基于模糊聚类贪婪优化和卷积神经网络的医疗物联网认知无线通信网络医疗资源分配方案

M. Bhuvaneswari, S. Sasipriya
{"title":"基于模糊聚类贪婪优化和卷积神经网络的医疗物联网认知无线通信网络医疗资源分配方案","authors":"M. Bhuvaneswari, S. Sasipriya","doi":"10.1166/jmihi.2021.3863","DOIUrl":null,"url":null,"abstract":"A cognitive wireless powered communication network (CWPCN) for spectrum distribution in IoMT based healthcare systems is employed with a principal network, which in turn deals with security issues from various attacks like Denial of Service (DoS), Man-In-the-Middle, or phishing attacks.\n In this, a new protocol is proposed for wireless powered SU (secondary users) so as to cooperate with PU (primary user) of the healthcare network. At the time of wireless power transfer (WPT) in a IoMT based healthcare network, the first harvest energy of SUs was carried from power signals\n broadcasted by the cognitive hybrid access point. Then the harvested energy is employed while gaining transmission opportunities simultaneously all through the phase of Wireless Information Transfer (WIT) of healthcare system. Furthermore, Fuzzy based cluster greedy algorithm is introduced\n for reducing the interruption of PU secrecy prospect and to offer the best optimal values in the healthcare data. In this approach, the injection impact and reactive jamming attacks on wireless transmission are analyzed. These can be recognized through a Convolutional Neural Network (CNN)\n to detect different attack types and classify them. Finally, the results were compared with the existing method.","PeriodicalId":393031,"journal":{"name":"J. Medical Imaging Health Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fuzzy Based Cluster Greedy Optimization and Convolutional Neural Networks Based Scheme for Internet of Medical Things Based Healthcare Resource Allocation in Cognitive Wireless Powered Communication Network\",\"authors\":\"M. Bhuvaneswari, S. Sasipriya\",\"doi\":\"10.1166/jmihi.2021.3863\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A cognitive wireless powered communication network (CWPCN) for spectrum distribution in IoMT based healthcare systems is employed with a principal network, which in turn deals with security issues from various attacks like Denial of Service (DoS), Man-In-the-Middle, or phishing attacks.\\n In this, a new protocol is proposed for wireless powered SU (secondary users) so as to cooperate with PU (primary user) of the healthcare network. At the time of wireless power transfer (WPT) in a IoMT based healthcare network, the first harvest energy of SUs was carried from power signals\\n broadcasted by the cognitive hybrid access point. Then the harvested energy is employed while gaining transmission opportunities simultaneously all through the phase of Wireless Information Transfer (WIT) of healthcare system. Furthermore, Fuzzy based cluster greedy algorithm is introduced\\n for reducing the interruption of PU secrecy prospect and to offer the best optimal values in the healthcare data. In this approach, the injection impact and reactive jamming attacks on wireless transmission are analyzed. These can be recognized through a Convolutional Neural Network (CNN)\\n to detect different attack types and classify them. Finally, the results were compared with the existing method.\",\"PeriodicalId\":393031,\"journal\":{\"name\":\"J. Medical Imaging Health Informatics\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Medical Imaging Health Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1166/jmihi.2021.3863\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Medical Imaging Health Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/jmihi.2021.3863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

用于基于IoMT的医疗保健系统中的频谱分配的认知无线供电通信网络(CWPCN)与主网络一起使用,主网络反过来处理来自各种攻击(如拒绝服务(DoS)、中间人攻击或网络钓鱼攻击)的安全问题。在此基础上,提出了一种新的无线供电SU(辅助用户)协议,以配合医疗网络的PU(主用户)。在基于IoMT的医疗网络中进行无线电力传输(WPT)时,SUs的第一次收获能量来自认知混合接入点广播的电力信号。然后,在整个医疗系统的无线信息传输(WIT)阶段,利用收集到的能量同时获得传输机会。在此基础上,引入了基于模糊聚类贪婪算法,以减少PU保密前景的中断,并在医疗保健数据中提供最优值。在此方法中,分析了注入冲击和被动干扰攻击对无线传输的影响。这些可以通过卷积神经网络(CNN)来识别,以检测不同的攻击类型并对其进行分类。最后,将结果与现有方法进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Fuzzy Based Cluster Greedy Optimization and Convolutional Neural Networks Based Scheme for Internet of Medical Things Based Healthcare Resource Allocation in Cognitive Wireless Powered Communication Network
A cognitive wireless powered communication network (CWPCN) for spectrum distribution in IoMT based healthcare systems is employed with a principal network, which in turn deals with security issues from various attacks like Denial of Service (DoS), Man-In-the-Middle, or phishing attacks. In this, a new protocol is proposed for wireless powered SU (secondary users) so as to cooperate with PU (primary user) of the healthcare network. At the time of wireless power transfer (WPT) in a IoMT based healthcare network, the first harvest energy of SUs was carried from power signals broadcasted by the cognitive hybrid access point. Then the harvested energy is employed while gaining transmission opportunities simultaneously all through the phase of Wireless Information Transfer (WIT) of healthcare system. Furthermore, Fuzzy based cluster greedy algorithm is introduced for reducing the interruption of PU secrecy prospect and to offer the best optimal values in the healthcare data. In this approach, the injection impact and reactive jamming attacks on wireless transmission are analyzed. These can be recognized through a Convolutional Neural Network (CNN) to detect different attack types and classify them. Finally, the results were compared with the existing method.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信