基于Se-Small的数据耗散Se-Drip模型的改进版本

M. Lydia, S. Saravanan
{"title":"基于Se-Small的数据耗散Se-Drip模型的改进版本","authors":"M. Lydia, S. Saravanan","doi":"10.1109/ICRTCCM.2017.42","DOIUrl":null,"url":null,"abstract":"The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Improved Version of Se-Drip Model for Data Dissipation Using Se-Small\",\"authors\":\"M. Lydia, S. Saravanan\",\"doi\":\"10.1109/ICRTCCM.2017.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.\",\"PeriodicalId\":134897,\"journal\":{\"name\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTCCM.2017.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTCCM.2017.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

未来医疗系统的成长和发展对无线体域网络(WBAN)的依赖程度越来越高。尽管如此,使用不可信的方法使其无法抵御各种攻击。这些攻击可以通过使用不同的安全程序来控制。出于这个原因,使用了名为Se-Small的安全协议。该过程包括在发送主数据包之前由基站对其进行签名。随后,这个符号被传输到产生哈希值的数据项的其余部分。这个过程减少了系统的开销和传输延迟。无线网络基本上利用三种不同的结构进行分组传输。它们包括-树,星和线性链。本文揭示了在WBAN中利用完美显示和分布式结构,将三种基本结构组合在一起,实现分组的高效传输。为此,采用鱼骨结构。同样,任何簇头的故障都可以通过提供替代组件来补偿。这里使用移动节点从主头收集信息。为了熟练传输,移动节点的缓冲长度保持较高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Improved Version of Se-Drip Model for Data Dissipation Using Se-Small
The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing the primary packet by the base station before it is transmitted. Subsequently this sign is transmitted to the rest of the data item from which hash value is produced. This procedure reduces overhead and transmission delay in the system. The wireless network essentially utilizes three distinct structures for packet transmission. They incorporate – Tree, Star and Linear chain. This paper uncovers the utilization of flawlessly displayed and distributed structure where the three essential structures have been assembled for productive transmission of packets in WBAN. For this reason Fish-Bone structure is utilized. Failure in any of the cluster head has likewise been compensated by giving a substitute component. Mobile node is utilized here to gather the information from master heads. For proficient transmission buffer length of mobile node is kept high.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信