SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
8
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Authentic Patient Data and Optimization Process through Cryptographic
Image or Sound computations as Key using Genetic Algorithm in Body Area
Network
Pradeep Kumar
Ph.D. Student, Enrollment Number: 120481
Mody University of Science and Technology, Lakshmangarh, Sikar-332311, Rajasthan, India
I. Introduction
Internet of Things (IoT), helping interconnected sensors (i.e., wireless body area network (WBAN), can treat in real time
monitoring of patient health status and manage patients and treatment. Likewise, IoT will play a helping role in the next-
generation healthcare establishment. Although IoT-based patient health status monitoring has become very popular,
monitoring patients remotely outside of hospital settings requires augmenting the capabilities of IoT with other resources for
health data storage and processing. In this paper, we propose an IoT-based authentication and optimization process through
image key management using a genetic algorithm in body area network. Recent advances in wireless communications
technologies formedical/fitness applications. Particular, it analyzes the following related developments may cover the
following topics:
• Status of M2M standardization, market and development in general and specifically for medical applications
• Development and standardization of the Wireless Body Area Network (WBAN) and Medical Body Area Network
(WMBAN), including their markets profits.
• Underlying technologies:
o
Bluetooth o
ZigBee
o
Wi-Fi low-power consumption technology o Z-Wave
o Self-powered wireless sensors
II. Image Processing
Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and
the value of the function at given pair of coordinates (x, y) is called the intensity value.
The programming counterpart of such a function could be a one or two-dimensional array. Code Snippet 1 and Code
Snippet 2 show how to traverse and use 1-D and 2-D arrays programmatically. Both of them essentially can represent an
image as shown in Figure 1.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
9
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure: Values in the grid represent the grayscale intensities of the image on the right.
(A)Intensity values are shown in a grid of the same dimension as image (B) Image as seen on a monitor
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
10
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The ‘for’ loop in Code Snippet 1 and 2 can be visualized as shown in Figure 2.
Figure: Array traversal in a ‘for’ loop. Note that rows are being accessed one after the other. This isknown as'Row Major
Traversal’. The graphic suggests that in the current iteration, x = 4 and y = 3 both starting from 0.
III Sound Programming:
Use of the audioread(filename,y,Fs) function of Matlab and it converts an audio file to a matrix. Value of that matrix
generated can be used for computational purposes. It possible to produce a specific sound like the sound of a guitar by
giving your own values to the matrix and then sounding it using the sound() function.
IV.Security optimization through key management using a genetic algorithm in body areanetwork:
A genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection systems.
Three basic operators used in Genetic [2] algorithms contain selection, crossover, and mutation. The GA goes through the
following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction and crossover
together
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
11
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
give genetic algorithms most of their searching power.
C. Selection It is quantitative criterion based on fitness value to choose the chromosomes from a population which is going
to reproduce.
D. Crossover
In crossover operation, two chromosomes are taken and a new is generated by taking some attributes of the first
chromosome and the rest from the second chromosome. [2]
For example, the strings 11001111 to 01101110 could be crossed over after the third locus in each to produce the two
offspring 11001110 to 01101111.
Mutation
Mutation is used to maintain genetic diversity from one generation of the population to the next. It is similar to biological
mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in bit-
string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 01000100 might be
mutated in its second position to yield 00000100.
V. PROPOSED METHODOLOGY
In the proposed method GA will be used in the key generation process. The crossover and mutation operation is used along
with Pseudo-random number generators to make the key very complex. A number of rows in the array can be a population
for crossover and mutation purposes. For encryption, we have proposed AES. The symmetric key algorithm is proposed due
to its computation speed and less overhead in key management. The process of generating the key from the Genetic
Population has the following steps:
STEP 1: A pseudo-random binary sequence is generated with the help of a small image like part of the image of ECG sensor
image. Means any image can be used as a cryptographic security key. Another key like sound frequency of patient can be
used for a cryptographic key for algorithm or material of a mixture of various metal touches to the sensor can be used for
cryptographic security key just like biometric way. As Mathematically, an image can be considered as a function of 2
variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is
called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. The
first row of this two-dimensional array can be used as key generated from the same image used for the cryptographic
purpose. For more criticality, a random number can be generated to choose the row from the array because the first-row idea
can be hacked. But in GA for population limits can be decided for population and for a number of digits through fitness
function from rows of the array from image processing. Two images can be used for intermixing of arrays to increase the
population at sending and receiving end for heterogenous environment.
STEP 2. Matrix from sound programming computation can be used as key if image is not available.
STEP 3: Fitness function like converting first row bit into a decimal number and the new decimal number generated by this
process can be divided by hundred or more as per optimality factor after experimentation to reduce the bit size to convert
this number back into binary and can be used as the population of cryptographic keys. For other fitness function, further new
expression can be used as per requirement of key size.
STEP 4: The generated string or population is divided into two halves.
STEP 5: On the selected string crossover operation is performed to achieve good randomness among the key.
STEP 6: After crossover operation, the bits of the string are swapped again to permute the bit values.
STEP 7: The same process is iterated two times.
Here the crossover and mutation are done two times to create more complexity and randomness in the key. This key will be
then used for the encryption process. Here AES will be used for encryption as it is one of the most efficient symmetric key
algorithms and its whole security lies in the key used.
VI. CONCLUSION
The BAN is an emerging technology that will alter people’s everyday experiences revolutionarily. Privacy and data security
in BANs is a significant area, and still, there is a number of challenges which need to be overcome. Image processing can
create an image as a data for cryptographic purposes. So, there is no limit to a number of images and so as to the number of
keys. Mathematical function on keys can help us to more growth in this field.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 6 08 - 12
______________________________________________________________________________________
12
IJRITCC | June 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
VII. Reference:
[1] Pradeep Kumar, Anand Sharma,” Authentication Process in Body Area Network And Security Optimization Through Key
Management Using Genetic Algorithm In Body Area
Network”, ISSN (Online): 2347–4718, International Journal for Technological Research InEngineering Volume 4, Issue 9,
May-2017,
[2] Aarti Soni, Suyash Agrawal,” Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, ISSN: 2278 –
1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10,
December 2012
[3] Santanu Chatterjee, Ashok Kumar Das *, Jamuna Kanta Sing,” A novel and efficient user access control scheme for wireless
body area sensor networks”, Journal of King Saud
University– Computer and Information Sciences (2014) 26, 181–201
[4] Copyright © 2005-2007, Advanced Digital Imaging Solutions Laboratory (ADISL). http://www.adislindia.com
[5] Pradeep Kumar,” Right Patient Data And Optimization Process Through Cryptographic Image as Key Using Genetic Algorithm In
Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research In Engineering Volume 5,
Issue 9, May-2018

More Related Content

PDF
Cf33497503
IJERA Editor
 
PDF
Design and Implementation of Visual Cryptography System for Transmission of S...
rahulmonikasharma
 
PDF
Number Plate Recognition
rahulmonikasharma
 
PDF
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
rahulmonikasharma
 
PDF
A Survey on the Use of Pattern Recognition Techniques
rahulmonikasharma
 
PDF
Smart License Plate Recognition Using Optical Character Recognition Based on ...
rahulmonikasharma
 
PDF
Enhance The Technique For Searching Dimension Incomplete Databases
paperpublications3
 
PPTX
Matrices in computer applications
Rayyan777
 
Cf33497503
IJERA Editor
 
Design and Implementation of Visual Cryptography System for Transmission of S...
rahulmonikasharma
 
Number Plate Recognition
rahulmonikasharma
 
Optimized Parameter of Wavelet Neural Network (WNN) using INGA
rahulmonikasharma
 
A Survey on the Use of Pattern Recognition Techniques
rahulmonikasharma
 
Smart License Plate Recognition Using Optical Character Recognition Based on ...
rahulmonikasharma
 
Enhance The Technique For Searching Dimension Incomplete Databases
paperpublications3
 
Matrices in computer applications
Rayyan777
 

What's hot (14)

PPTX
Application of Matrices in real life
Shayshab Azad
 
PDF
IRJET- Missing Data Imputation by Evidence Chain
IRJET Journal
 
PDF
A novel tool for stereo matching of images
eSAT Journals
 
PDF
A novel tool for stereo matching of images
eSAT Publishing House
 
PDF
Web Based Fuzzy Clustering Analysis
inventy
 
PDF
Review of different methods of protecting privacy using finger prints
IAEME Publication
 
PDF
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET Journal
 
PDF
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET Journal
 
PPTX
Matrix in software engineering
Daffodil International University
 
PDF
Data Science Machine
Luis Taveras EMBA, MS
 
PDF
Variance rover system web analytics tool using data
eSAT Publishing House
 
PDF
Variance rover system
eSAT Journals
 
PDF
IRJET- Privacy Preservation using Apache Spark
IRJET Journal
 
PPTX
ICCSA2014 - slides
Gabriella Casalino
 
Application of Matrices in real life
Shayshab Azad
 
IRJET- Missing Data Imputation by Evidence Chain
IRJET Journal
 
A novel tool for stereo matching of images
eSAT Journals
 
A novel tool for stereo matching of images
eSAT Publishing House
 
Web Based Fuzzy Clustering Analysis
inventy
 
Review of different methods of protecting privacy using finger prints
IAEME Publication
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET Journal
 
IRJET- Supervised Learning Classification Algorithms Comparison
IRJET Journal
 
Matrix in software engineering
Daffodil International University
 
Data Science Machine
Luis Taveras EMBA, MS
 
Variance rover system web analytics tool using data
eSAT Publishing House
 
Variance rover system
eSAT Journals
 
IRJET- Privacy Preservation using Apache Spark
IRJET Journal
 
ICCSA2014 - slides
Gabriella Casalino
 
Ad

Similar to Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network (20)

PDF
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
ijma
 
PDF
IRJET- Enhanced Security using Genetic Algorithm in Cryptography
IRJET Journal
 
PDF
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET Journal
 
PDF
A Novel Approach to Genetic Algorithm Based Cryptography
IJORCS
 
PDF
Features of genetic algorithm for plain text encryption
IJECEIAES
 
PDF
Fn3410321036
IJERA Editor
 
PDF
IJSRED-V2I2P13
IJSRED
 
PDF
Application of genetic algorithm in intrusion detection system
Alexander Decker
 
PPTX
Biometric Hashing technique for Authentication
AnIsh Kumar
 
PDF
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET Journal
 
PDF
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
 
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
nooriasukmaningtyas
 
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
IJEECSIAES
 
PDF
A Biometric Approach to Encrypt a File with the Help of Session Key
Sougata Das
 
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
PDF
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET Journal
 
PDF
Trust Enhanced Role Based Access Control Using Genetic Algorithm
IJECEIAES
 
PDF
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
IJNSA Journal
 
PPTX
Thesis Background
Abdullah Metwally
 
PDF
PROGRAM TEST DATA GENERATION FOR BRANCH COVERAGE WITH GENETIC ALGORITHM: COMP...
cscpconf
 
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
ijma
 
IRJET- Enhanced Security using Genetic Algorithm in Cryptography
IRJET Journal
 
IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algor...
IRJET Journal
 
A Novel Approach to Genetic Algorithm Based Cryptography
IJORCS
 
Features of genetic algorithm for plain text encryption
IJECEIAES
 
Fn3410321036
IJERA Editor
 
IJSRED-V2I2P13
IJSRED
 
Application of genetic algorithm in intrusion detection system
Alexander Decker
 
Biometric Hashing technique for Authentication
AnIsh Kumar
 
IRJET- Efficient Image Encryption with Pixel Scrambling and Genetic Algorithm
IRJET Journal
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
nooriasukmaningtyas
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
IJEECSIAES
 
A Biometric Approach to Encrypt a File with the Help of Session Key
Sougata Das
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET Journal
 
Trust Enhanced Role Based Access Control Using Genetic Algorithm
IJECEIAES
 
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
IJNSA Journal
 
Thesis Background
Abdullah Metwally
 
PROGRAM TEST DATA GENERATION FOR BRANCH COVERAGE WITH GENETIC ALGORITHM: COMP...
cscpconf
 
Ad

More from rahulmonikasharma (20)

PDF
Data Mining Concepts - A survey paper
rahulmonikasharma
 
PDF
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
PDF
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
PDF
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
PDF
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
PDF
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
PDF
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
PDF
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
PDF
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
PDF
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
PDF
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
PDF
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
PDF
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
PDF
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
PDF
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
PDF
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
PDF
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
PDF
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
PDF
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
PDF
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 

Recently uploaded (20)

PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Ppt for engineering students application on field effect
lakshmi.ec
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Information Retrieval and Extraction - Module 7
premSankar19
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 

Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 8 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Authentic Patient Data and Optimization Process through Cryptographic Image or Sound computations as Key using Genetic Algorithm in Body Area Network Pradeep Kumar Ph.D. Student, Enrollment Number: 120481 Mody University of Science and Technology, Lakshmangarh, Sikar-332311, Rajasthan, India I. Introduction Internet of Things (IoT), helping interconnected sensors (i.e., wireless body area network (WBAN), can treat in real time monitoring of patient health status and manage patients and treatment. Likewise, IoT will play a helping role in the next- generation healthcare establishment. Although IoT-based patient health status monitoring has become very popular, monitoring patients remotely outside of hospital settings requires augmenting the capabilities of IoT with other resources for health data storage and processing. In this paper, we propose an IoT-based authentication and optimization process through image key management using a genetic algorithm in body area network. Recent advances in wireless communications technologies formedical/fitness applications. Particular, it analyzes the following related developments may cover the following topics: • Status of M2M standardization, market and development in general and specifically for medical applications • Development and standardization of the Wireless Body Area Network (WBAN) and Medical Body Area Network (WMBAN), including their markets profits. • Underlying technologies: o Bluetooth o ZigBee o Wi-Fi low-power consumption technology o Z-Wave o Self-powered wireless sensors II. Image Processing Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. Code Snippet 1 and Code Snippet 2 show how to traverse and use 1-D and 2-D arrays programmatically. Both of them essentially can represent an image as shown in Figure 1.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 9 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure: Values in the grid represent the grayscale intensities of the image on the right. (A)Intensity values are shown in a grid of the same dimension as image (B) Image as seen on a monitor
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 10 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ The ‘for’ loop in Code Snippet 1 and 2 can be visualized as shown in Figure 2. Figure: Array traversal in a ‘for’ loop. Note that rows are being accessed one after the other. This isknown as'Row Major Traversal’. The graphic suggests that in the current iteration, x = 4 and y = 3 both starting from 0. III Sound Programming: Use of the audioread(filename,y,Fs) function of Matlab and it converts an audio file to a matrix. Value of that matrix generated can be used for computational purposes. It possible to produce a specific sound like the sound of a guitar by giving your own values to the matrix and then sounding it using the sound() function. IV.Security optimization through key management using a genetic algorithm in body areanetwork: A genetic algorithm is a randomized search and optimization technique guided by the principle of natural selection systems. Three basic operators used in Genetic [2] algorithms contain selection, crossover, and mutation. The GA goes through the following cycle: Evaluate, select, mate, and mutate until some stopping criteria are reached. Reproduction and crossover together
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 11 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ give genetic algorithms most of their searching power. C. Selection It is quantitative criterion based on fitness value to choose the chromosomes from a population which is going to reproduce. D. Crossover In crossover operation, two chromosomes are taken and a new is generated by taking some attributes of the first chromosome and the rest from the second chromosome. [2] For example, the strings 11001111 to 01101110 could be crossed over after the third locus in each to produce the two offspring 11001110 to 01101111. Mutation Mutation is used to maintain genetic diversity from one generation of the population to the next. It is similar to biological mutation. GAs involves string-based modifications to the elements of a candidate solution. These include bit-reversal in bit- string GAs. This operator randomly flips some of the bits in a chromosome. For example, the string 01000100 might be mutated in its second position to yield 00000100. V. PROPOSED METHODOLOGY In the proposed method GA will be used in the key generation process. The crossover and mutation operation is used along with Pseudo-random number generators to make the key very complex. A number of rows in the array can be a population for crossover and mutation purposes. For encryption, we have proposed AES. The symmetric key algorithm is proposed due to its computation speed and less overhead in key management. The process of generating the key from the Genetic Population has the following steps: STEP 1: A pseudo-random binary sequence is generated with the help of a small image like part of the image of ECG sensor image. Means any image can be used as a cryptographic security key. Another key like sound frequency of patient can be used for a cryptographic key for algorithm or material of a mixture of various metal touches to the sensor can be used for cryptographic security key just like biometric way. As Mathematically, an image can be considered as a function of 2 variables, f(x, y), where x and y are spatial coordinates and the value of the function at given pair of coordinates (x, y) is called the intensity value. The programming counterpart of such a function could be a one or two-dimensional array. The first row of this two-dimensional array can be used as key generated from the same image used for the cryptographic purpose. For more criticality, a random number can be generated to choose the row from the array because the first-row idea can be hacked. But in GA for population limits can be decided for population and for a number of digits through fitness function from rows of the array from image processing. Two images can be used for intermixing of arrays to increase the population at sending and receiving end for heterogenous environment. STEP 2. Matrix from sound programming computation can be used as key if image is not available. STEP 3: Fitness function like converting first row bit into a decimal number and the new decimal number generated by this process can be divided by hundred or more as per optimality factor after experimentation to reduce the bit size to convert this number back into binary and can be used as the population of cryptographic keys. For other fitness function, further new expression can be used as per requirement of key size. STEP 4: The generated string or population is divided into two halves. STEP 5: On the selected string crossover operation is performed to achieve good randomness among the key. STEP 6: After crossover operation, the bits of the string are swapped again to permute the bit values. STEP 7: The same process is iterated two times. Here the crossover and mutation are done two times to create more complexity and randomness in the key. This key will be then used for the encryption process. Here AES will be used for encryption as it is one of the most efficient symmetric key algorithms and its whole security lies in the key used. VI. CONCLUSION The BAN is an emerging technology that will alter people’s everyday experiences revolutionarily. Privacy and data security in BANs is a significant area, and still, there is a number of challenges which need to be overcome. Image processing can create an image as a data for cryptographic purposes. So, there is no limit to a number of images and so as to the number of keys. Mathematical function on keys can help us to more growth in this field.
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 6 08 - 12 ______________________________________________________________________________________ 12 IJRITCC | June 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ VII. Reference: [1] Pradeep Kumar, Anand Sharma,” Authentication Process in Body Area Network And Security Optimization Through Key Management Using Genetic Algorithm In Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research InEngineering Volume 4, Issue 9, May-2017, [2] Aarti Soni, Suyash Agrawal,” Using Genetic Algorithm for Symmetric key Generation in Image Encryption”, ISSN: 2278 – 1323, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 10, December 2012 [3] Santanu Chatterjee, Ashok Kumar Das *, Jamuna Kanta Sing,” A novel and efficient user access control scheme for wireless body area sensor networks”, Journal of King Saud University– Computer and Information Sciences (2014) 26, 181–201 [4] Copyright © 2005-2007, Advanced Digital Imaging Solutions Laboratory (ADISL). http://www.adislindia.com [5] Pradeep Kumar,” Right Patient Data And Optimization Process Through Cryptographic Image as Key Using Genetic Algorithm In Body Area Network”, ISSN (Online): 2347–4718, International Journal for Technological Research In Engineering Volume 5, Issue 9, May-2018