- Rasheed, Muhammad, Javaid, Nadeem, Imran, Muhammad, Khan, Zahoor, Qasim, Umar, Vasilakos, Athanasios
- Authors: Rasheed, Muhammad , Javaid, Nadeem , Imran, Muhammad , Khan, Zahoor , Qasim, Umar , Vasilakos, Athanasios
- Date: 2017
- Type: Text , Journal article
- Relation: Wireless Networks Vol. 23, no. 4 (2017), p. 1249-1266
- Full Text: false
- Reviewed:
- Description: Wireless body area networks are captivating growing interest because of their suitability for wide range of applications. However, network lifetime is one of the most prominent barriers in deploying these networks for most applications. Moreover, most of these applications have stringent QoS requirements such as delay and throughput. In this paper, the modified superframe structure of IEEE 802.15.4 based MAC protocol is proposed which addresses the aforementioned problems and improves the energy consumption efficiency. Moreover, priority guaranteed CSMA/CA mechanism is used where different priorities are assigned to body nodes by adjusting the data type and size. In order to save energy, a wake-up radio based mechanism to control sleep and active modes of body sensors are used. Furthermore, a discrete time finite state Markov model to find the node states is used. Analytical expressions are derived to model and analyze the behavior of average energy consumption, throughput, packet drop probability, and average delay during normal and emergency data. Extensive simulations are conducted for analysis and validation of the proposed mechanism. Results show that the average energy consumption and delay are relatively higher during emergency data transmission with acknowledgment mode due to data collision and retransmission. © 2016, Springer Science+Business Media New York.
Modeling induction and routing to monitor hospitalized patients in multi-hop mobility-aware body area sensor networks
- Javaid, Nadeem, Ahmad, Ashfaq, Tauqir, Anum, Imran, Muhammad, Guizani, Mohsen, Khan, Zahoor, Qasim, Umar
- Authors: Javaid, Nadeem , Ahmad, Ashfaq , Tauqir, Anum , Imran, Muhammad , Guizani, Mohsen , Khan, Zahoor , Qasim, Umar
- Date: 2016
- Type: Text , Journal article
- Relation: Eurasip Journal on Wireless Communications and Networking Vol. 2016, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: In wireless body area sensor networks (WBASNs), energy efficiency is an area of extreme significance. At first, we present a mathematical model for a non-invasive inductive link which is used to recharge the battery of an implanted biomedical device (pacemaker). Afterwards, we propose a distance-aware relaying energy-efficient (DARE) and mutual information-based DARE (MI-DARE) routing protocols for multihop mobility-aware body area sensor networks (MM-BASNs). Both the routing protocols and the non-invasive inductive link model are tested with the consideration of eight patients in a hospital unit under different topologies, where the vital signs of each patient are monitored through seven on-body sensors and an implanted pacemaker. To reduce energy consumption of the network, the sensors communicate with a sink via an on-body relay which is fixed on the chest of each patient. The behavior (static/mobile) and position of the sink are changed in each topology, and the impact of mobility due to postural changes of the patient(s) arms, legs, and head is also investigated. The MI-DARE protocol further prolongs the network lifetime by minimizing the number of transmissions. Simulation results show that the proposed techniques outperform contemporary schemes in terms of the selected performance metrics. © 2016, Javaid et al.
- Authors: Javaid, Nadeem , Ahmad, Ashfaq , Tauqir, Anum , Imran, Muhammad , Guizani, Mohsen , Khan, Zahoor , Qasim, Umar
- Date: 2016
- Type: Text , Journal article
- Relation: Eurasip Journal on Wireless Communications and Networking Vol. 2016, no. 1 (2016), p.
- Full Text:
- Reviewed:
- Description: In wireless body area sensor networks (WBASNs), energy efficiency is an area of extreme significance. At first, we present a mathematical model for a non-invasive inductive link which is used to recharge the battery of an implanted biomedical device (pacemaker). Afterwards, we propose a distance-aware relaying energy-efficient (DARE) and mutual information-based DARE (MI-DARE) routing protocols for multihop mobility-aware body area sensor networks (MM-BASNs). Both the routing protocols and the non-invasive inductive link model are tested with the consideration of eight patients in a hospital unit under different topologies, where the vital signs of each patient are monitored through seven on-body sensors and an implanted pacemaker. To reduce energy consumption of the network, the sensors communicate with a sink via an on-body relay which is fixed on the chest of each patient. The behavior (static/mobile) and position of the sink are changed in each topology, and the impact of mobility due to postural changes of the patient(s) arms, legs, and head is also investigated. The MI-DARE protocol further prolongs the network lifetime by minimizing the number of transmissions. Simulation results show that the proposed techniques outperform contemporary schemes in terms of the selected performance metrics. © 2016, Javaid et al.
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
- Khan, Zahoor, Amjad, Sana, Ahmed, Farwa, Almasoud, Abdullah, Imran, Muhammad, Javaid, Nadeem
- Authors: Khan, Zahoor , Amjad, Sana , Ahmed, Farwa , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 31036-31051
- Full Text:
- Reviewed:
- Description: Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE.
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
- Authors: Khan, Zahoor , Amjad, Sana , Ahmed, Farwa , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 31036-31051
- Full Text:
- Reviewed:
- Description: Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE.
- «
- ‹
- 1
- ›
- »