Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN

被引:0
|
作者
Karthiga, I.
Sankar, Sharmila
机构
[1] Department of Computer Science, Engineering B. S. Abdur Rahman University, Chennai
来源
COMPUTER JOURNAL | 2018年 / 61卷 / 02期
关键词
cluster heads; encryption; security; Wavelet-Domain Hidden Markov Model; WBAN;
D O I
10.1093/comjnl/bxx051
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In inter-WBAN communication, there is more possibility of the physical attacks that includes the node capture, tampering, pre-deployment network topology and so on. In order to overcome these issues, in this paper, we propose a secret authentication in clustered security architecture for Cloud-based WBAN. When the nodes are deployed in the network, the cluster heads are elected based on the residual energy and node distance. Then a Wavelet-Domain Hidden Markov Model is deployed to perform the communication in a secure manner. A selective encryption mechanism is then used to protect data confidentiality by using biomedical information as a key. Further, the security is enhanced by concealing the features of sensors by generating a coffer, a computationally efficient protocol. By simulation results, we show that the proposed technique enhances the security and reduces the overhead.
引用
收藏
页码:223 / +
页数:34
相关论文
共 50 条
  • [1] A Hybrid Cryptography and Authentication based Security Model for Clustered WBAN
    Sangwan, Aarti
    Bhattacharya, Partha Pratim
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2018, 13 (01): : 34 - 54
  • [2] An Authentication Architecture for Cloud-Based Firewalling Service
    Guenane, Fouad Amine
    Serhrouchni, Ahmed
    Pujolle, Guy
    [J]. 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 46 - 50
  • [3] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064
  • [4] Cloud-Based Data Architecture Security
    Semenov, N. A.
    Poltavtsev, A. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1056 - 1064
  • [5] RESCUE: Resilient Secret Sharing Cloud-based Architecture
    Ukwandu, Elochukwu
    Buchanan, William J.
    Fan, Lu
    Russell, Gordon
    Lo, Owen
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 872 - 879
  • [6] Security-enhanced cloud-based image secret sharing and authentication using POB number system
    Chen, Tzung-Her
    Chang, Tzu-Ching
    Zhu, Ting-Le
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 1901 - 1924
  • [7] Security-enhanced cloud-based image secret sharing and authentication using POB number system
    Tzung-Her Chen
    Tzu-Ching Chang
    Ting-Le Zhu
    [J]. Multimedia Tools and Applications, 2021, 80 : 1901 - 1924
  • [8] Toward the SIEM Architecture for Cloud-based Security Services
    Lee, Jong-Hoon
    Kim, Young Soo
    Kim, Jong Hyun
    Kim, Ik Kyun
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 398 - 399
  • [9] A Novel Cloud-Based MultiTenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization
    Benkhelifa, Elhadj
    Fernando, Dayan Abishek
    Welsh, Thomas
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (03) : 34 - 49
  • [10] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175