Cyber Security and Applications最新文献

筛选
英文 中文
Authentication, access control and scalability models in Internet of Things Security–A review 物联网安全中的身份验证、访问控制和可扩展性模型--综述
Cyber Security and Applications Pub Date : 2024-04-14 DOI: 10.1016/j.csa.2024.100057
M Kokila, Srinivasa Reddy K
{"title":"Authentication, access control and scalability models in Internet of Things Security–A review","authors":"M Kokila,&nbsp;Srinivasa Reddy K","doi":"10.1016/j.csa.2024.100057","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100057","url":null,"abstract":"<div><p>The Internet of Things (IoT) leads to the next phase of human interaction with technology. With the help of the IoT, physical objects can be given the ability to generate, receive, and seamlessly trade data with one another. The IoT includes a wide variety of applications, each of which focuses on automating a specific task and works to give inanimate objects the ability to act independently of human intervention. The currently available and upcoming IoT applications hold a great deal of promise for enhancing the level of convenience, productivity, and automation enjoyed by users. High levels of security, privacy, authentication, and the ability to recover from attacks are required for the implementation of such a world in a manner that is constantly expanding. In this light, it is necessary to make the necessary adjustments to the architecture of IoT applications to accomplish end-to-end security in IoT environments. In this article, a comprehensive review of the security-related challenges and potential sources of danger posed by IoT applications is provided. Following a discussion of security concerns, a variety of new and established technologies that are focused on achieving a high degree of trust in the applications of the IoT are covered. Machine learning, fog computing, edge computing, and blockchain are just a few of the technologies that help the IoT provide greater security.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100057"},"PeriodicalIF":0.0,"publicationDate":"2024-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000237/pdfft?md5=8fa317b32e24d44f6351a63506f93d8a&pid=1-s2.0-S2772918424000237-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings 驾驭全局:在医疗环境中保护环境智能时代的隐私和安全
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100046
Tarun Vats , Sudhakar Kumar , Sunil K. Singh , Uday Madan , Mehak Preet , Varsha Arya , Ritika Bansal , Ammar Almomani
{"title":"Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings","authors":"Tarun Vats ,&nbsp;Sudhakar Kumar ,&nbsp;Sunil K. Singh ,&nbsp;Uday Madan ,&nbsp;Mehak Preet ,&nbsp;Varsha Arya ,&nbsp;Ritika Bansal ,&nbsp;Ammar Almomani","doi":"10.1016/j.csa.2024.100046","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100046","url":null,"abstract":"<div><p>Ambient intelligence technologies have the potential to transform healthcare by providing personalized, context-aware, and proactive support for patients and healthcare providers. However, the use of these technologies in healthcare settings raises important privacy and security concerns that must be addressed to ensure patient trust and acceptance. This paper explores the privacy and security considerations related to the utilization of ambient intelligence in healthcare, aiming to address the associated risks and establish a robust security infrastructure. By reviewing the inherent privacy and security risks in healthcare settings employing ambient intelligence, discussing the ethical and legal considerations, and proposing mitigation strategies, the focus is on ensuring patient trust and acceptance.The architecture that is being presented is a comprehensive one with interconnected layers that guarantees data confidentiality, integrity, and privacy in the ambient intelligence healthcare system. This protects sensitive data and maintains its continuous availability. This research helps to establish a safe environment that supports the transformational potential of ambient intelligence in healthcare while putting patient privacy and data protection first by thoroughly addressing privacy and security concerns.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100046"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000122/pdfft?md5=efe7200683f294a4dc27ed3363c6368a&pid=1-s2.0-S2772918424000122-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140112969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of cyber physical system using digital forensic incident response 利用数字取证事件响应对网络物理系统进行安全分析
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2023.100034
Pranita Binnar , Sunil Bhirud , Faruk Kazi
{"title":"Security analysis of cyber physical system using digital forensic incident response","authors":"Pranita Binnar ,&nbsp;Sunil Bhirud ,&nbsp;Faruk Kazi","doi":"10.1016/j.csa.2023.100034","DOIUrl":"10.1016/j.csa.2023.100034","url":null,"abstract":"<div><p>There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering the closed, dynamic and distributed architecture. This motivates the researchers to focus more on investigating the role of forensic tools such as DFIR in the designing of security models. A brief analysis of the security issues, challenges and attacks on IIoT systems is presented in this paper with an emphasis of DFIR for the security of ICS, CPS, and SCADA. The security recommendations for IIoT, forensic challenges in SCADA, ICS and CPS are discussed. The study suggests that forensic tools can overcome the drawbacks of conventional security solutions in terms of maintaining the privacy of data while sharing information with other systems. The study discusses different models, overview, comparisons, and summarization of DFIR and intrusion detection systems (IDS)-based techniques for IIoT security. In addition, this review analyzes the challenges and research gaps based on the existing literary works.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100034"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918423000218/pdfft?md5=5043651ac8c83a8df31150d7471fc04a&pid=1-s2.0-S2772918423000218-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139014533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments 确保前方道路安全:VANET 云环境中机器学习驱动的 DDoS 攻击检测
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100037
Himanshu Setia , Amit Chhabra , Sunil K. Singh , Sudhakar Kumar , Sarita Sharma , Varsha Arya , Brij B. Gupta , Jinsong Wu
{"title":"Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments","authors":"Himanshu Setia ,&nbsp;Amit Chhabra ,&nbsp;Sunil K. Singh ,&nbsp;Sudhakar Kumar ,&nbsp;Sarita Sharma ,&nbsp;Varsha Arya ,&nbsp;Brij B. Gupta ,&nbsp;Jinsong Wu","doi":"10.1016/j.csa.2024.100037","DOIUrl":"10.1016/j.csa.2024.100037","url":null,"abstract":"<div><p>Vehicular ad-hoc network (VANET) technology has gained prominence, especially in the context of the emerging field of VANET Cloud as an integral part of connected and autonomous vehicles. The automotive industry’s move towards automation and the integration of vehicles into the digital ecosystem has revolutionized wireless network communications. Nevertheless, security remains a paramount concern in these advanced technological landscapes. Safeguarding system integrity and data privacy is of utmost importance before the widespread adoption of VANET Cloud solutions. This study addresses the critical challenge of security within the context of VANET Cloud. Specifically, the focus is on anticipating and mitigating Distributed Denial of Service (DDoS) attacks, which can potentially disrupt the functioning of connected vehicles and associated cloud-based services. To tackle this issue, an innovative architectural framework is proposed to capture and analyze network flows within the VANET Cloud environment. Additionally, it leverages machine learning techniques for classification and predictive analytics with an accuracy of 99.59%. The architecture presented in this research offers the potential to significantly enhance security measures in VANET Cloud deployments. Its adaptability ensures practical applicability to real-world systems, enabling timely responses to security threats and breaches.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100037"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000031/pdfft?md5=cb4f1ca958fe6310acbd1c05c848dec3&pid=1-s2.0-S2772918424000031-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139538768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on exploring the challenges and applications of wireless body area networks (WBANs) 探索无线体域网络(WBAN)的挑战和应用的调查报告
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100047
Arun Sekar Rajasekaran , L. Sowmiya , Azees Maria , R. Kannadasan
{"title":"A survey on exploring the challenges and applications of wireless body area networks (WBANs)","authors":"Arun Sekar Rajasekaran ,&nbsp;L. Sowmiya ,&nbsp;Azees Maria ,&nbsp;R. Kannadasan","doi":"10.1016/j.csa.2024.100047","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100047","url":null,"abstract":"<div><p>Networks play an important role in the day-to-day life of every individual. Networks are involved in the transmission of necessary information between the sender and receiver in the channel. Wireless Body Area Network (WBAN) is a major advancement in the field of network communication. Due to the arrival of the Micro Electromechanical System (MEMS) and several intelligent sensors, collaboration with WBAN makes accurate predictions of parameters in the human body. WBAN has numerous applications in medical and non-medical fields. WBANs have demonstrated remarkable capabilities in real-time health monitoring, facilitating the collection of vital physiological data from individuals in diverse environments. Firstly, their low-power and energy-efficient design ensures prolonged device operation, making them suitable for continuous monitoring over extended periods. Additionally, the miniaturization of sensors and the integration of wireless communication technologies enable seamless data transmission to centralized healthcare systems. Furthermore, the integration of artificial intelligence and machine learning algorithms in WBAN systems has enabled personalized health analytics, allowing for more precise and context-aware health monitoring. This paper gives a survey of the WBAN standard, security in WBAN, several authentication approaches, routing, and MAC protocols. In addition, this paper describes the challenges faced by WBAN, such as network partitioning, changes in postures, lifetime issues, and quality of service (QoS). At last, the advancement in WBAN is for future improvement in the area of body area networks.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100047"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000134/pdfft?md5=5a090b0e0ca2657e5efe18d1e6a0a2a6&pid=1-s2.0-S2772918424000134-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140160591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology 基于 Hyperledger Fabric 技术的安全、可持续食品加工供应链框架
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100045
Mosiur Rahaman , Farhin Tabassum , Varsha Arya , Ritika Bansal
{"title":"Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology","authors":"Mosiur Rahaman ,&nbsp;Farhin Tabassum ,&nbsp;Varsha Arya ,&nbsp;Ritika Bansal","doi":"10.1016/j.csa.2024.100045","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100045","url":null,"abstract":"<div><p>Food processing supply chains are gradually facing the problem of incorporation and sustainability because of the complexity of many participants involved in the supply chain network. Customers are very aware of and particularly interested in the quality, safety, and provenance of food processing products. However, conventional supply chains, on the other hand, rely heavily on a third party for transactions and confidence. Traditional supply chain models only partially reveal information about an organization to other parties, which results in inadequate data and a communication gap. Although emails and printed papers offer some information, the capacity to provide utterly accurate visibility and traceability information is impossible since the items throughout the supply chain are difficult to trace. In this research, we provide a fully distributed method, Hyperledger Fabric, to establish a food processing supply chain system incorporating a Hyperledger Fabric framework designed to demonstrate the efficiency of the approach and analyze the main use cases needed in a food processing supply chain network.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100045"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000110/pdfft?md5=21823af031b7f937fc1204baedd4b75f&pid=1-s2.0-S2772918424000110-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140179613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Any Bluetooth device can be hacked. Know how? 任何蓝牙设备都可能被黑客入侵。知道怎么做吗?
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100041
Prathibha Muraleedhara , Mary Subaja Christo , Jaya J , Yuvasini  D
{"title":"Any Bluetooth device can be hacked. Know how?","authors":"Prathibha Muraleedhara ,&nbsp;Mary Subaja Christo ,&nbsp;Jaya J ,&nbsp;Yuvasini  D","doi":"10.1016/j.csa.2024.100041","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100041","url":null,"abstract":"<div><p>In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes the risk of privacy and security breaches. Each Bluetooth device has potential vulnerabilities that cybercriminals can exploit and take advantage of. It is important to create awareness about various Bluetooth vulnerabilities, exploits, and ways to prevent them. This article examines the dark side of Bluetooth technology by explaining how hackers can find ways to bypass the advanced security features of laptops, phones, cars, or smart home devices to compromise the devices and steal personal sensitive data. Whether it is a casual user of Bluetooth technology or a business owner with multiple devices, understanding these risks is crucial to protecting yourself and your information.</p><p>This article begins by explaining the basics of Bluetooth technology and how it works. Followed by a list of security risks involved while using Bluetooth and finally, it highlights the best practices to protect the devices and the data they contain.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100041"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000079/pdfft?md5=b7264e407ecc26cf9b9c2a72b2cd62da&pid=1-s2.0-S2772918424000079-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139748889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An application for predicting phishing attacks: A case of implementing a support vector machine learning model 预测网络钓鱼攻击的应用程序:实施支持向量机学习模型的案例
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100036
Emmanuel Song Shombot , Gilles Dusserre , Robert Bestak , Nasir Baba Ahmed
{"title":"An application for predicting phishing attacks: A case of implementing a support vector machine learning model","authors":"Emmanuel Song Shombot ,&nbsp;Gilles Dusserre ,&nbsp;Robert Bestak ,&nbsp;Nasir Baba Ahmed","doi":"10.1016/j.csa.2024.100036","DOIUrl":"10.1016/j.csa.2024.100036","url":null,"abstract":"<div><p>The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable users into divulging confidential data like medical health records, credit card details, passwords, and Personal Identifiable information (PII). To bait their victims, cybercriminals employ tactics such as social engineering, spear-phishing attacks, and email phishing scams. As a result, unsuspecting individuals may be enticed to visit these websites, putting their sensitive information at risk. This work presents an application designed to predict phishing attacks after comparing polynomial and radial basis function of support vector machine (SVM). The proposed application leverages a dataset of known legitimate, suspicious and phishing attacks stored in a database and employs an SVM algorithm for classification based on user input. The application provides a user-friendly graphical user interface (GUI) that allows reporting of new phishing incidents based on the features that have strong relationship in determining if a website is phishing or not. The proposed application utilizes the inherent scalability of database technology to support record expansion whenever there is an instance of a user initiating phishing prediction thereby, making it suitable for use in a wide range of organizational settings.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100036"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S277291842400002X/pdfft?md5=029e223b071a8cdaaec160468cac57c7&pid=1-s2.0-S277291842400002X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact 安全的深度伪造缓解框架:架构、问题、挑战和社会影响
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100040
Mohammad Wazid , Amit Kumar Mishra , Noor Mohd , Ashok Kumar Das
{"title":"A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact","authors":"Mohammad Wazid ,&nbsp;Amit Kumar Mishra ,&nbsp;Noor Mohd ,&nbsp;Ashok Kumar Das","doi":"10.1016/j.csa.2024.100040","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100040","url":null,"abstract":"<div><p>Deepfake refers to synthetic media generated through artificial intelligence (AI) techniques. It involves creating or altering video, audio, or images to make them appear as though they depict something or someone else. Deepfake technology advances just like the mechanisms that are used to detect them. There’s an ongoing cat-and-mouse game between creators of deepfakes and those developing detection methods. As the technology that underpins deepfakes continues to improve, we are obligated to confront the repercussions that it will have on society. The introduction of educational initiatives, regulatory frameworks, technical solutions, and ethical concerns are all potential avenues via which this matter can be addressed. Multiple approaches need to be combined to identify deepfakes effectively. Detecting deepfakes can be challenging due to their increasingly sophisticated nature, but several methods and techniques are being developed to identify them. Mitigating the negative impact of deepfakes involves a combination of technological advancements, awareness, and policy measures. In this paper, we propose a secure deepfake mitigation framework. We have also provided a security analysis of the proposed framework via the Scyhter tool-based formal security verification. It proves that the proposed framework is secure against various cyber attacks. We also discuss the societal impact of deepfake events along with its detection process. Then some AI models, which are used for creating and detecting the deepfake events, are highlighted. Ultimately, we provide the practical implementation of the proposed framework to observe its functioning in a real-world scenario.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100040"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000067/pdfft?md5=04e4b598d9efad782ad0da18f0460890&pid=1-s2.0-S2772918424000067-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139743904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks 在无线体域网络中检测干扰和恶意传感器节点的高能效分类策略
Cyber Security and Applications Pub Date : 2024-01-01 DOI: 10.1016/j.csa.2024.100048
Mohd Kaleem, Ganesh Gopal Devarajan
{"title":"Energy-efficient classification strategy for detecting interference and malicious sensor nodes in wireless body area Networks","authors":"Mohd Kaleem,&nbsp;Ganesh Gopal Devarajan","doi":"10.1016/j.csa.2024.100048","DOIUrl":"10.1016/j.csa.2024.100048","url":null,"abstract":"<div><p>Wireless Body Area Networks (WBANs) play a vital role in healthcare monitoring, using wireless sensors to track physiological parameters and predict illness onset. This study proposes a novel approach for detecting interference and malicious sensor nodes in WBANs, crucial for maintaining system integrity and performance. The method combines feature-based techniques with classification strategies to accurately identify anomalies. Features are taken from WBAN nodes and used to train Support Vector Machine (SVM) classifiers, which makes interference detection work well. A neurofuzzy inference system (ANFIS) classifier is also used to train the system on trusted and untrusted nodes at the start, which makes classification easier in real-world WBAN situations. Link failures due to rogue sensor nodes can severely impact WBAN performance, emphasizing the need for efficient detection and correction mechanisms. The proposed strategy introduces a weight metric to identify broken links, enhancing system reliability. Evaluation metrics, including LFD latency and packet delivery ratio, are analyzed to assess the efficacy of the approach. By improving interference detection and addressing link failures, this study contributes to enhancing the efficiency and reliability of WBAN networks, critical for advancing healthcare monitoring technologies.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"2 ","pages":"Article 100048"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000146/pdfft?md5=1f2586c9ff0787c84a1192d3baddb7e9&pid=1-s2.0-S2772918424000146-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信