SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
8
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Authentic Patient Data and Optimization Process through Cryptographic
Image or Sound computations as Key using Genetic Algorithm in Body Area
Network
Pradeep Kumar
Ph.D. Student, Enrollment Number: 120481
Mody University of Science and Technology, Lakshmangarh, Sikar-332311, Rajasthan, India
I. Introduction
Internet of Things (IoT), helping interconnected sensors (i.e., wireless body area network (WBAN), can treat in real time
monitoring of patient health status and manage patients and treatment. Likewise, IoT will play a helping role in the next-
generation healthcare establishment. Although IoT-based patient health status monitoring has become very popular,
monitoring patients remotely outside of hospital settings requires augmenting the capabilities of IoT with other resources for
health data storage and processing. In this paper, we propose an IoT-based authentication and optimization process through
image key management using a genetic algorithm in body area network. Recent advances in wireless communications
technologies formedical/fitness applications. Particular, it analyzes the following related developments may cover the
following topics:
• Status of M2M standardization, market and development in general and specifically for medical applications
• Development and standardization of the Wireless Body Area Network (WBAN) and Medical Body Area Network
(WMBAN), including their markets profits.
• Underlying technologies:
o
Bluetooth o
ZigBee
o
Wi-Fi low-power consumption technology o Z-Wave
o Self-powered wireless sensors
II. Image Processing
Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and
the value of the function at given pair of coordinates (x, y) is called the intensity value.
The programming counterpart of such a function could be a one or two-dimensional array. Code Snippet 1 and Code
Snippet 2 show how to traverse and use 1-D and 2-D arrays programmatically. Both of them essentially can represent an
image as shown in Figure 1.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
9
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure: Values in the grid represent the grayscale intensities of the image on the right.
(A)Intensity values are shown in a grid of the same dimension as image (B) Image as seen on a monitor
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
10
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The ‘for’ loop in Code Snippet 1 and 2 can be visualized as shown in Figure 2.
Figure: Array traversal in a ‘for’ loop. Note that rows are being accessed one after the other. This isknown as'Row Major
Traversal’. The graphic suggests that in the current iteration, x = 4 and y = 3 both starting from 0.
III Sound Programming:
Use of the audioread(filename,y,Fs) function of Matlab and it converts an audio file to a matrix. Value of that matrix
generated can be used for computational purposes. It possible to produce a specific sound like the sound of a guitar by
giving your own values to the matrix and then sounding it using the sound() function.
IV.Security optimization through key management using a genetic algorithm in body areanetwork:
A genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection systems.
Three basic operators used in Genetic [2] algorithms contain selection, crossover, and mutation. The GA goes through the
following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction and crossover
together
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
11
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
give genetic algorithms most of their searching power.
C. Selection It is quantitative criterion based on fitness value to choose the chromosomes from a population which is going
to reproduce.
D. Crossover
In crossover operation, two chromosomes are taken and a new is generated by taking some attributes of the first
chromosome and the rest from the second chromosome. [2]
For example, the strings 11001111 to 01101110 could be crossed over after the third locus in each to produce the two
offspring 11001110 to 01101111.
Mutation
Mutation is used to maintain genetic diversity from one generation of the population to the next. It is similar to biological
mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in bit-
string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 01000100 might be
mutated in its second position to yield 00000100.
V. PROPOSED METHODOLOGY
In the proposed method GA will be used in the key generation process. The crossover and mutation operation is used along
with Pseudo-random number generators to make the key very complex. A number of rows in the array can be a population
for crossover and mutation purposes. For encryption, we have proposed AES. The symmetric key algorithm is proposed due
to its computation speed and less overhead in key management. The process of generating the key from the Genetic
Population has the following steps:
STEP 1: A pseudo-random binary sequence is generated with the help of a small image like part of the image of ECG sensor
image. Means any image can be used as a cryptographic security key. Another key like sound frequency of patient can be
used for a cryptographic key for algorithm or material of a mixture of various metal touches to the sensor can be used for
cryptographic security key just like biometric way. As Mathematically, an image can be considered as a function of 2
variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is
called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. The
first row of this two-dimensional array can be used as key generated from the same image used for the cryptographic
purpose. For more criticality, a random number can be generated to choose the row from the array because the first-row idea
can be hacked. But in GA for population limits can be decided for population and for a number of digits through fitness
function from rows of the array from image processing. Two images can be used for intermixing of arrays to increase the
population at sending and receiving end for heterogenous environment.
STEP 2. Matrix from sound programming computation can be used as key if image is not available.
STEP 3: Fitness function like converting first row bit into a decimal number and the new decimal number generated by this
process can be divided by hundred or more as per optimality factor after experimentation to reduce the bit size to convert
this number back into binary and can be used as the population of cryptographic keys. For other fitness function, further new
expression can be used as per requirement of key size.
STEP 4: The generated string or population is divided into two halves.
STEP 5: On the selected string crossover operation is performed to achieve good randomness among the key.
STEP 6: After crossover operation, the bits of the string are swapped again to permute the bit values.
STEP 7: The same process is iterated two times.
Here the crossover and mutation are done two times to create more complexity and randomness in the key. This key will be
then used for the encryption process. Here AES will be used for encryption as it is one of the most efficient symmetric key
algorithms and its whole security lies in the key used.
VI. CONCLUSION
The BAN is an emerging technology that will alter people’s everyday experiences revolutionarily. Privacy and data security
in BANs is a significant area, and still, there is a number of challenges which need to be overcome. Image processing can
create an image as a data for cryptographic purposes. So, there is no limit to a number of images and so as to the number of
keys. Mathematical function on keys can help us to more growth in this field.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
12
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
VII. Reference:
[1] Pradeep Kumar, Anand Sharma,” Authentication Process in Body Area Network And Security Optimization Through Key
Management Using Genetic Algorithm In Body Area
Network”, ISSN (Online): 2347–4718, International Journal for Technological Research InEngineering Volume 4, Issue 9,
May-2017,
[2] Aarti Soni, Suyash Agrawal,” Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, ISSN: 2278 –
1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10,
December 2012
[3] Santanu Chatterjee, Ashok Kumar Das *, Jamuna Kanta Sing,” A novel and efficient user access control scheme for wireless
body area sensor networks”, Journal of King Saud
University– Computer and Information Sciences (2014) 26, 181–201
[4] Copyright © 2005-2007, Advanced Digital Imaging Solutions Laboratory (ADISL). http://www.adislindia.com
[5] Pradeep Kumar,” Right Patient Data And Optimization Process Through Cryptographic Image as Key Using Genetic Algorithm In
Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research In Engineering Volume 5,
Issue 9, May-2018

More Related Content

What's hot

Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real lifeShayshab Azad
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET Journal
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of imageseSAT Journals
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of imageseSAT Publishing House
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysisinventy
 
Review of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsReview of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsIAEME Publication
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET Journal
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET Journal
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using dataeSAT Publishing House
 
Variance rover system
Variance rover systemVariance rover system
Variance rover systemeSAT Journals
 
IRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET Journal
 

What's hot (14)

Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real life
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence ChainIRJET- Missing Data Imputation by Evidence Chain
IRJET- Missing Data Imputation by Evidence Chain
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysis
 
Review of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger printsReview of different methods of protecting privacy using finger prints
Review of different methods of protecting privacy using finger prints
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms ComparisonIRJET- Supervised Learning Classification Algorithms Comparison
IRJET- Supervised Learning Classification Algorithms Comparison
 
Matrix in software engineering
Matrix in software engineeringMatrix in software engineering
Matrix in software engineering
 
Data Science Machine
Data Science Machine Data Science Machine
Data Science Machine
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 
Variance rover system
Variance rover systemVariance rover system
Variance rover system
 
IRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache SparkIRJET- Privacy Preservation using Apache Spark
IRJET- Privacy Preservation using Apache Spark
 
ICCSA2014 - slides
ICCSA2014 - slidesICCSA2014 - slides
ICCSA2014 - slides
 

Similar to Genetic Algorithm Key Generation for Encrypting Patient Data

Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGArahulmonikasharma
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET Journal
 
Framework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining TechniqueFramework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining Techniquerahulmonikasharma
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
IRJET - Smart Vet Locator for Hybrid Pets
IRJET -  	  Smart Vet Locator for Hybrid PetsIRJET -  	  Smart Vet Locator for Hybrid Pets
IRJET - Smart Vet Locator for Hybrid PetsIRJET Journal
 
FPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System GeneratorFPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System Generatorrahulmonikasharma
 
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...rahulmonikasharma
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET Journal
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...rahulmonikasharma
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
 
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm OptimizationObject Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimizationrahulmonikasharma
 
Reversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A SurveyReversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A Surveyrahulmonikasharma
 
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...rahulmonikasharma
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET Journal
 
Face Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDAFace Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDArahulmonikasharma
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET Journal
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...sipij
 
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative SensingReal-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensingrahulmonikasharma
 

Similar to Genetic Algorithm Key Generation for Encrypting Patient Data (20)

Optimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGAOptimized Parameter of Wavelet Neural Network (WNN) using INGA
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
Framework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining TechniqueFramework on Retrieval of Hypermedia Data using Data mining Technique
Framework on Retrieval of Hypermedia Data using Data mining Technique
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
IRJET - Smart Vet Locator for Hybrid Pets
IRJET -  	  Smart Vet Locator for Hybrid PetsIRJET -  	  Smart Vet Locator for Hybrid Pets
IRJET - Smart Vet Locator for Hybrid Pets
 
FPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System GeneratorFPGA Implementation for Image Edge Detection using Xilinx System Generator
FPGA Implementation for Image Edge Detection using Xilinx System Generator
 
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
A Study of An Optical Mouse to Customize Ii for Implementation of Wireless Dr...
 
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry PiIRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm OptimizationObject Detection using Deep Learning with Hierarchical Multi Swarm Optimization
Object Detection using Deep Learning with Hierarchical Multi Swarm Optimization
 
Reversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A SurveyReversible Data Hiding Methods : A Survey
Reversible Data Hiding Methods : A Survey
 
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
Implementation of Knowledge-Based Expert System Using Probabilistic Network M...
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
 
Face Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDAFace Recognition in the Scrambled Domain Using MK-RDA
Face Recognition in the Scrambled Domain Using MK-RDA
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning Models
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
 
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative SensingReal-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
Real-Time Vehicle Classification and Counting Via Low-Cost Collaborative Sensing
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Genetic Algorithm Key Generation for Encrypting Patient Data

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 8 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network Pradeep Kumar Ph.D. Student, Enrollment Number: 120481 Mody University of Science and Technology, Lakshmangarh, Sikar-332311, Rajasthan, India I. Introduction Internet of Things (IoT), helping interconnected sensors (i.e., wireless body area network (WBAN), can treat in real time monitoring of patient health status and manage patients and treatment. Likewise, IoT will play a helping role in the next- generation healthcare establishment. Although IoT-based patient health status monitoring has become very popular, monitoring patients remotely outside of hospital settings requires augmenting the capabilities of IoT with other resources for health data storage and processing. In this paper, we propose an IoT-based authentication and optimization process through image key management using a genetic algorithm in body area network. Recent advances in wireless communications technologies formedical/fitness applications. Particular, it analyzes the following related developments may cover the following topics: • Status of M2M standardization, market and development in general and specifically for medical applications • Development and standardization of the Wireless Body Area Network (WBAN) and Medical Body Area Network (WMBAN), including their markets profits. • Underlying technologies: o Bluetooth o ZigBee o Wi-Fi low-power consumption technology o Z-Wave o Self-powered wireless sensors II. Image Processing Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. Code Snippet 1 and Code Snippet 2 show how to traverse and use 1-D and 2-D arrays programmatically. Both of them essentially can represent an image as shown in Figure 1.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 9 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure: Values in the grid represent the grayscale intensities of the image on the right. (A)Intensity values are shown in a grid of the same dimension as image (B) Image as seen on a monitor
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 10 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ The ‘for’ loop in Code Snippet 1 and 2 can be visualized as shown in Figure 2. Figure: Array traversal in a ‘for’ loop. Note that rows are being accessed one after the other. This isknown as'Row Major Traversal’. The graphic suggests that in the current iteration, x = 4 and y = 3 both starting from 0. III Sound Programming: Use of the audioread(filename,y,Fs) function of Matlab and it converts an audio file to a matrix. Value of that matrix generated can be used for computational purposes. It possible to produce a specific sound like the sound of a guitar by giving your own values to the matrix and then sounding it using the sound() function. IV.Security optimization through key management using a genetic algorithm in body areanetwork: A genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection systems. Three basic operators used in Genetic [2] algorithms contain selection, crossover, and mutation. The GA goes through the following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction and crossover together
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 11 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ give genetic algorithms most of their searching power. C. Selection It is quantitative criterion based on fitness value to choose the chromosomes from a population which is going to reproduce. D. Crossover In crossover operation, two chromosomes are taken and a new is generated by taking some attributes of the first chromosome and the rest from the second chromosome. [2] For example, the strings 11001111 to 01101110 could be crossed over after the third locus in each to produce the two offspring 11001110 to 01101111. Mutation Mutation is used to maintain genetic diversity from one generation of the population to the next. It is similar to biological mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in bit- string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 01000100 might be mutated in its second position to yield 00000100. V. PROPOSED METHODOLOGY In the proposed method GA will be used in the key generation process. The crossover and mutation operation is used along with Pseudo-random number generators to make the key very complex. A number of rows in the array can be a population for crossover and mutation purposes. For encryption, we have proposed AES. The symmetric key algorithm is proposed due to its computation speed and less overhead in key management. The process of generating the key from the Genetic Population has the following steps: STEP 1: A pseudo-random binary sequence is generated with the help of a small image like part of the image of ECG sensor image. Means any image can be used as a cryptographic security key. Another key like sound frequency of patient can be used for a cryptographic key for algorithm or material of a mixture of various metal touches to the sensor can be used for cryptographic security key just like biometric way. As Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. The first row of this two-dimensional array can be used as key generated from the same image used for the cryptographic purpose. For more criticality, a random number can be generated to choose the row from the array because the first-row idea can be hacked. But in GA for population limits can be decided for population and for a number of digits through fitness function from rows of the array from image processing. Two images can be used for intermixing of arrays to increase the population at sending and receiving end for heterogenous environment. STEP 2. Matrix from sound programming computation can be used as key if image is not available. STEP 3: Fitness function like converting first row bit into a decimal number and the new decimal number generated by this process can be divided by hundred or more as per optimality factor after experimentation to reduce the bit size to convert this number back into binary and can be used as the population of cryptographic keys. For other fitness function, further new expression can be used as per requirement of key size. STEP 4: The generated string or population is divided into two halves. STEP 5: On the selected string crossover operation is performed to achieve good randomness among the key. STEP 6: After crossover operation, the bits of the string are swapped again to permute the bit values. STEP 7: The same process is iterated two times. Here the crossover and mutation are done two times to create more complexity and randomness in the key. This key will be then used for the encryption process. Here AES will be used for encryption as it is one of the most efficient symmetric key algorithms and its whole security lies in the key used. VI. CONCLUSION The BAN is an emerging technology that will alter people’s everyday experiences revolutionarily. Privacy and data security in BANs is a significant area, and still, there is a number of challenges which need to be overcome. Image processing can create an image as a data for cryptographic purposes. So, there is no limit to a number of images and so as to the number of keys. Mathematical function on keys can help us to more growth in this field.
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 12 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ VII. Reference: [1] Pradeep Kumar, Anand Sharma,” Authentication Process in Body Area Network And Security Optimization Through Key Management Using Genetic Algorithm In Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research InEngineering Volume 4, Issue 9, May-2017, [2] Aarti Soni, Suyash Agrawal,” Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, ISSN: 2278 – 1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10, December 2012 [3] Santanu Chatterjee, Ashok Kumar Das *, Jamuna Kanta Sing,” A novel and efficient user access control scheme for wireless body area sensor networks”, Journal of King Saud University– Computer and Information Sciences (2014) 26, 181–201 [4] Copyright © 2005-2007, Advanced Digital Imaging Solutions Laboratory (ADISL). http://www.adislindia.com [5] Pradeep Kumar,” Right Patient Data And Optimization Process Through Cryptographic Image as Key Using Genetic Algorithm In Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research In Engineering Volume 5, Issue 9, May-2018