Affiliation:
1. Taibah University
2. Khwaja Moinuddin Chishti Language University
3. RV University
4. Chitkara University Institute of Engineering and Technology, Chitkara University
5. Eudoxia Research University
6. Bule Hora University
Abstract
Abstract
The Wireless Sensor Network's (WSN's) sensor nodes commonly communicate via mobiles, which have been widely regarded as the most prevalent and perhaps most important communication technology. Due to their self-configuration, ease of handling, and adaptability, WSNs have become more popular in mobile computing. The WSN is set up with extra nodes to transport data. As a result of their short memory, poor throughput, restricted capacity, and other limitations, sensor networks become notoriously difficult to secure. WSN has been grappling with how to maintain network security in mobile computing while using as little power as possible in current history. So, we present a novel trust-bat-adaptive homomorphic crypto routing protocol (TBAHCRP) to overcome these difficulties. Initially, we gather healthcare datasets from the medical server and deploy a 5G (fifth-generation) network to transfer these datasets from sending node to receiving node. The encryption and decryption are performed by employing the proposed technique and it also performs clustering and routing functionalities. A multi-gradient spider monkey optimization (MG-SMO) approach is applied to optimize the received data for mobile applications. Finally, performance metrics like security level, memory usage, energy efficiency, and energy consumption of the proposed technique are examined and compared with other classical techniques to prove our work with the greatest efficiency. These metrics are depicted in graphical form by using the MATLAB tool.
Publisher
Research Square Platform LLC
Reference39 articles.
1. ECH: An enhanced clustering hierarchy approach to maximize the lifetime of wireless sensor networks;Alami H;Ieee Access : Practical Innovations, Open Solutions,2019
2. Lai, S., Zhao, R., Tang, S., Xia, J., Zhou, F., & Fan, L. (2021). Intelligent secure mobile edge computing for beyond 5G wireless networks. Physical Communication, 45, p.101283.
3. EMG based finger motion classification using wavelet transform and Artificial Neural Networks;Mary Vasanthi S;Caribben Journal of Science,2019
4. Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN;Ullah A;Peer-to-Peer Networking and Applications,2020
5. Revamping data access privacy preservation method against inside attacks in wireless sensor networks;Babu SS;Cluster Computing,2019