skip to main content
10.1145/3377049.3377084acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccaConference Proceedingsconference-collections
short-paper

Naive Bayes based Trust Management Model for Wireless Body Area Networks

Authors Info & Claims
Published:20 March 2020Publication History

ABSTRACT

With the development of micro sensors, embedded technologies and wireless networking, Wireless Body Area Network (WBAN) is becoming a key emerging technology in healthcare to monitor and collect the biological data from the human body. Ensuring security of this network from compromised sensor nodes is a challenging task, as the traditional security mechanisms are not suitable and compatible with the lightweight body sensor nodes. In this paper, We have proposed a trust management model based on Naive Bayes classifier to classify a sensor node as trustworthy or malicious. Based on the classification the trustor node will choose a trustee node for the exchange of data. We have trained our proposed model in MATLAB and experimental results show that the proposed model can successfully classify a sensor node as a malicious or trusted.

References

  1. Kemal Akkaya and Mohamed Younis. 2005. A survey on routing protocols for wireless sensor networks. Ad hoc networks 3, 3 (2005), 325--349.Google ScholarGoogle Scholar
  2. Md Murshedul Arifeen, Md Mustafizur Rahman, Kazi Abu Taher, Md Maynul Islam, M Shamim Kaiser, et al. 2019. ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks. In 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  3. M Gowtham and S Sobitha Ahila. 2017. Privacy enhanced data communication protocol for wireless body area network. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ramesh Kumar and Rajeswari Mukesh. 2013. State of the art: Security in wireless body area networks. International Journal of Computer Science & Engineering Technology (IJCSET) Vol 4, 5 (2013), 622--630.Google ScholarGoogle Scholar
  5. Ming Li, Wenjing Lou, and Kui Ren. 2010. Data security and privacy in wireless body area networks. IEEE Wireless communications 17, 1 (2010), 51--58.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wenjia Li and Xianshu Zhu. 2014. Recommendation-based trust management in body area networks for mobile healthcare. In 2014 IEEE 11th International conference on mobile ad hoc and sensor systems. IEEE, 515--516.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Wenjia Li and Xianshu Zhu. 2016. BAN-trust: An attack-resilient malicious node detection scheme for body area networks. In 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber. 2011. Trust Key Management Scheme for Wireless Body Area Networks. IJ Network Security 12, 2 (2011), 75--83.Google ScholarGoogle Scholar
  9. Pejman Niksaz and Mashhad Branch. 2015. Wireless body area networks: attacks and countermeasures. International Journal of scientific and engineering research 6, 19 (2015), 565--568.Google ScholarGoogle Scholar
  10. Ibrahim Abdulai Sawaneh, Ibrahim Sankoh, and David Kanume Koroma. 2017. A survey on security issues and wearable sensors in wireless body area network for healthcare system. In 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). IEEE, 304--308.Google ScholarGoogle ScholarCross RefCross Ref
  11. KM Sharmilee, Rajeswari Mukesh, A Damodaram, and V Subbiah Bharathi. 2008. Secure WBAN using rule-based IDS with biometrics and MAC authentication. In HealthCom 2008-10th International Conference on e-health Networking, Applications and Services. IEEE, 102--107.Google ScholarGoogle Scholar
  12. Weiwei Yuan, Donghai Guan, Sungyoung Lee, and Youngkoo Lee. 2006. A dynamic trust model based on naive bayes classifier for ubiquitous environments. In International Conference on High Performance Computing and Communications. Springer, 562--571.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Harry Zhang. 2004. The optimality of naive Bayes. AA 1, 2 (2004), 3.Google ScholarGoogle Scholar
  14. Tong Zhang, Lisha Yan, and Yuan Yang. 2018. Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Networks 24, 3 (2018), 777--797.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Naive Bayes based Trust Management Model for Wireless Body Area Networks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICCA 2020: Proceedings of the International Conference on Computing Advancements
              January 2020
              517 pages
              ISBN:9781450377782
              DOI:10.1145/3377049

              Copyright © 2020 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 20 March 2020

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper
              • Research
              • Refereed limited

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader