Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
13 results
Search Results
Item A comprehensive security framework for WBANs in the healthcare environment(CRC Press, 2024) Pabitha, B.; Sanshi, S.; Karthik, N.The emergence of technology is constantly required by human society's healthcare system, where a patient is added to the environment of sickness every day. By providing real-time monitoring of patient vital signs, enabling remote patient care, and enhancing general medical diagnostics, Wireless Body Area Networks (WBANs) in e-healthcare have revolutionized the healthcare business. In our fast-paced environment, it is impossible to monitor every patient individually. Instead, WBAN can be used to treat patients in life-threatening situations. A new wireless network called WBAN was created using many tiny, short-power sensor nodes, communication links between nearby nodes, and a central base station to store and analyze the data. WBAN uses low-power, low-cost hardware with a 10 Kbps to 10 Mbps data rate. Many industries, including healthcare, senior care, sports and fitness, chronic illness management, military and emergency services, innovative apparel and fashion, precision agriculture, and farming, can successfully implement WBAN. These WBANs can be made using wearable digital apparel, accessories, and other items. In this chapter, WBAN is used in the healthcare system to monitor the fundamental values of temperature, pressure, blood sugar, and other parameters using a larger number of sensor nodes, transmit the monitored information promptly to a nearby base station (server), and then conduct data analysis to determine the patient's status accurately. As a result, tracking nodes and data transfer protocols must be highly secure to ensure data integrity. Here, strategies for potential node failures, improved technology for data connection faults, and corrective measures are provided to ensure confidentiality, integrity, and availability (CIA) for accurate analysis of patient data collection. However, there are significant privacy and data security issues that have been brought up by the use of WBANs in healthcare settings. This chapter offers a thorough security framework to handle the particular problems WBANs in e-healthcare provide. To guarantee the confidentiality, integrity, and accessibility of sensitive patient data, the framework includes encryption, authentication, access control, and intrusion detection technologies. Adopting contemporary security measures will lead to better patient outcomes and a more robust and secure healthcare ecosystem, promoting confidence between patients, healthcare providers, and technology. © 2025 selection and editorial matter, Anuj Kumar Singh and Sachin Kumar. All rights reserved.Item Data trustworthiness in wireless sensor networks(Institute of Electrical and Electronics Engineers Inc., 2016) Karthik, N.; Ananthanarayana, V.S.Wireless Sensor Networks (WSN) comprises of tiny wireless sensor nodes installed in the terrain for continuous observation of physical or environmental conditions. Finding data trustworthiness is a prime pre-processing action in WSN because of harsh environment producing faulty data and insecure data transfer over WSN. The trustworthy of the data generated from sensor nodes play an important role to make critical decision. In this work, we propose a Data Trust Management Scheme (DTMS) to address the issue by assigning the trust score to data items. The proposed DTMS detects the data fault with the help of temporal and spatial correlations. The provenance data is used to evaluate the trust score of data item by similarity of value and provenance. The data trust score is utilized for making decision. Implementation of the proposed DTMS is done by simulations. Results show that the proposed DTMS detects untrustworthy data and score the data items which are useful for taking critical decisions. © 2016 IEEE.Item Sensor data modeling for data trustworthiness(Institute of Electrical and Electronics Engineers Inc., 2017) Karthik, N.; Vs, A.Wireless sensor networks (WSNs) are installed in the terrain for observing the physical and environmental parameters. The nodes in the network are resource constrained in nature and faces several challenges for producing the data from the unfriendly environment. Large amount of data is generated from WSN and suffers from data fault, inaccuracy and inconsistency. To increase the reliability of application, several data trust management schemes are introduced to ensure the trustworthiness of data in decision making process. Apart from these schemes, in the absence of ground truth, sensor data models are used to find the trustiness of the sensor data. The data generated from the simulation of data model is used as a metric to evaluate the degree of trustiness of sensor data. The existing sensor data models suffer from high energy consumption for data trustiness detection and it becomes inaccurate when the data fault rate is high. In this paper, we are proposing an energy efficient sensor data model for evaluating the sensor data trustworthiness and reconstruct the sensor data in case of any data loss and data fault. The proposed data model is hybrid in nature and it works at low level sensor nodes and also at sink node. Results show that the proposed data model is able to detect the untrustworthy data and gives remedy to untrustworthy and missing data with the help of data reconstruction in an energy efficient way and it is able to identify the events in reliable fashion. © 2017 IEEE.Item Data trust model for event detection in wireless sensor networks using data correlation techniques(Institute of Electrical and Electronics Engineers Inc., 2017) Karthik, N.; Ananthanarayana, V.S.A wireless sensor network (WSN) is a conglomeration of scattered self organized sensor nodes to agreeably monitor the physical and surrounding conditions. These sensor nodes are equipped with limited resources such as memory, processing capability, battery power and transceiver for monitoring, processing and communicating the observed phenomena to make critical decisions with respect to collected data. Evaluating the trustworthiness of data is a primary preprocessing process of event detection in WSN. The trustworthy data which is free from data fault, inaccuracy and inconsistency is used to identify the interesting events and critical decision making in WSN. In this paper, we present our current work on data trust model that focuses on data fault detection, data reconstruction, data quality estimation for reliable event detection in WSN. The aim of this paper is to propose a novel data trust model for harsh environment of WSN to identify the events and strange environmental data behavior. This proposed framework combines different data processing methods through data correlation techniques to mitigate the data security risks of pervasive environments. © 2017 IEEE.Item An Ontology Based Trust Framework for Sensor-Driven Pervasive Environment(Institute of Electrical and Electronics Engineers Inc., 2018) Karthik, N.; Ananthanarayana, V.S.Pervasive computing is an environment consisting set of sensor nodes with the characteristics of perception, computation and communication capabilities. Wireless sensor nodes are deployed in various pervasive computing applications to observe the happenings in the surroundings. Data gathered from such wireless sensor nodes are utilized for critical decision making in context-aware environment. The Frequent incorrect data sampling, missing values, untrustworthy data, misbehavior and selfishness of nodes are common in pervasive applications since they are deployed in unfriendly and harsh environment. Moreover, the increasing number of sensor node fabricator leads to interoperability problems in context aware pervasive applications because they are represented in different formats and processed using different techniques. In this paper, we propose an ontology based trust framework for sensor driven pervasive environment for evaluating node and data trustworthiness which suffers from heterogeneity and interoperability problems. The proposed approach is capable of handling all types of nodes in pervasive environment and heterogeneous data generated from harsh and unfriendly environments of context aware pervasive applications. The proposed method comprises of semantic sensor data model and an ontology which is written in OWL language and implemented in protege. The proposed ontology is validated against use case and used for finding the trustworthiness of different sensor nodes and its data using a generic TRUST ontology. © 2017 IEEE.Item A Trust Model for Lightweight Semantic Annotation of Sensor Data in Pervasive Environment(Institute of Electrical and Electronics Engineers Inc., 2018) Karthik, N.; Ananthanarayana, V.S.Pervasive computing application consists of various types of sensors, actuators and smart devices for monitoring physical, environmental circumstances and happenings by collecting data and act autonomously to serve user. Due to recent advancements of sensors and wireless technologies, pervasive computing is bringing heterogeneous sensors into our everyday life for providing better services. Data collected from heterogeneous sensors and raising number of sensor node manufacturers leads to data heterogeneity problem in pervasive computing applications. The generated data from various sensors depict more conflict in types, formats and representations which arises problem for nodes to process and infer. Because of data heterogeneity, the data cannot be shared with other application which leads to interoperability problem among pervasive environment. To overcome this, Semantic Web Technologies (SWT) are used for semantic annotation of sensor data. Annotating the sensor data with SWT is an important process in making interoperable pervasive applications. Due to resource restriction, harsh and open environments, data generated from sensor network suffers from noisy, faulty data and missing data. Annotating the faulty data with SWT causes unwanted resource consumption, network traffic and affects application performance. To solve these problems, a trust model is proposed to remove noisy, faulty data and reconstruct the missing data. Trust model ensures the annotation process of trustworthy sensor data alone and reduces resource consumption. In order to find the efficiency of proposed approach, we carried out a set of experimentation on medical sensor network prototype of pervasive healthcare application. Results show that the proposed approach is lightweight in semantic data annotation process and suitable for resource restricted nodes in pervasive environment. © 2018 IEEE.Item Towards an Upper Ontology and Hybrid Ontology Matching for Pervasive Environments(Springer Verlag service@springer.de, 2020) Karthik, N.; Ananthanarayana, V.S.Pervasive environments include sensors, actuators, handheld devices, set of protocols and services. The specialty of this environment is its power to manage with any device at any time anywhere and work autonomously for providing customized services to user. The different entities of pervasive environment collaborate with each other to accomplish an objective by sharing data among them. It raises an interesting problem called semantic heterogeneity. To address this problem, a hybrid ontology matching technique which combines direct and indirect matching techniques is proposed in this paper. To share and integrate data semantically, ontology matching technique establishes a semantic correspondence among various entities of pervasive application ontologies. To find the efficiency of proposed approach, we carried out set of experiments with real world pervasive applications. Experimental results prove that the proposed approach shows excellent performance in hybrid ontology matching. Results also proved that the use of background knowledge has influence over the performance of ontology matching technique. © 2020, Springer Nature Switzerland AG.Item Cardiovascular Diseases Divination using Artificial Neural Network with Ensemble Models(Institute of Electrical and Electronics Engineers Inc., 2023) Pabitha, B.; Sanshi, S.; Karthik, N.Health is wealth, but nowadays, wealth is health, where humans keep running their day-to-day activities without caring about their health for various reasons. Every human being in this world suffers from one or other diseases. Recently, cardiovascular diseases like heart attacks are prevalent in all age groups. Addressing cardiovascular diseases is essential before the disease reaches a crucial stage. Nowadays, artificial intelligence algorithms have been used to detect diseases in their early stages. In this piece of writing, a model of an artificial neural network is utilised to analyze, detect and predict the likelihood of cardiovascular disease in the early stages. In this proposed work, feed forward propagation, forward the input data to learn and map the relationships between inputs and outputs, and backward propagation is used to reduce the errors in the data. Further, an ensemble learning stacked model is used to achieve high accuracy in the prediction of diseases. To verify the correctness of the model, ensemble learning to stack is executed with three different models, namely Model 1, Model 2, and Model 3, with varying sets of feature selections. The experiment results show an accuracy rate of 93% in their predictions. © 2023 IEEE.Item Multi-factor Authentication and Data Integrity for WBAN Using Hash-Based Techniques(Springer Science and Business Media Deutschland GmbH, 2024) Pabitha, B.; Vani, V.; Sanshi, S.; Karthik, N.In recent days, a wireless body area network (WBAN) has been developed as part of the Internet of Things (IoT) with sensors and actuators in three different modes, building its network, i.e., in-body sensors, wearable sensors, and on-body sensors. The doctor’s access the data recorded and monitored by the sensor embedded in the patient to treat critical situations immediately. Maintaining data integrity and guarding against threats is necessary to secure sensitive patient information. Several people have proposed schemes for authenticating data access through formal and informal verification. In this research work, we carry out multi-factor authentication extensively using zero-knowledge proofs. The anomaly detection of the sensors is detected using machine learning algorithms, which help tune the sensors to their correct working conditions. The work aims to concentrate on sensor working conditions promptly and to handle attacks like masquerade, forgery, and key escrow attacks. To assess whether performance metrics are superior in computing cost, storage overhead, and communication overhead, utilize the BAN logic tool. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.Item A Hybrid Trust Management Scheme for Wireless Sensor Networks(Springer New York LLC barbara.b.bertram@gsk.com, 2017) Karthik, N.; Ananthanarayana, V.S.Wireless sensor network (WSN) consists of wireless small sensor nodes deployed in the terrain for continuous observation of physical or environmental conditions. The data collected from the WSN is used for making decisions. The condition for making critical decision is to assure the trustworthiness of the data generated from sensor nodes. However, the approaches for scoring the sensed data alone is not enough in WSN since there is an interdependency between node and data item. If the overall trust score of the network is based on one trust component, then the network might be misguided. In this work, we propose the hybrid approach to address the issue by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively. The proposed hybrid trust management scheme (HTMS) detects the data fault with the help of temporal and spatial correlations. The correlation metric and provenance data are used to score the sensed data. The data trust score is utilized for making decision. The communication trust and provenance data are used to evaluate the trust score of intermediate nodes and source node. If the data item is reliable enough to make critical decisions, a reward is given by means of adding trust score to the intermediate nodes and source node. A punishment is given by reducing the trust score of the source and intermediate nodes, if the data item is not reliable enough to make critical decisions. Result shows that the proposed HTMS detects the malicious, faulty, selfish node and untrustworthy data. © 2017, Springer Science+Business Media, LLC.
