• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks

    2021-12-11 13:30:28RajeshKumarDhanarajLalithaKrishnasamyOanaGemanandDianaRoxanaIzdrui
    Computers Materials&Continua 2021年8期

    Rajesh Kumar Dhanaraj,Lalitha Krishnasamy,Oana Geman and Diana Roxana Izdrui

    1School of Computing Science and Engineering,Galgotias University,201310,India

    2Department of Information Technology,Kongu Engineering College,Erode,638060,India

    3Department of Health and Human Development,Stefan cel Mare University,Romania

    4Department of Computers,Electronics and Automation,Stefan cel Mare University,Romania

    Abstract: In Wireless Body Area Networks (WBANs) with respect to health care,sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically.The great challenges posed to healthcare WBANs are the black hole and sink hole attacks.Data from deployed sensor nodes are attracted by sink hole or black hole nodes while grabbing the shortest path.Identifying this issue is quite a challenging task as a small variation in medicine intake may result in a severe illness.This work proposes a hybrid detection framework for attacks by applying a Proportional Coinciding Score (PCS) and an MK-Means algorithm, which is a well-known machine learning technique used to raise attack detection accuracy and decrease computational difficulties while giving treatments for heartache and respiratory issues.First,the gathered training data feature count is reduced through data pre-processing in the PCS.Second, the pre-processed features are sent to the MK-Means algorithm for training the data and promoting classification.Third, certain attack detection measures given by the intrusion detection system, such as the number of data packages trans-received, are identified by the MK-Means algorithm.This study demonstrates that the MK-Means framework yields a high detection accuracy with a low packet loss rate, low communication overhead, and reduced end-to-end delay in the network and improves the accuracy of biomedical data.

    Keywords:Wireless body area network; black hole attack; sink hole attack;proportional coinciding score; intrusion detection; correlation rate

    1 Introduction

    One of the most active research areas in the past few years is that regarding wireless sensor networks (WSNs).In WSNs, sensor nodes cooperate with one another by sensing the deployed surroundings and updating to the Sink.Sink hole attack attracts the network traffic in neighborhood nodes by promoting itself to own the shortest route to the Sink.

    Based on the existing route, the sink hole node attempts to invite the stream of traffic through a specific area.The rest of the nodes in the network then use this malicious node path and interchange their data.Given that the communication dependency for affected nodes is through a malicious node, the sink hole attack easily creates a way for other kinds of attacks, such as gray hole and black hole.A distributed adaptive framework is proposed [1] on the basis of the subjective opinion and probabilistic logic extension of scheduled automata to identify the likelihood of each sensor node being attacked by sink hole.Fig.1 shows the model of the sink hole attack.

    Figure 1:Sink hole attack

    As presented in Fig.1, the red sensors represent the compromised nodes, whereas the blue sensors represent the normal sensor nodes with “Shole” and “Snode” being the sink hole and sink node, respectively.In [1], subjective opinion models at the Sink evaluate the probabilistic logic in an iterative manner.This evaluation is conducted according to node behaviors, such as +ve and?ve observations collected by the distributed sensors, which are adaptively tuned on the basis of timed automation.This timed automation captures the entire network behavior at runtime in the Sink.Given that the routing paths are selected from reliable nodes, the packet loss ratio is reduced.

    To determine the discriminative features of other attacks in Wireless Body Area Networks(WBANs), such as black hole and worm hole, the overlap between positive and negative observations to be analyzed is an important performance criterion.Malicious nodes utilize the holes involved during the route discovery process with the objective of carrying out their malicious intent.One such familiar attack is the black hole attack, which sends fake routing information to a source node and drops the entire data after hosting itself in the path among source nodes and destinations.A malicious node sends a fake reply to the start node that it possesses the shortest route (i.e., malicious route request) to the end node.The start node establishes a path with this malicious node by sending data packets to it, which, in turn, discards the transmitted data packets.Fig.2 illustrates a sample scenario of black hole attack.

    In Fig.2, “Sa” denotes the start node (i.e., sensors), whereas “Se” denotes the end node with a malicious route reply obtained from sensor “Sd” and a normal route reply from “Sb,Sf,Sc”with a route request placed by “Sa.” An effective security algorithm against the black hole attack is given in [2], which identifies the secured path by improving the processing of data packet with minimum end-to-end (E2E) delay and routing overhead.Such an improvement is achieved using a threshold value built on the request path (PREQ) sent and reply path (PREP) received.However,the existing solutions provided in [3] exclude solutions for other attacks.

    Figure 2:Black hole attack

    The sink hole attack in MANETs is distinguished using multi-hop routes from the start node to the end node, as investigated in [4].A unique cooperative cross layer approach is presented in [5] to discover the black hole attack by using multipoint relays for establishing the route [5].Black hole and sentinel attacks are addressed in [6] on the basis of the decision process, which includes the Bayes rule and a simple threshold approach.The effect of a cooperated node on the zone routing protocol is designed in [7] to mitigate the black hole attack, resulting in the improvement of packet delivery ratio, throughput, and E2E delay.Although improvement is attained, authentication remains a major issue.To resolve this issue, a technique to discover a pattern on the basis of gathered passwords and an attempt to provide a worker’s password using hash are depicted in [8].

    Although the subjective logic and trust-based model are often used in different networks,the means to address different types of attacks and the overlapping between observations remain unaddressed.The prevention of other types of attacks may not be assured using the subjective logic and trust-based model.This work leverages the flaws of the subjective logic, in addition to the trust-based model and the method to combat against the black hole and sink hole attacks,through an overlapping score and by using machine learning techniques.

    This paper is organized as follows:Section 2 includes briefings about existing methods to overcome the different types of attacks.Section 3 explains the sink hole and black hole attack detection methodology.Section 4 presents the parametric explanations and experimental settings.Section 5 summarizes the impacts of different performance metrics by evaluating up-to-date works.Section 6 concludes with limitations and future scope.

    2 Literature Review

    With the wide popularity of next-generation communication networks, such as MANETs and vehicular ad-hoc networks (VANETs), safety has become a major concern.Wireless sensors and delay tolerant network applications have emerged as promising technologies; some of them are used for health care, smart grid, and target monitoring.A geometric-based detection of black hole and gray hole attack schemes is investigated in [9].In [10], a secure data fragmentation is designed to avoid and identify the sink hole and Sybil attacks on the existence of fixed and dynamic deployed nodes, yielding high detection accuracy and meager false-positive rate.In addition to issues and taxonomy, future directions against DDoS attacks are presented in [11].A survey of Sybil defense algorithms used in online social webs is provided in [12].

    A mutable black hole unearthing mechanism is designed in [13] to identify the behavioral changes of nodes.However, the mechanism fails to identify the black hole attack.WBANs are prone to many attacks, which weaken network performance.Black hole attack represents the security risk that reduces the normal functioning by dropping all received packets.Even though many mechanisms are compared in [14] to protect the network from the black hole attack, an effective and lightweight security mechanism detects and prevents DDoS attacks.

    An attempt is made to investigate the features for ensuring secure routing protocols in VANETs and combat against the black hole attack by applying the stack operations, as given in [15,16].Another measure to fight against the black hole attack is by using the AODV routing protocol, which is designed in [17].However, the reliability of the node is not ensured and thus compromises the entire network.A proficient GA-based denial of sleep attack detection is proposed in [18]; it guarantees the reliability of the connector node by using the fitness function estimation.

    Node attacks in WBANs are unavoidable, owing to node replication.To address this issue,a novel type named Solo Stage Random Walk Memory with a Distributed Network is proposed in [19]; it guarantees the security of a node with sensible overhead with respect to memory and communication.However, with nodes prone to various attacks, data communication is found insecure in both ways.Although data communication is ensured in [20], attack detection is said to be compromised as network density increases.To address this issue, different types of sink hole nodes are identified in [21] on the basis of several disjoint clusters.An intrusion detection with various machine learning techniques is surveyed and presented in [22,23].

    Some secured solutions are provided to protect WBANs from the black hole attack.An improvised hierarchical efficient intrusion detection system (IDS) preserves the sensor network from such an attack [24,25].The approach depends on the exchange of control packets between the sensor node and base station.However, the security remains unaddressed.

    Many security keys are used to secure data transmission from the black hole attack.A hierarchical energy efficient IDS, which preserves the sensor network from the black hole attack,is designed in [26].The designed system controls the packet exchange between the sensor node and base station.However, the designed system still experiences network overhead issues.

    A new probabilistic approach identifies and separates the black hole attack from MANETs.Routing algorithms are not designed to reduce and remove this type of attack.A technique called Novel Honeypot-based Detection and Isolation helps identify and remove the black hole attack.The Honeypot method increases the security rate of MANETs with minimum network overhead.However, such a method is cost-ineffective [26,27].A new technique identifies the black hole attack by multiple base stations and performs verification through an agent-based technology [28].

    From the observations drawn, many of the techniques and/or algorithms are implemented for detecting attacks yet suffer from overlapping discriminative features on the intermediary node,resulting in computational issues in identifying attacks.This work proposes a novel algorithm with the objective of reducing the computational complexity (CC) of identifying the discriminative features by using the proportional coinciding score (PCS).

    3 Methodology of MK-Means

    A scenario for remote patient monitoring is considered in this work, where the PCS is used to collect data and bring alert activation when abnormal patterns (i.e., sink hole or black hole nodes) are detected, as followed in [29,30].The proposed framework is based on the machine learning technique given in [31,32].It clusters the sensor nodes according to the updated distance(as patient records are dynamic) by using the MK-Means algorithm.Fig.3 depicts the block structure of hybrid, sink hole, and black hole attack detection framework.

    Figure 3:Block diagram of MK-Means

    The block diagram consists of three different phases, namely, physiological data gathering(PDG) phase, data reduction phase, and classification phase.The description of each module is elaborated below.

    3.1 PDG

    The PDG phase gathers data or features from the physiological parameter measurements presented in the form of data matrix “DMat=DMatij.” In the data matrix, “i” represents the time-related growth values, whereas “j”represents the measured parameter.All gathered values for all measured parameters are stored as a single record incrementally at time “t.” It is represented by “DMatt=(DMatt1,DMatt2,...,DMattn)” for each patient and considered packet “Pt.”

    The recorded features are denoted by “Fe=(Fe1,Fe2,...,Fen),”where “Fei”represents column“i”in data matrix “DMat.” The features represent patient metrics, such as heart rate “HRate” and blood pressure “B′P.” Hence, the data matrix is written as given below.

    The PDG module in the hybrid attack detection framework monitors the events and packets,their delivery time, and topological changes; the module also archives feature inputs.The MKMeans framework selects the hidden data, which tolerate evidence of familiarity or anomaly.The healthcare WSN is in need of the received physiological data to maintain its accuracy.Wrong triggering or erroneous instances when required to alert medical personnel may result in fatal health issues [33].To increase the attack detection accuracy and reduce false alarms (improper diagnosis), black hole and sink hole attacks are given focus in this study.

    3.2 PCS

    In the MK-Means framework, an analytical method for opting features, which are based on an overlying examination of medical data through classes for each patient, is presented.In the data or feature selection module, data packets are distributed to the PCS technique to select the best features.

    The PCS is determined with the objectives of exploring the commonality between features across classes for unalike patients and identifying discriminative features.This approach employs the facts given by training classes along with testing classes to explore contradictory features among target classes for hybrid attack detection.

    Physiological data can generally be presented in the matrix form, “DMat=dmatij,” where“DMat∈K?N.” Here, “i=1,2,...K” and “j=1,2,...N.” Each sample record is categorized by a labeled target class “Pj,” signifying the patient model.Class labels represented as vectors, such as “P∈N” and its “jth” element “pj,” have a unique value called “Cl,” which may be either “1”or “2.”

    Minimum subsets of patient records (i.e., features) are selected using the PCS method,and the data delivered are analyzed.This resultant value is assumed to be the small one that suitably classifies the huge set of samples in the training set given.This kind of procedure agrees to the discarding of repeated samples, such as patient records with identical profiles, thus avoiding overlapping.

    Let “Fe” be taken as a set comprising all features (i.e., “|Fe|=N”).Consider also “AM(F)”to be the features aggregate mask, which is stated as the rational disconnection corresponding to patient records, which belong to the set.It is expressed as given below.

    Then, the mathematical formula to cover the maximum number of patient records is as follows:

    From Eq.(3), the patient record set whose data matrix values have the maximum bits of“1” is assigned.The objective of this proposed framework should be to look for the tiny subset,indicated by “Fe′,” by whichmatches to the features aggregate mask in the bunch of patient records and “AM(Fe)” fulfilling the following assertion.

    The above mentioned phenomenon is iterated successively and stops when all patient records are processed, that is, when the selected patient record covers almost all the samples.The step-bystep instruction of minimizing the redundancy and maximizing the relevancy by using the PCS is given in Algorithm 1.

    Algorithm 1:Minimizing the redundancy and maximizing the relevancy Input:Patients “Np,” packet “Pktt,” time “t,” features “Fe=(Fe1,Fe2,...,Fen)”O(jiān)utput:Minimal redundancy, maximum relevant features 1:Begin 2:For each packet “Pktt ” with “Np” patients 3:Frame the data matrix with features by using Eq.(1)4:Find the unique feature from feature set Fe by using Eq.(2) and bring the logical disconnection among features 5:Acquire maximum relevance by using Eq.(3) to cover the maximum number of patient records 6:Minimize the redundancy of features identified in the patient records by using Eq.(4)7:End for 8:End

    As given in Algorithm 1, the PCS in the MK-Means framework assigns the minimum subset of patient records (i.e., not all the attributes of the records are considered; only their relevant attributes), giving the maximum likelihood of classification accuracy in a selected training set.Patient records with a minimal subset are integrated with highly measured patient records on the basis of the “PCS,” resulting in an absolute feature selection.

    3.3 MK-Means Clustering

    K-means clustering is used to identify sets of sensor nodes with their collection represented by variable “K.” As patient records (e.g., blood pressure, pulse rate, etc.) change with respect to time, the MK-Means algorithm is used in this work because of the advantage of using rescaled(i.e., varied with respect to time) entity points.

    K-means clustering involves a set of sensor nodes “N,”“i”set of features, and “V;”including data matrix “DMat=dmatij,” where “dmatij” is the value of feature “j∈J” at entity “i ∈I.”The framework makes a partition “{Fe′=Fe′1,Fe′2,...,Fe′n}”of “i”in “K”non-overlapping subsets generated by Algorithm 1, referred to as clusters, each represented by a centroid “cK=(ckv)” in the feature space “k=1,2,...,K.” Then, “within cluster distances to centroid” are measured and given below.

    Subsequently, the Minkowski m-metric between M-dimensional points “x=xh” and “y=yh”is defined using the equation given below.

    With the obtained M-dimensional points, the groups or similar nodes (i.e., similar records),which exist in the network, are identified.With the obtained information, the identified records are transferred to the cluster head (CH) nodes.Fig.4 illustrates the block diagram with a brief working structure of the suggested IDS by using the MK-Means algorithm.The work proposed here assumes that the sink hole or black hole nodes either drop the data or claim to owe the shortest path.

    Figure 4:MK-means IDS

    From the sensing devices, the CH gathers the data, and nodes are differentiated by stars as the CH and normal sensor nodes are denoted by filled circles.The Sink position is fixed randomly on the basis of the GCCR [34].

    The intrusion detection consists of a correlation measure that estimates the intrusion measure(IntMsr) from the extracted feature values.Data packets receive “DPktrec;” data transmit packet“DPkttr;” and node ID’s “Si” is applied to estimate “IntMsr.” The alert message is activated by an intrusion detection engine that depends on the “IntMsr” input, which denotes the presence or absence of cooperated nodes (i.e., sink hole or black hole nodes).Fig.5 shows an example network that includes sink hole and black hole attacks.

    As presented in Fig.5, “S1” and “Dst” are the source and destination nodes, respectively.Circle “Sh” represents the sink hole node, which attracts the traffic with “S4,” “S6,” and “S7”being the compromised nodes.Meanwhile, “S9” denotes the black hole node, which claims to possess the shortest path with “S5” being the compromised node.

    The correlation measure is obtained with the aid of the intrusion measure using the data packets received and data packets transmitted for each CH node.It is mathematically measured as follows:

    With the intrusion measure, the IDS activates an alert message according to the resultant values.

    Figure 5:An attack detection generated by the IDS with a sample network

    The pseudo code representation for the sink hole and black hole attack detection using a machine learning technique is given in Algorithm 2.

    Algorithm 2:Sink hole and black hole attack detection using a machine learning algorithm Input:Sensor node “Si,” data packet received “DPktR,” data packet transmitted “DPktT”O(jiān)utput:Detection of sink hole or black hole 1:Begin 2:F or network sensing nodes “Si” (i.e., that form cluster)<=N 3:Calculate in cluster distances by using Eq.(5)4:Calculate m-metric between M-dimensional points by using Eq.(6)5:End for 6:Repeat 7:Calculate intrusion measure “IntMsr” by using Eq.(7)8:If “IntMsri →∞,” then 9:The matching “Si” is the sink hole node.10:Isolate “Si” node 11:Send alert notice about “Si” to the cluster member nodes that remain in the network 12:End if 13:If “freq(DPktRi[Si])=0,” then 14:Fix black hole node “Si”15:Isolate “Si” node 16:Send alert notice about “Si” to the cluster member nodes that remain in the network 17:Else 18:The matching “Si” in the network is a normal CH.

    19:End if 20:Until communication process is accomplished 21:End

    The IDS comprises a correlation measure module, which calculates the intrusion measure(IntMsr) from the extracted features by using the PCS.The correlation measure transmits the“IntMsr” input to the attack detection engine.The detection technique activates the alert message depending on the “IntMsr,” which signifies the role of compromised node as live or not.

    4 Experimental Results

    The model specified is executed using Network Simulator-3 (NS-3).Nodes, which are deployed in the region on the basis of the random-waypoint model and scenario, vary from 50 to 500.For each sensor node, the model behavior is repeated individually, and variation is made in mobility by constructing each node to be stationary for a certain pause period.The parameters used for simulation are shown in Tab.1.

    In this segment, the experimental results are presented to exhibit the efficiency of the hybrid attack detection accuracy framework.The proposed framework is compared along with the adaptive sink aware (SINK-AWARE) algorithm and secure route discovery in AODV (AODV-SR) as both are analogues to the proposed framework; the location estimation of sink hole and black hole attackers is also conducted using the two algorithms.In the NS-3 implementation, a set of nodes in WBANs is randomly deployed in a “500 ?500 m2” area, and each node has 150 m as the communication range.

    Table 1:Parameters used for simulation

    4.1 Performance Measures

    The following performance metrics are applied in the current scenario.

    4.1.1 Computational Complexity(CC)CCinvolves the time taken to measure the Minkowski m-metric between M-dimensional points “Dism(x,y)” and the intrusion measure (IntMsr) for detecting intrusion.

    4.1.2 Attack Detection Accuracy

    The attack detection accuracy is formulated as follows:

    From Eq.(9), attack detection accuracy “ADacc” is attained with the complete sensor nodes“Si,” which are obtained from patients “P” and attack (sink hole or black hole) nodes “Atts”during data transmission in healthcare WBANs.

    4.1.3 Packet Loss Rate

    Packet loss is said to occur when certain packets fail to reach the intended destination and network congestion.It is measured as the ratio of packets lost with respect to the packets sent.

    From Eq.(10), packet loss rate “PLR” is the difference between the data packet transmitted“DPktTi” and the data packet received “DPktRi” by “i” nodes.

    4.1.4 E2E Delay

    E2E delay refers to the duration consumed for a packet to be transmitted to a network wide from source to destination.It is mathematically evaluated as given below.

    E2E delay “DelayEnd2End” is the measure of total delay occurred for the transmission of data packets “DPktT′i” to the successful delivery of a packet with respect to delay to the data packets in total “DPkti.” It is measured in terms of milliseconds and involves waiting at interface queues,propagation time, transfer time, and retransmission time.

    5 Discussion

    The result analysis of the MK-Means framework is compared with existing SINK-AWARE algorithm [1] and AODV-SR [2].

    5.1 Computational Complexity(CC)

    To conduct experimentation, 500 sensor nodes with varying sizes of data packets sent at different time intervals are selected.With these sensor nodes, the CC involved in attack detection is identified.

    Fig.6 illustrates the computational risk involved in attack detection averaged over 500 random training sensor nodes.The inference drawn from the experimental results clearly shows that it exceeds statistical measures compared with existing techniques SINK-AWARE [1] and AODVSR [2].The experimental outcome of the proposed work points out a significant improvement in different deployment scenarios and a reduced CC with the MK-Means.With the deployment of 100 nodes, the CC is observed to be 5.25 and 8.89 milliseconds using SINK-AWARE and 9.23 milliseconds using AODV-SR.The CC involved in attack detection is improved with the application of the PCS, which considers the overlapping of medical data across classes for different patients and evaluates the discriminative features for attack detection.Furthermore, the PCS regarding the overlapping of features is made on the basis of the time-related growth values with which the aggregated mask value is considered, resulting in the minimum redundant and maximum relevant features to be extracted.Moreover, the CC involved in attack detection is reduced by 31% compared with SINK-AWARE and 10% compared with AODV-SR.

    Figure 6:Computational complexity with respect to network size

    5.2 Impact of Attack Detection Accuracy

    The average results of 10 simulation runs, which are performed to measure the accuracy of attack detection, are shown in Fig.7.The sensing nodes vary from 50 to 500 in the experimental scenario.As discussed in previous sections, the attack (sink hole and black hole) detection ratio using the MK-Means framework produces better results than employing contemporary methods.The attack detection accuracy of the deployment of 50 nodes using MK-Means is 83.93% and 78.53% using SINK-AWARE and 73.53% using AODV-SR.

    The attack detection ratio with the MK-Means framework is compared with SINK-AWARE and AODV-SR in Fig.7, which shows betterment using MK-Means.The MK-Means framework differs from SINK-AWARE and AODV-SR, as it incorporates a machine learning algorithm for sink hole and black hole detection.The advantage of applying a machine learning algorithm in the MK-Means framework is that an intrusion measure is used to validate attacks, and the intrusion measure value is a time-related growth value in that it obtains patient information with respect to time.This time-related increase value is then used to decide whether any type of attack or a normal node is observed.This decision, in turn, improves the attack detection ratio as 7.8%against SINK-AWARE and 8.5% against AODV-SR.

    Figure 7:Detection accuracy based on the number of nodes

    5.3 Effect of Packet Loss Ratio

    The packet loss ratio is evaluated when the source transfers a volume of data (i.e., patient records) to the destination (i.e., laboratory technicians or doctors).The experiments are conducted using 200 data packets with various sizes, and the packet loss rate is measured by the set of packets received per second (pps).

    Fig.8 illustrates the packet loss rate for the MK-Means framework, SINK-AWARE, and AODV-SR with 200 different data packets.The average packet loss rate returned over the MKMeans framework increases gradually for different data packets and proves to be efficient when compared with the two other methods.Fig.8 also reveals that the average packet loss ratio while performing attack detection is enhanced by the MK-Means framework.With the MKMeans algorithm, rescaled entity points with various patient features are considered (i.e., due to the non-static nature of patient records as discussed in [35]).The packet loss rate is reduced by considering the rescaled entity points and non-overlapping subsets produced by Algorithm 1.From the extracted features, attack detection is performed, resulting in the upscale of the packet loss ratio by the MK-Means structure by 25.4% with respect to SINK-AWARE and 16.3% with respect to AODV-SR.

    5.4 Impact of E2E Delay

    The E2E delay is measured with different sizes of data packets against all the three algorithms, and the resultant values are shown in Fig.9.The E2E delay rate is measured in terms of milliseconds for experimental purpose.Fig.9 reveals that the E2E delay is lower when using the MK-Means framework than when using existing methods, such as SINK-AWARE and AODVSR.The reason is because within cluster distances to centroid are measured using MK-Means,where similar patient records are transferred to the CH node, as given in [36].This CH node then obtains the correlation by using the intrusion measure.Therefore, not all the node information is transferred to the IDS; only the updated patient records with respect to time using MK-Means are used as measures for obtaining the correlation value.Considering such a situation, the E2E delay, which uses the MK-Means framework, is reduced by 37.4% compared with SINK-AWARE and 8.7% compared with AODV-SR.

    Figure 8:Packet loss rate

    Figure 9:E2E delay with increased sensor nodes

    6 Conclusion

    Healthcare WBANs remain susceptible to security risks, such as sink hole and black hole attacks.To overcome these issues, an intrusion detection framework is proposed for detecting attacks and alerting sensing nodes to minimize data loss.Specifically, the architectural view for the intrusion detection of healthcare WBANs, which use the PCS and the MK-Means machine learning technique, is implemented for data reduction and classification accuracy, respectively.The PCS minimizes the feature size, which, in turn, cuts down classification complexities, with which the attack detection accuracy is improved.The proposed attack detection framework captures the sink hole and black hole nodes with computation ability and activates the remaining deployed nodes through an alert message.Furthermore, the numerical results drawn from various executions demonstrate that the proposed attack detection framework reduces the E2E delay and packet loss rate with the help of CH nodes, which send only updated patient records.

    Although CC is reduced, the experiments are conducted with only few records.For handling voluminous data, algorithmic techniques must be changed accordingly or suitable learning algorithms with cloud data management should be incorporated in the future to adopt this technique in healthcare domains.

    Funding Statement:This research received no grant funding.APC was funded by ?Stefan cel Mare University of Suceava, Romania.

    Conflicts of Interest:The authors declare no conflicts of interest to report regarding the study.

    日韩欧美三级三区| 国产精品久久久久久亚洲av鲁大| 99热精品在线国产| 啦啦啦观看免费观看视频高清| 欧美日本视频| 少妇的逼水好多| 小蜜桃在线观看免费完整版高清| 天天一区二区日本电影三级| 亚洲性久久影院| 99热精品在线国产| 少妇的逼水好多| 欧美高清成人免费视频www| 成人一区二区视频在线观看| 伦精品一区二区三区| 国产免费男女视频| 看十八女毛片水多多多| 国产精品国产高清国产av| 伦理电影大哥的女人| 国产免费男女视频| 三级经典国产精品| 黄色日韩在线| 亚洲精品亚洲一区二区| 久久欧美精品欧美久久欧美| 女同久久另类99精品国产91| 边亲边吃奶的免费视频| 日韩精品青青久久久久久| 少妇丰满av| 此物有八面人人有两片| 91午夜精品亚洲一区二区三区| 国产三级在线视频| 草草在线视频免费看| 日韩欧美一区二区三区在线观看| 久久久久久久久久黄片| 男女下面进入的视频免费午夜| 99久久中文字幕三级久久日本| 99在线人妻在线中文字幕| 日韩成人av中文字幕在线观看| 六月丁香七月| 亚洲av第一区精品v没综合| 午夜福利在线观看吧| 午夜老司机福利剧场| 亚洲一区高清亚洲精品| 日韩大尺度精品在线看网址| 中国美白少妇内射xxxbb| 免费无遮挡裸体视频| av福利片在线观看| av天堂中文字幕网| 日日啪夜夜撸| 久久中文看片网| 菩萨蛮人人尽说江南好唐韦庄 | 欧美成人一区二区免费高清观看| 高清日韩中文字幕在线| 蜜臀久久99精品久久宅男| 午夜a级毛片| 色综合亚洲欧美另类图片| 此物有八面人人有两片| 精品人妻偷拍中文字幕| 亚洲最大成人中文| 夜夜爽天天搞| 亚洲婷婷狠狠爱综合网| 中国国产av一级| 深夜a级毛片| 99热这里只有是精品50| 亚洲av成人精品一区久久| 亚洲av成人精品一区久久| 一本精品99久久精品77| 国产在线精品亚洲第一网站| 日本黄色片子视频| 欧美极品一区二区三区四区| 一本精品99久久精品77| 欧美最黄视频在线播放免费| 丝袜喷水一区| 精品国内亚洲2022精品成人| 蜜桃亚洲精品一区二区三区| 亚洲国产精品久久男人天堂| 国产在视频线在精品| 韩国av在线不卡| 亚洲欧美清纯卡通| 能在线免费观看的黄片| 国产单亲对白刺激| 国产日韩欧美在线精品| 国产 一区 欧美 日韩| 亚洲不卡免费看| 精品久久久久久成人av| 精品久久久噜噜| 国产日韩欧美在线精品| 级片在线观看| 精品久久久久久久久久久久久| 国产 一区 欧美 日韩| 亚洲av中文字字幕乱码综合| 岛国毛片在线播放| 久久精品国产亚洲av涩爱 | 国产日本99.免费观看| 蜜桃久久精品国产亚洲av| 精品久久久久久久人妻蜜臀av| 午夜精品一区二区三区免费看| 大又大粗又爽又黄少妇毛片口| 国产激情偷乱视频一区二区| 中国美白少妇内射xxxbb| 国产熟女欧美一区二区| 欧美区成人在线视频| 夫妻性生交免费视频一级片| 日本黄色视频三级网站网址| 男女啪啪激烈高潮av片| 只有这里有精品99| 精品久久久噜噜| 亚洲第一电影网av| 欧美极品一区二区三区四区| 亚洲在线自拍视频| 免费av观看视频| 老熟妇乱子伦视频在线观看| 人妻夜夜爽99麻豆av| 人人妻人人澡人人爽人人夜夜 | www.av在线官网国产| 国产亚洲精品av在线| 精品日产1卡2卡| 国产成人午夜福利电影在线观看| 熟女电影av网| 麻豆久久精品国产亚洲av| 日本熟妇午夜| 国产熟女欧美一区二区| 国产一级毛片七仙女欲春2| 3wmmmm亚洲av在线观看| 五月玫瑰六月丁香| 有码 亚洲区| av在线天堂中文字幕| 我要搜黄色片| 日韩成人av中文字幕在线观看| 午夜老司机福利剧场| 国产片特级美女逼逼视频| 国产亚洲欧美98| 国产久久久一区二区三区| 久久亚洲国产成人精品v| 亚洲中文字幕日韩| 欧美日本亚洲视频在线播放| 深夜a级毛片| 国产精品久久久久久精品电影| 亚洲av成人av| 欧美zozozo另类| 在线观看一区二区三区| 日日撸夜夜添| 色综合站精品国产| 成人特级av手机在线观看| 99riav亚洲国产免费| 亚洲精品456在线播放app| 国产大屁股一区二区在线视频| 亚洲成av人片在线播放无| 日韩在线高清观看一区二区三区| 九草在线视频观看| 亚洲一区二区三区色噜噜| 菩萨蛮人人尽说江南好唐韦庄 | 网址你懂的国产日韩在线| 国产精品综合久久久久久久免费| 久久国产乱子免费精品| 美女黄网站色视频| 一夜夜www| 国产精品一区www在线观看| 国产中年淑女户外野战色| 在线播放国产精品三级| 丝袜喷水一区| 中国美白少妇内射xxxbb| 精品人妻偷拍中文字幕| 国产精品一及| 亚洲av成人av| 国产国拍精品亚洲av在线观看| 亚洲国产精品成人综合色| 国产精品一区www在线观看| 麻豆一二三区av精品| 天堂网av新在线| 特级一级黄色大片| 黄色配什么色好看| 国产亚洲精品久久久久久毛片| 在线观看av片永久免费下载| 国产一区亚洲一区在线观看| 嫩草影院入口| 久久久久九九精品影院| 给我免费播放毛片高清在线观看| 夜夜夜夜夜久久久久| 亚洲在线自拍视频| 日韩,欧美,国产一区二区三区 | 日韩欧美国产在线观看| 成人综合一区亚洲| 一个人看视频在线观看www免费| 变态另类成人亚洲欧美熟女| 国产高潮美女av| 欧美bdsm另类| 淫秽高清视频在线观看| 日日摸夜夜添夜夜爱| 亚洲国产精品成人久久小说 | 欧美区成人在线视频| 人人妻人人澡欧美一区二区| 亚洲一级一片aⅴ在线观看| 精品久久国产蜜桃| 亚洲av免费高清在线观看| 一级黄片播放器| 啦啦啦韩国在线观看视频| 亚洲成人av在线免费| 3wmmmm亚洲av在线观看| 国产成人精品婷婷| 亚洲四区av| 精品人妻一区二区三区麻豆| 国产成人午夜福利电影在线观看| 亚洲欧美精品自产自拍| 日韩av不卡免费在线播放| 久久精品久久久久久噜噜老黄 | 亚洲国产高清在线一区二区三| 亚洲激情五月婷婷啪啪| 欧美一区二区亚洲| 99久国产av精品国产电影| 蜜桃久久精品国产亚洲av| 亚洲色图av天堂| 九九久久精品国产亚洲av麻豆| 狠狠狠狠99中文字幕| 如何舔出高潮| 91狼人影院| 亚洲成人av在线免费| 国产男人的电影天堂91| 国产成人福利小说| 亚洲国产欧美在线一区| 国产成人影院久久av| 直男gayav资源| 国产午夜精品论理片| 免费观看在线日韩| 国产精品一区二区三区四区久久| 变态另类丝袜制服| 午夜福利在线观看吧| 精品99又大又爽又粗少妇毛片| 日韩在线高清观看一区二区三区| 男的添女的下面高潮视频| 波多野结衣高清无吗| 亚洲成人中文字幕在线播放| 一级二级三级毛片免费看| 中出人妻视频一区二区| 欧美激情国产日韩精品一区| ponron亚洲| 国产一区亚洲一区在线观看| 18禁在线无遮挡免费观看视频| 中文字幕人妻熟人妻熟丝袜美| 网址你懂的国产日韩在线| 少妇丰满av| 偷拍熟女少妇极品色| 麻豆乱淫一区二区| 国内精品一区二区在线观看| 中文字幕av成人在线电影| 草草在线视频免费看| 免费大片18禁| 亚洲av免费高清在线观看| 青春草视频在线免费观看| 日本一本二区三区精品| 免费看光身美女| 少妇被粗大猛烈的视频| 精品久久久噜噜| 精品少妇黑人巨大在线播放 | 国产91av在线免费观看| 人体艺术视频欧美日本| 国产成年人精品一区二区| 能在线免费看毛片的网站| 国产精品久久久久久久久免| 小蜜桃在线观看免费完整版高清| 欧美区成人在线视频| a级毛片a级免费在线| 一本久久精品| 国产亚洲av片在线观看秒播厂 | 男女下面进入的视频免费午夜| av在线天堂中文字幕| 三级毛片av免费| 中出人妻视频一区二区| 国产精品野战在线观看| 久久久久国产网址| 欧美又色又爽又黄视频| 亚洲欧洲日产国产| 一进一出抽搐动态| 亚洲性久久影院| 欧美日韩在线观看h| 毛片一级片免费看久久久久| 亚洲久久久久久中文字幕| 国产免费男女视频| 国产精品久久久久久亚洲av鲁大| 亚洲国产欧美在线一区| 亚洲最大成人手机在线| 中出人妻视频一区二区| 国产亚洲精品av在线| 亚洲成人久久性| 国产视频首页在线观看| 亚洲国产精品成人久久小说 | 欧美精品一区二区大全| 欧美日韩在线观看h| 午夜亚洲福利在线播放| 国产69精品久久久久777片| 99热精品在线国产| 永久网站在线| 色综合亚洲欧美另类图片| 成人午夜高清在线视频| 在线观看午夜福利视频| 中文字幕制服av| 成人永久免费在线观看视频| 国产三级中文精品| 一级毛片电影观看 | 欧美最新免费一区二区三区| 亚洲欧洲国产日韩| 免费搜索国产男女视频| 中文字幕人妻熟人妻熟丝袜美| .国产精品久久| 国产高清视频在线观看网站| 99在线视频只有这里精品首页| 91精品一卡2卡3卡4卡| 欧美又色又爽又黄视频| 狠狠狠狠99中文字幕| 国产综合懂色| 草草在线视频免费看| 三级毛片av免费| 两个人的视频大全免费| 狠狠狠狠99中文字幕| 成人美女网站在线观看视频| 美女国产视频在线观看| 桃色一区二区三区在线观看| av.在线天堂| 久久午夜福利片| 欧美日本视频| 亚洲一级一片aⅴ在线观看| 日本在线视频免费播放| 亚洲精品久久久久久婷婷小说 | 一级毛片久久久久久久久女| a级一级毛片免费在线观看| 男人舔女人下体高潮全视频| 久久久久性生活片| 一区二区三区高清视频在线| 能在线免费看毛片的网站| 国产精品野战在线观看| 男女做爰动态图高潮gif福利片| 国产精品美女特级片免费视频播放器| 国产精品1区2区在线观看.| 淫秽高清视频在线观看| 又黄又爽又刺激的免费视频.| 日韩制服骚丝袜av| 欧美3d第一页| 精品一区二区三区人妻视频| 亚洲精品国产av成人精品| 国产免费男女视频| 国产av不卡久久| 国产色爽女视频免费观看| 国产真实伦视频高清在线观看| 最近手机中文字幕大全| 国产亚洲精品久久久久久毛片| 校园人妻丝袜中文字幕| 日日摸夜夜添夜夜添av毛片| 色哟哟·www| 又爽又黄a免费视频| 九九久久精品国产亚洲av麻豆| 国产美女午夜福利| 国内精品一区二区在线观看| 国产国拍精品亚洲av在线观看| 欧美极品一区二区三区四区| 精品人妻视频免费看| 成年免费大片在线观看| 国产爱豆传媒在线观看| 简卡轻食公司| 亚洲电影在线观看av| 日本爱情动作片www.在线观看| 久久久久久久久久成人| 久久精品综合一区二区三区| 99久久人妻综合| 国产三级在线视频| 国产黄色视频一区二区在线观看 | 午夜a级毛片| 一级黄片播放器| 熟女电影av网| 18禁在线无遮挡免费观看视频| 日日摸夜夜添夜夜添av毛片| 深爱激情五月婷婷| a级一级毛片免费在线观看| 成人国产麻豆网| 精品日产1卡2卡| 男女啪啪激烈高潮av片| 在线免费观看不下载黄p国产| 麻豆久久精品国产亚洲av| 嫩草影院入口| 欧美日韩综合久久久久久| 日本免费a在线| 欧美潮喷喷水| 九九热线精品视视频播放| 老女人水多毛片| av免费在线看不卡| 精品日产1卡2卡| 又粗又爽又猛毛片免费看| 国产麻豆成人av免费视频| 久久精品91蜜桃| 禁无遮挡网站| 久久久久免费精品人妻一区二区| 国国产精品蜜臀av免费| 久久这里有精品视频免费| 我的女老师完整版在线观看| 精品久久久久久久久久久久久| 99久久久亚洲精品蜜臀av| 超碰av人人做人人爽久久| 亚洲在久久综合| 日韩强制内射视频| 麻豆成人av视频| 国产一区二区激情短视频| 久久久久久久亚洲中文字幕| 床上黄色一级片| 成人美女网站在线观看视频| 色哟哟·www| 免费人成在线观看视频色| 国产精品国产三级国产av玫瑰| 亚洲在线自拍视频| 97超视频在线观看视频| a级毛色黄片| 久久国产乱子免费精品| 美女高潮的动态| 日韩欧美精品v在线| 麻豆乱淫一区二区| 成人三级黄色视频| 久久久国产成人精品二区| 久久99精品国语久久久| 亚洲av不卡在线观看| 久久99精品国语久久久| 国产美女午夜福利| 亚洲精品日韩在线中文字幕 | 日本黄色视频三级网站网址| 午夜老司机福利剧场| 国产午夜福利久久久久久| 最后的刺客免费高清国语| 亚洲经典国产精华液单| 亚洲高清免费不卡视频| 免费av不卡在线播放| 日本av手机在线免费观看| 久久久久国产网址| 亚洲aⅴ乱码一区二区在线播放| 久久久久久久久久久免费av| 日日摸夜夜添夜夜爱| 天天一区二区日本电影三级| 欧美xxxx黑人xx丫x性爽| 国产黄片美女视频| 亚洲精品影视一区二区三区av| 国产精品国产高清国产av| а√天堂www在线а√下载| 国产精品一区二区在线观看99 | av在线蜜桃| 在线免费十八禁| 成年女人看的毛片在线观看| 精品久久久久久久末码| 亚洲成人av在线免费| 我要搜黄色片| 小说图片视频综合网站| 高清毛片免费观看视频网站| 国产女主播在线喷水免费视频网站 | 国产91av在线免费观看| 久久亚洲精品不卡| 乱码一卡2卡4卡精品| 亚洲av男天堂| 国产 一区 欧美 日韩| 精品久久国产蜜桃| 看黄色毛片网站| 欧美日韩乱码在线| 不卡视频在线观看欧美| 超碰av人人做人人爽久久| 国产白丝娇喘喷水9色精品| 一区二区三区四区激情视频 | 日韩欧美精品免费久久| 大香蕉久久网| 午夜福利视频1000在线观看| 寂寞人妻少妇视频99o| 精品无人区乱码1区二区| 国产乱人视频| 国产v大片淫在线免费观看| 成人鲁丝片一二三区免费| 亚洲经典国产精华液单| av卡一久久| 波野结衣二区三区在线| 99国产精品一区二区蜜桃av| 久久久久免费精品人妻一区二区| 一夜夜www| 三级男女做爰猛烈吃奶摸视频| 久久午夜福利片| 国产老妇女一区| 午夜爱爱视频在线播放| 波多野结衣高清无吗| 午夜福利成人在线免费观看| 九九久久精品国产亚洲av麻豆| 国产成人a区在线观看| 国产男人的电影天堂91| 国产激情偷乱视频一区二区| 综合色丁香网| 欧美不卡视频在线免费观看| 男人和女人高潮做爰伦理| 精品一区二区三区人妻视频| 亚洲欧美日韩高清专用| 又粗又爽又猛毛片免费看| 国产美女午夜福利| 村上凉子中文字幕在线| 亚洲av电影不卡..在线观看| 99久久精品热视频| 天堂网av新在线| 3wmmmm亚洲av在线观看| 亚洲av电影不卡..在线观看| 精华霜和精华液先用哪个| 亚洲人与动物交配视频| 欧美日韩一区二区视频在线观看视频在线 | 能在线免费看毛片的网站| 日韩国内少妇激情av| 69av精品久久久久久| 内射极品少妇av片p| 99在线人妻在线中文字幕| 欧美3d第一页| 日韩av不卡免费在线播放| 欧美xxxx黑人xx丫x性爽| 日日摸夜夜添夜夜添av毛片| 有码 亚洲区| 国产日韩欧美在线精品| 精品国产三级普通话版| 成人鲁丝片一二三区免费| 九九在线视频观看精品| 少妇猛男粗大的猛烈进出视频 | 色尼玛亚洲综合影院| 少妇人妻一区二区三区视频| 久久精品国产亚洲网站| 国产精品一区二区性色av| 91久久精品国产一区二区成人| 日韩在线高清观看一区二区三区| 亚洲国产欧洲综合997久久,| 日本黄色片子视频| 午夜福利高清视频| 少妇猛男粗大的猛烈进出视频 | 尤物成人国产欧美一区二区三区| 免费av毛片视频| 成人午夜精彩视频在线观看| 乱人视频在线观看| 全区人妻精品视频| 国产美女午夜福利| 男女做爰动态图高潮gif福利片| 国产色爽女视频免费观看| 久久综合国产亚洲精品| 久久久久久久久久久免费av| 精品久久久久久久末码| 熟女电影av网| 国产老妇伦熟女老妇高清| 又粗又爽又猛毛片免费看| 99久久人妻综合| 亚洲国产色片| h日本视频在线播放| 亚洲欧美日韩高清专用| 欧美bdsm另类| 一级毛片aaaaaa免费看小| 青青草视频在线视频观看| 在线天堂最新版资源| 能在线免费观看的黄片| 亚洲欧美成人综合另类久久久 | 国产人妻一区二区三区在| av国产免费在线观看| 99精品在免费线老司机午夜| 欧美一区二区亚洲| 国产精品一区二区在线观看99 | 日本与韩国留学比较| 久久草成人影院| 日韩欧美一区二区三区在线观看| 中文字幕av在线有码专区| 免费观看人在逋| 精品一区二区三区人妻视频| 国产日本99.免费观看| 在线免费观看的www视频| 国产精品电影一区二区三区| 99久久无色码亚洲精品果冻| 不卡一级毛片| 国产91av在线免费观看| 亚洲自偷自拍三级| 免费看光身美女| 免费观看的影片在线观看| 欧美日韩在线观看h| 亚洲第一电影网av| 国产成年人精品一区二区| 成人高潮视频无遮挡免费网站| 成人漫画全彩无遮挡| 亚洲欧美日韩东京热| 18禁在线播放成人免费| 亚洲欧美日韩卡通动漫| 成人av在线播放网站| 亚洲最大成人中文| 欧美性感艳星| 免费观看精品视频网站| 床上黄色一级片| 在线国产一区二区在线| 淫秽高清视频在线观看| 午夜免费男女啪啪视频观看| 国产私拍福利视频在线观看| 亚洲国产精品久久男人天堂| 亚洲欧美精品专区久久| 午夜精品在线福利| 中文字幕av成人在线电影| 成人av在线播放网站| 欧美日韩综合久久久久久| 国产精品嫩草影院av在线观看| 国产精品久久久久久久电影| 久久九九热精品免费| 大型黄色视频在线免费观看| 亚洲四区av| 亚洲国产高清在线一区二区三| 亚洲精品久久国产高清桃花| 国产午夜福利久久久久久| 久久国内精品自在自线图片| 亚洲中文字幕一区二区三区有码在线看| 国产成人a∨麻豆精品| 伦理电影大哥的女人| 成人午夜高清在线视频| 欧美日本视频| 欧美激情在线99| 免费无遮挡裸体视频| 国产精品久久久久久av不卡| 日韩一本色道免费dvd| 国产精品蜜桃在线观看 | 成年女人永久免费观看视频| 亚洲成人av在线免费| 热99re8久久精品国产| 一区福利在线观看| 午夜视频国产福利|