Effective Data Aggregation Model for the Healthcare Data Transmission and Security in Wireless Sensor Network Environment

Authors

  • K. Vijay Kumar Assistant Professor, Department of Computer Science and Engineering, Balaji Institute of Technology and Science, Laknepally, Narsampet, Telangana,506004, India. Author
  • S. Sravanthi Assistant Professor, Department of Computer Science and Engineering, Balaji Institute of Technology and Science, Laknepally, Narsampet, Telangana,506004, India. Author
  • Syed Shujauddin Sameer Assistant Professor, Department of Computer Science and Engineering, Balaji Institute of Technology and Science, Laknepally, Narsampet, Telangana,506004, India. Author
  • K. Anil Kumar Assistant Professor, Department of Computer Science and Engineering, Balaji Institute of Technology and Science, Laknepally, Narsampet, Telangana,506004, India. Author

DOI:

https://doi.org/10.69996/jsihs.2023004

Keywords:

Data aggregation, wireless sensor network (wsn), healthcare, monkey optimization, security

Abstract

Data aggregation is the process of collecting and combining information from multiple sources to provide a unified view or summary. In various fields such as statistics, economics, and data analysis, aggregating data helps reveal patterns, trends, or general insights that may not be apparent when examining individual data points. Aggregated data can provide a more comprehensive perspective, facilitating decision-making and strategic planning. This paper explores the application of Sugeno Fuzzy Model Monkey Swarm Optimization (SFMMsO) in healthcare, specifically focusing on data aggregation and security within Wireless Sensor Networks (WSN). The study demonstrates SFMMsO’s efficacy in aggregating patient health data, generating comprehensive Aggregated Health Indices. It also highlights SFMMsO’s optimization capabilities, refining decision variables to enhance healthcare algorithm performance. The paper addresses the critical dimension of security, showcasing SFMMsO’s adaptability in optimizing security parameters and assessing its vulnerability to various attack types. The findings underscore SFMMsO’s potential as a robust tool for healthcare applications, emphasizing the need for proactive security measures to fortify its resilience against potential threats. This study contributes valuable insights into the intersection of optimization algorithms, data aggregation, and security in healthcare, paving the way for advancements in utilizing SFMMsO for secure and comprehensive healthcare systems.

References

[1] N. Chandnani and C.N. Khairnar, “Bio-inspired multilevel security protocol for data aggregation and routing in iot wsns,” Mobile Networks and Applications, vol.27, no.3, pp.1030-1049, 2022.

[2] B. Murugeshwari, S.A. Sabatini, L. Jose and S. Padmapriya, “Effective data aggregation in wsn for enhanced security and data privacy,” arXiv preprint arXiv:vol. 2304.14654, 2022.

[3] G. Said, A. Ghani, A.Ullah, M. Azeem, M. Bilal et al., “Light-weight secure aggregated data sharing in iot-enabled wireless sensor networks,” IEEE Access, vol. 10, pp.33571-33585, 2023.

[4] P. Saravanakumar, T.V.P. Sundararajan, R.K. Dhanaraj, K. Nisar, F.H. Memon et al., “Lamport certificateless signcryption deep neural networks for data aggregation security in wsn,” Intelligent Automation & Soft Computing, vol.33, no.3, pp.1835-1847, 2022.

[5] B.A. Begum and S.V. Nandury, “Data aggregation protocols for wsn and iot applications–a comprehensive survey,” Journal of King Saud University-Computer and Information Sciences, vol.35, no.2, pp. 651-681, 2023.

[6] M. Kumar, M. Sethi, S. Rani, D.K. Sah, S.A. AlQahtani et al., “Secure data aggregation based on end-to-end homomorphic encryption in iot-based wireless sensor networks,” Sensors, vol. 23, no. 13, pp.6181, 2023.

[7] N. Tabassum, G.D. Devanagavi, R.C Biradar and C. Ravindra, “Survey on data aggregation based security attacks in wireless sensor network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 3, pp.3131-3139, 2023.

[8] G.S. Shetty, N. Raghu and G. Aithal, “Strategies for secure data aggregation in wireless sensor networks and optimization issues: a comprehensive survey,” Journal of Harbin Engineering University, vol.44, no.8, 2023.

[9] A. Gunasekaran, “Internet of things based wireless sensor networks for monitoring access constraint security measures in liable data aggregation,” International Journal of Communication Systems, vol.36, no.17, pp. e5596, 2023.

[10] M. A.Nezhad, H. Barati and A. Barati, “An authentication-based secure data aggregation method in Internet of Things,” Journal of Grid Computing, vol.20, no. 3, pp.29, 2022.

[11] G. Lavanya, B.L. Velammal and K. Kulothungan, “SCDAP–secured cluster-based data aggregation protocol for energy efficient communication in wireless sensor networks,” Journal of Intelligent & Fuzzy Systems, (Preprint), pp.1-10, 2023.

[12] M. Manoharan, S. Babu and R. Pitchai, “Wireless sensor network security analysis for data and aggregation,” Journal of Interconnection Networks, vol.23, no. 02, pp.2250002, 2023.

[13] J. M. Bohli, P. Langendörfer and A.F. Skarmeta, “Security and privacy challenge in data aggregation for the iot in smart cities,” In Internet of Things, pp. 225-244, 2022.

[14] M. Dener, “SDA-RDOS: A new secure data aggregation protocol for wireless sensor networks in iot resistant to dos attacks,” Electronics, vol.11, no. 24, pp.4194, 2022.

[15] S.G. Gundabatini, S.B. Kolluru, C.V. Ratnam and N.N. Krupa, “DAAM: wsn data aggregation using enhanced ai and ml approaches,” In Microelectronics, Circuits and Systems: Select Proceedings of Micro2021, Singapore: Springer Nature Singapore, pp. 547-556, 2023.

[16] N. Chandnani and C.N. Khairnar, “A reliable protocol for data aggregation and optimized routing in iot wsns based on machine learning,” Wireless Personal Communications, vol.130, no. 4, pp. 2589-2622, 2023.

[17] H. Dou, Y. Chen, Y. Yang and Y. Long, “A secure and efficient privacy-preserving data aggregation algorithm,” Journal of Ambient Intelligence and Humanized Computing, pp.1-9, 2022.

[18] S. Thomas and T. Mathew, “Secure data aggregation in wireless sensor network using Chinese remainder theorem,” International Journal of Electronics and Telecommunications, pp. 329-336, 2022.

[19] X. Liu, J. Yu, K. Yu, G. Wang and X. Feng, “Trust secure data aggregation in wsn-based iot with single mobile sink,” Ad Hoc Networks, vol.136, pp. 102956, 2022.

[20] M.I. Adawy, M. Tahboush, O. Aloqaily and W. Abdulraheem, “Man-in-the middle attack detection scheme on data aggregation in wireless sensor networks,” International Journal of Advances in Soft Computing & Its Applications, vol. 15, no.2, 2023.

[21] R. Maivizhi and P. Yogesh, “Identity-based secure data aggregation in big data wireless sensor networks,” International Journal of Ad Hoc and Ubiquitous Computing, vol.41, no.1, pp.16-28, 2022.

[22] L. Dash, B.K. Pattanayak, S.K. Mishra, K.S.Sahoo, N.Z. Jhanjhi et al., “A data aggregation approach exploiting spatial and temporal correlation among sensor data in wireless sensor networks,” Electronics, vol.11, no.7, pp. 989, 2022.

[23] G.A. Macriga, K. Malarvizhi, S.S. Ahila, S. Ayyasamy and B.M. Yashaswini, “Energy efficient greedy tree based algorithm for data aggregation in wireless sensor network measurement,” Sensors, vol. 30, pp. 100910, 2023.

[24] P. William, A. Badholia, V. Verma, A. Sharma and A. Verma, “Analysis of data aggregation and clustering protocol in wireless sensor networks using machine learning,” In Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2021, Singapore: Springer, pp. 925-939, 2022.

Downloads

Published

2023-12-31

How to Cite

K. Vijay Kumar, S. Sravanthi, Syed Shujauddin Sameer, & K. Anil Kumar. (2023). Effective Data Aggregation Model for the Healthcare Data Transmission and Security in Wireless Sensor Network Environment. Journal of Sensors, IoT & Health Sciences (JSIHS,ISSN: 2584-2560), 1(1), 40-50. https://doi.org/10.69996/jsihs.2023004