SlideShare a Scribd company logo
1 of 16
Security protocols &
platform
FOR WSN BASED MEDICAL APPLICATIONS
-AVIJIT MATHUR
SUPERVISOR: DR. THOMAS NEWE
Overview
WSN: Nodes collected and organized in some fashion in order to make a cooperative
network.
Usage: Monitoring of patients wirelessly. (Routine/emergency/mass causality) thereby
providing healthcare services.
As the population increases there is a need for continuous medical monitoring.
Patients monitored wirelessly has several advantages.
Traditional wired methods do not allow mobility with the added difficulty of time constraints.
Provide a secure, reliable and energy-efficient Wireless Sensor Network for medical devices.
In Home/hospital architecture
Base StationRepeater
Access point 1
Access point 2
Access point 3
GSM/3g/
4g
WiFi
WiMAX
ZIGBEE
BLE
Topologies
Star
Mesh:
Hierarchical tree
Clustered Hierarchical
Star Topology
Partial Mesh
Topology
Hierarchical Tree
Clustered HierarchicalCluster Head Central Hub/Switch
Gateway Nodes Sensor Nodes
Source: A Performance Comparison of Different Topologies for
Wireless Sensor Networks by Akhilesh Shrestha and Liudong Xing
ZIGBEE Bluetooth Low energy Wi-Fi 4G
Range 10-100 m >60m
(10m for Classic BT)
Depends on specification In Kilometers
Power Low Very Low
(High for classic BT and
medium for others)
High
(variable for WiFi Direct)
High
Entries 254
(>64000 per network)
 2 Billion
 (Classic: 7)
Depends on no. of IP
addresses
-
Latency Low 3 ms (compared to 100ms
in classic BT)
Variable -
Self healing Yes - Yes Yes
Topologies Mesh, Star and Cluster-
tree
Star Star, Point-to-Point Ring
Data transmission rate Up to 250Kbps 1Mbps (BT v4.0: 25Mbps) 11Mbps & 54Mbps
(250 Mbps: WiFi Direct)
100Mbps & 1Gbps(fixed
access)
Bandwidth 2.4GHz, 915MHz & 868
MHz
2.4 GHz only
(BT + HS: 6-9 GHz)
2.4, 3.6 & 5 GHz Similar to WiFi
Transmission technique DSSS DS/FA? Adaptive FHSS
(Classic BT: FHSS)
DSSS, CCK & OFDM OFDMA
IEEE 802.15.6
New standard specified for Wireless Body Area Networks (WBANs)
Extremely low power, good data rate and safety compliant.
Flexible frequencies => selecting the right physical layer very important
MICS and WMTS do not support high data rate while ISM band supports high data rate at the
cost of interference.
PHY layers
Security levels
Source :An Overview of IEEE 802.15.6 Standard (Invited Paper)
Kyung Sup Kwak, Sana Ullah, and Niamat Ullah; UWB-ITRC Center, Inha University;
253 Yonghyun-dong, Nam-gu, Incheon (402-751), South Korea
Table Source:Body Area Networks
Arif Onder ISIKMAN, Loris Cazalony, Feiquan Chenz, Peng Lix
Chalmers University of Technology, SE-412 96, Gothenburg, Sweden
IEEE 802.15.4 / ZigBee IEEE 802.15.6
Range 10-100m 2-5m
Data rate 20,40 & 250 Kbps Few Kbps – 10 Mbps
Power 25-35mW 0.01 mW (stand by),
40mW (active)
Entries 65535 devices 256 devices per network
Security & Reliability
Security services: Authentication, access control, data confidentiality,
integrity and Non-repudiation.
Reliability depends on two main factors: network connectivity and
sensing coverage.
Security is very important as the technology may be
vulnerable to attacks
Traditional security mechanisms
(PKI) cannot be used.
Semantic security
Secure routing & storage are most important
Source: Integrated Modeling for Wireless Sensor Networks by
Liudong Xing, Ph. D., University of Massachusetts, Dartmouth & Howard E. Michel, Ph.D., University of Massachusetts, Dartmouth
Security protocols
TinySec
MiniSec
SPINS: SNEP & uTesla
LiSP
MAC
SIA
Security Mechanism
Steganography: Channel is hidden under the Physical layer to provide covert data transmission
Cryptography: Encryption & authentication mechanisms
Key management: Global, pair-wise node, pair-wise group & individual
Localization: Geographically detect a malicious node
Trust management: Select route based on trustworthy nodes
Data Partitioning
6 6
6
6
7
7
7
6
Periodic key generation
Data: D
D1
D2
D3
D1
D1
D2
D3 D3
Source: Wireless Sensor Network Attacks and Security Mechanisms : A Short Survey David Martins and Hervé Guyennet
Computer Science Department, University of Franche-Comté, France
Energy management
Energy consuming layers
Use VCO based radio architecture since it is:
Robust to interference
Allows communication at different carrier frequencies
Better sleep synchronization
Uses Flash over SRAM memory
Efficient programming techniques
Collision avoidance
Idle listening periods must be reduced
Routing: with the usage of real-time protocols, reduce the size of routing tables
Clustering: Hierarchical clustering
Data gathering
Issues & Challenges
Privacy & security
Trust
Coverage
Communication delay
Need for reliable, fault tolerant, self-healing and organising cluster-scheme for key distribution
Choosing the right blend of encryption and authentication schemes
Movement of patient is challenging with regards to architecture, coverage and routing.
Decentralized security mechanism.
Findings
Research into network topologies and clustering algorithms.
Securing both the nodes and the communication network.
Group key distribution techniques.
WSNs require node scalability and mobile agent.
Sensors may capture confidential data.
Motes must authenticate the stored public key of Base station.
In the future it may be possible for patients to interpret their results on a PDA/desktop.
Findings
Key management schemes to be further researched.
Nodes should automatically decide on a routing strategy.
Medical environment may call for high reporting times from the nodes (emergency).
Reporting of failed nodes and healing of the network is important.
Connectivity: USB, Ethernet, RS232 + WiFi, ZigBee,
Bluetooth & cellular.
Machine learning algorithm can act as a mediator.
Image source: Medical Applications based on Wireless Sensor Networks by Stanković, Stanislava
Motes
Tmote Sky
Tmote sky: http://insense.cs.st-andrews.ac.uk/examples/
Micaz: http://www.cse.chalmers.se/~larandr/master.html
Shimmer: http://www.eecs.Harvard.edu/~mdw/proj/codeblue
Shimmer
Micaz
The End
THANK YOU

More Related Content

What's hot

IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET Journal
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifisunil raj kumar
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...LogicMindtech Nologies
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)IAESIJEECS
 
Body sensor network a modern survey & performance study in medical perspect
Body sensor network  a modern survey & performance study in medical perspectBody sensor network  a modern survey & performance study in medical perspect
Body sensor network a modern survey & performance study in medical perspectAlexander Decker
 
Wireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesWireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesShakas Technologies
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
Research on security of the wlan campus network
Research on security of the wlan campus networkResearch on security of the wlan campus network
Research on security of the wlan campus networkkarthik
 
Wireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemWireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 

What's hot (18)

IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data Transmission
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifi
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
 
Body sensor network a modern survey & performance study in medical perspect
Body sensor network  a modern survey & performance study in medical perspectBody sensor network  a modern survey & performance study in medical perspect
Body sensor network a modern survey & performance study in medical perspect
 
Wireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesWireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titles
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
Wban
WbanWban
Wban
 
Research on security of the wlan campus network
Research on security of the wlan campus networkResearch on security of the wlan campus network
Research on security of the wlan campus network
 
Wireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemWireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring System
 
Comsnets wban ppt
Comsnets wban pptComsnets wban ppt
Comsnets wban ppt
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Similar to Security protocols & platform for wsn based medical applications

IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSIAEME Publication
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSIAEME Publication
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptxKamakshiMB1
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devicesgvrangaraj
 
Tutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical DevicesTutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical Devicesgvrangaraj
 
Tutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical DevicesTutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical Devicesgvrangaraj
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...Karthikeyan Ece venkatesan
 
A high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsA high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsariannabenaja
 

Similar to Security protocols & platform for wsn based medical applications (20)

IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
 
Tutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical DevicesTutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical Devices
 
Tutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical DevicesTutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical Devices
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
Ban Smart Card Mahasweta
Ban Smart Card MahaswetaBan Smart Card Mahasweta
Ban Smart Card Mahasweta
 
Presentation1
Presentation1Presentation1
Presentation1
 
A high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsA high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applications
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

Security protocols & platform for wsn based medical applications

  • 1. Security protocols & platform FOR WSN BASED MEDICAL APPLICATIONS -AVIJIT MATHUR SUPERVISOR: DR. THOMAS NEWE
  • 2. Overview WSN: Nodes collected and organized in some fashion in order to make a cooperative network. Usage: Monitoring of patients wirelessly. (Routine/emergency/mass causality) thereby providing healthcare services. As the population increases there is a need for continuous medical monitoring. Patients monitored wirelessly has several advantages. Traditional wired methods do not allow mobility with the added difficulty of time constraints. Provide a secure, reliable and energy-efficient Wireless Sensor Network for medical devices.
  • 3. In Home/hospital architecture Base StationRepeater Access point 1 Access point 2 Access point 3 GSM/3g/ 4g WiFi WiMAX ZIGBEE BLE
  • 4. Topologies Star Mesh: Hierarchical tree Clustered Hierarchical Star Topology Partial Mesh Topology Hierarchical Tree Clustered HierarchicalCluster Head Central Hub/Switch Gateway Nodes Sensor Nodes Source: A Performance Comparison of Different Topologies for Wireless Sensor Networks by Akhilesh Shrestha and Liudong Xing
  • 5. ZIGBEE Bluetooth Low energy Wi-Fi 4G Range 10-100 m >60m (10m for Classic BT) Depends on specification In Kilometers Power Low Very Low (High for classic BT and medium for others) High (variable for WiFi Direct) High Entries 254 (>64000 per network)  2 Billion  (Classic: 7) Depends on no. of IP addresses - Latency Low 3 ms (compared to 100ms in classic BT) Variable - Self healing Yes - Yes Yes Topologies Mesh, Star and Cluster- tree Star Star, Point-to-Point Ring Data transmission rate Up to 250Kbps 1Mbps (BT v4.0: 25Mbps) 11Mbps & 54Mbps (250 Mbps: WiFi Direct) 100Mbps & 1Gbps(fixed access) Bandwidth 2.4GHz, 915MHz & 868 MHz 2.4 GHz only (BT + HS: 6-9 GHz) 2.4, 3.6 & 5 GHz Similar to WiFi Transmission technique DSSS DS/FA? Adaptive FHSS (Classic BT: FHSS) DSSS, CCK & OFDM OFDMA
  • 6. IEEE 802.15.6 New standard specified for Wireless Body Area Networks (WBANs) Extremely low power, good data rate and safety compliant. Flexible frequencies => selecting the right physical layer very important MICS and WMTS do not support high data rate while ISM band supports high data rate at the cost of interference. PHY layers Security levels Source :An Overview of IEEE 802.15.6 Standard (Invited Paper) Kyung Sup Kwak, Sana Ullah, and Niamat Ullah; UWB-ITRC Center, Inha University; 253 Yonghyun-dong, Nam-gu, Incheon (402-751), South Korea Table Source:Body Area Networks Arif Onder ISIKMAN, Loris Cazalony, Feiquan Chenz, Peng Lix Chalmers University of Technology, SE-412 96, Gothenburg, Sweden IEEE 802.15.4 / ZigBee IEEE 802.15.6 Range 10-100m 2-5m Data rate 20,40 & 250 Kbps Few Kbps – 10 Mbps Power 25-35mW 0.01 mW (stand by), 40mW (active) Entries 65535 devices 256 devices per network
  • 7. Security & Reliability Security services: Authentication, access control, data confidentiality, integrity and Non-repudiation. Reliability depends on two main factors: network connectivity and sensing coverage. Security is very important as the technology may be vulnerable to attacks Traditional security mechanisms (PKI) cannot be used. Semantic security Secure routing & storage are most important Source: Integrated Modeling for Wireless Sensor Networks by Liudong Xing, Ph. D., University of Massachusetts, Dartmouth & Howard E. Michel, Ph.D., University of Massachusetts, Dartmouth
  • 9. Security Mechanism Steganography: Channel is hidden under the Physical layer to provide covert data transmission Cryptography: Encryption & authentication mechanisms Key management: Global, pair-wise node, pair-wise group & individual Localization: Geographically detect a malicious node Trust management: Select route based on trustworthy nodes Data Partitioning 6 6 6 6 7 7 7 6 Periodic key generation Data: D D1 D2 D3 D1 D1 D2 D3 D3 Source: Wireless Sensor Network Attacks and Security Mechanisms : A Short Survey David Martins and Hervé Guyennet Computer Science Department, University of Franche-Comté, France
  • 10. Energy management Energy consuming layers Use VCO based radio architecture since it is: Robust to interference Allows communication at different carrier frequencies Better sleep synchronization Uses Flash over SRAM memory Efficient programming techniques Collision avoidance Idle listening periods must be reduced Routing: with the usage of real-time protocols, reduce the size of routing tables Clustering: Hierarchical clustering Data gathering
  • 11. Issues & Challenges Privacy & security Trust Coverage Communication delay Need for reliable, fault tolerant, self-healing and organising cluster-scheme for key distribution Choosing the right blend of encryption and authentication schemes Movement of patient is challenging with regards to architecture, coverage and routing. Decentralized security mechanism.
  • 12. Findings Research into network topologies and clustering algorithms. Securing both the nodes and the communication network. Group key distribution techniques. WSNs require node scalability and mobile agent. Sensors may capture confidential data. Motes must authenticate the stored public key of Base station. In the future it may be possible for patients to interpret their results on a PDA/desktop.
  • 13. Findings Key management schemes to be further researched. Nodes should automatically decide on a routing strategy. Medical environment may call for high reporting times from the nodes (emergency). Reporting of failed nodes and healing of the network is important. Connectivity: USB, Ethernet, RS232 + WiFi, ZigBee, Bluetooth & cellular. Machine learning algorithm can act as a mediator. Image source: Medical Applications based on Wireless Sensor Networks by Stanković, Stanislava
  • 14.
  • 15. Motes Tmote Sky Tmote sky: http://insense.cs.st-andrews.ac.uk/examples/ Micaz: http://www.cse.chalmers.se/~larandr/master.html Shimmer: http://www.eecs.Harvard.edu/~mdw/proj/codeblue Shimmer Micaz

Editor's Notes

  1. Simulations show that transmission energy is equivalent to receive energy when distance is short or/and radio electronics energy is high. Direct transmission is more efficient on global scale than minimum transmission energy (MTE) routing. Therefore we use star topology for BANs