Computer Systems Science & Engineering DOI:10.32604/csse.2022.024802 | |
Article |
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT
1Department of Computer Science, Oklahoma State University, Oklahoma, USA
2College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
3Industrial Innovation and Robotics Center, University of Tabuk, Tabuk, Saudi Arabia
*Corresponding Author: Ahamed Aljuhani. Email: A_aljuhani@ut.edu.sa
Received: 31 October 2021; Accepted: 10 December 2021
Abstract: The Internet of Things (IoT) represents a radical shifting paradigm for technological innovations as it can play critical roles in cyberspace applications in various sectors, such as security, monitoring, medical, and environmental sectors, and also in control and industrial applications. The IoT in E-medicine unleashed the design space for new technologies to give instant treatment to patients while also monitoring and tracking health conditions. This research presents a system-level architecture approach for IoT energy efficiency and security. The proposed architecture includes functional components that provide privacy management and system security. Components in the security function group provide secure communications through Multi-Authority Ciphertext-Policy Attributes-Based Encryption (MA-CPABE). Because MA-CPABE is assigned to unlimited devices, presuming that the devices are reliable, the user encodes data with Advanced Encryption Standard (AES) and protects the ABE approach using the solutions of symmetric key. The Johnson’s algorithm with a new computation measure is used to increase network lifetime since an individual sensor node with limited energy represents the inevitable constraints for the broad usage of wireless sensor networks. The optimal route from a source to destination turns out as the cornerstone for longevity of network and its sustainability. To reduce the energy consumption of networks, the evaluation measures consider the node’s residual energy, the number of neighbors, their distance, and the link dependability. The experiment results demonstrate that the proposed model increases network life by about 12.25% (27.73%) compared to Floyd–Warshall’s, Bellman–Ford’s, and Dijkstra’s algorithms, lowering consumption of energy by eliminating the necessity for re-routing the message as a result of connection failure.
Keywords: Energy-efficiency; energy consumption; Internet of Things; telemedicine; wireless sensor networks
The internet services have become indispensable for business, health, and governmental activities and operations. Its significance and relevance in daily life have grown substantially, whether for economic growth, technological developments, or social services. The Internet of Things (IoT) is one such application model that has attracted attentions to link anything and everyone while also delivering various services [1–3]. Connecting sensors, computers, and networks for communications, monitoring, and control is not a new paradigm, but the IoT expands this concept a step further by connecting everyday objects, not just computers, which could be then utilized for data generation, collections, and transmission with minimal human involvement. The connectivity among IoT devices for collectively transmitting collected data or deploying new services has also opens the door to delegate intelligent tasks to these devices [4].
The progress and practical application of these IoT devices transform everything into smart objects. Nowadays, IoT devices are widely linked with energy management and home automations devices to form what is called “smart home”. As a result, family members may remotely manage household appliances willingly or based on data acquired for increasing the efficiency or security. Also, the IoT devices such as fitness wearable devices that are connected with network-based health monitoring systems for human health tracking and monitoring, which consequently pave the land for smart health monitoring systems.
In relation to smart cities, the IoT devices can be embedded in vehicles connected to broadband networks, traffic control systems, and also as sensor nodes along the road that communicates with each other to detect and reduce congestions. IoT may also be utilized in agriculture, security, and energy industry. However, IoT paradigm itself faces challenges that should be taken in considerations when it’s adopted to be utilized effectively. Some of these IoT challenges, which should be properly considered and examined [5,6]:
• Inter-Operability and Inter-Connectivity: A wide range of IoT systems must be linked or consolidated into a single platform. Combining these devices, made by many manufacturers, into a single common platform is quite difficult.
• Heterogeneity: Because IoT architecture can includes a wide range of devices, each has a unique hardware structure, transamination media, and network configurations. All of these devices must be compatible with a global information and communication infrastructure. In practice, it is not easy to find a generic technique that works well for all off-the-shelf devices.
• Security: Government regulations may prohibit sensitive data from being transmitted via IoT communication networks. Note, because one of the primary purposes behind IoT paradigm is to gather as much data as possible, it is critical to guarantee that the data flow in such system is protected throughout the whole networks.
• Quality of Service (QoS): The communication channels should be good enough to handle a large volume of network traffic among the network’s nodes (i.e., potentially sensors and remote servers) and also towards the data collector platform.
• Dynamic changes: IoT devices should be able to alter their status dynamically according to the various conditions, such as wake up, sleep mode, termination connections, as well as essential updates regarding their operating systems and working circumstances.
• Large scale: Often IoT systems have a massive number of IoT devices involved, which would require a robust and scalable control system to manage such number of devices.
The smart health systems, which is one of the beneficiaries of the IoT systems, present additional challenges as the health monitoring systems are application-specific and not mutually interoperable due to the heterogeneous underlying architecture (i.e., for each different application). This makes it harder to reduce costs and more difficult for users to switch between applications or move to a better service provider. The IoT could be used in healthcare to track hospitalized patients who require special medical treatment, in which sensors capture extensive data regarding the user health conditions, and store such data and process it in the cloud. The resultant data is then wirelessly transmitted to the service provider for further analysis.
As with the medical treatments, various sensors gather patient’s health data, perform a few complicated analyses, and then share the results with a medical expert for further analysis. This has the potential to provide effective and timely medical guidance and treatments. Likewise, it may be utilized to monitor the health of any individual remotely. The success of IoT applications in health care dependents on many stages of effective deployment [7]:
• Using various sensor equipment to closely and precisely track the health status.
• The efficiency of IoT devices depends on many factors, such as power consumptions, operational cost, reliability, accuracy, interoperability, and durability.
• Different data collection and integration procedures.
• Network access to the cloud and the service infrastructure.
• Efficient data analysis methods.
• Appropriate user-friendly interfaces.
This paper presents a secure architecture for IoT-based systems in telemedicine. The proposed architecture takes into consideration different functional components to provide system security while also preserve the users’ privacy. As the nature of telemedicine technologies allow patients to receive treatments and medical advice remotely, the proposed architecture provides secure communications for patients through Multi-Authority Ciphertext-Policy Attributes-Based Encryption (MA-CPABE) scheme. Adopting such scheme in IoT-based systems is not free from challenges due to resource constraints when assigning MA-CPABE to unlimited IoT devices and sensor nodes suffer from limited energy, which is one of the most constrains for the ubiquitous use of Wireless Sensor Networks (WSN) and indeed raises the demand to improve energy efficiency of IoT sensors. Therefore, the Johnson’s algorithm with a new computation measure is utilized in our proposed approach to minimize energy consumption while increasing network lifetime. We analyzed, evaluated, and compared our proposed architecture with other widely used approaches including Floyd–Warshall’s, Bellman–Ford’s, and Dijkstra’s algorithms.
This section presents the common requirements of the Telemedicine systems and their utility. Also, the role of IoT in the medical field is highlighted. Then, we discuss the related research work that aimed to tackle security and privacy issues for IoT-based systems in healthcare.
2.1 Telemedicine in IoT: A Broad Perspective
Telemedicine is a rapidly evolving technology that allows patients to receive treatment through a remote system [8–11]. Fig. 1 depicts a higher-level representation of Telemedicine with the IoT technologies. For an effective telemedicine system in the context of IoT, there are some main requirements that should be fulfilled. This research can be helpful in the following situations:
• A physician can examine a patient with chronic health problems from a distance without leaving the hospital.
• If workers become sick or injured faraway from hospital, they must be transported to closest capable medical care center or hospital via telemedicine; a doctor should be able to make that decision remotely.
• When a child becomes ill, it may disrupt the working schedule of parents, and especially when urgent childcare is needed for critical situations. To address this issue, parents can use the Telemedicine system to obtain primary care for their children or at least to mitigate the situation acuteness. Hence, it increases the accessibility of healthcare services and outcomes since patients are seen sooner rather than later [8]. For example, suppose a patient was not feeling well for several days. In that case, he can seek an immediate healthcare service or primary care from a licensed doctor via telemedicine applications rather than visiting in person.
• It saves patients time since they do not have to wait for a physician at an emergency department or hospital. There was no coinsurance and deductible, saving people and industries lost revenue because employees being absent from work.
• It enhances healthcare system in general, particularly for people living in rural locations or conflict zones with no health services or facilities [12].
• Generally, as the IoT-based systems often receive and collect data from various diffused devices, it should sufficiently resistant against any possible DDoS attacks [13,14] since the availability of the system is crucial for legitimate users.
2.2 The Role of IoT in Telemedicine
The patient has the ability to interact with the medical equipment at any time and from any location. These devices are equipped with sensors that can detect and record patient medical data such as heart rate, blood pressure, and body temperature. The recorded data is then gathered through sensor gateway devices such as mobile phones, tablets, and PCs. The actual sensors cannot be used to communicate with TCP/IP protocols; instead, often low-power protocols are used (i.e., Bluetooth). Furthermore, they cannot connect to the Internet using those protocols. That is why gateway devices are necessary. As a result, gateway devices play an essential role in this communication architecture. Also, in some IoT applications, these IoT devices may rely on IoT hub system for data for various data collection.
The IoT hub system is essentially a Demilitarized Zone (DMZ) service [15] that delivers and receives data from gateway devices. Sensor gateways in hospitals would be network-connected devices that seek data collection. The IoT hub is a software component that listens on different ports for various protocols to communicate with different systems. The primary goal of this technology was to enable bi-directional communication among doctors and patients.
Moreover, the IoT system enables the communication among digital active artifacts and users in a physiological environment. This system involves people as critical system components, which might cause harm if the system fails or exposes private information, which justifies the need for security and privacy within IoT design and references model, as illustrated in Fig. 2. Safety of a system is related to the application domain that is inextricably linked to an IoT framework and its utility. The security measures in the IoT environment depend on the communications security to protect the integrity and secrecy of communicating entities and other related functional elements such as management of identity, authentication, trust and reputations, and authorization [16].
Many research studies have been conducted in the past towards the utility of IoT-based medical services. Zhang et al. [17] proposed a secure, open, and adaptable architectures for IoT and cloud-based health applications. Their proposed model contained different short-distance communication protocols to address medical security issues in such IoT environment. For example, the interoperability when connecting multiple telemedicine devices from different factories and the authentication process to securely authorize users to access the system. To demonstrate the effectiveness of their proposed model, authors provided a reference implementation of the proposed architecture. Ziegler et al. [18] proposed a comprehensive approach to mitigating cyber-physical system (CPS) vulnerabilities using cloud and IoT architectures. Their proposed architecture, known as ANASTACIA, aimed to provide several security and privacy features for monitoring, evaluating, and analysing a wide range of cybersecurity threats. Also, authors in [19] proposed a trust-based decision-making protocol for an IoT-based healthcare model. The system design included a trust protocol running on an IoT devices to properly measure both data and source reliability in order to make an accurate decision for the user. In addition, the proposed trust protocol considered patient’s loss of health scores along with reliability of service providers to achieve more accurate decision-making. Their experimental results showed that the proposed model achieved higher decision ratio results when compared to other baseline protocols. Jebri et al. [20] proposed STAC protocol to ensure secure communication and trust management for IoT applications. The STAC protocol aimed to improve the Efficient Anonymous Communication (EAC) protocol by resolving issues such as the setup phase’s weaknesses. To ensure privacy, data are transmitted through an anonymous trusted node, where these nodes are identified and established anonymously. Their evaluation results demonstrated that the proposed protocol enhanced security and privacy communications compared with existing protocols.
3 Architecture of Proposed Trusted and Secure Telemedicine in IoT
Fig. 3 depicts an architecture outline of trusted and secure telemedicine model in IoT. The functional components in this research are restrict in the group of security function, which guarantees the privacy management and the system’s secure functioning. The group of security function includes factors that provide the following:
• Secure communications (assuring the integrity and confidentiality of messages) between system entities like devices, services, and applications and the privacy acknowledgement of sensitive data related to users.
• User’s authentication and permissions management to provide services access for users.
• Privacy methods include anonymizations of resource and service access (services could not identify which user used the data), anonymizations of gathered information, and unlinkability (An outside intruder could not detect the user by monitoring multiple requests executed by the same user).
Like computational systems, IoT adapters (gateways) provide networking interface for communicating with sensors (Bluetooth and ZigBee interface) and with the Internet via wireless or wired interfaces. The new gateway’s additional function may do preliminary data processing (pattern analysis, compression, and data filtering) before data is encrypted and transmitted to the Internet through an Ethernet network interface. It can have a 1 GHz ARM CPU and 512 MB of RAM and a full operating system including PKI (Public Key Infrastructure) tools like OpenSSL.
3.2 Authentication and Authorization
PKI is a feasible technique for data gathering because it provides an improved authentication level to transmit data in an increasingly insecure medium. In the environment of health care and IoT, a system that delivers patient-based data (body sensor measures) is the sole public key that could be utilized to decode data, and health monitoring applications could utilize the private key to decode data. The appropriate device authentication is accomplished by using PKI digital certificates that protect data transfer, as adopted [21]. Therefore, developing PKI in the context of IoT presents significant problems. Public key encryption necessitates a computational procedure that uses memory resources, which are not accessible in current wireless sensor technologies, specifically for constant data transmission like the cardiac signal. Because it requires less processing than PKI, symmetric encryption may secure communication among the system and IoT sensors.
3.3 Secure Communication: Algorithm and Architecture
The constant incorporation of prominent technologies like wireless communications and the cloud enables new ways of communication in the framework of the IoT. Although for IoT-based systems to realize their full potential, appropriate solutions to their security questions are required. The specific security issues concern secure communication among entities (user and environmental things). An IoT-based system node provides authentication and privacy solutions. It enables the gathering of patient signals and data. As a result, it employs data encryption, safe transmission methods, and control of user access to provide the critical privacy and security that health monitoring system demand. The proposed model incorporates protocols and security methods to satisfy the stated features (four stages).
In this work, a Multi-Authority Ciphertext-Policy Attributes-Based Encryption [22] was proposed to securely transport data while using fine-grained access control in IoT settings. The first phase is a digital solution integrating AES symmetrical encryption standard with MA-CPABE to solve MA-CPABE constraints such as resource needs and speed. Because MA-CPABE is assigned to unlimited devices, presuming that the devices are reliable, the user encodes data with AES and protects the ABE approach using solutions of symmetric key. Just entities with private key combined with the group of attributes matching data could access data matching and encode the symmetrical keys to acquire data in such a scenario. The proposed approach was split into four stages, as shown in Fig. 4. The mathematical symbols and annotations are summarized in Tab. 1. The following pseudocode depicts the proposed algorithm.
3.4 MA-CPABE and AES Algorithm
The proposed model is based on the sequential MA-CPABE model which performs certain work needed for parallelization process. The key generated using the proposed MA-CPABE and AES algorithm performs parallel processing, and these attributes are handled in an independent manner and the generated key is perfect for parallel processing and the sequential algorithm is completely partitioned and allocated with the data blocks. While processing those attributes and the outcomes require private key. Moreover, the model adopts some neutral approach, and the private key provides local attributes for processing. The major benefits of this approach are the spatial locality and reduced computational overhead. The communication and computation are attained to diminish the execution time.
4 The Proposed Energy Efficient Routing in WSN
One of the developing technologies is the WSN. It may be utilized for military purposes, environmental monitoring (i.e., climate change and natural catastrophes such as fires and floods), agriculture, transportation, and security. WSN sensor nodes are tiny electronic devices that are dispersed across the area of interest. Electronic devices have a processor to collect data and minimize memory consumption and RF circuits for communications. Above half of the entire energy in the sensor was used in WSN during communications [23]. Since then, the majority of research has concentrated on this essential element of the WSN. WSN communications focused on the transfer of gathered data among the sensor node and the destinations. All sensor nodes have a coverage limitation. This transmission is divided into two types: direct data transmission from source to destination and indirect transmissions (i.e., forwarding gathered data from a sensor node to a close sensor and finally delivering to the SN).
There are potentially many issues in wireless multi-hop network system design such as energy consumption and time consuming. Multi-hop transmission refers to moving data from a sensor to other till it reach the sink node (SN) [24]. Any sensor node can have many neighbors, and the sensor nodes were randomly placed within the coverage region. As a result of randomly distribution sensors, finding an appropriate sensor node for hopping becomes essential in terms of energy usage. A routing problem is how to choose an appropriate path for data transfer from the source to the sink node.
The sensor node plays a significant role in measuring pressure, temperature, movement, chemical, or other physical variables necessary for various applications in an aperiodic or periodic means. When the sensing element in the sensor node gathers this data, it saves it in its memory to process and short-term storage before delivering it to the SN. The SN is a type of node with a lot of computing power, radio frequency components, and storage [25]. The SN’s objective is to gather and process all data from adjacent sensor nodes. The numerous sensor nodes attempt to connect with this SN in the multi hop environment.
Sequential Assignment Routing (SAR) [26] was a routing protocol based on network structure. It was a QoS-based protocol designed to reduce energy usage while increasing fault tolerance. REEP [27] was a routing protocol based on data-centric that falls into the similar energy efficiency and stability category as REEP. Sensor network protocol with some standard hierarchical routing protocols that belong to the same category includes the Threshold sensitive energy-efficient sensor networks protocol (TEEN) [28], Low Energy Adaptive Clustering Hierarchy (LEACH) [29,30] algorithms were depended on the creation of a cluster and the selection of the cluster-head that was then liable for transferring data to the SN. Sensor Protocol for Information through Negotiations (SPIN) [31], Distributed Energy Adaptive Routing Algorithms (DEAR) [32] were examples of generic adaptive routing algorithms. In SPIN, sensors’ excess energy is taken into account for adaptive routing, but in DEAR, data traffic in sensor node is balanced decentralized to result in energy efficiency. Lately, the bio inspired routing approaches such as Ant Colony Optimizations (ACO) [33], Swarm Intelligences Optimizations Based Routing Algorithms [34], were investigated to reduce global energy consumption. Aside from this [35,36] propose cooperation-based routing systems.
An optimization issue to optimize network lifespan with numerous constraints was discussed in this part. WSN included many routing protocols, including shortest path algorithm to accurately route data from a sensor node to the appropriate destination. The shortest path algorithms like Dijkstra’s, Bellman–Ford’s, and Floyd–Warshall’s algorithms were familiar. Bellman–Ford method was utilized to calculate the shortest path in a WSN; however, Floyd-technique Warshall’s requires specific changes in a WSN [37,38]. Johnson’s algorithm is the shortest path algorithm that solves the shortest path issue for all pairings. The all-pairs shortest path problem accepts a graph with vertices and edges and returns the shortest path between any two vertices in that graph [39]. The Floyd–Warshall algorithm is extremely similar to Johnson’s algorithm. Nature-inspired routing methods, such as Ant Colony optimization, can also be employed. However, they frequently take suboptimal pathways and so do not ensure optimality.
Dijkstra’s method offers the advantages of being quicker, ensuring optimality, and having less computing complexity. Furthermore, they need a longer execution time. Dijkstra’s method was the algorithm of shortest path, with a modified computation metric applied among the nodes. It is utilized in this work with a modification based on the weight factor.
In WSN, the static sensors are randomly placed over the sensing field of 200 m × 200 m in the proposed design. The number of sensor nodes varies depending on the circumstance, ranging from 200 to 600. In the lower right corner of the provided space, a single SN is placed. It should be noticed that the sensor node’s energy usage. It is determined by the amount of data transferred and transmission distance. If the distance of propagation (d) exceeds the distance of threshold (d0), the radio communication exponent (usually written as ‘n’) is four; otherwise, it is two. For the practical WSN, it was presumed that not every link is similar (i.e., the transmission route among sensor nodes changes at random). This means that even if the two nodes were near enough to communicate, they might not have a perfect channel state. This might be caused by a hardware error in one node, channel noise conditions among nodes, or various factors. As a result, each connection is assigned a probability of uniform random reliability (
The sensor nodes operate in two modes, and its battery level determines the sensor’s mode of operation. The initial mode is transmission mode, and in this, the sensor nodes may only send its perceived data to the following adjacent node. If the level of the battery goes under 60% but exceeds 35% of its starting state, it will only work in transmission modes. The next mode is retransmission and reception mode, and in this, the sensor nodes can function as the relay by receiving the signals from a close sensor node and forwarding it to another node. It can function in retransmission and reception modes if the battery exceeds 60% of its starting battery. The sensor node is rendered inoperable if the battery goes under 20% of its starting level. Based on the received signal intensity, each node may calculate the distance to its neighbors [40,41].
4.3 Optimization Problem Formulation
WSN optimization problems are often multi-objective. WSN features such as reliability, energy consumption, energy efficiency, latency, QoS, etc., are optimized. This work primarily focuses on minimizing energy usage to enhance network lifetime. The optimization issue is affected by connection capacity, network throughput, residual energy, and the chance of connection failure. The proposed model intends to provide solution for multi-objective constraints. The optimization is to provide a global solution to establish secure communication among the network model. Hence, the objective function was provided as in Eq. (1).
where
Likewise, every connection got some capacities, and every node would meet this criterion as in Eq. (3).
where
The SN must not send data to any nodes, which is expressed as in following Eq. (5).
where set B includes every node considered the SN. In the provided region, there is just one SN for this work.
Every node could consume power that is minimum or equal to its remaining battery capacity. The battery power of
where
Johnson’s algorithm is a method for finding the shortest routes between any two vertices in a network, where the edges might have positive or negative weights. However, no negative-weight cycles are known to exist. It combines the Bellman–Ford and Dijkstra algorithms to discover the shortest routes rapidly. The procedure either provides a (n*n) matrix of shortest-path weights for all
The for loop in lines 9–12 computes the shortest routes weight
4.5 Tailored Johnson’s Algorithm
Consider, the graph is G and new vertex is added to the graph where the edges form the vertex to other vertices of G. Later, modify the graph as
Every simulation was executed on a Dell Power Edge C6321 server with two 2.5 GHz Intel Xeon E52680 v4 14-core processor running on Linux using MATLAB R2017a. The algorithms are performed five times, and the results were plotted using the average of the data instances acquired from the successive five iterations. Here, the k-value is set for successive iterations and it may be of any integer. Generally, investigators set as
This simulation section considers packets of different sizes to assess their effect on the WSN’s overall energy consumption and the total received packets by the SN at the end of experiment. For this, the number of sensors was 300, and all other characteristics are given in Tab. 2.
The total energy consumption related to packet size is tabulated in Tab. 3. As seen in Fig. 5, as the packets size grows from 300 to 1000, so does the network’s overall energy usage. Because the route was not changed till one packet transfer was completed, the nodes spend more energy.
Similarly, Tab. 4 represents the number of received packets related to packet size. Fig. 6 demonstrates that when the packet size grows from 200 to 1000, the number of packets received after the simulation falls considerably.
As a result, it is critical to correctly restrict packet size to improve network lifespan, which is directly connected to energy usage. It also allows the SN to accept additional packets with less energy, enhancing the network’s energy efficiency.
5.2 Number of Sensor Node’s Impact
This results section considers packets of different sizes to assess their influence on the WSN’s overall energy consumption and the received count of packets by the SN at the end of experiment.
Tab. 5 represents the tabulation of total energy consumption related to the number of sensor nodes. Fig. 7 illustrates that when the count of nodes for a particular area of WSN rises from 200 to 600, the overall consumption of energy of the WSN extends constantly.
As the total nodes in a particular region rises, the nodes are closer together, significantly reducing the energy needed for communication. To explain the rise in energy usage, the received number of packets by the SN must be examined. The number of packets received after the experiment rises exponentially as the number of sensor nodes increases as shown in Tab. 6. Fig. 8 demonstrates that the more nodes present, the greater the total packets that may be transmitted. It additionally implies that energy efficiency improves, despite the network’s overall energy consumption has grown.
To assess the effect of SN location, just the total packets received was examined as a function of the nodes’ Euclidean distance from the SN. The total sensor nodes were 300, and size of packet was 300 bits. The sensor field is divided into five zones: 0–20 m, 20–40 m, 40–80 m, 80–160 m, and 160–290 m.
According to Tab. 7, above half of the received packets totally at the SNs come from nodes within a Euclidean distance of 40 m of the SN. Fig. 9 represents the graphical representation of total received packets related to the Euclidean distance from the SN. Nodes located further from the SN contribute less, because these nodes are so far apart, they need a multi-hop method to communicate with the SN. When the relay nodes’ energy level falls below BT2, they no longer receive any packets from the distant nodes. In such a scenario, they will have to expend additional energy to connect with the SN.
This research proposes a new safe and trusted architecture for IoT-assisted telemedicine. Unlike any other previously presented IoT security paradigm, the approach implemented in this work provided security at both the communication connection and the endpoint through privacy management and user authentication. The simulation results demonstrated that the proposed approach overcomes Dijkstra’s, Bellman–Ford’s, and Floyd–Warshall’s approaches in relation to overall consumption of energy and received packets at the SN finally. The following observations are made based on the simulation results:
• Based on energy consumption, the total nodes increased from 200 to 600, and for a 300 bits packet size, the proposed model overcomes Dijkstra’s, Bellman–Ford’s, and Floyd–Warshall’s approaches by 12.25 percent (27.73 percent) to 9.24 percent (11.19 percent), individually.
• Based on the packets received at the SN, the proposed model overcomes Dijkstra’s, Bellman–Ford’s, and Floyd–Warshall’s approaches by 59.24 percent (16.23 percent) to 133.30 percent (36.26 percent) as the number of nodes rose from 200 to 600.
Overall, in terms of energy consumption and packets received related to the packet size and sensor nodes, the proposed model outperforms the compared models in every parameter as seen in results. In future, a privacy method can be examined by running several tests on real-world resource-constrained devices such as sensors. The data from various devices can be compared and studied in depth. Likewise, a more realistic energy consumption scenario will be examined, including energy consumptions by idle/stand-by/sleep modes, node sensing energy, and consumption of energy for retransmission if packets get lost/damaged.
Acknowledgement: The high-level security architecture and preliminary results of this paper have been presented in the following conference articles: [42,43].
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. J. Huang, X. Wu, W. Huang, X. Wu and S. Wang, “Internet of things in health management systems: A review,” International Journal of Communication, vol. 34, no. 4, pp. 1–19, 2020. [Google Scholar]
2. T. Haaker, P. Ly, N. Nguyen-Thanh and H. Nguyen, “Business model innovation through the application of the Internet-of-Things: A comparative analysis,” Journal of Business Research, vol. 126, no. 3, pp. 126–136, 2021. [Google Scholar]
3. A. Guqhaiman, O. Akanbi, A. Aljaedi and C. Edward Chow, “A survey on MAC protocol approaches for underwater wireless sensor networks,” IEEE Sensors, vol. 21, no. 3, pp. 3916–3932, 2020. [Google Scholar]
4. A. Nauman, M. Jamshed, R. Ali, K. Cengiz, K. Zulqarnain et al., “Reinforcement learning-enabled intelligent device-to-device (I-D2D) communication in Narrowband Internet of Things (NB-IoT),” Computer Communications, vol. 176, no. 3, pp. 13–23, 2021. [Google Scholar]
5. M. Frustaci, P. Pace, G. Aloi and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, 2018. [Google Scholar]
6. K. Sha, R. Errabelly, W. Wei, T. A. Yang and Z. Wang, “EdgeSec: Design of an edge layer security service to enhance IoT security,” in 2017 IEEE 1st Int. Conf. on Fog and Edge Computing (ICFEC), Madrid, Spain, pp. 81–88, 2017. [Google Scholar]
7. A. Pawar and S. Ghumbre, “A survey on IoT application, security challenge and counter measure,” in 2016 Int. Conf. on Computing, Analytics and Security Trends (CAST), Pune, India, pp. 294–299, 2017. [Google Scholar]
8. J. Awotunde, A. Adeniyi, R. Ogundokun, G. Ajamu and P. Adebayo, “MIoT-based big data analytic architectures, opportunities and challenge for enhanced telemedicine system,” in Enhanced Telemedicine and e-Health: Advanced IoT Enabled Soft Computing Frameworks, Springer, Cham, vol. 410, pp. 199–220, 2021. [Google Scholar]
9. M. Yamin and B. Alyoubi, “Adoption of telemedicine application among Saudi citizens during COVID-19 pandemic: An alternative health delivery system,” Journal of Infections and Public Health, vol. 13, no. 12, pp. 1845–1855, 2020. [Google Scholar]
10. M. Abdellatif and W. Mohamed, “Telemedicine: An IoT based remote health care systems,” Int. Journal of Online & Biomedical Engineering, vol. 16, no. 6, pp. 72–81, 2020. [Google Scholar]
11. S. Rehan, F. Khan and F. Saleem, “Internet of Things in telemedicine: A discussion regarding to several implementations,” Journal of Information Communications Technologies and Robotic Application, vol. 10, pp. 17–26, 2018. [Google Scholar]
12. M. Hasanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas et al., “Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenge,” in IEEE Int. Conf. on Service Computing, New York, USA, pp. 286–293, 2015. [Google Scholar]
13. A. Ramtin, P. Nain, D. Menasche, D. Towsley and E. Silva, “Fundamental scaling laws of covert DDoS attacks,” Performance Evaluation, vol. 151, no. 2, pp. 1–24, 2021. [Google Scholar]
14. A. Ramtin, D. Towsley, P. Nain, E. Silva and D. Menasche, “Are covert DDoS attacks facing multi-feature detectors feasible?,” ACM SIGMETRICS Performance Evaluation Review, 2021. [Google Scholar]
15. A. Westling, “The Korean demilitarized zones (DMZ) as bridge between two Koreas,” in Participant Paper 2010: A World Without Walls, Berlin, Germany, 2010. [Google Scholar]
16. J. Holler, V. Tsiatsis, C. Mulligan, S. Avesand and D. Boyle, From machines-to-machines to the Internet of Thing: Introduction to new age of intelligences. Amsterdam, Netherlands, Elsevier, 2014. [Google Scholar]
17. X. Zhang and N. Zhang, “An open, secured and flexible platforms based on IoT and cloud computing for ambient aiding living and telemedicine,” in 2011 Int. Conf. on Computer and Management (CAMAN), Wuhan, China, pp. 1–4, 2011. [Google Scholar]
18. S. Ziegler, A. Skarmeta, J. Bernal, E. E. Kim and S. Bianchi, “ANASTACIA: Advanced networked agent for security and trust assessments in CPS IoT architecture,” in 2017 Global Internet of Things Summit, Geneva, Switzerland, pp. 1–6, 2017. [Google Scholar]
19. H. Al-Hamadi and I. R. Chen, “Trust-based decisions making for health IoT system,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1408–1419, 2017. [Google Scholar]
20. S. Jebri, M. Abid and A. Bouallegue, “STAC-protocol: Secured and trust anonymous communications protocol for IoT,” in 2017 13th Int. Wireless Communication and Mobile Computing Conf., Valencia, Spain, pp. 366–371, 2017. [Google Scholar]
21. C. Douklas, I. Maglogianis, V. Kouffi, F. Malammateniou and G. Vassilacopoulos, “Enabling data protections though pki encryptions in IoT m-health device,” in 2012 IEEE Int. Conf. on Bioinformatics & Bioengineering, Larnaca, Cyprus, pp. 25–29, 2012. [Google Scholar]
22. J. Bethencourt, A. Sahai and B. Waters, “Ciphertexts-policy attribute-based encryptions,” in 2007 IEEE Symp. on Security and Privacy, Berkeley, CA, USA, pp. 321–334, 2007. [Google Scholar]
23. M. Halgamuge, M. Zukerman, K. Ramamohanarao and H. Vu, “An estimation of sensors energy consumptions,” Progresses in Electromagnetic Research B, vol. 13, pp. 258–294, 2009. [Google Scholar]
24. J. Dai, K. Ishibashi and Y. Yamao, “Highly efficient multi-hop packet transmission using intra-flow interference cancellation and maximal-ratio combining,” IEEE Transactions on Wireless Communication, vol. 14, no. 11, pp. 5998– 6011, 2015. [Google Scholar]
25. N. Iliev and I. Paprotny, “Review and comparison of spatial localization methods for low-power wireless sensor networks,” IEEE Sensors Journal, vol. 15, no. 10, pp. 5971–5987, 2015. [Google Scholar]
26. K. Sohrabhi, J. Ghao, V. Ailawadi and G. J. Potie, “Protocol for self-organizations of wireless sensor networks,” IEEE Personal Communication, vol. 6, no. 4, pp. 17–28, 2000. [Google Scholar]
27. N. Sharma, I. Kaushik, N. Singh and R. Kumar, “Performance measurement using different shortest path techniques in wireless sensor network,” in 2019 2nd Int. Conf. on Signal Processing and Communication (ICSPC), Tamil Nadu, India, pp. 295–299, 2019. [Google Scholar]
28. A. Manjeswar and D. P. Agarwal, “TEEN: A routing protocol for enhanced efficiency in wireless sensor networks,” in Int. Workshop on Parallels and Distributed Processing Symp., San Francisco, California, USA, pp. 2009–2015, 2001. [Google Scholar]
29. W. Heinzelmann, A. Chandhrakasan and H. Balakrishna, “Energy efficient communications protocols for wireless microsensors network,” in Proc. of Annual Hawaii’s Int. Conf. on Systems Science, Hawaii, USA, pp. 10–15, 2000. [Google Scholar]
30. W. Heinzelmann, A. P. Chandhrakasan and H. Balakrishna, “An application-specific protocols architectures for wireless microsensors network,” IEEE Transactions on Wireless Communications, vol. 11, no. 4, pp. 661–671, 2002. [Google Scholar]
31. W. Heinzelmann, J. Kulik and H. Balakrishna, “Adaptive protocols for information disseminations in wireless sensor network,” in Proc. of the 5th Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking, Seattle Washington, USA, pp. 174–185, 1999. [Google Scholar]
32. C. Ok, P. Mithra, S. Lei and S. Kumar, “Distributed energy adaptive routings for wireless sensors network,” in IEEE Int. Conf. on Automations Sciences and Engineering, Arizona, USA, pp. 906–911, 2007. [Google Scholar]
33. J. Zhang, J. Yu, Z. Si-Wang and Y. Lin, “A survey on positions-based routings algorithm in wireless sensors network,” Algorithms, vol. 3, no. 11, pp. 159–183, 2009. [Google Scholar]
34. C. Whang and Q. Lee, “Swarm intelligences optimizations based routing algorithms for wireless sensors network,” in Int. Conf. on Neural Network and Signals Processing, Nanjing, China, pp. 137–142, 2008. [Google Scholar]
35. J. Habib, A. Grayeb and A. G. Aghadam, “Energy efficient cooperatives routings in wireless sensors network: A mixed integers optimizations frameworks and explicit solutions,” IEEE Transactions on Communications, vol. 62, no. 9, pp. 3425–3438, 2013. [Google Scholar]
36. H. Garavi and B. Hou, “Cooperatives diversity routings and transmissions for wireless sensors network,” IET Wireless Sensor Systems, vol. 13, no. 3, pp. 278–289, 2013. [Google Scholar]
37. P. Khaan, G. Khonar and N. Chakraborrty, “Modifications of Floyd Warshall algorithms for shortest paths routings in wireless sensors network,” in Annual IEEE Indian Conf., Pune, India, pp. 1–7, 2014. [Google Scholar]
38. M. Umalae and S. D. Markhande, “Energy-efficient routings algorithms on the targets tracking in wireless sensors networks,” in Int. Conf. on Information Process, Pune, India, pp. 176–181, 2015. [Google Scholar]
39. M. Okwu and I. Emovon, “Application of Johnson’s algorithm in processing jobs through two-machine system,” Journal of Mechanical and Energy Engineering, vol. 4, no. 1, pp. 33–38, 2020. [Google Scholar]
40. A. Seyedi and B. Sikdar, “Energy efficient transmission strategies for body sensor networks with energy harvesting,” IEEE Transactions on Communications, vol. 58, no. 7, pp. 2116–2126, 2010. [Google Scholar]
41. R. Wu, M. Chen, Y. Su and H. J. Siddiqui, “A novel location-based routing algorithm for energy balance in wireless sensor networks,” in 2009 WRI Int. Conf. on Communications and Mobile Computing, Yunnan, China, pp. 568–572, 2009. [Google Scholar]
42. U. Albalawi and S. Joshi, “Secure and trusted telemedicine in Internet of Things,” in Proc. of IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, pp. 30–34, 2018. [Google Scholar]
43. J. Joshi and U. Albalawi, “Energy efficient routing considering link robustness in wireless sensor networks,” in Proc. of the IEEE Int. Conf. on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India, pp. 3116–3120, 2017. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |