Attack Discernment and Protected Network Communication in Wireless Body Area Network (WBAN)

Authors

  • Smitha B N Department of Computer Science and Engineering, Sai Vidya Institute of Technology, Yelahanka, Bengaluru, India.
  • Kumari G Department of Computer Science and Engineering, Sai Vidya Institute of Technology, Yelahanka, Bengaluru, India.
  • Rohith H G Department of Computer Science and Engineering, Sai Vidya Institute of Technology, Yelahanka, Bengaluru, India.
  • Sammed Patil Department of Computer Science and Engineering, Sai Vidya Institute of Technology, Yelahanka, Bengaluru, India.
  • Suraj Gudi Department of Computer Science and Engineering, Sai Vidya Institute of Technology, Yelahanka, Bengaluru, India.

DOI:

https://doi.org/10.5281/zenodo.8210362

Keywords:

Autonomous System, EIGRP, TELNET, QoS, Subnet Mask

Abstract

Wireless Body Area Network (WBAN) is the most rapidly growing branch of networking and data communication. With the rapid advancements of wireless communication and semiconductor technology, sensor network designed to operate autonomously to connect various other sensors (medical, position and geography) and appliances has become more robust and efficient. We realize a network consisting of intra-body and inter-body communication network. Each body is considered to be an Autonomous System (AS) capable of mobility and connectivity to every other Autonomous System (AS) with different Autonomous System Number (ASN). The intra-body network consists of sensors and other elements embedded on or inside the body. These form the nodes of the network and are interconnected by links. A Body Area Network is constructed to interconnect the nodes, thereby exchanging information and bringing about the real-time concepts of sensors inter-dependability. Malicious nodes can construct a dynamic blacklist of Network nodes, which can be used to block nodes whose trust values fall below a pre-defined threshold. This network when connected and tested would enable exchange of confidential and essential data of military personnel. The information in the network to be transmitted is password protected. This would avoid the intruders from stealing TOP-SECRET data/information. GNS 3 tool is used for implementing routing and cryptography on the network.

References

Qi, W., Su, H., Chen, F., Zhou, X., Shi, Y., Ferrigno, G., & De Momi, E. (2020, December). Depth vision guided human activity recognition in surgical procedure using wearable multisensor. In 2020 5th International Conference on Advanced Robotics and Mechatronics (ICARM) (pp. 431-436). IEEE.

Yang, Y. (2019). Focus on the four core sensor technologies and tap the new growth pole of wearable devices. High Tech. Ind, 2, 36-47.

Shajin, F. H., & Rajesh, P. (2022). Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications, 18(5), 603-621.

Liu, B., Peng, Y., Xu, J., Mao, C., Wang, D., & Duan, Q. (2021). Design and implementation of multiport energy routers toward future energy Internet. IEEE Transactions on Industry Applications, 57(3), 1945-1957.

Al Mahmud, A., Wickramarathne, T. I., & Kuys, B. (2020). Effects of smart garments on the well-being of athletes: a scoping review protocol. BMJ open, 10(11), e042127.

Sreedhar Kumar, S., Ahmed, S. T., Mercy Flora, P., Hemanth, L. S., Aishwarya, J., GopalNaik, R., & Fathima, A. (2021, January). An Improved Approach of Unstructured Text Document Classification Using Predetermined Text Model and Probability Technique. In ICASISET 2020: Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India (p. 378). European Alliance for Innovation.

Wu, H., & Li, Y. (2020). Application of flexible sensor in textile and garment. Wool Technol, 48(09), 94-98.

Qi, W., Su, H., & Aliverti, A. (2020). A smartphone-based adaptive recognition and real-time monitoring system for human activities. IEEE Transactions on Human-Machine Systems, 50(5), 414-423.

Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian informatics journal, 18(2), 113-122.

Ahmed, S. T., Priyanka, H. K., Attar, S., & Patted, A. (2017, June). Cataract density ratio analysis under color image processing approach. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 178-180). IEEE.

Luo, J., Chen, Y., Wu, M., & Yang, Y. (2021). A survey of routing protocols for underwater wireless sensor networks. IEEE Communications Surveys & Tutorials, 23(1), 137-160.

Sankar, R., Le, X. H., Lee, S., & Wang, D. (2013). Protection of data confidentiality and patient privacy in medical sensor networks. In Implantable Sensor Systems for Medical Applications (pp. 279-298). Woodhead Publishing.

Patil, K. K., & Ahmed, S. T. (2014, October). Digital telemammography services for rural India, software components and design protocol. In 2014 International Conference on Advances in Electronics Computers and Communications (pp. 1-5). IEEE.

Gao, T., Massey, T., Selavo, L., Crawford, D., Chen, B. R., Lorincz, K., ... & Welsh, M. (2007). The advanced health and disaster aid network: A light-weight wireless medical system for triage. IEEE Transactions on biomedical circuits and systems, 1(3), 203-216.

Nagashree, N., Chitralekha, M., Harsha, S. M., Sree, S. S. U., Chinmayee, M., & Basavaraj, S. H. (2023, March). A Modified UNet based Framework towards Early Detection of Autism using EEG Waves. In 2023 2nd International Conference for Innovation in Technology (INOCON) (pp. 1-4). IEEE.

Redondi, A., Chirico, M., Borsani, L., Cesana, M., & Tagliasacchi, M. (2013). An integrated system based on wireless sensor networks for patient monitoring, localization and tracking. Ad Hoc Networks, 11(1), 39-53.

Downloads

Published

2023-08-03

How to Cite

Smitha B N, Kumari G, Rohith H G, Sammed Patil, & Suraj Gudi. (2023). Attack Discernment and Protected Network Communication in Wireless Body Area Network (WBAN). International Journal of Computational Learning & Intelligence, 2(3), 99–106. https://doi.org/10.5281/zenodo.8210362

Issue

Section

RESEARCH ARTICLES