Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN

被引:0
|
作者
Karthiga, I.
Sankar, Sharmila
机构
[1] Department of Computer Science, Engineering B. S. Abdur Rahman University, Chennai
来源
COMPUTER JOURNAL | 2018年 / 61卷 / 02期
关键词
cluster heads; encryption; security; Wavelet-Domain Hidden Markov Model; WBAN;
D O I
10.1093/comjnl/bxx051
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In inter-WBAN communication, there is more possibility of the physical attacks that includes the node capture, tampering, pre-deployment network topology and so on. In order to overcome these issues, in this paper, we propose a secret authentication in clustered security architecture for Cloud-based WBAN. When the nodes are deployed in the network, the cluster heads are elected based on the residual energy and node distance. Then a Wavelet-Domain Hidden Markov Model is deployed to perform the communication in a secure manner. A selective encryption mechanism is then used to protect data confidentiality by using biomedical information as a key. Further, the security is enhanced by concealing the features of sensors by generating a coffer, a computationally efficient protocol. By simulation results, we show that the proposed technique enhances the security and reduces the overhead.
引用
收藏
页码:223 / +
页数:34
相关论文
共 50 条
  • [21] Data Security in Cloud-Based Applications
    Pandey, Surabhi
    Purohit, G. N.
    Munshi, Usha Mujoo
    [J]. DATA SCIENCE LANDSCAPE: TOWARDS RESEARCH STANDARDS AND PROTOCOLS, 2018, 38 : 321 - 326
  • [22] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534
  • [23] Related Work in Cloud-Based Security
    不详
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (01) : 45 - 45
  • [24] Cloud-Based Architecture for Farm Management
    Mocanu, Mariana
    Cristea, Valentin
    Negru, Catalin
    Pop, Florin
    Ciobanu, Vlad
    Dobre, Ciprian
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 814 - 819
  • [25] Architecture for Cloud-Based Industrial Automation
    Mahmoud, Magdi S.
    [J]. THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 51 - 62
  • [26] A Cloud-based Web Crawler Architecture
    Bahrami, Mehdi
    Singhal, Mukesh
    Zhuang, Zixuan
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON INTELLIGENCE IN NEXT GENERATION NETWORKS, 2015, : 216 - 223
  • [27] Explaining the Workings Principle of Cloud-based Multi-factor Authentication Architecture on Banking Sectors
    Bose, Rajesh
    Chakraborty, Srabanti
    Roy, Sandip
    [J]. PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 764 - 768
  • [28] Providing Security, Integrity and Authentication Using ECC Algorithm in cloud storage
    Barisal, Akanksha
    Agrawal, Arun
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [29] Design of An Authentication Scheme for Cloud-Based IoT Applications*
    Sahoo, Sampa
    Swagatika Sahoo, Shreeya
    Sahoo, Bibhudatta
    Kumar Turuk, Ashok
    [J]. IETE TECHNICAL REVIEW, 2022, 39 (02) : 343 - 356
  • [30] Secure Improved Cloud-Based RFID Authentication Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 147 - 164