Proceedingsof the third International Conference on Computing, Communications
and Control Technologies (Vol. 3, pp. 1–6).
9. Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust based cluster head
election in wireless sensor networks. In Proceedings of the Second IEEE Workshop on
Dependability and Security in Sensor networks and Systems (pp. 13–22).
10. Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of
trust modeling and evaluation for ad-hoc networks. IEEE Journal on Selected Areas in
Communications, 24(2), 305–317.
11. Verma, V. K., Singh, S., & Pathak, N. P. (2014). Collusion based realization of trust and
reputation models in extreme fraudulent environment over static and dynamic wireless sensor
networks. International Journal of Distributed Sensor Networks, Hindawi Publication.
12. Arya, V., & Singh, J. (2016). Image compression algorithm using two dimensional discrete
cosine transform. Journal Interdisciplinary Research(IJIR), 2(8). ISSN: 2454–1362.
13. Arya, V., & Singh, J. (2016). Robust image compression using two dimensional discrete cosine
transform. International Journal of Electrical and Electronics Research, 4(2), (187–192). ISSN
2348–6988 (online).
14. Arya, V., Singh, P., & Sekhon, K. (2016). Medical image compression using two dimensional
discrete cosine transform. International Journal of Electrical and Electronics Research, 3(1),
(156–164). ISSN 2348–6988 (online).
15. Arya, V., Singh, P., & Sekhon, K. (2013). RGB Image cosmpression using two dimen-
sional discrete cosine transform. International Journal of Engineering Trends and Technology
(IJETT), V4(4), 828–832. ISSN:2231-5381.
16. Gupta, O. P., & Rani S. (2013). Accelerating molecular sequence analysis using distributed
computing environment. International Journal of Scientific & Engineering Research–IJSER.
17. Rani, S., & Gupta, O. P. (2016). Empirical analysis and performance evaluation of various GPU
implementations of protein BLAST. International Journal of Computer Applications, 151(7),
22–27.
18. Marzi, H., & Lia, M. (2013). An enhanced bio-inspired trust and reputation model for WSN.
In The fourth International Conference on Ambient Systems, Networks and Technologies
(pp.1159–1166). Elsevier.
19. Marmol, F. et al. (2011). Providing trust in WSNs using a bio-inspired technique (pp. 163–180).
Springer science plus business media
20. Pan, Y., Yu, Y., & Yan, L. (2013). An improved trust model based on interactive ant algorithms
and its applications in wireless sensor networks. International Journal of Distributed Sensor
Networks. Hindwai Publishing Corporation, 2013.
Enhanced Bio-inspired Trust and Reputation Model 579
21. Karthik, S., Vanitha, K., & Radhamani, G. (2011). Trust Management Techniques in Wireless
Sensor Networks: An Evaluation. IEEE.
22. Dorigo, M., Stuzle, T. (2004). Ant Colony optimization. Bradford Book.
23. Ukil, A. Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks.
In Second International Conference on Computational Intelligence, Modelling and Simulation,
24. Marmol, F. et al. (2009). TRMSim-WSN, trust and reputation models simulator for WSNs. In
IEEE Communication Society.
... 20 While the deployment of WSN offers a promising solution, it is not without its challenges, including sensor node lifespan limitations, packet loss issues, and routing complexities. [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36] Therefore, an imperative requirement in disaster management scenarios is the implementation of an energy-efficient routing protocol tailored to the specific demands of WSNs. Bio-inspired routing protocols emerge as a viable option due to their adaptability in addressing multiple and intricate objective functions. ...
... Location-based algorithms have demonstrated their efficiency, particularly in large, mobile, heterogeneous, and distributed networks. 22,28,30 This efficiency is attributed to their capability to manage the spatial positions of sensor nodes. Furthermore, radio signal strength indicator (RSSI) algorithms are employed to determine the distance between the transmitting sensor node and the receiving sensor node using radio frequency-based techniques. ...
... Furthermore, radio signal strength indicator (RSSI) algorithms are employed to determine the distance between the transmitting sensor node and the receiving sensor node using radio frequency-based techniques. 28,30,43 RSSI algorithms are particularly well-suited for WSNs due to their cost-effectiveness, minimal power consumption, and straightforward hardware requirements. ...
Article
Full-text available
Environmental disasters such as earthquakes, tsunamis, floods, and landslides disrupt natural resources, human casualties, and so on. Early warning and alert of such events will help for preparedness to avoid human and economic causalities. Managing a disaster or emergency scenario is a difficult endeavor. These episodes of mass devastation, whether caused by natural disasters or man‐made disasters, result in massive losses of money, property, and lives as a result of inadequate response by the government and management authorities. As a result, actions must be taken to avoid these circumstances from occurring by discovering the causes of these catastrophes in advance and providing swift rescue procedures once the crisis happens. In a disaster situation, communication plays a vital role, and a lot of people turn towards it as a source of information conveyance/delivery for controlling the situation. Even these communication networks are damaged and incur tremendous losses during disasters. All the communication networks, including mobile wireless sensor networks (WSNs) deployed for communication, also suffer huge damage and face many challenges during disasters. Nature appears to deal with these issues well. WSN is inspired by several biological systems and processes that have intrinsically attractive properties such as adaptation, self‐organization, and self‐healing. In this paper, we proposed an enhanced bio‐inspired energy‐efficient localization (EBEEL) routing for Mobile WSN. The main focus of the proposed EBEEL algorithm is to overcome the challenges faced by peer‐existing routing protocols such as data aggregation, limited bandwidth, scalability, data redundancy, energy consumption, packet drops, load balancing, and Quality of Service (QoS).
... Thus, it is a dynamic system capable of adapting to changes in the network, with the primary goal of determining the most reliable paths for the most trustworthy nodes. In [10], [11], additional enhancements to the bio-inspired concept for dynamic mobile WSNs from [9] have been suggested. ...
... But wireless network makes traditional security schemes less appropriate. Therefore, it is very difficult to manage security protocols which can handle both wired and wireless technologies equally [22]. ...
Preprint
Full-text available
The fundamental aim of the healthcare sector is to incorporate different technologies to observe and keep a track of the various clinical parameters of the patients in day to day life. Distant patient observation applications are becoming popular as economical healthcare services are facilitated by these apps. The process of data management gathered through these applications also require due attention. Although cloud facilitated healthcare applications cater a variety of solutions to store patients record and deliver the required data as per need of all the stakeholders but are affected by security issues, more response time and affecting the continues availability of the system. To overcome these challenges, an intelligent IoT based distributed framework to deploy remote healthcare services is proposed in this chapter. In the proposed model, various entities of the system are interconnected using IoT and Distributed Database Management Systems is used to cater secure and fast data availability to the patients and health care workers. The concept of Blockchain is used to ensure the security of the patient medical records. The proposed model will comprise of intelligent analysis of the clinical records fetched from Distributed Database Management Systems secured with Blockchain. Proposed model is tested with true clinical data and results are discussed in detail.
Chapter
Now days, the fundamental aim of the healthcare sector is to incorporate different technologies to observe and keep a track of the various clinical parameters of the patients in day-to-day life. Distant patient observation applications are becoming popular as economical healthcare services are facilitated by these apps. The process of data management gathered through these applications also requires due attention. Although cloud-facilitated healthcare applications cater a variety of solutions to store patients’ record and deliver the required data as per need of all the stakeholders but are affected by security issues, more response time and affecting the continues availability of the system. To overcome these challenges, an intelligent IoT-based distributed framework to deploy remote healthcare services is proposed in this chapter. In the proposed model, various entities of the system are interconnected using IoTs and Distributed Database Management Systems (DDBMS) is used to cater secure and fast data availability to the patients and health care workers. The concept of Blockchain is used to ensure the security of the patients’ medical records. The proposed model will comprise of intelligent analysis of the clinical records fetched from DDBMS secured with Blockchain. The proposed model is tested with true clinical data and results are discussed in detail. At last, the future scope of the work is presented in the Conclusions section.
Research
Full-text available
Image Compression Algorithm Using Two Dimensional Discrete Cosine Transform
Article
Full-text available
To addresses the problem of reducing the memory space and amount of data required to represent a digital image. Image compression plays a crucial role in many important and adverse applications and including televideo conferencing, remote sensing, document, medical and facsimile transmission. The need for an efficient technique for compression of Images ever increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission & storage. Even though there are so many compression technique already available- a better technique which is faster, memory efficient and simple surely suits the requirements of the user. In this paper the Spatial Redundancy method of image compression using a simple transform technique called Discrete Cosine Transform is proposed. This technique is simple in implementation and utilizes less memory. A software algorithm has been developed and implemented to compress the given RGB image using Discrete Cosine Transform techniques in a MATLAB platform. In this paper rgb image is compressed upto 70%, 60%, 40% and 20% and optimum results are obtained. The analysis of results obtain has been carried out with the help of MSE (mean square error) and PSNR (peak signal to noise ratio).
Article
Full-text available
Wireless Sensor Networks (WSNs) are designed to perform a variety of information processing functionalities. Security is one of the major concerns for WSNs. This study focuses on trust and reputation system management. The proposed approach entitled Enhanced Bio-inspired Trust and Reputation Model (EBTRM), is Bio-inspired and extending Trust and Reputation Model (BTRM-WSN) and Peer Trust System. The objective of the current proposed system is to provide an efficient security solution to WSN which can provide a high level of security taking into account energy conservation.
Article
Full-text available
We derive a new representation for the collusive sensor nodes when the underlying fraudulent correlated environment has strong influence on wireless sensor networks performance. We have evaluated collusion effect with respect to static (SW) and dynamic (DW) wireless sensor networks to derive the joint resultant. Moreover accuracy, path length, and energy consumption of sensor node operations are also evaluated. Additionally, we emphasized over the satisfaction evaluation for linguistic fuzzy trust and reputation (LFTM) models in the deployed WSN framework. Finally, simulation analysis has been carried out to prove the validity of our proposal. However, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario.
Book
An overview of the rapidly growing field of ant colony optimization that describes theoretical findings, the major algorithms, and current applications. The complex social behaviors of ants have been much studied by science, and computer scientists are now finding that these behavior patterns can provide models for solving difficult combinatorial optimization problems. The attempt to develop algorithms inspired by one aspect of ant behavior, the ability to find what computer scientists would call shortest paths, has become the field of ant colony optimization (ACO), the most successful and widely recognized algorithmic technique based on ant behavior. This book presents an overview of this rapidly growing field, from its theoretical inception to practical applications, including descriptions of many available ACO algorithms and their uses. The book first describes the translation of observed ant behavior into working optimization algorithms. The ant colony metaheuristic is then introduced and viewed in the general context of combinatorial optimization. This is followed by a detailed description and guide to all major ACO algorithms and a report on current theoretical findings. The book surveys ACO applications now in use, including routing, assignment, scheduling, subset, machine learning, and bioinformatics problems. AntNet, an ACO algorithm designed for the network routing problem, is described in detail. The authors conclude by summarizing the progress in the field and outlining future research directions. Each chapter ends with bibliographic material, bullet points setting out important ideas covered in the chapter, and exercises. Ant Colony Optimization will be of interest to academic and industry researchers, graduate students, and practitioners who wish to learn how to implement ACO algorithms. Bradford Books imprint
Book
ZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical applications. This book will explain the ZigBee protocol, discuss the design of ZigBee hardware, and describe how to design and implement ZigBee networks. The accompanying CD will include ZigBee analysis and modeling software. The author is a ZigBee applications engineer for Freescale. KEY FEATURES * Provides a comprehensive overview of ZigBee technology and networking, from RF/physical layer considerations to application layer development. * Discusses ZigBee security features such as encryption. * Describes how ZigBee can be used in location detection applications. * Includes step-by-step instructions for implementing ZigBee networks. * Explores techniques for ZigBee co-existence with other wireless technologies such as 802.11 and Bluetooth. * Accompanying CD contains ZigBee analysis and modeling software.
Article
Bioinformatics applications are compute and data intensive by nature. As the size of molecular databases is growing from day to day experiments performed in the field of molecular biology, thoughtful steps need to be taken to exploit various methods to accelerate bioinformatics applications. Many efforts have already been put in the field to optimize most of the bioinformatics algorithms. By incorporating Graphical Processing Units (GPUs), many bioinformatics applications have benefited hugely. Compute Unified Device Architecture (CUDA) is a hardware and software platform, used to exploit multi-threaded architecture of GPUs. Basic Local Alignment Search Tool (BLAST) is one of the most frequently used algorithms for bioinformatics applications. Different GPU implementations of protein BLAST have already been proposed by different authors. For each implementation, the authors claimed different speedups. But these implementations are on different hardware platforms and also were experimented with different databases, so it’s difficult to compare their performance accurately. In this paper four different GPU implementations of protein BLAST are explored in detail. To compare their performance, these GPU versions of BLAST are implemented on a common hardware platform, i.e. NVIDIA M2050 GPU with 448 processing cores, 3GB of memory and two hex-core Intel, Xeon 2.93 GHz processors. Experiments are performed on 2.38 GB protein database. Performance is analyzed and compared with standard NCBI-BLASTP. Parameter considered for performance analysis and comparison is the execution time. In the current environment speedup obtained by different implementations varied from 2.3X to 9.8X.
Conference Paper
In this paper the power efficiency of Wireless Sensor Networks (WSNs) Power is studied. Power consumption is the main challenge during the routing of data. The objective of this study is to address three routing parameters that affect the network life time such as initial power of the nodes, the residual power in the nodes and routing period. Simulations of the effects of these parameters are presented in different network sizes. Contribution on how to improve network lifetime through consideration of power consumption factors during routing is added.
Article
To apply ACO to the TSP, we consider the graph defined by associating the set of cities with the set of vertices of the graph. This graph is called construction graph. Since in the TSP it is possible to move from any given city to any other city, the construction graph is fully connected and the number of vertices is equal to the number of cities. We set the lengths of the edges between the vertices to be proportional to the distances between the cities represented by these vertices and we associate pheromone values and heuristic values with the edges of the graph. Pheromone values are modified at runtime and represent the cumulated experience of the ant colony, while heuristic values are problem dependent values that, in the case of the TSP, are set to be the inverse of the lengths of the edges. where \(S_{upd}\) is the set of solutions that are used for the update, \(\rho \in (0,1]\) is a parameter called evaporation rate, and \(F : S \rightarrow R_0^+\) is a function such that \[f(s) < f(s') \Rightarrow F(s) \ge F(s'), \forall{s \ne s'} \in S\ .\] \(F(\cdot)\) is commonly called the fitness function. The first major improvement over the original ant system to be proposed was ant colony system (ACS), introduced by Dorigo and Gambardella (1997). The first important difference between ACS and AS is the form of the decision rule used by the ants during the construction process. Ants in ACS use the so-called pseudorandom proportional rule: the probability for an ant to move from city \(i\) to city \(j\) depends on a random variable \(q\) uniformly distributed over \([0,1]\ ,\) and a parameter \(q_0\ ;\) if \(q \le q_0\ ,\) then, among the feasible components, the component that maximizes the product \(\tau_{il}\eta_{il}^\beta\) is chosen; otherwise, the same equation as in AS is used.