{"title":"基于Se-Small的数据耗散Se-Drip模型的改进版本","authors":"M. Lydia, S. Saravanan","doi":"10.1109/ICRTCCM.2017.42","DOIUrl":null,"url":null,"abstract":"The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Improved Version of Se-Drip Model for Data Dissipation Using Se-Small\",\"authors\":\"M. Lydia, S. Saravanan\",\"doi\":\"10.1109/ICRTCCM.2017.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.\",\"PeriodicalId\":134897,\"journal\":{\"name\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTCCM.2017.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTCCM.2017.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Improved Version of Se-Drip Model for Data Dissipation Using Se-Small
The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.