Skip to main content
Top
Published in: Journal of Medical Systems 5/2019

01-05-2019 | Mobile & Wireless Health

Adaptive Risk Prediction and Anonymous Secured Communication in MANET for Medical Informatics

Authors: Naveena Ambidi, Rama Linga Reddy Katta

Published in: Journal of Medical Systems | Issue 5/2019

Login to get access

Abstract

Location-based services (LBS) and information security is a major concern in communication system.With the increasing popularity of location based services more attention is paid to preserve location information to protect the data. In order to protect and preserve the MANET and location based services, there are various existing location based anonymity protocols such as k-anonymity location based, but these protocols are more overhead due to the dynamic mobility nature of ad-hoc networks. In this paper we proposed an Adaptive Risk Prediction and Anonymous Secured Communication protocol to predict the risk before processing anonymous communication. The proposed protocol estimates the risk against adjacent nodes and estimates the vulnerability paths using hidden markov model and decision tree. The decision tree determines the evidence to identify the trusted paths. The anonymous communication message authentication scheme assigns the anonymous communication and organize the secured authentication scheme. We simulated the network by considering different attacks to determine the efficiency of Adaptive Risk Prediction and Anonymous Secured Communication using NS2 simulator.
Literature
1.
go back to reference Koh, J. Y., Nevat, I., Leong, D., and Wong, W.-C., Geo-spatial location spoofing detection for Internet of Things. IEEE Internet Things J. 3(6):971–978, 2016.CrossRef Koh, J. Y., Nevat, I., Leong, D., and Wong, W.-C., Geo-spatial location spoofing detection for Internet of Things. IEEE Internet Things J. 3(6):971–978, 2016.CrossRef
2.
go back to reference Wang, C., Lin, H., and Jiang, H., CANS: Towards congestion-adaptive and small stretch emergency navigation with wireless sensor networks. IEEE Trans. Mobile Comput. 15(5):1077–1089, 2016.CrossRef Wang, C., Lin, H., and Jiang, H., CANS: Towards congestion-adaptive and small stretch emergency navigation with wireless sensor networks. IEEE Trans. Mobile Comput. 15(5):1077–1089, 2016.CrossRef
3.
go back to reference Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., and Vaccarelli, A., Seas, a secure e-voting protocol: Design and implementation. Comput. Secur. 24(8):642–652, 2005.CrossRef Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petrocchi, M., and Vaccarelli, A., Seas, a secure e-voting protocol: Design and implementation. Comput. Secur. 24(8):642–652, 2005.CrossRef
4.
go back to reference Shepard, S. S., Dong, R., Kresman, R., and Dunning, L., Anonymous id assignment and opt-out. In: Ao, S., Gleman, L. (Eds), Lecture notes in electrical engineering. New York: Springer, 2010, 420–431. Shepard, S. S., Dong, R., Kresman, R., and Dunning, L., Anonymous id assignment and opt-out. In: Ao, S., Gleman, L. (Eds), Lecture notes in electrical engineering. New York: Springer, 2010, 420–431.
5.
go back to reference Zhao, Z., Hu, H., Ahn, G.-J., and Wu, R., Risk-aware response for mitigating MANET routing attacks. IEEE Transactions on Dependable and Secure Computing 9(2), 2012. Zhao, Z., Hu, H., Ahn, G.-J., and Wu, R., Risk-aware response for mitigating MANET routing attacks. IEEE Transactions on Dependable and Secure Computing 9(2), 2012.
6.
go back to reference Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., and Jiang, H., ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J. 5(2), 2018. Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., and Jiang, H., ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J. 5(2), 2018.
7.
go back to reference Cui, J., Wen, J., Han, S., and Zhong, H., Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network, 2327–4662 (c) IEEE, 2018. Cui, J., Wen, J., Han, S., and Zhong, H., Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network, 2327–4662 (c) IEEE, 2018.
9.
go back to reference Sarathamani, T., and Babu, D. M. R., Robust and secure anonymity based routing protocol in manet. Journal of Advanced Research in Dynamical and Control Systems 9(6), 2017. Sarathamani, T., and Babu, D. M. R., Robust and secure anonymity based routing protocol in manet. Journal of Advanced Research in Dynamical and Control Systems 9(6), 2017.
10.
go back to reference Xia, H., Li, Z., Zheng, Y., Liu, A., Choi, Y.-J., and Sekiya, H., A novel light-weight subjective trust inference framework in MANETs, IEEE transactions on sustainable computing, manuscript tsusc-2017-07-0063. Xia, H., Li, Z., Zheng, Y., Liu, A., Choi, Y.-J., and Sekiya, H., A novel light-weight subjective trust inference framework in MANETs, IEEE transactions on sustainable computing, manuscript tsusc-2017-07-0063.
11.
go back to reference Cai, F., Ming, L., Jing, C., Li, Z., and Liu, X., A projection pursuit based risk assessment method in mobile ad hoc networks. International Journal of Computational Intelligence Systems 4(5):749–758, 2011.CrossRef Cai, F., Ming, L., Jing, C., Li, Z., and Liu, X., A projection pursuit based risk assessment method in mobile ad hoc networks. International Journal of Computational Intelligence Systems 4(5):749–758, 2011.CrossRef
12.
go back to reference Liu, A., Joy, A., and Thompson, R., A dynamic trust model for mobile ad hoc networks. In: Proceedings of 10th IEEE Int'l Workshop Future Trends Of Distributed Computing Systems (Ftdcs '04), 80–85, 2004. Liu, A., Joy, A., and Thompson, R., A dynamic trust model for mobile ad hoc networks. In: Proceedings of 10th IEEE Int'l Workshop Future Trends Of Distributed Computing Systems (Ftdcs '04), 80–85, 2004.
13.
go back to reference Dai, H., Jia, Z., and Kin, Z., Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs. Journal of Software 4(10):1091–1101, 2009.CrossRef Dai, H., Jia, Z., and Kin, Z., Trust evaluation and dynamic routing decision based on fuzzy theory for MANETs. Journal of Software 4(10):1091–1101, 2009.CrossRef
14.
go back to reference Zhang, Y., and Lee, W., Intrusion detection in wireless ad-hoc networks. In: Proceedings of the sixth annual international conference on mobile computing and networking, Boston, 2000. Zhang, Y., and Lee, W., Intrusion detection in wireless ad-hoc networks. In: Proceedings of the sixth annual international conference on mobile computing and networking, Boston, 2000.
15.
go back to reference Bhargava, S., and Agrawal, D., Security enhancements in AODV protocol for wireless ad hoc networks. Proceedings of Vehicular Technology Conference (VTC) Fall, 4:2143–2147, 2001. Bhargava, S., and Agrawal, D., Security enhancements in AODV protocol for wireless ad hoc networks. Proceedings of Vehicular Technology Conference (VTC) Fall, 4:2143–2147, 2001.
16.
go back to reference Mishra, A., Nadkarni, A., and Patcha, A intrusion detection in wireless adhoc networks. IEEE Wirel. Commun. 11(1):48–60, 2004.CrossRef Mishra, A., Nadkarni, A., and Patcha, A intrusion detection in wireless adhoc networks. IEEE Wirel. Commun. 11(1):48–60, 2004.CrossRef
17.
go back to reference Takagi, H., and Kleinrock, L., Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Trans. Commun. 32(3):246–257, 1984.CrossRef Takagi, H., and Kleinrock, L., Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Trans. Commun. 32(3):246–257, 1984.CrossRef
18.
go back to reference Cao, Y., and Xie, S. A position based beaconless routing algorithm for mobile ad hoc networks. Proceedings of the International Conference on Communications, Circuits and Systems 1(1):303–307, 2005. Cao, Y., and Xie, S. A position based beaconless routing algorithm for mobile ad hoc networks. Proceedings of the International Conference on Communications, Circuits and Systems 1(1):303–307, 2005.
19.
go back to reference Giruka, V., and Singhal, M., Angular routing protocol for mobile ad-hoc networks. IEEE international conference on distributed computing systems workshops. Columbus, OH. 2005. Giruka, V., and Singhal, M., Angular routing protocol for mobile ad-hoc networks. IEEE international conference on distributed computing systems workshops. Columbus, OH. 2005.
20.
go back to reference Bing, W. U. et al., Network-based malcode detection technology. J. Commun.:87–91, 2007. Bing, W. U. et al., Network-based malcode detection technology. J. Commun.:87–91, 2007.
21.
go back to reference Ritchey, R. W et al., Using model checking to analyze network vulnerabilities. IEEE Conference on Security and Privacy, 2000. Ritchey, R. W et al., Using model checking to analyze network vulnerabilities. IEEE Conference on Security and Privacy, 2000.
22.
go back to reference Beaudoin, L. et al., Asset valuation technique for network management and security. IEEE Conference on Data Mining Workshops, 2006. Beaudoin, L. et al., Asset valuation technique for network management and security. IEEE Conference on Data Mining Workshops, 2006.
23.
go back to reference Shen, D. et al., Adaptive Markov game theoretic data fusion approach for cyber network defense. IEEE Conference on Military Communications, 2007. Shen, D. et al., Adaptive Markov game theoretic data fusion approach for cyber network defense. IEEE Conference on Military Communications, 2007.
24.
go back to reference Cardenas, A. A., Ramezani, V., and Baras, J. S., HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs, U.S. Army Research Office under Award No. DAAD19–01-1-0494 t Cardenas, A. A., Ramezani, V., and Baras, J. S., HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs, U.S. Army Research Office under Award No. DAAD19–01-1-0494 t
25.
go back to reference Estahbanati, M. M., Rasti, M., and Hamami, S. M. S., A mobile ad hoc network routing based on energy and Markov chain trust Estahbanati, M. M., Rasti, M., and Hamami, S. M. S., A mobile ad hoc network routing based on energy and Markov chain trust
26.
go back to reference Das, S., Mukhopadhyay, A., Saha, D., and Sadhukhan, S., A Markov-Based model for information security risk assessment in healthcare MANETs. Springer Science+Business Media, LLC, 2017. Das, S., Mukhopadhyay, A., Saha, D., and Sadhukhan, S., A Markov-Based model for information security risk assessment in healthcare MANETs. Springer Science+Business Media, LLC, 2017.
27.
go back to reference Kannan, A., Sathiyamoorthy, E., A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system. In: International Journal of Internet Technology and Secured Transactions Vol 6, no: 186, 2016.CrossRef Kannan, A., Sathiyamoorthy, E., A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system. In: International Journal of Internet Technology and Secured Transactions Vol 6, no: 186, 2016.CrossRef
28.
go back to reference Cayirci, E., Ghergherehchi, R., Modeling cyber attacks and their effects on decision process. Proceedings of the 2011 Winter Simulation Conference. Cayirci, E., Ghergherehchi, R., Modeling cyber attacks and their effects on decision process. Proceedings of the 2011 Winter Simulation Conference.
30.
go back to reference Lu, H., Li, J., and Guizani, M., Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3):750–761, 2014.CrossRef Lu, H., Li, J., and Guizani, M., Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3):750–761, 2014.CrossRef
Metadata
Title
Adaptive Risk Prediction and Anonymous Secured Communication in MANET for Medical Informatics
Authors
Naveena Ambidi
Rama Linga Reddy Katta
Publication date
01-05-2019
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2019
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-019-1231-7

Other articles of this Issue 5/2019

Journal of Medical Systems 5/2019 Go to the issue