Next Article in Journal
A Bi-Directional Carrier Sense Collision Avoidance Neighbor Discovery Algorithm in Directional Wireless Ad Hoc Sensor Networks
Next Article in Special Issue
Brain Inspired Dynamic System for the Quality of Service Control over the Long-Haul Nonlinear Fiber-Optic Link
Previous Article in Journal
Land Use Change and Climate Variation in the Three Gorges Reservoir Catchment from 2000 to 2015 Based on the Google Earth Engine
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System

1
Department of Electronics and Communication, Jaypee University of Information Technology, Solan 173234, India
2
Department of Computer Science and Engineering, Jaypee University of Information Technology, Solan 173234, India
3
School of Computing Science and Engineering, Vellore Institute of Technology, Chennai 600127, India
4
Department of Computer Science and Engineering, Soonchunhyang University, Asan 31538, Korea
5
Department of CS&IT, La Trobe University, Melbourne 3086, Australia
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(9), 2119; https://doi.org/10.3390/s19092119
Submission received: 9 April 2019 / Revised: 1 May 2019 / Accepted: 3 May 2019 / Published: 7 May 2019

Abstract

:
Due to advances in technology, research in healthcare using a cyber-physical system (CPS) opens innovative dimensions of services. In this paper, the authors propose an energy- and service-level agreement (SLA)-efficient cyber physical system for E-healthcare during data transmission services. Furthermore, the proposed phenomenon will be enhanced to ensure the security by detecting and eliminating the malicious devices/nodes involved during the communication process through advances in the ad hoc on-demand distance vector (AODV) protocol. The proposed framework addresses the two security threats, such as grey and black holes, that severely affect network services. Furthermore, the proposed framework used to find the different network metrics such as average qualifying service set (QSS) paths, mean hop and energy efficiency of the quickest path. The framework is simulated by calculating the above metrics in mutual cases i.e., without the contribution of malevolent nodes and with the contribution of malevolent nodes over service time, hop count and energy constraints. Further, variation of SLA and energy shows their expediency in the selection of efficient network metrics.

1. Introduction

In recent innovations and applications, the involvement of a cyber-physical system (CPS) can be seen widely in different areas of research such as business, intelligent driving system, tele-operated surgeries and healthcare systems. The roots of CPS is older, however and gained attention when Helen Gill through this concept in the air at the National Science Foundation (NSF). The CPS was initially introduced by Lee [1] in a NSF workshop where they discussed how physical process and computations were integrated. Presently, it has revolutionized E-healthcare technology up to the new heights of advancements [2] in order to fulfill the user’s expectations in the tele-operated mode of healthcare services. An E-healthcare CPS is generally a combination of a cyber-system of networks and physical system of sensors, medical equipment that provides the monitoring data to the practitioners /experts. This facility allows the patient to be observed from remote location by the medical practitioners where the data is observed either over a wireless network, wired network or mixed network. The diagram in Figure 1 shows an E-health CPS where practitioner monitors the health of their patient over the cyber space. Here, the health data from the equipment is transmitted through the cyber space to the practitioners at remote location. The cyber space consists of a network and an intelligent computational components where the whole working of CPS lies mostly on the intelligent component. However, the healthcare services are sometime critical and severely constrained with several parameters such as energy, risk, reliability, capacity and availability. Lots of researchers are seeking to strengthen the CPS. However, none of them have been concerned about their computational procedures. Recently, it has been found that the consumption of energy is a major issue for performing the computation and in CPS it is recommended to design an energy-efficient CPS. Furthermore, due to the environmental bar on energy resources, it is efficient to consume resources wisely. Therefore, research in CPS leads to green computations. Also, sometimes the working of CPS is found for critical services and when we are considering critical healthcare then it can be a matter of loss of life. Critical healthcare services are needed to be provided to the patient within requested service time (RST). The RST is the time for which a patient can survive, moreover, the RST of the patient also relies on the mean-time-to-failure (MTTF) of the services. The parameters discussed in the above paragraph need to be firmed up by providing agreements between service providers and users. These agreements are known as service-level-agreements (SLAs). Here, in the case of critical healthcare CPS, the SLAs are drawn in between practitioner and patient in terms of RST and MTTF of the service. These SLAs are the promise toward the satisfaction of services and provide the quality of service (QoS).
For the best explanation, there is a huge literature available to support the proposed system model and concepts. Although healthcare services are important requirements in society, sometimes risk of life loss is associated with the services. Therefore criticality constraint has to be applied. The continuity constraint to these applications is a very important parameter to fulfil the availability of energy requested to transmit the data between two specific ends. The healthcare data is sometime important and critical and must not be tempered; therefore, there is a need to propose some framework that provides a critical and energy-efficient CPS during the response of critical services. Furthermore, along with critical and energy-efficient CPS, security is considered to a great concern where patient health data is assumed to be confidential from ethical and legal perspectives. In the above paragraphs and literature, it has been analyzed that the discussed issues are highly sensitive toward the working of a CPS. Therefore, in this paper, we are considering the energy and SLA constraints collectively towards the proper functioning of CPS. Also, here we are assuming that our physical system is perfect and in functioning order. CPS has gradually becoming a widespread replacement technique with sensible cost-efficient emulation for connectivity to the family networking and community; it is officious to venture a proficient and safe communication mechanism. In CPS, security can be agreed simply because of its broadcasting, dynamic and distributed nature. Consequently, an ornate verification approach and a secure data transmission practice should be vital to promise that only legitimate devices have access to a variety of services with well-organized network recital. However, over these networks (wired/wireless), a patient’s data can be compromised due to the attacks. Therefore, special attention has been paid towards designing a secure architecture toward CPS. During the real-time transmission of messages, personal communication between patient and practitioner or storage of the patient’s report, there may be a possibility of an attack happening. A malicious node or a user may enter into an environment or hack one more legitimate node to behave maliciously where the attackers aim is to steal the communication between practitioner and patient, forge the patient’s reports, or perform some malicious activities in order to consume the network resources or slow down the communication process.
The proposal of the algorithm and mathematical formulation purely depends on the amount of healthcare data to be transmitted between two specific ends. The proposed mechanism follows end-to-end mechanism; therefore, the continuous maximum flow of healthcare data depends on the first and second equation. To deal with the workload, the maximum capacity has been considered at links. However, to deal with constant flow condition, the capacity of the path has been considered minimum with respect to the maximum healthcare data to be transmitted. Therefore, there is a need to propose some security mechanisms for an E-health CPS along with critical and energy efficient mechanisms. In order to ensure security during data transmission or personal communication between patient and practitioner or the storage of a patient’s report where malicious nodes or users are willing to disrupt the legitimate users or sensors, there is a need to deal with this issue.
The rest of the paper is structured into sections. Section 2 draws on the related work of the problem. Section 3 represents the proposed algorithms and preliminaries of the paper. Empirical analysis is carried out to highlight the theoretical results in Section 4. Section 5 is used for illustration of proposed algorithm and its time complexity. Experiment setup, results and discussion is given in Section 6. Finally, conclusion and future directions are given in the last section.

2. Related Work

With the passage of time, it has been seen that researchers from eminent research fields pioneered the powerful methods and tools to deal with the emerging CPS [3]. Development in physical systems improved CPS via advances in state space analysis, time and frequency domain analysis, tracking, optimization and filtering etc. Also, a number of scientists were concerned about the development of computational components technology with the design of new programming, body area sensors, biomedical sensors, computer system reliability, fault tolerance and cyber security. The below section discussed some of the energy SLA efficient, security frameworks needed to firm a strong basis for the development of proposed E-healthcare systems in a CPS.
The author in [4] discussed the importance of CPS in next-generation applications for the computing and integration of different applications such as transportation, health, manufacturing, energy and interdisciplinary applications. The functioning of CPS lies in three basic components sensing, computing/processing and networking [5]. The continued advances in wireless sensor networks (WSNs), medical sensors and reliable networks extended the involvement of CPS throughout in the field of E-healthcare and home-to-hospital (HTH) care or vice versa [6,7]. These applications became involved in body-area sensor networks and medical sensors, and therefore the research in this area became a hot topic [8,9]. Various researchers added their efforts to make these healthcare services easy and compatible using these sensors. However, it is difficult to manage wired sensor networks, and therefore the advancement of these sensors depends on the wireless sensor networks (WSNs) which gives the more comfort to the practitioner and patient. In addition to this, sometimes these healthcare services have been provided at remote locations via networking. This health data transmission has been requested as quickest with minimum delay. A number of authors [10,11,12,13,14,15] have been associated with the quickest path problem (QPP).
As this point, the health data of patient is helpful to provide necessary diagnostic /treatment/prescription to deal with the matter of patient life [16]. It is thanks to researchers that they have been provided with better solutions to deal with this compromising situation [17]. To add to this, while we deals with the wireless, wired or mixed sensor network then the health data over this are severely affected by the certain constraints [5] like energy, storage capacity, service level agreements, intelligent computing and processing etc. A number of authors have been associated with the different sections of the CPS [5,18]. However, lots of research has been underway in the field of networking to support the critical and continue health data transmission in the CPS [19].
In order to manage abnormal heart rate and cardiac diseases variability, authors in [20] have proposed a fractal technique for pacemaker design using a constrained horizon optimal controller issue. The proposed approach is achieved by moulding the dynamics of heart rate using fractional differential and calculus variations. Finally, along with practical implementation, researchers have discussed its hardware complexity. Also, authors in [21] have proposed an approach in order to facilitate the optimizing and designing of robust and efficient CPS for reducing diabetic costs in healthcare. The authors have designed a hardware model and proposed a mathematical model for amending the insulin injection problem for resolving the multi-fractal control issue. The accuracy of the proposed mathematical model is validated against existing non-fractal models. Later, in order to capture cross dependencies in spatial temporal fractal among united processes, authors have proposed a compact mathematical model. The proposed model is generalized and improved the accuracy for dynamic biological processes. Furthermore, the model is validated over certain medical observations [22]. In addition to this, authors in [23] have proposed a mathematical scheme for building accurate and compact complex system with the aim of scrutinizing influences and casual effects. In order to specify a single state at a time, the derived framework enables the incorporation of knowledge about inter-events and casual dynamics of magnitude increments. The presented framework permits us to examine the appropriateness of multi-fractional for various complex systems. The proposed approach validates the experimental results over various physiological processes against state of art techniques.
Networking abstractions to make the compatible CPS for healthcare are being developed [19] and lots of researchers are dealing with this [24,25,26]. Sometimes, healthcare services request reliable and promising health data transmission services [27,28,29]. Recently, it has been found that critical healthcare services relies more over the cyber component such as networking intelligent computing etc. Moreover, the health data is critical and there are requests for the reliable connection of networks [30,31,32]. A second delay in the services can lead to loss of life, and therefore for the need to design a health data transmission system without any violation in service level agreement [33,34]. For these types of services these SLAs plays a vital role in the support of CPS. The research in CPS shows the constraints of energy also; therefore, consideration of energy consumption can hold the computation of health data transmission [35]. Ignorance of energy constraints may interrupt services due to the lack of a sufficient amount of energy for health data transmission [36,37]. Also, due to deteriorating conditions of the environment and a bar on consumption of energy resources we are forced to consider these constraints on the data transmission [38]. In the networks, this confidential healthcare data of patient is requested to be made available to all concerned authorized medical personnel and, therefore, the chances of s security threat exist [39]. To tackle the crucial healthcare challenges, the authors have proposed a network on chip multi core platform for enabling the efficient molecular interaction among the entities. For analysing the interactions, communication and computation requirements, the authors have designed a high-performance network on chip (NoC) model that sustains a 1.36E5 events/ms throughput by consuming 15 mL energy per 1E5 stochastic events. The proposed approach offers 23% improvement with 20% less energy consumption against regular mesh NoC [40]. The authors in [41] have described two major fundamental challenges while designing a CPS framework for personalized healthcare systems. The need of a unifying mathematical description for designing CPS for providing dynamic interactions among cyber states and bio physiological events is considered as one major issue. Furthermore, the author has addressed secondary challenges for building a precise mathematical model for optimizing and designing wireless and wired NoCs.
Furthermore, a number of scientists and researchers have planned various safe routing approaches by defining several trusted and cryptographic based methods. For building the interaction from the outside world, a cyber-physical system must be reliable, efficient and secure. In order to optimize such systems, certain workload features such as non-stationary and self-similarity needed to be established. Authors have improved the CPS framework by enhancing the statistical approaches such as normalization group theory, master equations and fractional derivatives [42]. In [43], the authors proposed a feasible attack pattern mechanism against remote state estimation in CPS to analyze its corresponding effect on the performance metrics. To examine the optimal strategies for attacker and sensor, a game theoretic approach is built and the stability for mutually sides is deliberated. To identify the cyber-attack, the authors in [44] proposed a distributed multi-agent scheme over the protection systems of power grids. The malicious nodes on that protection system mimic legitimate faults and disable communication or cause component failure. The agents in the proposed mechanism employ both physical and cyber properties to strengthen the detection approach. The proposed approach is authorized through a benchmark power structure under several cyber-threat and fault scenarios. In order to explain and analyze the trustworthiness of cyber-physical measuring systems (CPMSs), generalized stochastic Petri nets are adopted by measuring against three metrics, i.e., availability, reliability and security in [45]. A malicious software spreading dynamics model is presented to learn about the trustworthiness evolution of CPMSs. The author in [46] proposed a service-oriented development approach for wide-area physical system such as vehicular networks and smart grid. Dissimilar to the traditional approach, the proposed methodology intrinsically permits disruption-free deployment. The proposed methodology broadens traditional service-oriented computing (SOC) concepts for managing real-time CPS features by pioneering QoS and resource-aware operation phases. The author in [47] presents a study of synthesis and analysis of the security and reliability of power CPS (PCPS). In this framework, the author considered the security management scenarios attained from the nature of each sort of cyber threat. The authors in [48] highlight industrial CPS security threats. The efficiency of the proposed scheme is verified by constructing an experimental fit. The simulated results reveal that the scheme deliberates a highly accurate solution that can effectively work in real-time scenarios. A number of secure approaches have been proposed for CPS against various applications such as industries, smart homes, and E-health. However, none of the proposed mechanism can provide the security in real-time scenarios with minimum delay, as time is also considered to be an important parameter while considering a E-health care CPS. A significant delay to ensure the security or legitimate the requested user allow number of intruders to analyse or consume the network resources. Therefore, along with a SLA critical and energy efficient mechanism, a secure E-healthcare CPS is needed to attract the users to rely on this application.
In literature, CPS and its applications have been discussed widely and rigorously. In this paper, the authors have tried to add the recent issues related to healthcare applications of CPS. The contribution can be seen as we have considered the energy constraint for the support of continuity of services for healthcare. This can be seen with the perspective of green computing which provides sustainable healthcare service of CPS. While we consider healthcare services, the assured services are the utmost requirement, and therefore another consideration can be seen by proposing SLAs for the healthcare data-transmission services. These SLAs are useful to support the critical healthcare application with the service assurance of CPS. In addition to this, sometimes healthcare data is confidential and, therefore, we have proposed a secure routing mechanism by doing some adjustment to the AODV protocol. The proposed security mechanism efficiently prevents the disruption of data packets during the transmission by addressing the security threat i.e., grey hole or black hole attack. The proposed method is confirmed against traditional routing mechanisms over several network metrics. The proposed approach is analyzed against the average number of s t paths, mean hop counts for s t path and mean energy efficiency. These results have been discussed for both cases without the involvement of a malicious device and with the involvement of a malicious device.

3. Proposed Framework

The proposed mechanism is discussed in number of steps along with their preliminaries:
  • An energy-efficient E-healthcare CPS mechanism will be discussed for continuous healthcare data transmission;
  • An SLA cooperative approach is defined to ensure a critical healthcare data transmission CPS mechanism;
  • A secure E-health CPS will be defined as an extension for the discussed mechanism.

3.1. Preliminaries

In an E-healthcare CPS, the health data is transmitted from one end to other over a cyber-computer communication network (CCCN). A CCCN is modeled with the help of a graph such as G = ( N , E ) , where N represents set of n nodes and E represents the set of m number of links. Every link of the network is assigned with specific link parameters such as capacity of link c ( u , v ) and delay of link d ( u , v ) [13,30]. A σ unit of data is transmitted between two consecutive nodes u and v by forming a link ( u , v ) . The transmission time of a link is given by:
T σ ( u , v ) = d ( u , v ) + σ c ( u , v )
Data is transmitted along a path ( P ) between two specific ends source ( s ) to destination ( t ) . For minimum transmission delay, the capacity of path is maximum, but for the flow network the capacity of the path is considered as minimum capacity of the path [30]. Therefore, the minimum transmission time is given by:
T σ ( P ) = i = 1 i = k 1 d ( u i , u i + 1 ) + σ min i = 1 k 1 c ( u i , u i + 1 )
Using Equation (2), the QPP model is given as:
min T σ ( P ) s . t . P   is   an   s t   path   in   network   G ( N , E )
The above model is useful to find the quickest path for data transmission. The problem has a great impact of data to be transmitted through a path ( P ) . When the amount of data is small, then communication (transmission) time relies mainly on the delay factor of link and if the data is large then transmission time relies mainly on the path capacity ( P ) . By using this model the proposed model is formulated in the next sub-sections.

3.2. Proposed Service-Level Agreement (SLA) System Model

In CCCN, for the continuity and criticality, all the link performance components are requested to be evaluated together in a single link parameter such as the service performance factor (SPF) [49] to find the qualifying service set (QSS). The following assumptions have been considered:
  • There are no parallel links or loop in the network to utilize the network resources efficiently.
  • Although nodes have been considered as perfect with respect to physical failure, these are subjected to the performance failure such as delay, traffic, requested SPF and bandwidth etc.
The SLA cooperation induced a great impact for completing the services in order to prevent network resources wastage [50]. During the problem formulation, these SLAs can be mapped in terms of RST ( t s ) and service MTTFs in seconds, minutes, hours, weeks, months or years. In CCCN, the data unit’s communication services are occurred and completed in fraction of seconds, therefore, these are considered into seconds ( s ) . As SPF is the part of link reliability, SLAs are requested to be modelled in such a way that it becomes comparable to the link reliability. Using the theory of reliability [51], the requested service performance factor (RSPF) at nodes denoted as ( r u ) is termed as the possibility of resilient service recital for a RST as defined in Equation (1) which is an important performance metric for getting the service.
r u = e t s M T T F s
The completion of the data transmission process has been affected not only by the link reliability but also the delay, capacity and the amount of data transmitted through with it. For example, if any service experiences delay beyond the limit of obtaining the service. Then service MTTFs can be considered as performance failure that further affects overall reliability of the link. Therefore, the integrity of all the link parameters is requested to make it comparable to link reliability. Its importance can be seen in a wide sense as it depends on the two essential factors (i) total transmission (communication) time and (ii) link of MTTF. As link delay, capacity, MTTF and data play a prominent role in the achievement of data transmission [49,52]; the mapping of SLAs has been incorporated in terms of service recital (performance) factor of link (SPF) denoted as r s ( u , v ) given by r s ( u , v ) = e [ d ( u , v ) + σ c ( u , v ) M T T F ( u , v ) ] . Service performance factor of the path (P) is computed and expanded by putting Equation (2) and given as:
R s ( P ) = e [ i = 1 i = k 1 d ( u i , u i + 1 ) + σ m i n i = 1 k 1 [ c ( u i , u i + 1 ) ] i = 1 i = k 1 M T T F ( u i , u i + 1 ) ] e [ i = 1 i = k 1 d ( u i , u i + 1 ) i = 1 i = k 1 M T T F ( u i , u i + 1 ) ] × e [ σ m i n i = 1 k 1 [ c ( u i , u i + 1 ) ] i = 1 i = k 1 M T T F ( u i , u i + 1 ) ] R s ( P ) = i = 1 k 1 e [ d ( u i , u i + 1 ) M T T F ( u i , u i + 1 ) ] × e [ σ m i n i = 1 k 1 [ c ( u i , u i + 1 ) ] i = 1 i = k 1 M T T F ( u i , u i + 1 ) ] R s ( P ) = e [ d ( P ) + σ c ( u , v ) M T T F ( P ) ] = e [ T σ ( P ) M T T F ( P ) ]   R s ( P ) = e [ T σ ( P ) M T T F ( P ) ]
In CCCN, there are number of nodes and links where each node can be a user, a service provider, a router or a computer. A path P is formed either combination of several links or a single link. Therefore, it is more realistic to satisfy the SLA piecewise or between two consecutive links other than satisfying the SLA after completion of the data transmission service among the path. The SLAs are considered for mission-critical applications; therefore, each node is endowed with the RSPF ( r u ) and relies as the possibility of resilient service for a particular service time ( t s ) . Hence to satisfy criticality constraint across the link ( u , v ) , SPF has to be more than that of RSPF given as:
e [ d ( u , v ) + σ c ( u , v ) ] M T T F ( u , v ) r u ,   ( u , v ) E
The remaining SPF value is defined as residual requested service recital (performance) factor (RRSPF) along a path denoted as r u ( σ , P ) . The RRSPF is distinct as the residual endowed RSPF from the SPF at the nodes after entire message transmission beside a path. The role of the RRSPF has been used to locate the SLA supportive nodes which take part in the message transmission. In this paper, we use SLA cooperation and extensive reliability theory framework to improve the service recital. The RRSPF r u ( σ , P ) along the path   P gives feasibility of path P i.e.,   r u ( σ , P ) 0 ,     u P as:
r u ( σ , P ) = { ln ( r u ) { ln [ e [ d ( u i , u i + 1   ) + σ c ( P ) ] M T T F ( u i , u i + 1 ) ] } , if   u = u i ,   i = 1 , 2 , ... ,   k 1 ln ( r u ) otherwise
The above equation is helpful for formulating the SLA cooperative quickest path problem for data transmission services:
min P T σ ( P ) s . t .   r u ( σ , P ) 0 , u P P   is   an   s t   path   in   network   G
In CCCN, plea energy at node u to transmit σ unit data over a link   ( u , v ) is called the energy rate   ω ( u , v ) and calculated as   ω ( u , v ) σ c ( u , v ) . Since, a different number of nodes and links are present in the network, each node u N has been associated with the limited energy supply   ( P u ) provided with batteries [37]. To satisfy the continuity, σ data transmission through link ( u , v ) has to be more than associated energy supply with requested energy (RE) given as:
P u ω ( u , v ) σ c ( u , v ) ,   ( u , v ) E
The rest of the leftover value is defined as residual energy supply (RES) along a path P u ( σ , P ) . RES is termed as the rest artistic energy supply from the plead energy at the nodes after complete data transfer along a path. RES used to locate the energy supportive nodes which take part in the data transfer [36]. The RES P u ( σ , P ) along the path   P gives the feasibility of path   P i.e.,   P u ( σ , P ) 0 ,     u P as:
P u ( σ , P ) = { P u ω ( u i , u i + 1   ) σ c ( P ) , i f   u = u i ,   i = 1 , ... ,   k 1 P u otherwise
Using the above equation, the energy cooperative quickest path dilemma is formulated as:
min P T σ ( P ) s . t .   P u ( σ , P ) 0 , u P P   is   an   s t   path   in   network   G
Using Equations (11) and (12), the quickest path problem model is capable for SLA and energy satisfied QPP for data transmission given as:
min   P T σ ( P ) s . t .       r u ( σ , P ) 0 ,     u P P u ( σ , P ) 0 ,     u P                               P   is   an   s t   path   in   network   G

3.3. Secure Cyber-Physical System (CPS) Framework

Figure 2 presents a CPS network having a number of IoT devices, sensor nodes, routers, gateways and internet.
The routers and gateways are generally are static and provide communication among the devices. The architecture of CPS is hierarchical in nature; the top layer comprises the internet to provide the services to users. Routers are the intermediate level through which services are provided. IoT devices constitute the lowest layer that utilize the real-time network services. In order to understand the entire working of proposed framework, let us believe a situation where foundation (source) node ‘S’ needs to communicate with destination node ‘D’ as depicted in Figure 3.
Let ‘S’ propels the data to ‘D’ through R1-R2-R3 path, in order to ensure the legitimacy of intermediate nodes every node will compute the legality of its previous node via previous node validity (PNV).
P N V = M e s s a g e   r e c e i v e d   b y   c u r r e n t   n o d e M e s s a g e   r e c i v e d   b y   p r e v i o u s   n o d e
If PNV satisfies threshold ratio, previous node is legitimate else the present node will propel as alarm memo to its 2-hop previous node to alert the node to reroute the data packet. Let ‘S’ conveys 350 packets to ‘D’, each node forwards all packet if they are legitimate. If a node accepts less packets then there may be possibility of grey hole or black hole attacks. If the number of packets inward by the present node is less than 75%, then there may be a chance of grey hole or black hole attacks. A black hole attack drops all the services transmitted between source and destination while a grey hole attack selectively drops the services making it crucial to identify it in initial stages. The network metrics severely affect the proposed framework that is why we have taken these two attacks only. The current node will instantly send alerts to its 2-hop previous node to stop further transmission of messages to that path.

3.3.1. Case 1: Without Contribution of Malicious Device

If ‘S’ sends 350 packets to R1 and R1 received all 350 packets and forwards to R2, the R1 and R2 will compute the PNV as given in the following equation:
N o d e   S = 350   ( N o d e   1 ) 350   ( N o d e   S )
Similarly, N o d e   1 = 350   ( N o d e   2 ) 350   ( N o d e   1 ) .
The PNV of ‘S’ is 1 means ‘S’ and R1 both are legitimate. Similarly, all the nodes will check the legitimacy of their preceding nodes by computing PNV.

3.3.2. Case 2: With Participation of Malevolent Device

Let node R2 is malevolent. ‘S’ sent 350 packets to R1 as depicted in Figure 4. As R1 is legitimate, it will send all 350 packets to R2. Now, R2 is malicious nodes, therefore, R2 intentionally drop some packets and forward intentionally drop some packets to its succeeding node i.e., R3. Now, node R3 will compute the PNV value of R2 as:
R 2 P N V = 230   ( N o d e   3 ) 350   ( N o d e   2 )
As the PNV of R2 is less than the threshold, this means R2 is malicious. In order to further confirm whether the dropping of packets are due to congestion or malicious node, R3 overhears its 2-hop preceding node i.e., R1 and check its PNV value. If the PNV value of R1 is more than R2 then it will immediately alert the R1 is more than R2 then it will immediate alert the R1 to reroute its data packets to any other nodes using AODV algorithm and declare the R2 as malicious nodes.

4. Empirical Analysis

Generally, there are r different capacities c 1 < c 2 < < c r present in any CCCN. The minimum energy and SLA cooperative link capacity is given below in Equations (13) and (14), and corresponding to this the minimum SLA and energy supportive link capacity is also revealed as in Equation (15):
c m i n S L A ( u , v ) = min i = 1 , ... ,   r { c i     :     e [ d ( u , v ) + σ c i ] M T T F ( u , v ) r u   0 }
c m i n E ( u , v ) = min i = 1 , ... ,   r { c i     :       P u ω ( u , v ) σ c i 0 }
The Equation (14), helps to corporate the efficient use of energy for continues data transmission. Therefore, the procedure has been given as follows for the support of continuity.
c min ( u , v ) = min { [ c m i n E ( u , v ) c a c ( u , v ) ] [ c m i n S L A ( u , v ) c b c ( u , v ) ] }
where c a and c b are the competence lies in the minimum supportive energy and SLA ability, respectively and link capacity Equation (15) provides the label of least link capacity to hold the criticality and continuity in message transmission if   c m i n S L A ( u , v ) and c m i n E ( u , v ) > 0 . A   s t path P is feasible if c ( P ) c m i n ( u , v ) . The above equations kind the least capacity which integrates both continues and critical data transmission allowing for the AND rule. The AND rule is mentioned here as for a precise link together parameters Energy and SLA needs to be satisfied. Let us assume that when a link chains several parameters then the logic has been given it as “1” otherwise “0”. Now using possessions of AND gate, the link will support the least capacity c m i n ( u , v ) only when both parameter gives logic “1”. Therefore, c m i n ( u , v ) has to trail the AND rule for secure, energy and SLA-efficient healthcare message transmission for task-critical relevance. From Equation (15), r number of sub-networks has been sort and every link has to pursue the given variation for the path capacity   c ( P ) .
c ( u , v ) c j c m i n ( u , v )   ; w h e r e   j = 1 , 2 ,   , r
Lemma 1.
Suppose a path P = u 1 , u 2   ,   u k 1 ,   u k has been recognized as the s t path in a sub-network then that path has been identified as SLA- and energy-cooperative (SESE).
Proof. 
Path P is s t path in the sub-network, the path capacity c ( P ) has to follow   c ( P ) c j c m i n ( u i , u i + 1 ) , where   i = 1 , , k 1 . Hence:
P u ( σ , P ) = P u ω ( u i , u i + 1 ) σ c ( P ) P u ω ( u i , u i + 1 ) σ c m i n ( u i , u i + 1 ) 0
r u ( σ , P ) = e [ d ( u i , u i + 1 ) + σ c ( P ) ] M T T F ( u i , u i + 1 ) r u e [ d ( u i , u i + 1 ) + σ c m i n ( u i , u i + 1 ) ] M T T F ( u i , u i + 1 ) r u 0
Lemma 2.
Let a s t   path P   is thought to be a possible path having capacity of path c   ( P ) = c j , then P is a path in G j .
Proof. 
From above Lemma 1, let P is possible.
P u ( σ , P ) = P u ω ( u i , u i + 1 ) σ c ( P ) 0 , i = 1 ,   2 ,   ,   k 1 .  
r u ( σ , P ) = e [ d ( u i , u i + 1 ) + σ c ( P ) ] M T T F ( u i , u i + 1 ) r u 0 ,   i = 1 ,   2 ,   ,   k 1
By satisfying Equation (16), the path ( P ) is s t path in network G j . The computation of path ( P ) depends on the shortest path problem (SPP) which follows Dijkastra’s algorithm. The computation of the path depends on the cost function which is taken as link delays i.e., d ( u , v ) .
SPP j       :         min P d ( P ) s . t .     P   is   a   s t   path   in   the   network   G j
After Equation (17), Lemma 3 needs to be explained as below:
Lemma 3.
Given, P is a most favorable path computed by S P P j given that c ( P ) = c h > c j . In that case, no other most favorable path is there for algorithm SESE having capacity c j .
Proof. 
Take; Q as a s t possible path for the algorithm SESE having capacity   c j , then Q is a path in   G j .
T σ ( P ) = d ( P ) + σ c h < d ( Q ) + σ c j = T σ ( Q )
Hence, Q cannot be a most favorable path for the algorithm SESE. □
Theorem 1.
Consider P ˇ be a most favorable path for SESE and ( P ˇ ) = c h . Then, P ˇ is a most favorable path of S P P h and any most favorable path of S P P h is a most favorable path.
Proof. 
Given that P ˇ is an s t possible path for SESE having capacity   c h , then P ˇ is an s t path in G h . Consider Q is a s t possible path in network   G h , then   c ( Q ) c h . Also, if   d ( Q ) < d ( P ˇ ) , then
T σ ( Q ) = d ( Q ) + σ c ( Q ) < d ( P ˇ ) + σ c h = T σ ( P ˇ )
which disagree with the condition of most favorable path P ˇ . In addition to this, using Lemma 3, capacity of s t shortest path P ˜ in G h is c ( P ˜ ) = c h . Hence, P ˜ is a s t possible path for SESE such that T σ ( P ˜ ) = T σ ( P ˇ ) is the most favorable path. □

5. Proposed Algorithms and Algorithmic Time Complexity

5.1. Algorithm 1

Algorithm 1: Secure, Energy- and SLA-Efficient (SESE) Algorithm without involvement of malicious device
Input:   G ( N , E ) , σ ,   d ( u , v ) ,   ω ( u , v ) , c ( u , v )   ,   M T T F ( u , v ) ,   r u , P u t s   and   M T T F s
Output: SLA-energy Cooperative Quickest Path (SESE)
BEGIN{
Initialization:
j 1 ,  
Procedure:
STEP 0: Variable Declaration
G   Network
N Set   of   nodes
E Set   of   links
c ( u , v ) Capacity   of   the   link   ( u , v )
d ( u , v ) Delay   of   link   the   ( u , v )
ω ( u , v ) Energy   rate   of   link   the   ( u , v )
P u Endowed   energy   at   node   u
r u Requested   service   performance   factor   at   node   u
σ Data
t s Requested   service   time
M T T F s Mean   Time   to   Failure   of   service
M T T F ( u , v ) Mean   Time   to   Failure   of   a   link
STEP 1: Find r capacities corresponds to critical-continuous service and label of minimum capacity:
(i)     c 1 < c 2 < c 3 < c r
(ii)    c m i n ( u , v ) with AND rule
STEP 2: Solve S P P j w.r.t. delay time d ( u , v ) in G j with capacities c j
For   j 1 : r
   Set j 1
   Solve S P P j .
     If No s t path in G j with capacity with c j
       go to STEP3
     else
       Let P j is an optimal solution for SPP j with capacity c ( P j ) = c j
     end
  end
STEP 3:
If j =   r
     go to STEP4
else
     set j = j + 1 and go to STEP2
end
STEP 4: Find the solution
Compute the index h ( 1 ,   2 , r ) of path array P j
T σ ( P h ) = min j = 1 , ,     r T σ ( P j )
P h is an optimal solution of the SESE
} END

5.2. Algorithm 2

Algorithm 2: Secure, Energy- and SLA-Efficient (SESE) Algorithm with involvement of malicious device
Input:   G ( N , E ) , σ ,   d ( u , v ) ,   ω ( u , v ) , c ( u , v ) ,   P u , M T T F ( u , v ) ,   r u , t s   and   M T T F s
Output: Secured SLA-energy Cooperative Quickest Path (SESE)
BEGIN{
Initialization:
j 1 ,  
Procedure:
STEP 0: Variable Declaration
G Network
N Set   of   nodes
E Set   of   links
c ( u , v ) Capacity   of   the   link   ( u , v )
d ( u , v ) Delay   of   link   the   ( u , v )
ω ( u , v ) Energy   rate   of   link   the   ( u , v )
P u Endowed   energy   at   node   u
r u Requested   service   performance   factor   at   node   u
σ Data
t s Requested   service   time
M T T F s Mean   Time   to   Failure   of   service
M T T F ( u , v ) Mean   Time   to   Failure   of   a   link
STEP 1: Find r capacities corresponds to critical-continuous service and label of minimum capacity:
(iii)     c 1 < c 2 < c 3 < c r
(iv)    c m i n ( u , v ) with AND rule
STEP 2: Solve S P P j w.r.t. delay time d ( u , v ) in G j with capacities c j
For   j 1 : r
   Set j 1
   Solve S P P j
     If No s t path in G j with capacity with c j
       go to STEP3
     else
       Let P j is an optimal solution for SPP j with capacity c ( P j ) = c j
     end
  end
STEP 3:
If j =   r
     go to STEP4
else
     set j = j + 1 and go to STEP2
end
STEP 4: Find the legitimate node
If P N V < 75 %
  Remove node from the network
else
go to STEP 5
STEP 5: Find the solution
Compute the index h ( 1 ,   2 , r ) of path array P j
T σ ( P h ) = min j = 1 , ,     r T σ ( P j )
P h is an optimal solution of the SESE
} END

5.3. Algorithm Time Complexity

Theorem 2.
The proposed SESE algorithm has time complexity of   O ( r ( m + n ( l o g ( n ) ) ) and space complexity.
Proof. 
The complexity of the proposed algorithm heavily relies on Dijkstra’s algorithm [53] which has the time complexity of O ( m + n   log ( n ) ) where ( m ) is the set of number of links and ( n ) is the set of nodes with O ( m + n ) space complexity. Here, the proposed algorithm has been run for ( r ) number of distinct capacities and gives a shortest path using Dijkstra’s algorithm. Therefore, the time and space complexity of the proposed algorithm is given by O ( r ( m + n   log ( n ) ) ) and O ( n + m ) , respectively. □

6. Simulation Results and Discussion

6.1. Experiment Setup

The experiment was conducted on a personal computer with Intel(R) CoreTMi5–7400, CPU@ 3.00 GHz, 8-GB RAM manufactured by Dell, and Windows 10 operating system in MATLAB 2010a. The SESE algorithm included calculation of the path utilizing the AODV calculation. The extent of the projected model was reenacted utilizing hop count, qualifying administration set of paths and vitality productivity. For the understanding the pertinence and convenience of the proposed algorithm, the outcomes have been introduced for the arbitrary systems produced by a Waxman irregular topology generator.
Waxman Random Topology Generator:
To examine the execution of the projected SESE algorithm on the extensive random network systems, a Waxman arbitrary topology producer was utilized [54,55]. The generation of Waxman topology are finished by setting the nodes in a one-by-one square, and the connections are made among two nodes ( u ) and ( v ) by thinking about the likelihood possibility.
P ( u , v ) = α e ( d ( u , v ) β L )
where: d ( u , v ) is the Euclidean distances between ( u ) and ( v ) , α is the greatest link probability such that α > 0 , β is the attribute to control length links, L is the greatest separation among any two connections. The distinctive estimations of α and β were measured as 0.4 and 0.1, separately. To upgrade the lucidity of results, distinctive estimations of information traffic, vitality and SLAs have been considered. The projected algorithm was confirmed for various arrangements of network measurements, as depicted in Table 1, for example, number of links, nodes energy, information SLAs and traffic. These qualities are appeared beneath:
The distinct network recital attributes are worn to evaluate the performance for the algorithm. The network attributes are used as average contender s t QSS paths, mean hop-count and mean energy efficiency. The mean applicant s t QSS paths are the parameter for getting the average number of candidate ideal s t consistent and speediest paths for the information system. Mean hop count is the execution assess for ascertaining the energy effectiveness. On the off chance that the quantities of average hop count is decremented, then mean energy effectiveness is incremented. The energy effectiveness is the execution measure for proficient utilization of energy for information transmission administrations or services and it is measured as the measure of information traffic exchanged to the absolute energy devoured for the information transmission over the s t paths. The units for the energy efficiency are measured in terms of b i t s / s e c s / j o u l e . Here, the amount of data has been considered in M b , therefore here the units for energy efficiency are considered as M b / s e c s / j o u l e .

6.2. Results and Discussion

6.2.1. Without Attack

The first, second and third segments of Table 2, Table 3 and Table 4 demonstrate the variety of various number of capacities, nodes and connections related with the network systems, separately. The variety in the estimations of the mean number of applicable s t QSS paths, hop count and mean vitality effectiveness are shown in the following successive segments of Table 2, Table 3 and Table 4 for the information esteems 1 Mb, individually. These results show here are with the 95% confidence region or with 5% error.
The above observation gives a brief idea of the importance of the algorithm with reference to energy and SLAs to support significant healthcare applications. The dissimilarity of SLAs and energy is also a vital factor to support all these services. The performance of the performance attributes decreases if there is in increase in the data payload. One can increment the SLAs and energy attribute values to achieve high data transfer value, which ultimately is more favorable for the continuity of service. Also, for greater understanding, the experiment has been conducted for 10 M b data transmission also as depicted in Table 5, Table 6 and Table 7.
For the critical service, whose principal constraints cannot be compromised over other conditions, other media have to be used for the completion of the service, such as green corridors, dedicated networks etc. In the next section we are showing our results with occurrence of malicious nodes in the network where healthcare data can be compromised.

6.2.2. With Attack

In this section, results have been illustrated with the help of a random network generator, where nodes are attacked and become malicious to the network. These malicious nodes compromised the data of a patient. Therefore, by proposing a security enabled framework for the healthcare data, the patient’s data cannot be compromised. The results during attack are analyzed in Table 8, Table 9, Table 10, Table 11, Table 12 and Table 13.
While comparing the simulated results in both the scenarios such as with attack and without attack, it has been seen that the trend of network resources experiences some degradation. This scenario is tolerable at the cost of security of healthcare data of a patient which is more important.
Let us analyze the results quantitatively with the Table 2 column 4 and Table 8 column 4 values, whereby the trends show that for 10 distinct capacities and 100 nodes the average QSS paths decrease when attacks occurred in the network. This trend has been occurred because of the removal of malicious network resources at the cost of security. Furthermore, from Table 3 and Table 9 with column 4, the results for the hop counts for the 10 distinct capacities having 100 nodes shows that number of hopes increased. However, the hope count has not had such a big effect because network nodes have a sufficient degree to become connected after being generated via a Waxman network generator. The attacks in the network made a change in its energy efficiency too and, therefore, from Table 4 and Table 10 with column 4 this can be easily analyzed qualitatively as well as quantitatively. Same variation pattern has been analyzed for the 10 Mb data transmission in Table 5, Table 6 and Table 7 without attack and Table 11, Table 12 and Table 13 with attack.

7. Conclusions and Future Scope

In this paper, a secure and SLA- and energy-efficient healthcare CPS is proposed that can professionally secure the communication procedure, reports between practitioner and patient, and respond to the user’s request with minimum delay. By identifying the residual information of energy at the node before the transmission process, prior knowledge of requested service time and modification in AODV process mechanisms efficiently provide a secure and efficient communication mechanism. With and without involvement of malicious nodes, the simulated analysis of the proposed framework against average hop count, average energy efficient and mean quickest paths parameters outperforms conventional approaches. Furthermore, the results of SLA and energy vary over these parameters in order to analyze the pattern that governs an important aspect for considering an efficient path selection in the communication process. Moreover, the measured quantitative and qualitative results perform efficiently without the contribution of malicious devices, while during the contribution of malicious nodes the performance degrades at the cost of security. In our future communications, we deliberate to analyze the proposed mechanism over further security attacks i.e., byzantine, jelly fish and worm hole attacks and try to reduce the data size for efficiently utilizing the network resources.

Author Contributions

Conceptualization, R.K. and A.S.; Methodology, A.S. and G.R.; Software, X.X.; Validation, R.K., A.S. and G.R.; Formal Analysis, G.R. and H.S.; Investigation, R.K. and N.C.; Resources, N.C.; Data Curation, G.R., H.S., V.V., Y.N. and N.C.; Writing-Original Draft Preparation, A.S., R.K., G.R. and H.S.; Writing-Review & Editing, R.K., Y.N. and N.C.; Visualization, R.K., H.S. and V.V.; Supervision, R.K.; Project Administration, V.V., Y.N. and N.C.; Funding Acquisition, Y.N.

Funding

This research was supported by the KIAT (Korea Institute for Advancement of Technology) grant funded by the Korea Government (MOTIE: Ministry of Trade Industry and Energy). (No. N0001791, HRD Program for ICT Convergence Smart Rehabilitation Industrial Education Program) and the Soonchunhyang University Research Fund.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lee, E.A. Cyber-physical systems-are computing foundations adequate. In Proceedings of the Position Paper for NSF Workshop on Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, Austin, TX, USA, 16–17 October 2006; pp. 1–9. [Google Scholar]
  2. Lee, E.A. Cyber physical systems: Design challenges. In Proceedings of the 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA, 5–7 May 2008; IEEE Computer Society: Washington, DC, USA, 2008; pp. 363–369. [Google Scholar]
  3. Baheti, R.; Gill, H. Cyber-physical systems. Impact Control Technol. 2011, 12, 161–166. [Google Scholar]
  4. Rajkumar, R.; Lee, I.; Sha, L.; Stankovic, J. Cyber-physical systems: The next computing revolution. In Proceedings of the 2010 47th ACM/IEEE Design Automation Conference (DAC), Anaheim, CA, USA, 13–18 June 2010; pp. 731–736. [Google Scholar]
  5. Haque, S.A.; Aziz, S.M.; Rahman, M. Review of cyber-physical system in healthcare. Int. J. Distrib. Sens. Netw. 2014, 10, 217415. [Google Scholar] [CrossRef]
  6. Jovanov, E.; Milenkovic, A.; Otto, C.; De Groen, P.C. A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. J. Neuroeng. Rehabil. 2005, 2, 6. [Google Scholar] [CrossRef] [PubMed]
  7. Sharma, A.; Kumar, R. Service-level agreement—Energy cooperative quickest ambulance routing for critical healthcare services. Arab. J. Sci. Eng. 2019, 44, 3831–3848. [Google Scholar] [CrossRef]
  8. Sharma, A.; Kumar, R. Computation of the reliable and quickest data path for healthcare services by using service-level agreements and energy constraints. Arab. J. Sci. Eng. 2019, 1–18. [Google Scholar] [CrossRef]
  9. Shnayder, V.; Chen, B.-R.; Lorincz, K.; Fulford-Jones, T.R.; Welsh, M. Sensor networks for medical care. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, CA, USA, 2–4 November 2005. [Google Scholar]
  10. Chen, G.-H.; Hung, Y.-C. On the quickest path problem. Inf. Process. Lett. 1993, 46, 125–128. [Google Scholar] [CrossRef]
  11. Ahuja, R.K.; Magnanti, T.L.; Orlin, J.B. Network Flows; Elesivier: North-Holland, The Netherlands, 1988. [Google Scholar]
  12. Chen, Y.; Chin, Y. The quickest path problem. Comput. Oper. Res. 1990, 17, 153–161. [Google Scholar] [CrossRef]
  13. Sharma, A.; Kumar, R. A framework for pre-computated multi-constrained quickest qos path algorithm. J. Telecommun. Electron. Comput. Eng. (JTEC) 2017, 9, 73–77. [Google Scholar]
  14. Sharma, A.; Kumar, R. An optimal routing scheme for critical healthcare hth services—An iot perspective. In Proceedings of the 2017 Fourth International Conference on Image Information Processing (ICIIP), Shimla, India, 21–23 December 2017; pp. 1–5. [Google Scholar]
  15. Sharma, A.; Kumar, R. Risk-energy aware service level agreement assessment for computing quickest path in computer networks. Int. J. Reliab. Saf. 2019, 13, 96–124. [Google Scholar] [CrossRef]
  16. Rais, A.; Viana, A. Operations research in healthcare: A survey. Int. Trans. Oper. Res. 2011, 18, 1–31. [Google Scholar] [CrossRef]
  17. Fernández-Alemán, J.L.; Señor, I.C.; Lozoya, P.Á.O.; Toval, A. Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inform. 2013, 46, 541–562. [Google Scholar] [CrossRef]
  18. Zhang, Y.; Qiu, M.; Tsai, C.-W.; Hassan, M.M.; Alamri, A. Health-cps: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 2017, 11, 88–95. [Google Scholar] [CrossRef]
  19. Wan, K.; Man, K.; Hughes, D. Specification, analyzing challenges and approaches for cyber-physical systems (CPS). Eng. Lett. 2010, 18, 3. [Google Scholar]
  20. Bogdan, P.; Jain, S.; Goyal, K.; Marculescu, R. Implantable pacemakers control and optimization via fractional calculus approaches: A cyber-physical systems perspective. In Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, Beijing, China, 17–19 April 2012; pp. 23–32. [Google Scholar]
  21. Ghorbani, M.; Bogdan, P. A cyber-physical system approach to artificial pancreas design. In Proceedings of the 2013 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS), Montreal, QC, Canada, 29 September–4 October 2013; pp. 1–10. [Google Scholar]
  22. Xue, Y.; Rodriguez, S.; Bogdan, P. A spatio-temporal fractal model for a cps approach to brain-machine-body interfaces. In Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 14–18 March 2016; pp. 642–647. [Google Scholar]
  23. Xue, Y.; Bogdan, P. Constructing compact causal mathematical models for complex dynamics. In Proceedings of the 8th International Conference on Cyber-Physical Systems, Pittsburgh, PA, USA, 18–20 April 2017; ACM: New York, NY, USA, 2017; pp. 97–107. [Google Scholar]
  24. Hossain, M.S. Cloud-supported cyber–physical localization framework for patients monitoring. IEEE Syst. J. 2017, 11, 118–127. [Google Scholar] [CrossRef]
  25. Stankovic, J.A. Research directions for cyber physical systems in wireless and mobile healthcare. ACM Trans. Cyber-Phys. Syst. 2017, 1, 1. [Google Scholar] [CrossRef]
  26. Ahmad, A.; Paul, A.; Rathore, M.M.; Chang, H. Smart cyber society: Integration of capillary devices with high usability based on cyber–physical system. Future Gener. Comput. Syst. 2016, 56, 493–503. [Google Scholar] [CrossRef]
  27. Park, K.-J.; Zheng, R.; Liu, X. Cyber-physical systems: Milestones and research challenges. Comput. Commun. 2012, 36, 1–7. [Google Scholar] [CrossRef]
  28. Abdelwahab, S.; Hamdaoui, B.; Guizani, M.; Rayes, A. Enabling smart cloud services through remote sensing: An internet of everything enabler. IEEE Internet Things J. 2014, 1, 276–288. [Google Scholar] [CrossRef]
  29. Cook, D.J.; Duncan, G.; Sprint, G.; Fritz, R.L. Using smart city technology to make healthcare smarter. Proc. IEEE 2018, 106, 708–722. [Google Scholar] [CrossRef]
  30. Nejad, H.M.; Movahhedinia, N.; Khayyambashi, M.R. Improving the reliability of wireless data communication in smart grid nan. Peer Peer Netw. Appl. 2017, 10, 1021–1033. [Google Scholar] [CrossRef]
  31. Lin, Y.-K. Spare routing reliability for a stochastic flow network through two minimal paths under budget constraint. IEEE Trans. Reliab. 2010, 59, 2–10. [Google Scholar]
  32. Issac, P.; Campbell, A.M. Shortest path problem with arc failure scenarios. EURO J. Transp. Logist. 2017, 6, 139–163. [Google Scholar] [CrossRef]
  33. Gonzalez, A.J.; Helvik, B.E. Sla success probability assessment in networks with correlated failures. Comput. Commun. 2013, 36, 708–717. [Google Scholar] [CrossRef]
  34. Fawaz, W.; Daheb, B.; Audouin, O.; Du-Pond, M.; Pujolle, G. Service level agreement and provisioning in optical networks. IEEE Commun. Mag. 2004, 42, 36–43. [Google Scholar] [CrossRef]
  35. Aktas, E.; Bloemhof, J.; Fransoo, J.C.; Günther, H.-O.; Jammernegg, W. Green Logistics Solutions; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
  36. Calvete, H.I.; del-Pozo, L.; Iranzo, J.A. The energy-constrained quickest path problem. Optim. Lett. 2017, 11, 1319–1339. [Google Scholar] [CrossRef]
  37. Calvete, H.I.; del-Pozo, L.; Iranzo, J.A. Dealing with residual energy when transmitting data in energy-constrained capacitated networks. Eur. J. Oper. Res. 2018, 269, 602–620. [Google Scholar] [CrossRef]
  38. Chołda, P.; Jaglarz, P. Energy-efficiency versus resilience: Risk awareness view on dimensioning of optical networks with a sleep mode. Photonic Netw. Commun. 2015, 30, 43–58. [Google Scholar] [CrossRef]
  39. Al Ameen, M.; Liu, J.; Kwak, K. Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 2012, 36, 93–101. [Google Scholar] [CrossRef] [PubMed]
  40. Majumder, T.; Li, X.; Bogdan, P.; Pande, P. Noc-enabled multicore architectures for stochastic analysis of biomolecular reactions. In Proceedings of the IEEE 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 9–13 March 2015; pp. 1102–1107. [Google Scholar]
  41. Bogdan, P. A cyber-physical systems approach to personalized medicine: Challenges and opportunities for noc-based multicore platforms. In Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 9–13 March 2015; EDA Consortium: San Jose, CA, USA, 2015; pp. 253–258. [Google Scholar]
  42. Marculescu, R.; Bogdan, P. Cyberphysical systems: Workload modeling and design optimization. IEEE Des. Test Comput. 2011, 28, 78–87. [Google Scholar] [CrossRef]
  43. Li, Y.; Quevedo, D.E.; Dey, S.; Shi, L. A game-theoretic approach to fake-acknowledgment attack on cyber-physical systems. IEEE Trans. Signal Inf. Process. Over Netw. 2017, 3, 1–11. [Google Scholar] [CrossRef]
  44. Rahman, M.S.; Mahmud, M.A.; Oo, A.M.T.; Pota, H.R. Multi-agent approach for enhancing security of protection schemes in cyber-physical energy systems. IEEE Trans. Ind. Inform. 2017, 13, 436–447. [Google Scholar] [CrossRef]
  45. Yu, Z.; Zhou, L.; Ma, Z.; El-Meligy, M.A. Trustworthiness modeling and analysis of cyber-physical manufacturing systems. IEEE Access 2017, 5, 26076–26085. [Google Scholar] [CrossRef]
  46. Tariq, M.U.; Florence, J.; Wolf, M. Improving the safety and security of wide-area cyber–physical systems through a resource-aware, service-oriented development methodology. Proc. IEEE 2018, 106, 144–159. [Google Scholar] [CrossRef]
  47. Ge, H.; Zhao, Z. Security analysis of energy internet with robust control approaches and defense design. IEEE Access 2018, 6, 11203–11214. [Google Scholar] [CrossRef]
  48. Yang, J.; Zhou, C.; Yang, S.; Xu, H.; Hu, B. Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Trans. Ind. Electron. 2018, 65, 4257–4267. [Google Scholar] [CrossRef]
  49. Kumar, R.; Cholda, P. A framework for continuity of mission-critical network services. In Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), Kolkata, India, 15–18 December 2015; pp. 1–3. [Google Scholar]
  50. Følstad, E.L.; Helvik, B.E. The cost for meeting sla dependability requirements; implications for customers and providers. Reliab. Eng. Syst. Saf. 2016, 145, 136–146. [Google Scholar] [CrossRef]
  51. Rausand, M.; Arnljot, H. System Reliability Theory: Models, Statistical Methods, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2004; Volume 396. [Google Scholar]
  52. Gopal, K.; Kumar, R. An algorithm for computing the best-performing path in a computer network. Int. J. Perform. Eng. 2007, 3, 203–212. [Google Scholar]
  53. Fredman, M.L.; Tarjan, R.E. Fibonacci heaps and their uses in improved network optimization algorithms. J. ACM (JACM) 1987, 34, 596–615. [Google Scholar] [CrossRef]
  54. Chen, S.; Song, M.; Sahni, S. Two techniques for fast computation of constrained shortest paths. In Proceedings of the Global Telecommunications Conference GLOBECOM’04, Dallas, TX, USA, 29 November–3 December 2004; pp. 1348–1352. [Google Scholar]
  55. Chen, S.; Song, M.; Sahni, S. Two techniques for fast computation of constrained shortest paths. IEEE/ACM Trans. Netw. (TON) 2008, 16, 105–115. [Google Scholar] [CrossRef]
Figure 1. Cyber physical system (CPS) for E-healthcare systems.
Figure 1. Cyber physical system (CPS) for E-healthcare systems.
Sensors 19 02119 g001
Figure 2. Data flow in cyber-physical system (CPS) network.
Figure 2. Data flow in cyber-physical system (CPS) network.
Sensors 19 02119 g002
Figure 3. Data transmission in CPS.
Figure 3. Data transmission in CPS.
Sensors 19 02119 g003
Figure 4. Data transmission in CPS in the existence of a malicious node.
Figure 4. Data transmission in CPS in the existence of a malicious node.
Sensors 19 02119 g004
Table 1. Estimations of several network metrics for arbitrary experiment.
Table 1. Estimations of several network metrics for arbitrary experiment.
Sr. No.List of Network AttributesAttribute Values
1Total nodes100, 200 and 300
2Total links4600, 18,500 and 41,500
3Total number of different capacities10,100 and 1000
4Information traffic1, 10 Mb
5Distinct energy allied with nodes10, 100 and 100 joule
6Distinct SLAs assigned100, 110 and 120 secs
Table 2. Average candidate st qualifying service set (QSS) paths for SESE algorithm for 1 Mb.
Table 2. Average candidate st qualifying service set (QSS) paths for SESE algorithm for 1 Mb.
rnmAverage Candidate s − t QSS Paths for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046006.48.58.78.99.49.59.19.59.8
20018,5007.89.29.29.39.69.49.39.49.4
40074,0008.48.89.299.49.89.29.49.6
10010046003852.75456.66162.658.559.960.7
20018,50049.856.656.758.560.861.659.161.862
40074,0006060.56264.562.562.58892.494.2
1000100460063.980.682.689.695.795.390.595.696.2
20018,50072.689.69092.896.497.694.297.498
40074,00088.590.69192.49494.395.196.898
Table 3. Mean hop counts for the effective path for the SESE algorithm for 1 Mb.
Table 3. Mean hop counts for the effective path for the SESE algorithm for 1 Mb.
rnmMean Hop Counts for the Effective Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046002.82.72.82.52.73.62.92.32.9
20018,50032.82.52.62.52.42.72.52.3
40074,0003.63.43.23.23.43.4332
10010046004.12.72.62.92.62.62.92.62.5
20018,5003.23.12.93.632.83.133
40074,0004.543.532.524.532.8
100010046002.52.42.33.22.72.53.22.32.2
20018,5002.82.42.63.62.82.63.62.82.6
40074,0003.93.82.53.332.83.63.23.2
Table 4. Mean energy efficiency for the effective path for the SESE algorithm for 1 Mb.
Table 4. Mean energy efficiency for the effective path for the SESE algorithm for 1 Mb.
rnmMean Energy Efficiency for the Effective Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046000.363330.907491.221740.397981.07711.195860.34981.90551.9706
20018,5001.059422.012464.280121.752671.822797.355060.46241.699193.94239
40074,0001.001623.39334.609663.823244.54076.282482.57125.7075.744
10010046000.444070.513821.047910.550430.584041.530780.66950.841021.20749
20018,5000.903591.37011.680881.342482.038872.496832.29922.124482.6691
40074,0000.402651.33865.57282.999752.368953.746151.51383.54894.3569
100010046002.667021.277681.516180.546781.137491.264960.42011.831222.67396
20018,5000.45522.039942.66790.69471.62022.74750.89400.927481.39722
40074,0001.56892.06954.36630.68751.54233.25950.36240.59831.7999
Table 5. The average candidate s − t QSS paths for the SESE algorithm for 10 Mb.
Table 5. The average candidate s − t QSS paths for the SESE algorithm for 10 Mb.
rnmAverage Candidate s − t QSS Paths for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046004.56.66.87.17.57.67.27.67.9
20018,5005.97.37.37.47.77.67.47.57.5
40074,0006.56.97.377.57.97.37.57.7
10010046003650.85254.55960.756.658.158.8
20018,50047.954.654.856.658.961.657.259.960
40074,0005858.66062.560.660.68690.692.3
1000100460062.178.780.787.793.893.488.693.794.3
20018,50070.787.78890.994.695.792.495.696
40074,00086.688.78990.59292.493.294.996
Table 6. Mean hop counts for the effective path for the SESE algorithm for 10 Mb.
Table 6. Mean hop counts for the effective path for the SESE algorithm for 10 Mb.
rnmMean Hop Counts for the Optimal Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046002.42.32.42.12.33.22.522.5
20018,5002.62.42.12.22.122.32.12
40074,0003.232.82.8332.62.61.6
10010046003.72.32.22.52.22.22.52.22.1
20018,5002.82.72.53.12.62.42.72.62.6
40074,0004.13.63.12.62.11.64.12.62.4
100010046002.121.92.82.32.12.81.91.8
20018,5002.422.23.22.42.23.22.42.2
40074,0003.53.42.12.92.62.43.22.82.8
Table 7. Mean energy efficiency for the effective path for the SESE algorithm for 10 Mb.
Table 7. Mean energy efficiency for the effective path for the SESE algorithm for 10 Mb.
rnmMean Energy Efficiency for the Optimal Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046000.336660.877591.191750.367991.04771.156660.31871.87451.9486
20018,5001.019432.042464.240131.712541.7887.31660.42271.659873.9046
40074,0001.041623.34564.540453.785644.509895.242451.97124.70874.7542
10010046000.59420.618921.27910.890490.904041.950880.75950.981551.8974
20018,5000.95351.38071.720561.382652.078452.544562.35982.16482.781
40074,0000.54251.54865.78293.099772.568453.956171.75373.75884.5599
100010046002.867071.457671.72650.746771.347481.494970.64681.981272.8442
20018,5000.56522.34952.76890.85451.94272.947860.95471.147471.69787
40074,0001.78882.28984.56650.85771.76213.55970.552870.68891.7999
Table 8. Average candidate st QSS paths for the SESE algorithm for 1 Mb.
Table 8. Average candidate st QSS paths for the SESE algorithm for 1 Mb.
rnmAverage Candidate s − t QSS Paths for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046005.68.78.79.39.79.88.59.49.6
20018,5007.599.59.59.59.58.59.59
40074,00010101091010101010
100100460037.253.253.458.662.658.85960.264
20018,50050.251.559.259.166.267.557.16259.9
40074,0005556.259.85964.162.960.162.863-
100010046005382.482.68894.896.4849596.6
20018,50083.38894.492.196.2979697.696.9
40074,00089.190.292.192.594.195.394.295.798.3
Table 9. Mean hop counts for the effective path for the SESE algorithm for 1 Mb.
Table 9. Mean hop counts for the effective path for the SESE algorithm for 1 Mb.
rnmMean Hop Counts fo effective Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046002.72.72.62.53.12.92.42.62.4
20018,5001.522.542.52.53.533
40074,0004.22.93.14.12.52.532.92.9
10010046002.23332.82.42.82.82.8
20018,50032.82.82.82.52.533.12.2
40074,0005.13.93.543.12.95.24.72.2
100010046002.82.82.62.632.42.22.43.2
20018,5003.932.93.5.3.12.83.22.92.9
40074,0002.82.62.12.52.12.13.13.12.5
Table 10. Mean energy efficiency for the effective path for the SESE algorithm for 1 Mb.
Table 10. Mean energy efficiency for the effective path for the SESE algorithm for 1 Mb.
rnmMean Energy Efficiency for the effective Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046000.558330.624220.794780.7550.667980.928260.31840.596782.21058
20018,5000.72121.82245.288750.2972.79633.261151.18953.30843.38985
40074,0000.63222.76513.49583.6191.90481.61071.21711.1342.4272
10010046000.226420.618840.980460.564561.235761.309760.64870.703380.71424
20018,5000.24931.85437.42570.4310.74011.30210.49280.63372.0408
40074,0000.27741.43412.47251.21752.77784.21811.14701.86542.1414
100010046000.113080.297560.719880.451322.912460.798420.22631.167141.21476
20018,5000.95091.30492.52811.47151.3852.32650.57231.17461.6802
40074,0001.02011.20512.01421.15421.88412.10451.88742.01492.9879
Table 11. Average candidate st QSS paths for the SESE algorithm for 10 Mb.
Table 11. Average candidate st QSS paths for the SESE algorithm for 10 Mb.
rnmAverage Candidate s − t QSS Paths for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046003.97.17.17.38.18.26.97.87.9
20018,5005.97.27.97.97.58.46.97.98.2
40074,0007.27.27.27.58.88.88.88.88.8
100100460035.552.555.656.960.956.957.558.762.8
20018,50048.549.957.557.664.665.955.56057.5
40074,00053.554.558.157.262.961.258.861.162
1000100460051.280.680.986.292.994.682.293.294.6
20018,50081.586.292.890.594.495.294.295.895.1
40074,00087.688.590.590.792.393.592.493.996.6
Table 12. Mean hop counts for the effective path for the SESE algorithm for 10 Mb.
Table 12. Mean hop counts for the effective path for the SESE algorithm for 10 Mb.
rnmMean Hop Counts for the Optimal Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046001.81.81.71.62.221.51.71.5
20018,5001.11.62.13.62.12.13.12.62.6
40074,0003.32.12.23.21.61.62.12.22.9
10010046001.32.12.12.11.91.51.91.91.9
20018,5002.11.91.91.91.61.62.12.21.3
40074,0004.24.12.63.12.224.33.81.3
100010046001.91.91.71.72.11.51.31.52.3
20018,5002.92.122.61.31.92.312
40074,0001.91.71.21.61.21.22.22.21.6
Table 13. Mean energy efficiency for the effective path for the SESE algorithm for 10 Mb.
Table 13. Mean energy efficiency for the effective path for the SESE algorithm for 10 Mb.
rnmMean Energy Efficiency for the Optimal Path for 10 Runs
Pu = 10Pu = 100Pu = 1000
ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110ts = 100ts = 105ts = 110
1010046000.338330.424870.648580.58950.45580.728220.28950.486572.0056
20018,5000.52151.52285.088650.0982.59673.191181.09953.15873.24988
40074,0000.54242.45573.38573.41941.60481.31091.01461.0392.0277
10010046000.056440.458870.680850.36471.02571.159770.41880.453380.51429
20018,5000.04971.55477.12580.1320.44021.00250.29290.63392.0008
40074,0000.02751.2242.22251.00752.52784.00811.00701.61572.0019
100010046000.00380.057520.509870.201352.712450.568460.02640.97141.00474
20018,5000.70081.05462.22851.25161.0842.02610.27241.004641.3001
40074,0001.00021.01521.85410.95411.65421.65411.55751.85452.6576

Share and Cite

MDPI and ACS Style

Sharma, A.; Rathee, G.; Kumar, R.; Saini, H.; Varadarajan, V.; Nam, Y.; Chilamkurti, N. A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System. Sensors 2019, 19, 2119. https://doi.org/10.3390/s19092119

AMA Style

Sharma A, Rathee G, Kumar R, Saini H, Varadarajan V, Nam Y, Chilamkurti N. A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System. Sensors. 2019; 19(9):2119. https://doi.org/10.3390/s19092119

Chicago/Turabian Style

Sharma, Ashutosh, Geetanjali Rathee, Rajiv Kumar, Hemraj Saini, Vijayakumar Varadarajan, Yunyoung Nam, and Naveen Chilamkurti. 2019. "A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System" Sensors 19, no. 9: 2119. https://doi.org/10.3390/s19092119

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop