COVID-19 is a novel coronavirus disease that has been declared as a global pandemic in 2019. It affects the whole world through person-to-person communication. This virus spreads by the droplets of coughs and sneezing, which are quickly falling over the surface. Therefore, anyone can get easily affected by breathing in the vicinity of the COVID-19 patient. Currently, vaccine for the disease is under clinical investigation in different pharmaceutical companies. Until now, multiple medical companies have delivered health monitoring kits. However, a wireless body area network (WBAN) is a healthcare system that consists of nano sensors used to detect the real-time health condition of the patient. The proposed approach delineates is to fill a gap between recent technology trends and healthcare structure. If COVID-19 affected patient is monitored through WBAN sensors and network, a physician or a doctor can guide the patient at the right time with the correct possible decision. This scenario helps the community to maintain social distancing and avoids an unpleasant environment for hospitalized patients Herein, a Monte Carlo algorithm guided protocol is developed to probe a secured cipher output. Security cipher helps to avoid wireless network issues like packet loss, network attacks, network interference, and routing problems. Monte Carlo based covid-19 detection technique gives 90% better results in terms of time complexity, performance, and efficiency. Results indicate that Monte Carlo based covid-19 detection technique with edge computing idea is robust in terms of time complexity, performance, and efficiency and thus, is advocated as a significant application for lessening hospital expenses.
The COVID-19 has affected around 218 countries and territories worldwide, and the number of cases is still increasing daily. This coronavirus may affect an individual in various ways. For instance, some infected people may experience mild to moderate symptoms and might recover without hospitalization. The most common symptoms of the virus include temperature, cough, and breathing issues. COVID-19 is quickly transmitted through breath, cough, and sneeze droplets. The mortality and morbidity rate have reached unexpected levels in few months. To avoid this infection, various pharmaceutical companies are investing in the development of vaccines. However, development of a global vaccine is challenging and time demanding endeavor due to recent identification of new strain of COVID-19. However, self-isolation at home and immobilization may mitigate the risk of COVID-19. Nevertheless, airborne communication transmission can only be disinfected if appropriate handwashing procedures are followed, and precautionary measures are taken by each person to safeguard other individuals [
Therefore, social distancing is crucial to control the situation which could be maintained by opting real-time monitoring system. Multiple companies introduced COVID-19 diagnostics kits. The accuracy of the simple PCR kits remained gloomy. The IoT-based WBAN presents an opportunity to monitor the real-time status of the patient’s health. WBAN consists of small sensors embedded over the human body that senses the health signs and transmits the record towards a biomedical server.
Consequently, a Monte Carlo algorithm guided protocol with security cipher has been proposed to monitor a patient’s health and avoid frequent interaction with the hospital. First, the proposed algorithm calculates COVID-19 suspected patients’ fitness based on the body temperature and breathing rate. There are random chances of COVID-19 positivity, negativity, and allergy. The data variable values are recorded and selected based on data sensing rate. After this, an efficient and very simple cipher algorithm is applied over the randomly chosen status of human health. The security algorithm used a very simple procedure for the key generation that is used in the encryption and decryption process.
The proposed COVID-19 detection technique gave 90% efficiency terms of time complexity, various attack resistance, and network congestions problems.
The contribution of this article is summarized as follows.
This work provides COVID-19 detection along with the WBAN transmission framework. Secure approach is used to transmits data to the data analyst and a doctor. A random selection algorithm is used to exactly identify the real time health status at any time It provides a real-time monitoring system to limits the spread of viral disease. Edge computing brings biomedical server closer to transmitter and decrease response time.
The rest of the article is organized as Section 2 provides a literature review, Section 3 contains methodology, Section 4 presents results and analysis, and Section 5 shows the discussion and future work.
This section provides COVID-19 based literature and WBAN based cryptographic techniques along with cognitive radio networks (CRN) protocol.
In Wuhan, China, several unidentified cases of pneumonia have appeared in 2019. A new coronavirus, dubbed COVID-19, was discovered in a series of deep studies on respiratory tract samples. To date, in 210 different countries and territories around the world, more than 19,193,980 patients have been registered. Therefore, to clarify the essence of the virus, numerous medical and non-medical experiments have been performed [
Coronaviruses are positive non-segmented RNA viruses that belong to the family of corona-viridae which are widely distributed to humans and mammals [
Smart sensors act as a bridge between patients and healthcare devices that collect human health data and forward it towards the doctor or a physician [
The authors improved the IJS algorithm for calculating coefficients (encoding) and restoring minor data errors in [
The fuzzy vault scheme that generates the polynomial to encode the hidden information was proposed by Liu et al. [
The problems obtained from the literature survey along with the solution given through COVID detection architecture and security cipher are stated in this section.
There should be a procedure for (COVID suspected) patients that helps the community to maintain social distancing and avoids an unpleasant environment for hospitalized patients.
To augment the security of data transmission in WBAN’s, multiple ciphertext algorithms are being used previously. However, [
Here, we proposed a logical system for COVID detection procedure that helps to detect patient’s real time health status through sensors and transmits data with secure cipher. A security algorithm along with an efficient network protocol is proposed to avoid various malicious attacks to maintain even data transmission. Proposed wireless radio network protocol is also helps to evade wireless network issues
The proposed study’s main objective is to provide a complete structure that restricts the spread of COVID-19. It focuses on early detection and isolation, as these are the most significant factors that may help to minimize the number of cases of COVID-19. It is possible because of tracking patient’s vital signs through wearable sensors, and this will easily prevent unpleasant situations for hospitalized patients and doctors. Consequently, a random selection Monte Carlo based algorithm is proposed to detect the COVID signs and secure them with a simple encryption algorithm to forward over the sensor network. The recommended structure is divided into three categories sensors detection, cognitive routing network protocol, and hospital or doctor side layer.
Nano sensors detected humans’ real-time health status based on the suggested parameters such as body temperature and respiratory rate.
Symptoms/signs | Normal/usual range | COVID-19 active range |
---|---|---|
Temperature C° | Up to 36.5 to 37°C | 38 to 40°C |
Respiratory/breathing rate | 12 to 16 breaths per minute. | Respiratory rate of 30 or more breaths per minute. |
COVID-19 suspected patients’ health based on the temperature and respiratory parameters is calculated and resultant options are achieved.
In the Decryption process, all the encryption steps are reversed at the physician’s server-side. Ciphertext heat map colors are converted into their corresponding binary values and perform XOR logical operation with the key values. Resultant binary values are converted into numeric values which are substituted with the corresponding alphabets. This alphabet string was an input of the algorithm.
Key Generation: |
Setup of nodes, the base station |
Select any integer value. |
Convert into binary |
Apply shuffle bits from SB BOX |
key value |
Encryption: |
Calculate fitness of patient |
Respiratory and temperature range |
Resultant health status |
Select random input |
Convert |
temp2 |
Temp4 |
Decryption: |
Conversion of ciphertext into plaintext: |
Convert |
temp1 |
temp2 |
temp3 |
If there is not sufficient space for data storage is left, then data forwarded to the internet cloud which relates with the biomedical server else simply data will be transmitted to the server from an edge computing device. Doctor or physician easily get access to the encrypted data which is decrypted by the medical server in a very less amount of time. After fetching original or plain data, the physician can advise further treatments to keep maintaining social distancing. This strategy will avoid network congestion issues, maintains security, and original data for the doctor analysis.
F is calculating the fitness of COVID suspected patients based on the temperature and respiratory or breathing parameters. If temperature and breathing pace is up to the level of the proposed rate, then sensors detect the fitness of the patient.
X is the provisional data that is updated according to the applied operations. Here, X is converting randomly chosen to input into their corresponding numeric form which is Zn. X1 stores the binary input data converted from Zn.
Binary input data perform XOR logical operation with the key-value generated from the simple procedure and the resultant data is updated in X2.
X3 updates data by implementing heat map conversion on the temporarily generated data of X2. It converts binaries of ‘0’ into green color and ‘1’ into red color. This red and green colored generated string is the ciphertext that is kept into the X3.
The proposed COVID-19 detection and transmission methodology procedure is analyzed in the MATLAB environment. A Monte Carlo based algorithm is used to randomly select the health status of the suspected patient by the sensors. There are simple encryption steps are also computed to avoid network interference issues. Experimental results are calculated over the MATLAB based on the encryption and decryption time consumption.
The computational time is the total time taken by a specific algorithm to compute its results. For an encryption approach, the computational time is a critical output parameter that illustrates how many times a certain operation takes to execute within one protocol transaction.
The proposed key generation algorithm has a simple and quickly performed procedure that generates key value for the encryption and decryption process.
The computational time taken by the Monte Carlo based algorithm is calculated. It has a very simple and efficient procedure to encrypt patient’s data to avoid network interference issues.
Computational time taken by the proposed monte Carlo based algorithm to decrypt the ciphertext at the server side is calculated. It follows simple technique to decode ciphertext into the original data.
A comparison analysis of the proposed key generation algorithm is performed with the Kumar et al. [
Comparison analysis of various techniques with the proposed scheme is performed to check the efficiency of algorithm.
Cognitive radio (CR) is a kind of wireless communication in which a transceiver can detect intelligently which channels of communication are in use and which are not. It moves into empty channels immediately while avoiding populated ones. The certified users do not cause any interference. Cognitive radio networks as a wireless protocol avoids traffic congestion over the network to make sure the smooth data transmission. Here, by using this protocol disadvantage of data transmission delay is also avoided.
Multiple wireless communication protocols are used such as WIFI, Zigbee, Bluetooth or NFC. The major problem with Zigbee protocol is the insecure key exchange concern [
In Cryptography, known plaintext attack is very basic and common kind of interrupt in data transmission. The intruder or interrupter strive to analyze the relationship between known chunk of plaintext and ciphertext. Through this process, attackers try to access the whole proposed algorithm and manipulate the detected data.
Simply, plaintext or original data is not sending over the recommended network. The proposed technique avoids this common attack by providing encryption and decryption process with the key generation scheme.
Eavesdropper is the man-in-middle that injects fake data packets into the smooth data transmission. Intruder or attacker listen the conversation between sender to receiver secretly.
(E (T, R)) = Z(Ei(R)) Where E is the encrypted data that is used to communicate between sender T and receiver R. Z is the attacker that injects fake data continuously and forward it towards receiver.
The proposed algorithm avoided this man-in-middle because of an efficient secret key sharing process.
In this scenario, attacker may intentionally forward the dummy packets to collide the important data that cause collision. This attacker discards the original data by targeting fake data.
(E (T, R)) = (Z (F, E)) Where E is the encrypted data that is used to transfer between transmitter T and receiver R. Z is the attacker or intruder that simply discard encrypted data by hitting fake data F.
The proposed technique avoided this attack by introducing CRN protocol. CRN used idle bandwidth spectrum and only licensed personal can access the path.
Jamming attack interrupts with the node frequencies and it is the DOS (Denial of service) type attack. Attackers distract smooth data transmission between sender and receiver, flow of data is diverted to another path by the attacker instead of receiver path.
Because of CRN, the proposed approach avoids this attack. For data transmission, a cognitive network uses a priority-based and empty bandwidth spectrum. This concept does not obstruct the data transmission channel. Furthermore, due to the adaption of the idle spectrum, data collision has been avoided.
Tempering is an attack in which an attacker is allowed physical access to a node, or an interloper can access sensitive information on the node, such as cryptographic secret keys or other classified material. At that moment, the system is confined by the invader, who can modify, or communication is replaced. Outsider Z is broken down by communication between nodes A and B, allowing physical access to data transmission.
Proposed technique avoided this attack because of encryption and decryption along with key generation steps. Attacker would not be able to get plaintext without knowing key and encryption procedure
A node acts as a router, and hostile nodes can refuse to forward certain messages and simply dump them in a selective forwarding attack.
It also has an impact on the seamless transfer of data over the network. It shows how the selective node ZS disrupts transmission between sender NS and receiver node NR, and how the data packets are affected by the selective faked packet by the attacker ZA as (NS, NR) = ((NS)(ZS)) ((ZA) + (NR)
This assault was intercepted by the proposed technique, which included an encryption and decryption method that prevented this type of attack from affecting the original data. As a result, the receiver rejects selectively sent packets.
The proposed Monte Carlo based algorithm is applied over the COVID-19 patient’s data. Patient’s real time health status is randomly chosen by the algorithm and encrypted with the very efficient procedure. Sensors transmits the encrypted data towards doctor over a wireless channel to maintain safe distance from the people. Cognitive wireless network is used as a protocol to communicate with the server. Edge computing device is introduced between bandwidth data path and server which reduce time and bring server closer. Monte Carlo based covid-19 detection technique gives 90% better results in terms of time complexity, performance, and efficiency. This system is implemented over MATLAB 2013a and evaluation measures are taken. Overall, the computational results of the proposed system are according to the sensors capacity.
Coronavirus (COVID-19) is a new pandemic disease that effects human by sneezing and cough droplets over the surface. This disease could be avoided by maintaining social distancing. Hence the WBAN is used for the patients to prevent unpleasant environment in hospitals. WBAN is a wireless network that used tiny sensors to sense the real time health status of the patients. Nano-sensors are the wearable devices which are implanted over the human body that detects the human vital signs and transmits on the network. Security is the leading issue in wireless system to protect against various attacks and network interferences. Therefore, wireless network data should be in an unpredictable or in ciphertext form. Several literature articles proposed security algorithms to encrypt and decrypt the collected data, many of them contains some stumbling blocks of heavy computations. Consequently, proposed Monte Carlo based algorithm along with very simple and an efficient encryption procedure used for the detection of COVID patients. Routing protocol used for data transmission is CRN which choose empty available routing path. Results shows that proposed algorithm is an efficient scheme in terms of computational complexity and security concerns.
The proposed approach can be extended by introducing a decent authentication procedure for the patients to avoid unauthorized personal in the system. Proposed methodology can also be prolonged by implementing another efficient encryption and decryption algorithm along with key generation combination. A better solution could be provided to avoid various other wireless networks problem.
The authors would like to thank for the support from Taif University Researchers Supporting Project number (TURSP-2020/73), Taif University, Taif, Saudi Arabia.