SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 508
SECURED MIND UPLOADING METHOD IN WIRELESS BODY AREA
NETWORK
N. Sinthuja
Research Scholar, School of Computer Science, Engineering and Application, Bharathidhasan University
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In recent technologies, mind uploading is the
popular technology which is usedtotransfertheoriginalbrain
to the artificial computer substrate. Mind uploading is an
ongoing active research bringing together ideas from
neuroscience, computer science and philosophy.
Implementation of wireless Body Area Network (WBAN)
monitors the human body environment and their health
conditions. The main deprivation of recent survey delivers the
problem of data upload from the dead user. Thus the
significant data which are in need to others on the data may
not be known. In proposed system, a mind uploading whole
brain emulation (WBE) system is designed to upload the
essential data to the cloud with a secured process of Elliptical
Curve Cryptography (ECC). This lends the retrieval of the
extreme critical or significant data from the dead user. The
WBAN is used to get the sensitive data from the user like
memory loss or heartbeats etc. Where, the secured data is
uploaded from the user with the cryptographic. Key on the
secured data is generated from the Key Generation Center
(KGC) and the secret key can ensure the data safety from the
data owner side. An end-to-end security implementation is
given and the mind uploaded technology used to makehuman
brain on an artificial aspect and saves the lost data or
documents.
Key Words: – Mind upload, Wireless Body Area Network
(WBAN), Whole Brain Emulation (WBE),EllipticalCurve
Cryptography (ECC), Artificial Brain, Key Generation
Centre (KGC).
1. INTRODUCTION
Over the last few years, cloud computing has witnessed an
enormous technologies towards usertoshifttheiradoptions
and promises a significant cost reduction in business
environment. Cloud computinginfrastructurehasa resource
oriented premises where the user can be provided with a
remote access over the cloud resources. Several prototype
applications and industriessuchasIBM,Google,Amazon and
the Elastic computing Platform are used as a cloud
environment for the user. According to US National Institute
of Standards and Technology (NIST) “Cloud computing is a
enabling convenient, on demand network access to shared
pool of configurable computingresourcesthatcanberapidly
provisioned and released with minimal management effort
or cloud provided interaction”. But the resources are lively
updated by the user to the cloud which acts as a live
resource cloud service provider. Sometimes,data lossoccurs
if the user of the data seems to be unused or dead. The
advancement of Information Communication and
Technology (ICT) has brought an enormous change in
human’s life. Wireless Body Area Network is an emerging
technology which collectsthebiological data anditmonitor’s
the health condition of the human. Some data can be critical
and sensitive information which needs to be protected,
secured in the cloud service. Identification of the user status
implemented through the WBAN and the mind upload
technology enhances the sensitive data upload to the cloud.
The paper is organized as followed by related works in the
chapter III and the proposed system and the architecture is
employed in the chapter IV with its specified calculations
added through the system. ECC and the KGC steps are
defined in the chapter IV. Chapter V makes the analysed
result of the security process provided. The future
enhancements and the conclusionis discussedinthechapter
VI and the references are provided in the last chapter VII.
II. RELATED WORKS
Light weight encryption algorithms for wireless body
area network
CH. Radhika Rani1, Lakku Sai Jagan , Ch. Lakshmi Harika 3,
V.V. Durga Ravali Amara 4, International Journal of
Engineering & Technology, 7 (2.20) page no: 64-66, year
2018.
The WBAN comprise of body sensors during which the
energy resources ar restricted and since consumption of
energy are additional it's essential to travel for lightweight
weight algorithms to produce security and reduce energy
consumption.
Lightweight EncryptionAlgorithminWirelessBodyArea
Network for e-Health Monitoring.
Azza Zayed Alshamsi, Ezedin Salem Barka, Mohamed Adel
Serhani, 12th International Conference on Innovations in
Information Technology (IIT), IEEE,144-150, 2016.
The patient are going to be sporting sensors to sense his/her
important signs, like vital sign, pressure, sugar level,
temperature, etc. Since patient’s information is non-public,
the readings are encrypted, victimization. AN energy
economicallight-weight cryptography formula,tomakesure
the confidentiality, privacy, and integrity of the patient’s
information. once the cryptography, the info are going to be
transmitted to movable, or the other mobile device.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 509
Security In Wireless Body Area Networks From In-body
To Off-body Communications
Muhammad Usman, Muhammad Rizwan Asghar, Imran
Shafique Ansari And Marwa Qaraqu.Ieee Access, VolNo: doi
10.1109/Access .2873825, 2016.
Wireless Body body Networks (WBANs) play a significant
role in shaping today’s health care systems. Given the
essential nature of a WBAN in one’s health to mechanically
monitor and diagnose health problems, security and privacy
of those health care systems want a special attention. during
this work, initial propose a completely unique four-tier
design of remotehealth observationsystemsodeterminethe
safety needs and challenges at every tier.
Data Security and Privacy in Wireless Body Area
Networks
Ming Li and Wenjing Lou. Journal Name(IEEE), Vol No:1536-
1284/10, Page No:51-58, 2010.
They two vital knowledge security problems, 1. Dependable
distributed data storageandapairoffine-graineddistributed
data access management for the sensitive and personal
patient medical knowledge are mentioned.
Securing Data Communication in Wireless Body Area
Networks Using Digital Signatures.
M. Anwar, A.H. Abdullah, R.A. Butt, M.W.Ashraf, K.N. Qureshi
And Fullah, IEEE Access, Vol No: 23, Page No: 50-56, 2018.
This paper, highlight the key problems and challenges
associated with knowledge security and privacy in WBANs.
The planned knowledge hybrid technique named D-Sign for
encrypting and decrypting victimisation digital signatures.
An Efficient Biometric-basedAlgorithmUsingHeartRate
Variability for Securing Body Sensor Networks.
Sandeep Pirbhul, Heye Zhang, Subhas Chandra
Mukhopadhyay, Chunyue Li,yumei Wang, Guanglin Li,
Wanqing Wu And Yuan Ting Zhang, IEEE, Vol No:15, Page
No:15067-15089, 2015.
A device node in BSN delivers major information so, it's
terribly important and security. A BSN space supported
advanced cryptologic key generation procedures, that not
solely demands high resource utilization and computation
time,howeveradditionallyconsumesgreatamountofenergy,
power and memory throughout information transmission.
Wireless Body Area Network Security and Privacy Issue
In E-healthcare
Muhammad Sherz Asha Malik, Muhammad Ahamed, Tahir
Abdullah, Naila Kousarmehak Nigar Shumaila, International
Journal Of AdvancedComputer Science And Applications,Vol
No:9, Page No:209-215, 2018.
In this paper, a primary gift an outline of WBAN, however
they utilized for health care watching, its design then
highlight major security andprivacy necessitiesand assaults
at totally different network layerduringaWBANandafinally
bring up numerous cytological algorithms and laws for
providing resolution of security and privacy in WBAN.
An Enhanced AES Algorithm Using Cascading Method On
400 Bits Key Size Used In Enhancing The Safety Of Next
Generation Internet Of Things
Ritambhara, Alka Gupta, Manjit Jaiswal, International
Conference on Computing, Communication and Automation
(ICCCA),
IEEE, page no: 422-427, 2017.
Body Node Coordinator Placement Algorithms For
Wireless Body Area Networks
Md Tanvir Ishtaique ul Huque, Student Member, IEEE,
KumuduS.Munasinghe,Member,IEEEandAbbasJamalipour,
Fellow, IEEE, DOI 10.1109/JIOT.2366110, IEEE Internet of
Things Journal, 2016.
Three totally different completely different BNC(Bayonet
Neill - Concelman) placement algorithms considering
different options of accessible energy economical routing
protocols in a very WBAN. A simulation results show that
these algorithms at the side of associate degree acceptable
routing protocol will more prolong the network time period.
III. PROPOSED WORK
Our work is related to the processofsecuredminduploading
of critical or sensitive data, WBAN technology to know the
status of the human and Elliptical Curve Cryptography to
secure the data uploaded from the artificial brain.
Mind Uploading: Current model of consciousness and
neural processing in brain is generally a decentralized
adaptive process. If the model of consciousness is true then
they could be transferred to a computer incrementally via
adaptation. If the question raises that whether it is possible
to upload the human brain to computer? The research
reveals that “it’s extremely difficult but it is possible” says
neuroscientist Randal Koene. Human brain cannot able to
live forever but because of brain cell may able to live
indefinitely do mean humanscouldliveforever.Mindupload
has important existential andethical implications,yetlittleis
known how the ordinary people feel from the artificial brain
data upload. The current paper aims to provide the
evaluation system of the cognitive factors that explain the
people’s feeling and reaction for the use of mind upload
technology.
Consciousness is currently understood as an
epiphenomenon of the brain activity specifically of the
cerebral cortex. Unlike an identity, this is a composition of
information stored in brain. It is reasonable to understand
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 510
the intrinsic property of the human brain. The technology
can be made using the Whole Brain Emulation (WBE)
technology where it will scan the hypothetical futuristic
process of the mental state(includinglongtermmemoryand
self). Computational neuroscience attempts to understand
the brain by mathematical and software models of neural
systems.
Fig 1 Understanding the function vs Understanding the
models
Currently, the models are far simpler than the simpler than
the studied system, with the exception of small neural
system. Often these models require the simplified parts and
the neural networks.
Wireless Body Area Network: A fast developing technology,
which provides the patient medical data from the human
body vital parameters. This emerged as a promising
technology that will revolutionarily seek the way of
healthcare of the human called as E-healthcare. Thus the
WBAN can be implemented in the process of knowing the
user consciousness whether in a state of dead or coma.Ifthe
user seems to be in a brain idle state this technology guides
to recover the critical or the sensitive data from that user.
Such, that it enables the WBAN monitoring system of the
human body. The WBAN sensors monitor theuserheartbeat
and locomotive activity which it delivers the user state.
Wireless Body Area Network generally has two types of
nodes (i.e) wearable nodes and implantable nodes which
work at some certain frequencies. The implantable node
works at 400MHz, utilizing the Medical Implantable
Communication Systems (MICS) band. WBAN can
communicate with the net and other technologies like Zig-
Bee, Wi-Fi, Bluetooth, cell system and other Personnel Area
Network (PAN) technologies. So this makes a good
advantage for WBAN to get communicated with other
technologies and upload the critical data in a secured
manner.
Microcontroller:
In this system the patient is monitored using the WBAN
where the sensors will collect the data from the patient
whether he/she is dead or alive. Such that 3 main
microcontrollers are implemented they are: fig 2 the
diagram represents the overall processing.
Fig 2 the diagram represents the overall processing
• Heartbeat sensor
• PIC16F877
Heart Bear Sensor:
Heartbeat sensor is used to sense the heartbeat of the
patient to know that they have highheart rate,lowheart rate
and dead. This helps the user to know he is dead for mind
upload this process is used to know the patient status. Fig 3
Architecture of the heart beat sensor.
Fig 3 Architecture of the heart beat sensor
The sensor contains the transmitter and the receiver so that
the receiver will receive the patient heart beat and the
transmitter will transmits to the user through the PIC
microcontroller.
low high
high
Qualitative models
Qualitative models
Total
Understanding
Brain emulation
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 511
PIC16F877:
These microcontrollers are known as Programmable
Interface Controller programmed to carry a vast range of
tasks. Thus PIC microcontrollerhelpstosetsthecontrol with
a timer limit so that they can collude with the heartbeat
sensor to predict the heartbeat within a given time. Fig 4 the
diagram represents the pin diagram of the PIC16F877.
Fig 4 the diagram represents the pin diagram of the
PIC16F877
Bluetooth
Fig 5 the diagram represents Bluetooth
Bluetooth is a type of microcontroller which is used to
connect the device and get the heart beat ofthepatient.Thus
the Bluetooth can connect at 2.4GHz at a baseband. Fig 5 the
diagram represents Bluetooth.
Elliptical Curve Cryptography: Elliptical curvecryptography
(ECC) may be a public key encoding technique that evolved
from elliptical theory that may be wont to produce quicker
and smaller scientific discipline keys. Here, the Encryption
key is made public and the decryption key is made private
where as it is known as asymmetric key cryptographic
methods. The particular strategy uses the elliptical curve to
secure the encrypted products.Logarithmicprocesshelps us
to create the more complex cryptographic technique, where
a category called discrete logarithmic value protocols has
been modified to get elliptic curve calculations.ECCrequires
smaller keys compare to the non EC Cryptographic
techniques. Short encryption key is the value which is fed
into the encryption algorithm to decode an encrypted
message. The short key is faster and requireslesscomputing
power than the first generation encryption algorithms. An
elliptical curve is an algebraic function (y2=x3+ax+b) which
looks like a symmetric curve parallel to the x axis when
plotted.
Fig 4 this figure denotes the Elliptical Curve of the x axis
which are plotted using the algebraic functions
ECC uses different mathematical properties to achieve the
property over RSA algorithm. The easiest way to explain the
curve using the mathematical function using three points
along the curve (P, Q and R) by knowing two of the points P
and Q the other point can be calculated easily. But using the
R value the P and Q value cannot be derived.
IV. PROPOSED SYSTEM ARCHITECTURE
System overview
We assume a system which is designed in the way that it can
upload the sensitive information to thecloudafterthelossof
consciousness of the user in a secured manner. The mind
loader technology is proposed to upload the critical
information in the cloud using the Whole Brain Emulation
(WBE). The brain can be simulated, by creating an
intelligence machine. Thus the data can be uploaded after
the user seems to be idle or the data seems to be in a cold
storage. The system is changes with a calculative purpose of
hot storage and cloud storage of the cloud data.
However, the system is implemented in a secured way using
the Elliptical Curve Cryptography (ECC) which enhancesthe
small key encryptionprocess whichovercomestheproperty.
The data can be accessed only by the authorized person and
P
R
Q
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 512
it will be defined by the user. This architecture implements
the process of secure mind upload over cloud using wireless
Body Area Network. Here the critical data of an unconscious
user will be used in an efficient manner. The user health will
be monitored using the sensor where it monitors their
heartbeat, motion of the user, pulse, etc. the process can be
monitored and accessed through an access point. If the user
seems to be unconscious or seems to be brain dead then the
critical document can be transferred from the human brain
to the Cloud Service Provider (CSP). The main proposed
system which has been enhanced here is that the document
which are uploaded from the artificial intelligentsystemwill
be in a secured manner because to maintainthedocumentin
a protected manner from the unauthorized user. ECC
algorithm is derived to get the document in an encrypted
process with a public key. If the user is known as an
authorized user then the Key Generation Center (KGC)
where it generates the key to the user who can access the
data after it is uploaded.
Fig 6 secured mind upload architecture
Brain Models
Over dozen of brain modelshumanbrainsaremodeledusing
the pathological process from the anatomical chart. Current
neuroscientists make research on many organisms to
develop a brain model over an artificial intelligent process.
Thus it provides a human brain model emulator which is a
primitive among the wide range of organisms
a. Primate Brain (human brain)
The explorations on the human brain are one of the relevant
models which are used for the WBE technology. The
functional models proposed the primate brain enhanced
with magnetic resonance and the electric fields of the brain.
The artificial emulator isconnectedthroughneuronscalleda
node which creates a biological process of the human brain.
Key Generation Center (KGC)
The proposed KGC generates a secret key to encrypt and
decrypted resources which are uploaded to the cloud. Most,
of the time KGC gets a session key where it acts as a session
key shared with each entity. The key information is send to
the authorized user so that they can decrypt data and utilize
the resources which are shared. The unauthorized user
cannot get the shared session key and anyhow it enhances
the security issues inside and outside the CSP.
a. Advantages
The main security advantages over the secured key
generation is that,
• Key freshness
• Key confidentiality and
• Key authentication
Key Freshness: Key freshness enhances a new key which
will be generated to the authorized user so that they can get
a key which will be changed when it is newly uploaded. The
key can be generated in a random process so that the
security implementation is high.
Key Confidentiality: Key confidentiality is that the
authorized can only recover the key from the KGC but notby
an unauthorized user
Key authentication: Key authentication ensures that the
key generated only from the KGC, not by the attacker.
Sometimes attacker can generate the key to the user and the
data get attacked by the one who generatestheattackedkey.
b. Key Generation and Distribution
Upon receiving a request from the user, KGC has to generate
a secret key and share to the user. KGC needs to send the
secret session key in an authenticated manner. Assume that
the key requester as {U} and the secret key which added as
(xi, yi) for i=1,…….t
The Key Generation process contains five steps
Step 1: The data access user sends a request to the KGC as
{u}
Step 2: KGC verifies the user whether they are authorized
user or a non authorized user at the secret key generated
only to the authorized user xi
Step 3: The user send a random challenge to the KGC as R
Step 4: KGC selects a random secretkey withaninterpolated
polynomial function f(x) with degree t to i=1 which passes
through the (t+1) points. It compares the additional pointsP
(0,k) with the functional degree of points which are added
for i=0…….t on f(x) the Auth=h(k:u;Rt…. p1) where h is one
way hash function. All computations are performed in Zn.
Critical documents
Human body sensor nodes
Mind upload
Access point
Cloud server
KGC
Authorized user
Database
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 513
Step 5: For the user the hash function f(0) which are
calculated on it polynomial values (xi, yi,XOR Ri) andchecks
the authentication value is true. The identical values
authenticate the Ui the key sent from the KGC process.
c. Discrete Logarithms
The computation of the logarithmic fields added to the ECC
to enhance a valuable calculation and efficiencycompared to
the security of the data resources used.
Sender = gx mod P
Receiver=gy mod P
K= (gy)x mod P
An elliptical curve denotes the field K in a non singular cubic
curve in two variables, f(x,y)=0 with a rational point (which
the point may be infinity). The field K is usually taken in
finite complex numbers, reals, and algebraic extensions of
rationales, p addict numbers or infinite fields.
Elliptic Curve Cryptography is a plane curve defined by the
sequence of the equation form
Y3=x2+ax+b
The point which is sitting on the top plot of x implants the
point of infinity which passes through the vertical curve and
both the y axis which is added in the process execution. The
scalar point of addition and multiplicationisproposedto the
curve finite field analysis.
Design implementation:
The mind upload WBAN processisimplemented byusingthe
microcontroller connected with a system, an android
application to gather the sensed data and to predict the user
status.
Fig 6 the diagram presents the implementation work for
the WBAN with mind upload security technology
V. RESULTS
A comparative summary of the ECC evaluation makes a
comparison of the security analysis among the other
cryptographic algorithm. ECC implementation in terms of
code bytes and clock timing are given in the table I. The
fastest implantation is achieved while encrypting and
decrypting the resources using the secret key generated
from the KGC.
Table -1: Result Analysis
Symmetric key
size
(bits)
Diffie
Hellman and
RSA key size
(bits)
Elliptical Curve
Cryptography
(bits)
80 1024 160
112 2048 224
128 3072 256
192 7860 384
256 15360 521
Table I the comparison table for the key size of each
algorithms where ECC acts at a mediator level of bits the
fastest encryption process is achieved
Chart -1: Fig 4 gives a comparison line chart for the
security process of the enhanced functionality
VI. CONCLUSIONS
The work which had been presented with a WBAN
technology is utilized in an efficient manner. The user
resources can be efficiently used even after the user
unconsciousness or the user death. The extended research
can be analyzed in a way of two technologies (1) monitoring
the health condition of the human using the health
monitoring nano sensors with the wireless communication
technology and (2) the cloud storage providing hot storage
or cold storage. If the user data seems to becoldstorageover
a period of time then the data can be automaticallycopied or
transferred to the authorized person who is the next owner
of the critical or sensitive documents utilized. Thus these
enhances the utilization of the critical data instead it been
loosed without getting authorization from the particular
user. The security implications are provided using ECC
cryptographic algorithm and the process is analyzed using
the algorithmic verification of the finite fields. An obvious
area of future research may be usage of the time complexity
which is made to analyze the user health and to identify the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 514
cold storage resource in the cloud service provider.
Moreover, our current architecture creates an efficient way
of time complexity precedence over the security
enhancement. Finally from the usability point of view the
authorized user can access the mind uploaded data from the
user. User can securely handle the resources using Key
Generation Center.
REFERENCES
[1] Md. Rownak Hossain and Md. Selim Hossain, “Efficient
FPGA Implementation of Modular Arithmetic forElliptic
Curve Cryptography”, International Conference on
Electrical, Computer and Communication Engineering
(ECCE), 7-9 February, 2019
[2] Shubhankar Chaudhary, Ashish Singh, and Kakali
Chatterjee,” Wireless Body Sensor Network (WBSN)
Security and Privacy Issues: A Survey”, International
Conference on Computational Intelligence & IoT, 2018
[3] Heye Zhang, Subhas Chandra Mukhopadhyay, Sandeep
Pirbhulal ,Chunyue Li, Yumei Wang, GuanglinLiShantha
A, Renita J and Edna ElizabethN,WanqingWuandYuan-
Ting Zhang, “An Efficient Biometric-Based Algorithm
Using Heart Rate Variability for Securing Body Sensor
Networks”, Sensors 2015
[4] CH. Radhika Rani1 , Lakku Sai Jagan2 , Ch. Lakshmi
Harika 3 , V.V. Durga Ravali Amara 4, “Light weight
encryption algorithmsforwirelessbodyarea networks”,
International Journal of Engineering & Technology, 7
(2.20) (2018)
[5] Shantha A, Renita J and Edna Elizabeth N,” Analysis and
Implementation of ECC Algorithm in Lightweight
Device”, International Conference on Communication
and Signal Processing, April 4-6, 2019
[6] Amal HAFSA1,Anissa SGHAIER1,MohsenMACHHOUT1
, Jihene MALEK, “A New security Approach to Support
the operations of ECC and AES Algorithms on FPGA”,
2019 19th international conference on Sciences and
Techniques of Automatic control & computer
engineering (STA), March 24-26, 2019
[7] M. Anwar , A. H. Abdullah , R. A. Butt , M. W. Ashraf , K. N.
Qureshi , F. Ullah,” Securing Data Communication in
Wireless Body Area Networks Using Digital Signatures”,
Technical Journal, University of Engineering and
Technology (UET), 2018
[8] Muhammad Sheraz Arshad Malik, Muhammad Ahmed,
Tahir Abdullah, Naila Kousar, Mehak Nigar Shumaila,
“Wireless Body Area Network SecurityandPrivacyIssue
in E-Healthcare”, International Journal of Advanced
Computer Science and Applications, Vol. 9, No. 4, 2018
[9] Muhammad Usman∗ , Muhammad Rizwan Asghar† ,
Imran Shafique Ansari‡ , and Marwa Qaraqe”, “Security
in Wireless Body Area Networks: From In-Body to Off-
Body Communications”, Division of Information and
Computing Technology, 2018
[10] Wonjun Ko, Eunjin Jeon, Jiyeon Lee, and Heung-Il Suk,”
Semi-Supervised Deep Adversarial Learning for Brain-
Computer Interface”, DepartmentofBrainandCognitive
Engineering,2019

More Related Content

What's hot

Iot architecture report
Iot architecture reportIot architecture report
Iot architecture reportNiranjan Kumar
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
Analysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A ReviewAnalysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A Reviewijtsrd
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abledArvindKumar1806
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey ofVinod Salunkhe
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things IJECEIAES
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

What's hot (20)

Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
Analysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A ReviewAnalysis of Energy Management Scheme in Smart City: A Review
Analysis of Energy Management Scheme in Smart City: A Review
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abled
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 

Similar to IRJET- Secured Mind Uploading Method in Wireless Body Area Network

Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...IJCNCJournal
 
Applications Of Wireless Sensor Networks
Applications Of Wireless Sensor NetworksApplications Of Wireless Sensor Networks
Applications Of Wireless Sensor NetworksKaren Benoit
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Accelerometer-based elderly fall detection system using edge artificial inte...
Accelerometer-based elderly fall detection system using edge  artificial inte...Accelerometer-based elderly fall detection system using edge  artificial inte...
Accelerometer-based elderly fall detection system using edge artificial inte...IJECEIAES
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET Journal
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET Journal
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02Partha Sarathi Kar
 
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesUltra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesBHAVANA KONERU
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
 

Similar to IRJET- Secured Mind Uploading Method in Wireless Body Area Network (20)

Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
 
Applications Of Wireless Sensor Networks
Applications Of Wireless Sensor NetworksApplications Of Wireless Sensor Networks
Applications Of Wireless Sensor Networks
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Accelerometer-based elderly fall detection system using edge artificial inte...
Accelerometer-based elderly fall detection system using edge  artificial inte...Accelerometer-based elderly fall detection system using edge  artificial inte...
Accelerometer-based elderly fall detection system using edge artificial inte...
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
 
IoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptxIoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptx
 
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesUltra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

IRJET- Secured Mind Uploading Method in Wireless Body Area Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 508 SECURED MIND UPLOADING METHOD IN WIRELESS BODY AREA NETWORK N. Sinthuja Research Scholar, School of Computer Science, Engineering and Application, Bharathidhasan University ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In recent technologies, mind uploading is the popular technology which is usedtotransfertheoriginalbrain to the artificial computer substrate. Mind uploading is an ongoing active research bringing together ideas from neuroscience, computer science and philosophy. Implementation of wireless Body Area Network (WBAN) monitors the human body environment and their health conditions. The main deprivation of recent survey delivers the problem of data upload from the dead user. Thus the significant data which are in need to others on the data may not be known. In proposed system, a mind uploading whole brain emulation (WBE) system is designed to upload the essential data to the cloud with a secured process of Elliptical Curve Cryptography (ECC). This lends the retrieval of the extreme critical or significant data from the dead user. The WBAN is used to get the sensitive data from the user like memory loss or heartbeats etc. Where, the secured data is uploaded from the user with the cryptographic. Key on the secured data is generated from the Key Generation Center (KGC) and the secret key can ensure the data safety from the data owner side. An end-to-end security implementation is given and the mind uploaded technology used to makehuman brain on an artificial aspect and saves the lost data or documents. Key Words: – Mind upload, Wireless Body Area Network (WBAN), Whole Brain Emulation (WBE),EllipticalCurve Cryptography (ECC), Artificial Brain, Key Generation Centre (KGC). 1. INTRODUCTION Over the last few years, cloud computing has witnessed an enormous technologies towards usertoshifttheiradoptions and promises a significant cost reduction in business environment. Cloud computinginfrastructurehasa resource oriented premises where the user can be provided with a remote access over the cloud resources. Several prototype applications and industriessuchasIBM,Google,Amazon and the Elastic computing Platform are used as a cloud environment for the user. According to US National Institute of Standards and Technology (NIST) “Cloud computing is a enabling convenient, on demand network access to shared pool of configurable computingresourcesthatcanberapidly provisioned and released with minimal management effort or cloud provided interaction”. But the resources are lively updated by the user to the cloud which acts as a live resource cloud service provider. Sometimes,data lossoccurs if the user of the data seems to be unused or dead. The advancement of Information Communication and Technology (ICT) has brought an enormous change in human’s life. Wireless Body Area Network is an emerging technology which collectsthebiological data anditmonitor’s the health condition of the human. Some data can be critical and sensitive information which needs to be protected, secured in the cloud service. Identification of the user status implemented through the WBAN and the mind upload technology enhances the sensitive data upload to the cloud. The paper is organized as followed by related works in the chapter III and the proposed system and the architecture is employed in the chapter IV with its specified calculations added through the system. ECC and the KGC steps are defined in the chapter IV. Chapter V makes the analysed result of the security process provided. The future enhancements and the conclusionis discussedinthechapter VI and the references are provided in the last chapter VII. II. RELATED WORKS Light weight encryption algorithms for wireless body area network CH. Radhika Rani1, Lakku Sai Jagan , Ch. Lakshmi Harika 3, V.V. Durga Ravali Amara 4, International Journal of Engineering & Technology, 7 (2.20) page no: 64-66, year 2018. The WBAN comprise of body sensors during which the energy resources ar restricted and since consumption of energy are additional it's essential to travel for lightweight weight algorithms to produce security and reduce energy consumption. Lightweight EncryptionAlgorithminWirelessBodyArea Network for e-Health Monitoring. Azza Zayed Alshamsi, Ezedin Salem Barka, Mohamed Adel Serhani, 12th International Conference on Innovations in Information Technology (IIT), IEEE,144-150, 2016. The patient are going to be sporting sensors to sense his/her important signs, like vital sign, pressure, sugar level, temperature, etc. Since patient’s information is non-public, the readings are encrypted, victimization. AN energy economicallight-weight cryptography formula,tomakesure the confidentiality, privacy, and integrity of the patient’s information. once the cryptography, the info are going to be transmitted to movable, or the other mobile device.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 509 Security In Wireless Body Area Networks From In-body To Off-body Communications Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari And Marwa Qaraqu.Ieee Access, VolNo: doi 10.1109/Access .2873825, 2016. Wireless Body body Networks (WBANs) play a significant role in shaping today’s health care systems. Given the essential nature of a WBAN in one’s health to mechanically monitor and diagnose health problems, security and privacy of those health care systems want a special attention. during this work, initial propose a completely unique four-tier design of remotehealth observationsystemsodeterminethe safety needs and challenges at every tier. Data Security and Privacy in Wireless Body Area Networks Ming Li and Wenjing Lou. Journal Name(IEEE), Vol No:1536- 1284/10, Page No:51-58, 2010. They two vital knowledge security problems, 1. Dependable distributed data storageandapairoffine-graineddistributed data access management for the sensitive and personal patient medical knowledge are mentioned. Securing Data Communication in Wireless Body Area Networks Using Digital Signatures. M. Anwar, A.H. Abdullah, R.A. Butt, M.W.Ashraf, K.N. Qureshi And Fullah, IEEE Access, Vol No: 23, Page No: 50-56, 2018. This paper, highlight the key problems and challenges associated with knowledge security and privacy in WBANs. The planned knowledge hybrid technique named D-Sign for encrypting and decrypting victimisation digital signatures. An Efficient Biometric-basedAlgorithmUsingHeartRate Variability for Securing Body Sensor Networks. Sandeep Pirbhul, Heye Zhang, Subhas Chandra Mukhopadhyay, Chunyue Li,yumei Wang, Guanglin Li, Wanqing Wu And Yuan Ting Zhang, IEEE, Vol No:15, Page No:15067-15089, 2015. A device node in BSN delivers major information so, it's terribly important and security. A BSN space supported advanced cryptologic key generation procedures, that not solely demands high resource utilization and computation time,howeveradditionallyconsumesgreatamountofenergy, power and memory throughout information transmission. Wireless Body Area Network Security and Privacy Issue In E-healthcare Muhammad Sherz Asha Malik, Muhammad Ahamed, Tahir Abdullah, Naila Kousarmehak Nigar Shumaila, International Journal Of AdvancedComputer Science And Applications,Vol No:9, Page No:209-215, 2018. In this paper, a primary gift an outline of WBAN, however they utilized for health care watching, its design then highlight major security andprivacy necessitiesand assaults at totally different network layerduringaWBANandafinally bring up numerous cytological algorithms and laws for providing resolution of security and privacy in WBAN. An Enhanced AES Algorithm Using Cascading Method On 400 Bits Key Size Used In Enhancing The Safety Of Next Generation Internet Of Things Ritambhara, Alka Gupta, Manjit Jaiswal, International Conference on Computing, Communication and Automation (ICCCA), IEEE, page no: 422-427, 2017. Body Node Coordinator Placement Algorithms For Wireless Body Area Networks Md Tanvir Ishtaique ul Huque, Student Member, IEEE, KumuduS.Munasinghe,Member,IEEEandAbbasJamalipour, Fellow, IEEE, DOI 10.1109/JIOT.2366110, IEEE Internet of Things Journal, 2016. Three totally different completely different BNC(Bayonet Neill - Concelman) placement algorithms considering different options of accessible energy economical routing protocols in a very WBAN. A simulation results show that these algorithms at the side of associate degree acceptable routing protocol will more prolong the network time period. III. PROPOSED WORK Our work is related to the processofsecuredminduploading of critical or sensitive data, WBAN technology to know the status of the human and Elliptical Curve Cryptography to secure the data uploaded from the artificial brain. Mind Uploading: Current model of consciousness and neural processing in brain is generally a decentralized adaptive process. If the model of consciousness is true then they could be transferred to a computer incrementally via adaptation. If the question raises that whether it is possible to upload the human brain to computer? The research reveals that “it’s extremely difficult but it is possible” says neuroscientist Randal Koene. Human brain cannot able to live forever but because of brain cell may able to live indefinitely do mean humanscouldliveforever.Mindupload has important existential andethical implications,yetlittleis known how the ordinary people feel from the artificial brain data upload. The current paper aims to provide the evaluation system of the cognitive factors that explain the people’s feeling and reaction for the use of mind upload technology. Consciousness is currently understood as an epiphenomenon of the brain activity specifically of the cerebral cortex. Unlike an identity, this is a composition of information stored in brain. It is reasonable to understand
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 510 the intrinsic property of the human brain. The technology can be made using the Whole Brain Emulation (WBE) technology where it will scan the hypothetical futuristic process of the mental state(includinglongtermmemoryand self). Computational neuroscience attempts to understand the brain by mathematical and software models of neural systems. Fig 1 Understanding the function vs Understanding the models Currently, the models are far simpler than the simpler than the studied system, with the exception of small neural system. Often these models require the simplified parts and the neural networks. Wireless Body Area Network: A fast developing technology, which provides the patient medical data from the human body vital parameters. This emerged as a promising technology that will revolutionarily seek the way of healthcare of the human called as E-healthcare. Thus the WBAN can be implemented in the process of knowing the user consciousness whether in a state of dead or coma.Ifthe user seems to be in a brain idle state this technology guides to recover the critical or the sensitive data from that user. Such, that it enables the WBAN monitoring system of the human body. The WBAN sensors monitor theuserheartbeat and locomotive activity which it delivers the user state. Wireless Body Area Network generally has two types of nodes (i.e) wearable nodes and implantable nodes which work at some certain frequencies. The implantable node works at 400MHz, utilizing the Medical Implantable Communication Systems (MICS) band. WBAN can communicate with the net and other technologies like Zig- Bee, Wi-Fi, Bluetooth, cell system and other Personnel Area Network (PAN) technologies. So this makes a good advantage for WBAN to get communicated with other technologies and upload the critical data in a secured manner. Microcontroller: In this system the patient is monitored using the WBAN where the sensors will collect the data from the patient whether he/she is dead or alive. Such that 3 main microcontrollers are implemented they are: fig 2 the diagram represents the overall processing. Fig 2 the diagram represents the overall processing • Heartbeat sensor • PIC16F877 Heart Bear Sensor: Heartbeat sensor is used to sense the heartbeat of the patient to know that they have highheart rate,lowheart rate and dead. This helps the user to know he is dead for mind upload this process is used to know the patient status. Fig 3 Architecture of the heart beat sensor. Fig 3 Architecture of the heart beat sensor The sensor contains the transmitter and the receiver so that the receiver will receive the patient heart beat and the transmitter will transmits to the user through the PIC microcontroller. low high high Qualitative models Qualitative models Total Understanding Brain emulation
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 511 PIC16F877: These microcontrollers are known as Programmable Interface Controller programmed to carry a vast range of tasks. Thus PIC microcontrollerhelpstosetsthecontrol with a timer limit so that they can collude with the heartbeat sensor to predict the heartbeat within a given time. Fig 4 the diagram represents the pin diagram of the PIC16F877. Fig 4 the diagram represents the pin diagram of the PIC16F877 Bluetooth Fig 5 the diagram represents Bluetooth Bluetooth is a type of microcontroller which is used to connect the device and get the heart beat ofthepatient.Thus the Bluetooth can connect at 2.4GHz at a baseband. Fig 5 the diagram represents Bluetooth. Elliptical Curve Cryptography: Elliptical curvecryptography (ECC) may be a public key encoding technique that evolved from elliptical theory that may be wont to produce quicker and smaller scientific discipline keys. Here, the Encryption key is made public and the decryption key is made private where as it is known as asymmetric key cryptographic methods. The particular strategy uses the elliptical curve to secure the encrypted products.Logarithmicprocesshelps us to create the more complex cryptographic technique, where a category called discrete logarithmic value protocols has been modified to get elliptic curve calculations.ECCrequires smaller keys compare to the non EC Cryptographic techniques. Short encryption key is the value which is fed into the encryption algorithm to decode an encrypted message. The short key is faster and requireslesscomputing power than the first generation encryption algorithms. An elliptical curve is an algebraic function (y2=x3+ax+b) which looks like a symmetric curve parallel to the x axis when plotted. Fig 4 this figure denotes the Elliptical Curve of the x axis which are plotted using the algebraic functions ECC uses different mathematical properties to achieve the property over RSA algorithm. The easiest way to explain the curve using the mathematical function using three points along the curve (P, Q and R) by knowing two of the points P and Q the other point can be calculated easily. But using the R value the P and Q value cannot be derived. IV. PROPOSED SYSTEM ARCHITECTURE System overview We assume a system which is designed in the way that it can upload the sensitive information to thecloudafterthelossof consciousness of the user in a secured manner. The mind loader technology is proposed to upload the critical information in the cloud using the Whole Brain Emulation (WBE). The brain can be simulated, by creating an intelligence machine. Thus the data can be uploaded after the user seems to be idle or the data seems to be in a cold storage. The system is changes with a calculative purpose of hot storage and cloud storage of the cloud data. However, the system is implemented in a secured way using the Elliptical Curve Cryptography (ECC) which enhancesthe small key encryptionprocess whichovercomestheproperty. The data can be accessed only by the authorized person and P R Q
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 512 it will be defined by the user. This architecture implements the process of secure mind upload over cloud using wireless Body Area Network. Here the critical data of an unconscious user will be used in an efficient manner. The user health will be monitored using the sensor where it monitors their heartbeat, motion of the user, pulse, etc. the process can be monitored and accessed through an access point. If the user seems to be unconscious or seems to be brain dead then the critical document can be transferred from the human brain to the Cloud Service Provider (CSP). The main proposed system which has been enhanced here is that the document which are uploaded from the artificial intelligentsystemwill be in a secured manner because to maintainthedocumentin a protected manner from the unauthorized user. ECC algorithm is derived to get the document in an encrypted process with a public key. If the user is known as an authorized user then the Key Generation Center (KGC) where it generates the key to the user who can access the data after it is uploaded. Fig 6 secured mind upload architecture Brain Models Over dozen of brain modelshumanbrainsaremodeledusing the pathological process from the anatomical chart. Current neuroscientists make research on many organisms to develop a brain model over an artificial intelligent process. Thus it provides a human brain model emulator which is a primitive among the wide range of organisms a. Primate Brain (human brain) The explorations on the human brain are one of the relevant models which are used for the WBE technology. The functional models proposed the primate brain enhanced with magnetic resonance and the electric fields of the brain. The artificial emulator isconnectedthroughneuronscalleda node which creates a biological process of the human brain. Key Generation Center (KGC) The proposed KGC generates a secret key to encrypt and decrypted resources which are uploaded to the cloud. Most, of the time KGC gets a session key where it acts as a session key shared with each entity. The key information is send to the authorized user so that they can decrypt data and utilize the resources which are shared. The unauthorized user cannot get the shared session key and anyhow it enhances the security issues inside and outside the CSP. a. Advantages The main security advantages over the secured key generation is that, • Key freshness • Key confidentiality and • Key authentication Key Freshness: Key freshness enhances a new key which will be generated to the authorized user so that they can get a key which will be changed when it is newly uploaded. The key can be generated in a random process so that the security implementation is high. Key Confidentiality: Key confidentiality is that the authorized can only recover the key from the KGC but notby an unauthorized user Key authentication: Key authentication ensures that the key generated only from the KGC, not by the attacker. Sometimes attacker can generate the key to the user and the data get attacked by the one who generatestheattackedkey. b. Key Generation and Distribution Upon receiving a request from the user, KGC has to generate a secret key and share to the user. KGC needs to send the secret session key in an authenticated manner. Assume that the key requester as {U} and the secret key which added as (xi, yi) for i=1,…….t The Key Generation process contains five steps Step 1: The data access user sends a request to the KGC as {u} Step 2: KGC verifies the user whether they are authorized user or a non authorized user at the secret key generated only to the authorized user xi Step 3: The user send a random challenge to the KGC as R Step 4: KGC selects a random secretkey withaninterpolated polynomial function f(x) with degree t to i=1 which passes through the (t+1) points. It compares the additional pointsP (0,k) with the functional degree of points which are added for i=0…….t on f(x) the Auth=h(k:u;Rt…. p1) where h is one way hash function. All computations are performed in Zn. Critical documents Human body sensor nodes Mind upload Access point Cloud server KGC Authorized user Database
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 513 Step 5: For the user the hash function f(0) which are calculated on it polynomial values (xi, yi,XOR Ri) andchecks the authentication value is true. The identical values authenticate the Ui the key sent from the KGC process. c. Discrete Logarithms The computation of the logarithmic fields added to the ECC to enhance a valuable calculation and efficiencycompared to the security of the data resources used. Sender = gx mod P Receiver=gy mod P K= (gy)x mod P An elliptical curve denotes the field K in a non singular cubic curve in two variables, f(x,y)=0 with a rational point (which the point may be infinity). The field K is usually taken in finite complex numbers, reals, and algebraic extensions of rationales, p addict numbers or infinite fields. Elliptic Curve Cryptography is a plane curve defined by the sequence of the equation form Y3=x2+ax+b The point which is sitting on the top plot of x implants the point of infinity which passes through the vertical curve and both the y axis which is added in the process execution. The scalar point of addition and multiplicationisproposedto the curve finite field analysis. Design implementation: The mind upload WBAN processisimplemented byusingthe microcontroller connected with a system, an android application to gather the sensed data and to predict the user status. Fig 6 the diagram presents the implementation work for the WBAN with mind upload security technology V. RESULTS A comparative summary of the ECC evaluation makes a comparison of the security analysis among the other cryptographic algorithm. ECC implementation in terms of code bytes and clock timing are given in the table I. The fastest implantation is achieved while encrypting and decrypting the resources using the secret key generated from the KGC. Table -1: Result Analysis Symmetric key size (bits) Diffie Hellman and RSA key size (bits) Elliptical Curve Cryptography (bits) 80 1024 160 112 2048 224 128 3072 256 192 7860 384 256 15360 521 Table I the comparison table for the key size of each algorithms where ECC acts at a mediator level of bits the fastest encryption process is achieved Chart -1: Fig 4 gives a comparison line chart for the security process of the enhanced functionality VI. CONCLUSIONS The work which had been presented with a WBAN technology is utilized in an efficient manner. The user resources can be efficiently used even after the user unconsciousness or the user death. The extended research can be analyzed in a way of two technologies (1) monitoring the health condition of the human using the health monitoring nano sensors with the wireless communication technology and (2) the cloud storage providing hot storage or cold storage. If the user data seems to becoldstorageover a period of time then the data can be automaticallycopied or transferred to the authorized person who is the next owner of the critical or sensitive documents utilized. Thus these enhances the utilization of the critical data instead it been loosed without getting authorization from the particular user. The security implications are provided using ECC cryptographic algorithm and the process is analyzed using the algorithmic verification of the finite fields. An obvious area of future research may be usage of the time complexity which is made to analyze the user health and to identify the
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 514 cold storage resource in the cloud service provider. Moreover, our current architecture creates an efficient way of time complexity precedence over the security enhancement. Finally from the usability point of view the authorized user can access the mind uploaded data from the user. User can securely handle the resources using Key Generation Center. REFERENCES [1] Md. Rownak Hossain and Md. Selim Hossain, “Efficient FPGA Implementation of Modular Arithmetic forElliptic Curve Cryptography”, International Conference on Electrical, Computer and Communication Engineering (ECCE), 7-9 February, 2019 [2] Shubhankar Chaudhary, Ashish Singh, and Kakali Chatterjee,” Wireless Body Sensor Network (WBSN) Security and Privacy Issues: A Survey”, International Conference on Computational Intelligence & IoT, 2018 [3] Heye Zhang, Subhas Chandra Mukhopadhyay, Sandeep Pirbhulal ,Chunyue Li, Yumei Wang, GuanglinLiShantha A, Renita J and Edna ElizabethN,WanqingWuandYuan- Ting Zhang, “An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks”, Sensors 2015 [4] CH. Radhika Rani1 , Lakku Sai Jagan2 , Ch. Lakshmi Harika 3 , V.V. Durga Ravali Amara 4, “Light weight encryption algorithmsforwirelessbodyarea networks”, International Journal of Engineering & Technology, 7 (2.20) (2018) [5] Shantha A, Renita J and Edna Elizabeth N,” Analysis and Implementation of ECC Algorithm in Lightweight Device”, International Conference on Communication and Signal Processing, April 4-6, 2019 [6] Amal HAFSA1,Anissa SGHAIER1,MohsenMACHHOUT1 , Jihene MALEK, “A New security Approach to Support the operations of ECC and AES Algorithms on FPGA”, 2019 19th international conference on Sciences and Techniques of Automatic control & computer engineering (STA), March 24-26, 2019 [7] M. Anwar , A. H. Abdullah , R. A. Butt , M. W. Ashraf , K. N. Qureshi , F. Ullah,” Securing Data Communication in Wireless Body Area Networks Using Digital Signatures”, Technical Journal, University of Engineering and Technology (UET), 2018 [8] Muhammad Sheraz Arshad Malik, Muhammad Ahmed, Tahir Abdullah, Naila Kousar, Mehak Nigar Shumaila, “Wireless Body Area Network SecurityandPrivacyIssue in E-Healthcare”, International Journal of Advanced Computer Science and Applications, Vol. 9, No. 4, 2018 [9] Muhammad Usman∗ , Muhammad Rizwan Asghar† , Imran Shafique Ansari‡ , and Marwa Qaraqe”, “Security in Wireless Body Area Networks: From In-Body to Off- Body Communications”, Division of Information and Computing Technology, 2018 [10] Wonjun Ko, Eunjin Jeon, Jiyeon Lee, and Heung-Il Suk,” Semi-Supervised Deep Adversarial Learning for Brain- Computer Interface”, DepartmentofBrainandCognitive Engineering,2019