Professional Documents
Culture Documents
11) 489
1 Introduction
Nowadays, IoT is becoming one of the hottest research
topics. IoT describes the future, where every day phys-
ical objects will connect to the Internet and be able to
identify themselves to each others [19]. Hence, the IOT Figure 1: The framework protocols for IoT based
realizing smart environments such as: smart living, smart healthcare
home, smart manufacturing, and smart healthcare appli-
cations. Due to the spread of chronic diseases and ris-
ing the cost of traditional healthcare application around The main objective of internet of things based health-
the world; so it urgently demand transform the health- care application is enhancing the interaction of device-to-
International Journal of Network Security, Vol.20, No.3, PP.489-495, May 2018 (DOI: 10.6633/IJNS.201805.20(3).11) 490
4 Problem Formulation
Let zt be set of patient sensors values acquired at time t.
5.1.1 Digital Environment Module search hypothesis space of all the possible weights, the
GA will generate new points of the possible solutions.
The digital environment module represented by the Ar-
Therefore, The mathematical description of AN N − GA
duino U N O Board and some medical sensors such as:
as follows:
Body temperature sensor, and pulse sensor, etc., which m
Yi = F (Σi=0 Wi × Xi + b) (4)
measure some variables, such as: blood pressure, temper-
ature, and heart rate, etc.. Then the values will gathered Where,
to create a database as shown in Figure 3.
• Xi : is input variable associated with each node.
False positives (FP): refer to the number of normal 6.3 Energy-Saving Transmission Effi-
events being predicted as abnormal. ciency Analysis
False negatives (FN): The number of abnormal events The nodes in the IoT − T D base healthcare application
are incorrectly predicted as normal. are usually battery energy hence; energy is a scarce re-
International Journal of Network Security, Vol.20, No.3, PP.489-495, May 2018 (DOI: 10.6633/IJNS.201805.20(3).11) 494
Table 6: Testing accuracy and timing comparison anism at both local data processing and remote doctor
workstation. Where, GA with AN N will produce a hy-
System Test accuracy Model building Time
IOT-C4.5 76.66% 0.06 sec. brid neural network. So, the weights of AN N are calcu-
Proposed IOT-ANN-GA 98.51% 0.03 sec. lated using GA algorithm. From all possible weights of
search space, the GA will generate new points of possible
Table 7: Comparative analysis between the proposed solutions. Which implies that, it possible to optimize the
model and other approaches AN N by modifying the structure of weights calculation.
Hence, (AN N − GA) T D mechanism leads to maximize
Feature [3] [5] Proposed the T D accuracy, minimize the detection timing and effi-
IoT-based X X X ciency energy saving.
TD-based × × X Also, 6LoW P AN in data link layer security which is
Coap × × X responsible for the encryption and authentication of the
Topology Star Mesh Full Duplex links. 6LOW P AN provides secure data packets delivery.
Mesh besides, in the transport layer the proposed model use
Security Basic AES Block AES-128, U DP over DT LS mechanisms that could also be used
DTLS, WPA2 for CoAP security, in order to save the communications
Energy between the objects. Furthermore, the IEEE 802.15.4
Efficiency × X X standard has many security protocols, such as the W i−F i
802.15.4 × X X Protected Access W P A2 which provides data integrity,
Scalability High Low High confidentiality and authentication.
Adaptability High High High
7 Conclusions
source. Here, this paper compared the transmission ef-
ficiency every 5-minutes according to different abnormal This paper proposed a new IOT − T D model which em-
patient ratios with ”full transmission” and ”energy-saving ploys (AN N − GA) T D mechanism for secure the sen-
transmission”. In the energy-saving transmission mode, sitive information in healthcare applications. Therefore,
data is transmitted to the remote doctor workstation AN N − GA can be used to satisfy the security require-
module in a 32- byte package at a 5-minute interval. In ments of IoT-networks environment. According to the pri-
the full transmission mode, data is transmitted contin- mary and earlier experiments, the proposed AN N − GA
uously at a 1-second interval. In total, the size of con- mechanism achieved 98.51% T D rate, which can be con-
tinuous data transmitted over 5-minutes is 57,652 bytes sidered as the best tamper detection rate compared with
(12 bits ∗ 128/sec ∗ 300s + 20 bytes of package f ield + the C4.5 algorithm which achieved 76.66%. Also, the pro-
32 bytes of AN N − GA result). A twenty-four hour posed AN N − GA mechanism enhances the timing detec-
of data-set is emulated using 288 every five-minute data tion to 0.03 sec compared with the C4.5 algorithm which
sets. The normal ratio is defined as the percentage of achieved 0.06 sec and efficiency energy saving which is im-
normal AN N − GA results analyzed by the multi-pattern portant for the real-time IOT − T D model of healthcare
abnormal disease matching in the remote doctor work- applications.
station module. Once the AN N − GA parameters are
transmitted to the remote doctor workstation module,
they are analyzed to decide whether to transmit the Acknowledgments
raw data. For instance, if the normal ratio is 80%, the
twenty-four hour energy-saving transmission transmits The author gratefully acknowledge the editor and the
288 ∗ 32 bytes + 57652 bytes ∗ 288 ∗ (1 − 80%) = 3.176 M b, anonymous reviewers for their valuable comments.
and the efficacy is 15.84 M b/3.176M b = 4.99. Suppose
that 100% normal patterns can be detected from the pa-
tients; the transmission efficiency is then 1980 times. It References
is useful when analysis a huge amount of data such in
healthcare application as shown in Table 8. [1] R. Aarthi, A. R. Renold, “Coap based acute parking
lot monitoring system using sensor networks,” IC-
6.4 Security Analysis TACT Journal On Communication Technology: Spe-
cial Issue on Advances In Wireless Sensor Networks,
The security of the proposed model ”IoT − T D” is an vol. 5, no. 2, pp. 923–928, 2014.
important issue for healthcare application. Where as the [2] A. Alsadhan, N. Khan, “A proposed optimized and
healthcare information is very sensitive and the internet efficient intrusion detection system for wireless sensor
will never be safe. So, this section is going to discuss the network,” International Journal of Electrical, Com-
security architecture of the proposed model in each layer. puter, Energetic, Electronic and Communication En-
This paper propose (AN N − GA) T D efficient mech- gineering, vol. 7, no. 12, 2013.
International Journal of Network Security, Vol.20, No.3, PP.489-495, May 2018 (DOI: 10.6633/IJNS.201805.20(3).11) 495
[3] S. R. Anurag, A. M. Rahmani, T. Westerlund, [14] S. P. Mohanty, U. Choppali, and E. Kougianos, “Ev-
G. Yang, P. Liljeberg, H. Tenhunen, “Pervasive erything you wanted to know about smart cities,” in
health monitoring based on internet of things: Two IEEE Consumer Electronics Magazine, vol. 5, no. 3,
case studies,” in EAI 4th International Conference pp. 60-70, 2016.
omn Wireless Mobile Communication and Healthcare [15] P. Pongle, G. Chavan, “A survey: Attacks on RPL
(Mobihealth’14), pp. 275-278, 2014. and 6LoWPAN in IoT,” in IEEE International Con-
[4] A. A. Elngar, D. A. El A. Mohamed, F. M. Ghaleb, ference on Pervasive Computing (ICPC’15), 2015.
“A fast accurate network intrusion detection sys- [16] J. R. Quinlan, C4.5 Programs for Machine Learning,
tem,” International Journal of Computer Science Morgan Kaufmann San Mateo Ca, 1993.
and Information Security, vol. 10, no. 9, Sept. 2012. [17] E. Raptopoulou, CoAP Enabled Sensors for the In-
[5] T. N. Gia, A. M. Rahmani, T. Westerlund, P. Lilje- ternet of Things, Department of Applied Informatics
berg, H. Tenhunen, “Fault tolerant and scalable IoT- and Multimedia, Technological Educational Institute
based architecture for health monitoring,” in IEEE of Crete, 2014.
Sensors Applications Symposium (SAS’15), pp. 1-6, [18] W. L. Tai, Y. F. Chang, “Comments on a secure
2015. authentication scheme for IoT and cloud servers,”
[6] J. He, C. Hu,, and X. Wang, “A smart device enabled International Journal of Network Security, vol. 19,
system for autonomous fall detection and alert,” In- no. 4, pp. 648-651, 2017.
ternational Journal of Distributed Sensor Networks, [19] L.M.R. Tarouco, L.M. Bertholdo, L.Z. Granville, and
vol. 1, 2016. L.M.R. Arbiza, “Internet of things in healthcare: In-
[7] C. Jun, C. Chi, “Design of complex event-processing teroperatibility and security issues,” in IEEE Inter-
IDS in internet of things,” in IEEE Sixth Inter- national Conference on Communications, pp. 621-
national Conference on Measuring Technology and 6125, 2012.
Mechatronics Automation, 2014. [20] G. Wang, J. Hao, J. Ma and L. Huang , “A new
approach to intrusion detection using artificial neural
[8] P. Kasinathan, et al., “Denial-of-service detection
networks and fuzzy clustering,” Expert Systems with
in 6LoWPAN based internet of things,” in IEEE
Applications, vol. 37, pp. 6225-6232, 2010.
9th International Conference on Wireless and Mo-
[21] D. Xu, Z. Wu, Z. Wu, Q. Zhang, L. Qin, J. Zhou,
bile Computing, Networking and Communications
“Internet of things: Hotspot-based discovery service
(WiMob’13), 2013.
architecture with security mechanism,” International
[9] H. Kayarkar, “Classification of various security tech-
Journal of Network Security, vol. 17, no. 2, pp. 208-
niques in databases and their comparative analysis,”
216, 2015.
ACTA Technica Corviniensis, vol. 5, pp. 135-138,
[22] Y. Ye, Y. He, Y. Wang, “SHVC, the scalable exten-
2012.
sions of HEVC and its applications,” ZTE Commu-
[10] M. Kovatsch, “CoAP for the web of things: nications, vol. 14, no. 1, 2016.
From tiny resource-constrained devices to the web
browser,” in Proceedings of ACM Conference on Per-
vasive and Ubiquitous Computing Adjunct Publica- Biography
tion, pp. 1495-1504, 2013.
[11] Y. Ma, “NFC communications-based mutual authen- Ahmed A. Elngar graduated with a B.Sc. in com-
tication scheme for the internet of things,” Interna- puter Science from computer science Department, Al-
tional Journal of Network Security, vol. 19, no. 4, pp. Azhar University, Master of computer science in Intru-
631-638, 2017. sion Detection System (IDS) from Ain Shanm university.
[12] S. R. Maynard, H. Thapliyal, and A. Caban-Holt, He obtains his P.hD at computer science Department, Al-
“Smart home system for patients with mild cogni- Azhar University. Also he is a member in Egyptian Math-
tive impairment,” in Proceedings of the 2015 Inter- ematical Society (EMS) and International Rough Set So-
national Conference on Computational Science and ciety(IRSS). Now he is a member of Scientific Research
Computational Intelligence, pp. 738-742, 2015. Group in Egypt (SRGE). He is Asst. Prof. of computer
[13] A. Mayzaud, R. Badonnel, and I. Chrisment, “A tax- scienceat Faculty of Computer and Information, Beni-
onomy of attacks in RPL-based internet of things,” Suef University.
International Journal of Network Security, vol. 18,
no. 3, pp. 459-473, May 2016.