SlideShare a Scribd company logo
1 of 17
Connecting in-body nano communication with
body area networks: Challenges and opportunities
of the Internet of Nano Things
Behnaz AlSadat Motavali
Course Supervisor: Dr. Zarepour
Advanced Networks Course
December 2018
1/17
Outline
Introduction
Application
Requirements
&
Network
Architecture
Security Aspects
&
Performance
Evaluation
Conclusion
2/17
Introduction
In-body and Body Area Networks.
1
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
3/17
Body Area
Network
Body Area Network
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
4/17
In-Body
Network
In-Body Network
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
5/17
Application
Requirements
&
Network Architecture
2
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
6/17
Application
Requirements Application Requirements:
 Legal requirements
Law and risk categories of medical devices
 Functional requirements
Outbound/Inbound communication
 Non-functional Requirements
Reliability, Safety, Privacy, Performance, Real-time
capabilities
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
7/17
Network
Aechitecture Network Architecture Assumptions:
 Nano communications are available
 One powerful device
 One body area network device
 Micro devices implanted in body
 Nano devices in certain areas and with certain
functionalities
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
8/17
Network
Architecture
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
9/17
Network
Aechitecture
Network Architecture Issues:
 Addressing
Outbound/Inbound
 Low Latency
Important massage→delivered as quickly as possible
Spend as little energy as possible
 Reliability
Message reaches destination → BAN check
 Application Support
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
10/17
Security Aspects
&
Performance
Evaluation
3
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
11/17
Security
Aspects
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
CIA Security Goals:
 Confidentiality
Access content of message/Encryption/ Biochemical
cryptography
 Integrity
Modify content of message
 Availability
Disrupt or affect commenucation
12/17
Performance
Evaluation
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
Performance Evaluation:
 Body Area Network
 In-body Network
13/17
Conclusion
Conclusion.
4
Introduction
Application
Requirements
&
Network Architecture
Security Aspects
&
Performance Evaluation
Conclusion
14/17
Review
Application
Requirements
• Legal
• Functional
• Non-functional
Network Architecture
• Addressing
• Low Latency
• Reliability
• Application Support
Security Aspects
• Confidentiality
• Integrity
• Availability
Performance
Evaluation
• Body Area Net
• In-body Net
• Tools
15/17
 Falko Dressler, Stefan Fischer; Connecting in-
body nano communication with body area
networks: Challenges and opportunities of the
Internet of Nano Things; Nano Communication
Networks, 2015.
References
16/17
Thanks!
Any questions?
You can find me at bs.motavali@yahoo.com
😉
17/17

More Related Content

What's hot

Argonne Leadership Computing Facility Floor Manager
Argonne Leadership Computing Facility Floor ManagerArgonne Leadership Computing Facility Floor Manager
Argonne Leadership Computing Facility Floor Manager
Katrina Errant
 
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudSecure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Umer Khalid
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
Ecwaytech
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
Ecway Technologies
 
ALOK.ANAND.Resume
ALOK.ANAND.ResumeALOK.ANAND.Resume
ALOK.ANAND.Resume
Alok Anand
 
Explaining the SOA/REST impedance mismatch
Explaining the SOA/REST impedance mismatchExplaining the SOA/REST impedance mismatch
Explaining the SOA/REST impedance mismatch
William Martinez Pomares
 

What's hot (16)

Argonne Leadership Computing Facility Floor Manager
Argonne Leadership Computing Facility Floor ManagerArgonne Leadership Computing Facility Floor Manager
Argonne Leadership Computing Facility Floor Manager
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudSecure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
 
Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4Wireless access control system based on ieee 802.15.4
Wireless access control system based on ieee 802.15.4
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
 
S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptx
 
Mobile and IoT testing
Mobile and IoT testingMobile and IoT testing
Mobile and IoT testing
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
Glomosim Network Projects Research Assistance
Glomosim Network Projects Research AssistanceGlomosim Network Projects Research Assistance
Glomosim Network Projects Research Assistance
 
ALOK.ANAND.Resume
ALOK.ANAND.ResumeALOK.ANAND.Resume
ALOK.ANAND.Resume
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Explaining the SOA/REST impedance mismatch
Explaining the SOA/REST impedance mismatchExplaining the SOA/REST impedance mismatch
Explaining the SOA/REST impedance mismatch
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
Eee ppt
Eee pptEee ppt
Eee ppt
 

Similar to Nano Communication

Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
MIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docx
MIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docxMIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docx
MIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docx
raju957290
 
Assignment DescriptionThe long-term evolution (LTE)LTE-advanc.docx
Assignment DescriptionThe long-term evolution (LTE)LTE-advanc.docxAssignment DescriptionThe long-term evolution (LTE)LTE-advanc.docx
Assignment DescriptionThe long-term evolution (LTE)LTE-advanc.docx
luearsome
 
Key Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docxKey Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docx
sleeperfindley
 

Similar to Nano Communication (20)

Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New TechnologiesDigital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
Digital Procurement in the Nuclear Industry: Tips on Embracing New Technologies
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Lecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptxLecture 01 {Introduction}.pptx
Lecture 01 {Introduction}.pptx
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
 
MIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docx
MIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docxMIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docx
MIS 589 Applied Research ProjectMIS 589 , DeVry UniversityAp.docx
 
Assignment DescriptionThe long-term evolution (LTE)LTE-advanc.docx
Assignment DescriptionThe long-term evolution (LTE)LTE-advanc.docxAssignment DescriptionThe long-term evolution (LTE)LTE-advanc.docx
Assignment DescriptionThe long-term evolution (LTE)LTE-advanc.docx
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Key Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docxKey Assignment DraftGreat progress has been made on the design of .docx
Key Assignment DraftGreat progress has been made on the design of .docx
 

Recently uploaded

Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
RizalinePalanog2
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
Sérgio Sacani
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
1301aanya
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 

Recently uploaded (20)

Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 

Nano Communication

Editor's Notes

  1. Challenges and opportunities of connecting BAN with Nano devices Making road for IoNT
  2. Outside the body
  3. Collect data from inside send it outside Even better with actuators
  4. Highest risk or new category What is the purpose of communication inbound/outbound commands/sensor data not only value but also origin mixed cases
  5. Addressing on functionalities
  6. Biochemical cryptography Standard algorithms are not applicable to nano The form of data make it valuable for attackers