Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcareopen access

Authors
Hosseinzadeh, MehdiMohammed, Adil HusseinRahmani, Amir MasoudA. Alenizi, FarhanZandavi, Seid MiadYousefpoor, EfatAhmed, Omed HassanHussain Malik, MazharTightiz, Lilia
Issue Date
Oct-2023
Publisher
PUBLIC LIBRARY SCIENCE
Citation
PLOS ONE, v.18, no.10
Journal Title
PLOS ONE
Volume
18
Number
10
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/89484
DOI
10.1371/journal.pone.0290119
ISSN
1932-6203
Abstract
Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is really critical because health data of individuals must be forwarded to the destination securely to avoid unauthorized access by malicious nodes. However, biosensors have limited resources, especially energy. Recently, energy-efficient solutions have been proposed. Nevertheless, designing lightweight security mechanisms has not been stated in many schemes. In this paper, we propose a secure routing approach based on the league championship algorithm (LCA) for wireless body sensor networks in healthcare. The purpose of this scheme is to create a tradeoff between energy consumption and security. Our approach involves two important algorithms: routing process and communication security. In the first algorithm, each cluster head node (CH) applies the league championship algorithm to choose the most suitable next-hop CH. The proposed fitness function includes parameters like distance from CHs to the sink node, remaining energy, and link quality. In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. Also, we utilize an asymmetric cryptography scheme for forming secure inter-cluster connections. Network simulator version 2 (NS2) is used to implement the proposed approach. The simulation results show that our method is efficient in terms of consumed energy and delay. In addition, our scheme has good throughput, high packet delivery rate, and low packet loss rate.
Files in This Item
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher TIGHTIZ, LILIA photo

TIGHTIZ, LILIA
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE