The role of Internet of Things for adaptive traffic prioritization in wireless body area networks

Author(s):  
Fasee Ullah ◽  
Chi-Man Pun
Author(s):  
Arun Kumar Rana ◽  
Sharad Sharma

Aims: Health monitoring in Wireless Body Area Networks. Background: A medical wireless body area network activated by IoT is mainly concerned with transmitting the quality details to the doctor within a fair period. The explosion of wearable gadgets and recent developments in miniature sensors illustrate the technological viability of any universal tracking program. IoT incorporates a range of tools fitted with sensing, recognition, communication, etc. Objective: To improve the medical facility. Method: The Wireless Body Area Network (WBAN) Internet of Things (IoT) for healthcare applications is an operational scenario for IoT systems that has attracted interest from large fields of study in the last few years. Internet of Things Based Stable Increased-throughput Multi-hop Protocol for Link Efficiency (IoT-SIMPLE), the IoT ties both topics to the healthcare network effortlessly. IoT enables the sensing, retrieval, and connectivity of all facilities or functional criteria and biomedicine. It puts the surgeons, the patients together And nurses can roam without any restrictions through smart devices, and each entity. Now work is underway to improve the healthcare sector by rising prices and increasing patient care quality. The route determines the route between the nodes and the sink. In this paper, we propose a protocol in WBAN that transmits body sensing data from various sensors, installed on the human body, to sink nodes using a multihop routing technique. Our key goal is to increase WBAN’s total network existence by raising cumulative energy usage. The residual energy parameter governs the usage of energy by the sensor nodes while the distance parameter ensures that the packet is effectively transmitted into the sink Result: Simulation results demonstrate that our proposed protocol very energy efficient and maximizes network stability for longer periods. Conclusion: Throughout this paper, we suggest a method for route data to WBANs. The suggested system uses the expense feature to choose the correct path to fall. The costs of the nodes and their spread from the drain are dependent on residual electricity. Nodes with a lower cost function value are selected as the parent node. Other nodes are parent node children and send their data to parent node. Our simulation tests demonstrate that the suggested routing scheme increases the network reliability period and the packet sent to the sink and in future more numbers of sensors can be used to extend this work to measure throughput, network lifetime, and end-to-end delay.


Electronics ◽  
2019 ◽  
Vol 8 (10) ◽  
pp. 1171 ◽  
Author(s):  
Insaf Ullah ◽  
Abdullah Alomari ◽  
Noor Ul Amin ◽  
Muhammad Asghar Khan ◽  
Hizbullah Khattak

Recently, the spectacular innovations in the fields of wireless body area networks (WBAN) and the Internet of Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances the quality of the medical system, however, due to the openness of the wireless environment and privacy of people’s physiological data, WBAN and IoT are prone to various cyber-attacks. There is a significant need for an efficient and highly secured cryptographic scheme that can meet the requirements of resource-constrained devices. Therefore, in this paper, we propose a certificate-based signcryption (CB-SN) scheme for the IoT-enabled WBAN. The proposed scheme is based on the concept of hyper-elliptic curve cryptography (HECC) that offers the same level of security as the elliptic curve and bilinear pairing with lower-key size. The formal security verification using the Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis demonstrate that the proposed scheme is not just reducing the complexity of resource-constrained IoT devices, but proves to be secure against several well-known cryptographic attacks. Moreover, performance comparison with relevant existing schemes authenticates that the proposed scheme is far more secure and energy efficient.


2017 ◽  
Vol 75 (2) ◽  
pp. 181-203 ◽  
Author(s):  
Fasee Ullah ◽  
Abdul Hanan Abdullah ◽  
Omprakash Kaiwartya ◽  
Jaime Lloret ◽  
Marina Md Arshad

Sign in / Sign up

Export Citation Format

Share Document