A. Razaque, Fathi H. Amsaad, M. J. Khan, Amanzholova Saule Toksanovna, A. Oun, Muder Almiani
{"title":"无线体域传感器网络的保密性介质访问控制协议","authors":"A. Razaque, Fathi H. Amsaad, M. J. Khan, Amanzholova Saule Toksanovna, A. Oun, Muder Almiani","doi":"10.1109/NAECON46414.2019.9057832","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) play vital role in several fields and particularly add more in the health domain. Several applications in the health domain utilize the WSNs to diagnose the disease and cure the patients. However, there is threat and risk involved for exploiting the privacy of the patient and deteriorating the performance of operating tools and systems. There are few existing approaches handling the attacks to maintain the privacy issue of wireless body area sensor networks (WBASNs). Most of the threats are expected on the Medium Access Control (MAC) sub-layer that affect the performance of WBANs. In this paper, we introduce privacy preserving Medium Access Control (PP-MAC) to detect the selfish attack. The algorithm aims to save energy because selfish attack leads to additional energy consumption. In this type of attack, the illegitimate node has edge over the legitimate nodes at the MAC sub-layer. As a result, the illegitimate node consumes the resources negatively. The effectiveness of our proposed algorithm is tested by using OMNET++ and compared with other known existing MAC protocols designed for WBANs. Based on the simulation results, our proposed protocol performs better than other protocols in detecting the rate of selfish attacks, saving the energy, and performance throughput.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Privacy Preserving Medium Access Control Protocol for wireless Body Area Sensor Networks\",\"authors\":\"A. Razaque, Fathi H. Amsaad, M. J. Khan, Amanzholova Saule Toksanovna, A. Oun, Muder Almiani\",\"doi\":\"10.1109/NAECON46414.2019.9057832\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks (WSNs) play vital role in several fields and particularly add more in the health domain. Several applications in the health domain utilize the WSNs to diagnose the disease and cure the patients. However, there is threat and risk involved for exploiting the privacy of the patient and deteriorating the performance of operating tools and systems. There are few existing approaches handling the attacks to maintain the privacy issue of wireless body area sensor networks (WBASNs). Most of the threats are expected on the Medium Access Control (MAC) sub-layer that affect the performance of WBANs. In this paper, we introduce privacy preserving Medium Access Control (PP-MAC) to detect the selfish attack. The algorithm aims to save energy because selfish attack leads to additional energy consumption. In this type of attack, the illegitimate node has edge over the legitimate nodes at the MAC sub-layer. As a result, the illegitimate node consumes the resources negatively. The effectiveness of our proposed algorithm is tested by using OMNET++ and compared with other known existing MAC protocols designed for WBANs. Based on the simulation results, our proposed protocol performs better than other protocols in detecting the rate of selfish attacks, saving the energy, and performance throughput.\",\"PeriodicalId\":193529,\"journal\":{\"name\":\"2019 IEEE National Aerospace and Electronics Conference (NAECON)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE National Aerospace and Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON46414.2019.9057832\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON46414.2019.9057832","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy Preserving Medium Access Control Protocol for wireless Body Area Sensor Networks
Wireless Sensor Networks (WSNs) play vital role in several fields and particularly add more in the health domain. Several applications in the health domain utilize the WSNs to diagnose the disease and cure the patients. However, there is threat and risk involved for exploiting the privacy of the patient and deteriorating the performance of operating tools and systems. There are few existing approaches handling the attacks to maintain the privacy issue of wireless body area sensor networks (WBASNs). Most of the threats are expected on the Medium Access Control (MAC) sub-layer that affect the performance of WBANs. In this paper, we introduce privacy preserving Medium Access Control (PP-MAC) to detect the selfish attack. The algorithm aims to save energy because selfish attack leads to additional energy consumption. In this type of attack, the illegitimate node has edge over the legitimate nodes at the MAC sub-layer. As a result, the illegitimate node consumes the resources negatively. The effectiveness of our proposed algorithm is tested by using OMNET++ and compared with other known existing MAC protocols designed for WBANs. Based on the simulation results, our proposed protocol performs better than other protocols in detecting the rate of selfish attacks, saving the energy, and performance throughput.