Вы находитесь на странице: 1из 6

International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

RESEARCH ARTICLE OPEN ACCESS

Deployment with Location Knowledge by Multi Area


Approach
Shashidhar Kasthala
Assistant Professor Indian Naval Academy
ABSTRACT
Wireless Sensor Network (WSN) is profoundly imperative for securing network protection. Profoundly basic
attacks of different types have been reported in wireless sensor network till now by numerous researchers.
Various replica node detection techniques have been proposed to detect these replica nodes. These methods
incur control overheads and the detection accuracy is low when the replica is selected as a witness node. To stop
the node replica attack, e propose a location cluster detection scheme using deployment knowledge. From the
implementation results the proposed model compared with Area based cluster Approach (ABCD) and
Fingerprint based detection techniques.
Keywords: Networking, Wireless Sensor Networks (WSN), clustering, replica Detection, and Knowledge
discovery technique.

I. INTRODUCTION packet types. Despite that, on the grounds that


attackers can produce most packet data, describing
A Wireless Sensor Network (WSN) is a wireless attacks as single-or multi-source and recognizing
network comprising of spatially conveyed self- the quantity of attackers is troublesome [54-60].
ruling devices utilizing sensors to screen physical RN will be deployed back into the networks to
or ecological conditions [1-6]. LEACH protocol is eavesdrop communications or launch attacks.
the primary convention of various leveled routing
which proposed data combination; it is of point of II. RELATED WORKS
reference hugeness in clustering routing protocol.
Routing procedures and security issues are Wireless Sensor Networks (WSN) has wide
awesome research challenge [7-16]. Replica node applications in data gathering and data transmission
attacks are very dangerous to the operation of by means of wireless networks by [61]. Because of
sensor networks. With a single captured sensor the shortcomings in the WSN, the sensor nodes
node, the adversary can create as many replica were powerless against the vast majority of the
nodes as he wants; there could easily be as many security dangers. Denial of-Service (DoS) attack is
replica nodes as uncompromised nodes [17-28]. most mainstream attack on these sensor nodes.
The time and effort needed to inject so many Some attack aversion procedures must be utilized
replica nodes into the network is much less than the against DoS attacks. There are distinctive methods
effort to compromise the equivalent number of to avert DoS attack in wireless sensor network. An
original nodes [29-35]. A witness node that invulnerable framework was proposed for the DoS
receives two conflicting location claims for a node attack on WSN which will enhance the precision
concludes that the node has been replicated and rate of attack anticipation; decrease the false alarm
initiates a process to revoke the node. In the line- rate and ready to perceive distinctive Dos attack.
selected multicast scheme, both intermediate nodes, To solve these issues by enhancing the Single Hop
which relay the claims, and witness nodes Detection (SHD) method using the Clonal
participate in detecting and revoking replicas [36- Selection algorithm to detect the clones by
46]. The objective of this attack is to make a selecting the appropriate witness nodes [62]. The
sufficiently huge nearness of false activity with the advantages of the proposed method include (i)
end goal that authentic web movement expected for increase in the detection ratio, (ii) decrease in the
real web clients is backed off and postponed [47]. control overhead, and (iii) increase in throughput.
Different works manage methods for anticipating One among them is the node replication attack. In
unapproved access to data or with the essential this, the physically insecure nodes are acquired by
safety measures to ensure data genuineness and the adversary to clone them by having the same
uprightness inside the network. DoS attacks are identity of the captured node, and the adversary
keep the source node to convey its data to the goal deploys an unpredictable number of replicas
[48-53]. The attacks which work at the network throughout the network. Hence replica node
layer are alluded to as routing attacks. Monitoring detection is an important challenge in Mobile
tools can distinguish an attack and recognize Wireless Sensor Networks.Considering the
essential properties, for example, traffic rates and limitations of centralized detection schemes for
static wireless sensor networks, a few distributed
solutions have been recently proposed [63]To

ISSN: 2393-9516 www.ijetajournal.org Page 43


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

facilitate the discovery of contradictory conflicts, • Nodes choose probabilistically regardless of


we propose a hybrid local and global detection whether to end up noticeably a CH for the
method. The local detection is performed in a local current round in view of its outstanding
area smaller than the whole deployed area to energy and globally known wanted level of
improve the meeting probability of contradictory CHs. Those will communicate a message
nodes, while the distant replicated nodes in larger promoting this reality, at a level that can be
area can also be efficiently detected by the global heard by everybody in the network.
detection. • Each node knows when it is its turn to
transmit, as per the availability plan and the
III. REPLICA NODE DETECTION CHs gather messages from all their cluster
IN WSN individuals, total this information, and send
the outcome to the BS.
• The replica nodes are controlled by the
adversary. The problem is the replica nodes 4.1 Cluster formation for Replication Detection
also contain the key that is required for
secured communication in the network. In In a centralized approach for detecting node
addition to these problems, mobility of replication, the location claim of nodes will be
nodes, the collusion of replica, and sideway forwarded to a central trusted party. The simplest
attacks are the main difficulty while solution is to send all location claims to a base
detecting and controlling these replica station. However, if the base station stays in a
nodes. hostile environment, some location claims may not
• When the replicas are not detected, then the reach to the base station. The cluster head assumes
network will be open to attackers and the the part of facilitator inside its substructure, which
network becomes more vulnerable. goes about as a medium for data exchange between
• Security in wireless sensor networks is the nodes. Each CH goes about as an impermanent
challenging due to characteristics of sensor base station inside its cluster and speaks with
networks and the lack of hardware support different CHs by utilizing gateway nodes shows in
for incursion protection. figure 1. The Gateway node has at least two cluster
• In the node replication attack, an attacker heads as its neighbor's. At the point when the
intentionally puts replicas of a clusters are disjoint, in any event there one cluster
compromised node in many places in the head and another gateway node should begin.
network to make inconsistency. In the Cluster development helps to advance data
wormhole attack, an attacker can tunnel transmission reason K means clustering procedure
packets through a secret broadband channel steps appeared in underneath segment.
between two distant places and replay them 4.2 Deployment with Location Knowledge
to distort the network topology by making (DLK)
two distant nodes believe they are
neighbours. To improve the security as well as the performance
• However, these solutions are not of this approach with additional knowledge. The
satisfactory. First, they are energy and basic approach assumes that sensor nodes are
memory demanding: A serious drawback deployed group by group, and that each group is
for any protocol that is to be used in expected to be deployed towards a deployment
resource constrained environment such as a point that can be pre-determined. Prior to
sensor network. deployment, the network operator loads the pre-
determined deployment coordinates of every group
IV. LEACH PROTOCOL onto every sensor node. The sensor nodes in the
same group are very likely to be close to each other
LEACH protocol is the principal protocol of after deployment. Our schemes use this knowledge
progressive routing which proposed data fusion; it to stop node replication. To evaluate the security of
is of point of reference criticalness in clustering Scheme , we would like to point out that it is
routing protocol. Routing methodologies and infeasible to completely eliminate replicas from the
security issues are incredible research challenge. network.
These days in WSN, quantities of routing protocols
have been proposed however most surely Detection Steps
understood protocols are hierarchical protocols like
LEACH. The principle point of this protocol is to Initialize the network topology (Size from 1 to
enhance the life expectancy of wireless sensor 500). The Base station is settled and situated a long
networks by bringing down the energy. way from the sensors with correct threshold
esteem.

ISSN: 2393-9516 www.ijetajournal.org Page 44


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

V. RESULTS AND ANALYSIS replicated nodes would not trigger a revocation


procedure, and a claim message may be lost in the
Replica node detection process results are route path to the corresponding witness node. Both
discussed in Network Simulator (NS2) with of the results demonstrate that our approach
simulation parameters and IEEE 802.11b is provides better security resilience against the
connected to the MAC layer protocol. presented types of attack strategies in terms of a
higher detection rate with a reasonable increase of
communication overhead, and minimized the
Delay.

REFERENCE
[1] Anand Nayyar, Vikram Puri,
Nhu Gia Nguyen, Dac Nhuong Le, Smart
Surveillance Robot for the Real Time
Monitoring and Control System in
Environment and Industrial Applications,
Advances in Intelligent System and
Computing, pp 229-243, Springer
[2] Ezhilarasu, P., & Krishnaraj, N. (2015).
Applications of Finite Automata in Lexical
Figure 1: PDR Analysis
Analysis and as a Ticket Vending Machine–
A Review. Int. J. Comput. Sci. Eng.
Technol, 6(05), 267-270.
[3] Agrawal, U., Arora, J., Singh, R., Gupta, D.,
Khanna, A., & Khamparia, A. (2020).
Hybrid Wolf-Bat Algorithm for
Optimization of Connection Weights in
Multi-layer Perceptron. ACM Transactions
on Multimedia Computing,
Communications, and Applications
(TOMM), 16(1s), 1-20.
[4] Prasanna, S., & Ezhilmaran, D. (2016).
Association rule mining using enhanced
apriori with modified GA for stock
prediction. International Journal of Data
Mining, Modelling and Management, 8(2),
195-207.
Figure 2: NLT analysis [5] Pustokhina, I. V., Pustokhin, D. A., Gupta,
Figure 1 and 2 shows the results for PDR and D., Khanna, A., Shankar, K., & Nguyen, G.
NLT, Compared to all the techniques, the proposed N. (2020). An effective training scheme for
model gets maximum that means the routing deep neural network in edge computing
protocol chooses the trust node and carry out the enabled Internet of medical things (IoMT)
data forwarding while constructing the WSN systems. IEEE Access, 8, 107112-107123.
process. Our proposed clustering achieves 35% for
all the parameters and reaches 40% in PDR so; it [6] Shankar, K., Zhang, Y., Liu, Y., Wu, L., &
has the route recovery mechanism. In the route Chen, C. H. (2020). Hyperparameter tuning
recovery procedures, the consumption begins to deep learning for diabetic retinopathy fundus
increase when the speed increase. image classification. IEEE Access, 8,
118164-118173.
VI. CONCLUSION [7] Joshi, G. P., Perumal, E., Shankar, K., Tariq,
U., Ahmad, T., & Ibrahim, A. (2020).
The privacy and security of data are the real issues Toward Blockchain-Enabled Privacy-
worried about the wireless sensor networks. Preserving Data Transmission in Cluster-
Extraordinary avoidance methods are required to Based Vehicular
manage the clone node attacks in WSNs. Networks. Electronics, 9(9), 1358.
Moreover, the principle goal of this procedure was [8] Saračević, M. H., Adamović, S. Z.,
to maximize replica detection level on the number Miškovic, V. A., Elhoseny, M., Maček, N.
of nodes, clusters, and privacy of the transmission. D., Selim, M. M., & Shankar, K. (2020).
Our proposed detection model This is because Data Encryption for Internet of Things

ISSN: 2393-9516 www.ijetajournal.org Page 45


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

Applications Based on Catalan Objects and Nondeterministic Finite Automata. Indian


Two Combinatorial Structures. IEEE Journal Of Science And Technology, 8, 26.
Transactions on Reliability. [20] Amira S. Ashour, Samsad Beagum, Nilanjan
[9] Namasudra, S., & Roy, P. (2017). Time Dey, Ahmed S. Ashour, Dimitra Sifaki
saving protocol for data accessing in cloud Pistolla, Gia Nhu Nguyen, Dac-Nhuong Le,
computing. IET Communications, 11(10), Fuqian Shi (2018), Light Microscopy Image
1558-1565. De-noising using Optimized LPA-ICI Filter,
[10] Elsir, A., Elsier, O., Abdurrahman, A., & Neural Computing and Applications,
Mubarakali, A. (2019). Privacy Preservation Vol.29(12), pp 1517–1533, Springer, ISSN:
in Big Data with Data Scalability and 0941-0643.
Efficiency Using Efficient and Secure Data [21] Prasanna, S., Govinda, K., & Kumaran, U.
Balanced Scheduling Algorithm. S. (2012). An Evaluation study of Oral
[11] Ezhilarasu, P., Krishnaraj, N., & Babu, S. V. Cancer Detection using Data Mining
(2015). Applications of finite automata in Classification Techniques. International
text search-a review. International Journal of Journal of Advanced Research in Computer
Science, Engineering and Computer Science, 3(1).
Technology, 5(5), 116. [22] Sankhwar, S., Gupta, D., Ramya, K. C.,
[12] Huyen, D.T.T., Binh, N.T., Tuan, T.M., Rani, S. S., Shankar, K., &
Nguyen, G.N, Dey, N., Son, L.H, Analyzing Lakshmanaprabu, S. K. (2020). Improved
trends in hospital-cost payments of patients grey wolf optimization-based feature subset
using ARIMA and GIS: Case study at the selection with fuzzy neural classifier for
Hanoi Medical University Hospital, financial crisis prediction. Soft
Vietnam, Journal of Medical Imaging and Computing, 24(1), 101-110.
Health Informatics, 7(2), pp. 421-429. [23] Namasudra, S., & Deka, G. C. (2018).
[13] Prasanna, S., & Maran, E. (2015). Stock Introduction of DNA computing in
Market Prediction Using Clustering with cryptography. In Advances of DNA
Meta-Heuristic Approaches. Gazi University computing in cryptography (pp. 1-18).
Journal of Science, 28(3). Chapman and Hall/CRC.
[14] Pustokhina, I. V., Pustokhin, D. A., [24] Mubarakali, A., Srinivasan, K., Mukhalid,
Rodrigues, J. J., Gupta, D., Khanna, A., R., Jaganathan, S. C., & Marina, N. (2020).
Shankar, K., ... & Joshi, G. P. (2020). Security challenges in internet of things:
Automatic Vehicle License Plate Distributed denial of service attack detection
Recognition using Optimal K-Means with using support vector machine‐based expert
Convolutional Neural Network for systems. Computational Intelligence.
Intelligent Transportation Systems. IEEE [25] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu
Access. Nguyen, Vikrant Bhateja, Suresh Chandra
[15] Namasudra, S. (2018). Cloud computing: A Satapathy (2017), Optimizing Feature
new era. Journal of Fundamental and Selection in Video-based Recognition using
Applied Sciences, 10(2). Max-Min Ant System for the Online Video
[16] Uthayakumar, J., Elhoseny, M., & Shankar, Contextual Advertisement User-Oriented
K. (2020). Highly Reliable and Low- System, Journal of Computational Science,
Complexity Image Compression Scheme Elsevier ISSN: 1877-7503. Vol.21, pp.361-
Using Neighborhood Correlation Sequence 370.
Algorithm in WSN. IEEE Transactions on [26] Ezhilarasu, P., Thirunavukkarasu, E.,
Reliability. Karuppusami, G., & Krishnaraj, N. (2015).
[17] Deepalakshmi, P., & Shankar, K. (2020). Single substring based classification for
Role and Impacts of Ant Colony nondeterministic finite
Optimization in Job Shop Scheduling automata. International Journal on
Problems: A Detailed Applications in Information and
Analysis. Evolutionary Computation in Communication Engineering, 1(10), 29-31.
Scheduling, 11-35. [27] Bhateja, V., Gautam, A., Tiwari, A., Nhu,
[18] Ashwin, M., Kamalraj, S., & Azath, M. N.G., Le, D.-N, Haralick features-based
(2019). Multi objective trust optimization for classification of mammograms using SVM,
efficient communication in wireless M Advances in Intelligent Systems and
learning applications. Cluster Computing, Volume 672, 2018, Pages 787-
Computing, 22(5), 10687-10695. 795.
[19] Ezhilarasu, P., & Krishnaraj, N. (2015). [28] Latha, A., Prasanna, S., Hemalatha, S., &
Double Substring based Classification for Sivakumar, B. (2019). A harmonized trust

ISSN: 2393-9516 www.ijetajournal.org Page 46


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

assisted energy efficient data aggregation Environment. In Smart Intelligent


scheme for distributed sensor Computing and Applications (pp. 399-405).
networks. Cognitive Systems Research, 56, Springer, Singapore.
14-22. [39] Le, D.-N.a, Kumar, R.b, Nguyen, G.N.,
[29] Krishnaraj, N., Elhoseny, M., Lydia, E. L., Chatterjee, J.M.d, Cloud Computing and
Shankar, K., & ALDabbas, O. (2020). An Virtualization,
efficient radix trie‐based semantic visual DOI: 10.1002/9781119488149, Wiley.
indexing model for large‐scale image [40] Raj, R. J. S., Shobana, S. J., Pustokhina, I.
retrieval in cloud environment. Software: V., Pustokhin, D. A., Gupta, D., & Shankar,
Practice and Experience. K. (2020). Optimal Feature Selection-Based
[30] Namasudra, S., Roy, P., Vijayakumar, P., Medical Image Classification Using Deep
Audithan, S., & Balusamy, B. (2017). Time Learning Model in Internet of Medical
efficient secure DNA based access control Things. IEEE Access, 8, 58006-58017.
model for cloud computing [41] Namasudra, S., & Deka, G. C. (2018).
environment. Future Generation Computer Taxonomy of DNA-based security models.
Systems, 73, 90-105. In Advances of DNA Computing in
[31] Lakshmanaprabu, S. K., Shankar, K., Rani, Cryptography (pp. 37-52). Chapman and
S. S., Abdulhay, E., Arunkumar, N., Hall/CRC.
Ramirez, G., & Uthayakumar, J. (2019). An [42] Mubarakali, A., Ramakrishnan, J.,
effect of big data technology with ant colony Mavaluru, D., Elsir, A., Elsier, O., & Wakil,
optimization based routing in vehicular ad K. (2019). A new efficient design for
hoc networks: Towards smart cities. Journal random access memory based on quantum
of cleaner production, 217, 584-593. dot cellular automata nanotechnology. Nano
[32] Namasudra, S., & Deka, G. C. (Eds.). Communication Networks, 21, 100252.
(2018). Advances of DNA computing in [43] Ramakrishnan, J., Mavaluru, D., Sakthivel,
cryptography. CRC Press. R. S., Alqahtani, A. S., Mubarakali, A., &
[33] Mubarakali, A., Ashwin, M., Mavaluru, D., Retnadhas, M. (2020). Brain–computer
& Kumar, A. D. (2020). Design an attribute interface for amyotrophic lateral sclerosis
based health record protection algorithm for patients using deep learning
healthcare services in cloud network. NEURAL COMPUTING &
environment. Multimedia Tools and APPLICATIONS.
Applications, 79(5), 3943-3956. [44] Van, V.N., Chi, L.M., Long, N.Q., Nguyen,
[34] Dey, N., Ashour, A.S., Chakraborty, S., Le, G.N., Le, D.-N, A performance analysis of
D.-N., Nguyen, G.N, Healthy and unhealthy openstack open-source solution for IaaS
rat hippocampus cells classification: A cloud computing, Advances in Intelligent
neural based automated system for Systems and Computing, 380, pp. 141-150.
Alzheimer disease classification, Journal of [45] Sinha, A., Shrivastava, G., Kumar, P., &
Advanced Microscopy Research, 11(1), pp. Gupta, D. (2020). A community‐based
1-10 hierarchical user authentication scheme for
[35] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z. Industry 4.0. Software: Practice and
Hybrid Soft Computing Approach for Experience.
Prediction of Cancer in Colon Using [46] Namasudra, S., Devi, D., Kadry, S.,
Microarray Gene Data. Current Signal Sundarasekar, R., & Shanthini, A. (2020).
Transduction Therapy, 11(2). Towards DNA based data security in the
[36] Namasudra, S., Deka, G. C., Johri, P., cloud computing environment. Computer
Hosseinpour, M., & Gandomi, A. H. (2020). Communications, 151, 539-547.
The revolution of blockchain: State-of-the- [47] Mubarakali, A., Durai, A. D., Alshehri, M.,
art and research challenges. Archives of AlFarraj, O., Ramakrishnan, J., & Mavaluru,
Computational Methods in Engineering. D. (2020). Fog-Based Delay-Sensitive Data
[37] Goel, N., Grover, B., Gupta, D., Khanna, A., Transmission Algorithm for Data
& Sharma, M. (2020). Modified Forwarding and Storage in Cloud
Grasshopper Optimization Algorithm for Environment for Multimedia Applications.
detection of Autism Spectrum Big Data.
Disorder. Physical Communication, 101115. [48] Reshmi, T. R., & Azath, M. (2020).
[38] Prasanna, S., Narayan, S., NallaKaruppan, Improved self-healing technique for 5G
M. K., Anilkumar, C., & Ramasubbareddy, networks using predictive analysis. Peer-to-
S. (2019). Iterative Approach for Frequent Peer Networking and Applications, 1-17.
Set Mining Using Hadoop Over Cloud

ISSN: 2393-9516 www.ijetajournal.org Page 47


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

[49] Namasudra, S., Chakraborty, R., Majumder, Conference on Soft-Computing and


A., & Moparthi, N. R. (2020). Securing Networks Security (ICSNS) (pp. 1-5). IEEE.
multimedia by using DNA based encryption [59] Sujatha, R., Navaneethan, C., Kaluri, R., &
in the cloud computing environment. ACM Prasanna, S. (2020). Optimized Digital
Transactions on Multimedia Computing Transformation in Government Services
Communications and Applications. with Blockchain. In Blockchain Technology
[50] Patro, K. K., Reddi, S. P. R., Khalelulla, S. and Applications (pp. 79-100). Auerbach
E., Kumar, P. R., & Shankar, K. (2020). Publications.
ECG data optimization for biometric human [60] Govinda, K., & Prasanna, S. (2015,
recognition using statistical distributed February). A generic image cryptography
machine learning algorithm. The Journal of based on Rubik's cube. In 2015 International
Supercomputing, 76(2), 858-875. Conference on Soft-Computing and
[51] Rajagopal, A., Joshi, G. P., Ramachandran, Networks Security (ICSNS) (pp. 1-4). IEEE.
A., Subhalakshmi, R. T., Khari, M., Jha, S., [61] Anand Nayyar, Vikram Puri,
... & You, J. (2020). A Deep Learning Nhu Gia Nguyen, BioSenHealth 1.0: A
Model Based on Multi-Objective Particle Novel Internet of Medical Things (IoMT)
Swarm Optimization for Scene Based Patient Health Monitoring System,
Classification in Unmanned Aerial Lecture Notes in Networks and Systems.
Vehicles. IEEE Access, 8, 135383-135393. Springer, 2019
[52] Chakchai So-In, Tri Gia Nguyen, Gia Nhu [62] Prasanna, S., & Narayanan, V. (2017). A
Nguyen: Barrier Coverage Deployment Novel Approach for Generation of All-
Algorithms for Mobile Sensor Networks. Optical OFDM Using Discrete Cosine
Journal of Internet Technology 12/2017; Transform Based on Optical Couplers in a
18(7):1689-1699. Radio-Over-Fiber Link. International
[53] Mubarakali, A., Bose, S. C., Srinivasan, K., Journal of Advanced Research in
Elsir, A., & Elsier, O. (2019). Design a Engineering and Technology, 8(3).
secure and efficient health record transaction [63] Sanjeevi, P., Prasanna, S., Siva Kumar, B.,
utilizing block chain (SEHRTB) algorithm Gunasekaran, G., Alagiri, I., & Vijay Anand,
for health record transaction in block R. (2020). Precision agriculture and farming
chain. Journal of Ambient Intelligence and using Internet of Things based on wireless
Humanized Computing, 1-9. sensor network. Transactions on Emerging
[54] Devaraj, A. F. S., Murugaboopathi, G., Telecommunications Technologies, e3978.
Elhoseny, M., Shankar, K., Min, K., Moon, [64] Rathi, V. K., Chaudhary, V., Rajput, N. K.,
H., & Joshi, G. P. (2020). An Efficient Ahuja, B., Jaiswal, A. K., Gupta, D., ... &
Framework for Secure Image Archival and Hammoudeh, M. (2020). A Blockchain-
Retrieval System Using Multiple Secret Enabled Multi Domain Edge Computing
Share Creation Scheme. IEEE Access, 8, Orchestrator. IEEE Internet of Things
144310-144320. Magazine, 3(2), 30-36.
[55] Mubarakali, A. (2020). Healthcare Services [65] Khanna, A., Rodrigues, J. J., Gupta, N.,
Monitoring in Cloud Using Secure and Swaroop, A., & Gupta, D. (2020). Local
Robust Healthcare-Based BLOCKCHAIN mutual exclusion algorithm using fuzzy
(SRHB) Approach. MOBILE NETWORKS logic for Flying Ad hoc Networks. Computer
& APPLICATIONS. Communications.
[56] Namasudra, S. (2019). An improved
attribute‐based encryption technique towards
the data security in cloud
computing. Concurrency and Computation:
Practice and Experience, 31(3), e4364.
[57] Kathiresan, S., Sait, A. R. W., Gupta, D.,
Lakshmanaprabu, S. K., Khanna, A., &
Pandey, H. M. (2020). Automated detection
and classification of fundus diabetic
retinopathy images using synergic deep
learning model. Pattern Recognition Letters.
[58] Govinda, K., & Prasanna, S. (2015,
February). Medical dialysis prediction using
fuzzy rules. In 2015 International

ISSN: 2393-9516 www.ijetajournal.org Page 48

Вам также может понравиться