| Literature DB >> 35935783 |
Heon Jeong1, Sang-Woong Lee2, Mazhar Hussain Malik3, Efat Yousefpoor4, Mohammad Sadegh Yousefpoor4, Omed Hassan Ahmed5, Mehdi Hosseinzadeh2, Amir Mosavi6,7,8.
Abstract
In recent decades, the use of sensors has dramatically grown to monitor human body activities and maintain the health status. In this application, routing and secure data transmission are very important to prevent the unauthorized access by attackers to health data. In this article, we propose a secure routing scheme called SecAODV for heterogeneous wireless body sensor networks. SecAODV has three phases: bootstrapping, routing between cluster head nodes, and communication security. In the bootstrapping phase, the base station loads system parameters and encryption functions in the memory of sensor nodes. In the routing phase, each cluster head node calculates its degree based on several parameters, including, distance, residual energy, link quality, and the number of hops, to decide for rebroadcasting the route request (RREQ) message. In the communication security phase, a symmetric cryptography method is used to protect intra-cluster communications. Also, an asymmetric cryptography method is used to secure communication links between cluster head nodes. The proposed secure routing scheme is simulated in the network simulator version 2 (NS2) simulator. The simulation results are compared with the secure multi tier energy-efficient routing scheme (SMEER) and the centralized low-energy adaptive clustering hierarchy (LEACH-C). The results show that SecAODV improves end-to-end delay, throughput, energy consumption, packet delivery rate (PDR), and packet loss rate (PLR).Entities:
Keywords: Internet of things (IoT); healthcare; secure routing; security; wireless body sensor networks (WBSNs)
Year: 2022 PMID: 35935783 PMCID: PMC9351592 DOI: 10.3389/fmed.2022.829055
Source DB: PubMed Journal: Front Med (Lausanne) ISSN: 2296-858X
Figure 1Wireless body network and its applications (9).
Figure 2Various HIoT applications (24).
Figure 3Network model in SecAODV.
Route discovery process.
| |
| |
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |
| 9: |
| 10: |
| 11: |
| 12: |
| 13: |
| 14: |
|
|
Figure 4RREQ packet template.
Secure intra-cluster communications.
| |
| |
| |
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |
| 9: |
|
|
Figure 5Secure intra-cluster communication.
Secure inter-cluster communications.
| |
| |
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
|
|
Figure 6Secure inter-cluster communication.
Simulation parameters.
|
|
|
|---|---|
| Simulator | NS-2.35 |
| Network size | 50 × 2, 500 |
| Location of BS | Network center |
| Total number of sensor nodes | 100 |
| Initial energy of CHs | 1 J |
| Initial energy of sensor nodes | 0.5 J |
| Antenna | Omni-Antenna |
| Packet size | 1024 bit |
| Mac protocol | IEEE 802.11 |
| Simulation time | 30 s |
| Black hole nodes | 5 |
Figure 7Comparison of different method in terms of delay.
Figure 8Comparison of different methods in terms of throughput.
Figure 9Comparison of different methods in terms of energy consumption.
Figure 10Comparison of different methods in terms of PLR.
Figure 11Comparison of different methods in terms of PDR.