Loading

Secured and Trust –Multipath Optimized Link State Routing in Wireless Body Area Network
S. Veena1, D. John Aravindhar2, K.B. Aruna3, L. Sudha4

1S.Veena, Department of Computer Science and Engineering, S.A.Engineering College, Chennai (Tamil Nadu), India.
2D.John Aravindhar, Department of Computer Science and Engineering, Hindustan Institue of Technoloy and Science, Chennai (Tamil Nadu), India.
3K.B.Aruna, Department of Computer Science and Engineering, S.A.Engineering College, Chennai (Tamil Nadu), India.
4L.Sudha, Department of Computer Science and Engineering, S.A.Engineering College, Chennai (Tamil Nadu), India.
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 735-743 | Volume-8 Issue-6, April 2019 | Retrieval Number: F3636048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A Wireless Body Area Network (WBAN) are used to connect wearable computing devices and are designed to operate autonomously in a wireless environment. The research is on progress in designing a system of health observance to meet the technical demand especially in a Wireless Body Area Network. In these Body Area Networks, the parameters such as Packet Loss Rate (PLR), Delay, Quality of Service (QoS) and throughput have to be addressed in order to provide an efficient real-time data transmission. In this system, Trust Secure Energy Optimized Aggregation Protocol(TSEOAP) and a Secure Trust-Multipath Optimized Link State Routing (STMOLSR) is proposed where TSEOAP is a reactive protocol, which has higher latency since the routes are discovered when the source node initiates a request, STMOLSR is a proactive routing protocol, which has low latency based on routing operation. So, by comparing these two protocols, proactive is a better one as prevention is better than cure. A Retransmission Scheme based on Priority is designed in which the emergency packets are given a higher priority so that the performance of the system is increased. The behaviour of each node will be evaluated by using trust based reasoning which uses the OLSR protocol. For detection of malicious node, a Detection System is used to detect the intruders. Crypto Encryption is known for its tremendous speed and effective when compared to other encryption techniques. To enhance the security aspects, the encryption and decryption algorithms should be improved.
Keyword: Body Sensor Network, Cryptography, Energy Efficiency, Resource Allocation, Routing Protocol, Quality of Service.
Scope of the Article: Computer Network