SlideShare a Scribd company logo
1 of 10
Sensors and Wireless
Communication for Medical Care
This research is supported by CERIAS security center and NSF REU grant of Prof. Arif Ghafoor and Mike Zoltowski.
Slide 2
Security and Safety
 Medical care environments are vulnerable to malicious behavior,
hostile setting, terrorism attacks, natural disaster, tampering.
 Computing nodes and sensors can be malicious, selfish,
malfunctioning, or compromised.
 Challenge is to develop sensors that detect and monitor violations in
medical care environments before threat to life occurs.
 Reliability, Security, Accuracy can affect timeliness and precise
information for patient monitoring.
 Collaboration among physicians/nurses, pharmacies, emergency
personnel, law enforcement agencies, government/community
leaders over wireless network should be secure, private, reliable,
consistent/correct and anonymous.
Slide 3
Technology and Type of Sensors
 Sensors and wireless devices have limited computation, communication, and energy.
 High rate of temporary or lasting failure.
 Tiny, inexpensive, mobile sensors are becoming available.
 Microsensors consist of 8-bit 4-MHz processors.
 Bio-sensors to detect Anthrax, viruses, toxins, bacteria uses chips coated with
antibodies that attract a specific biological agent. Pattern changes result in alerts.
 Ion trap mass spectrometer aids in locating fingerprints of proteins to detect toxin or
bacteria.
 Neutron-based detectors detect chemical and nuclear materials.
 Research is underway on sensor fusion, topology management, smart dust,
scalability, and wireless communication issues.
 Characteristics of sensors include size, battery consumption, energy level,
movement, position, redundancy, failure mode (failed, degrading, Byzantine).
Slide 4
Research Issues
 Smart Antennae
Omni-directional antenna has a problem with congestion and
eavesdropping. One solution is smart antennae with multiple sub-antennae
and switches (sectorized, phase array, and adaptive array).
Sectorized has elements that aim in different directions and only one sector
is energized with Radio Frequency.
Phase-array can steer a main lobe in any direction, but not capable of
forming nulls.
Adaptive-arrays can form multiple main lobes and steerable nulls in the
direction of interferes.
 Jam Resistant Antennae
Two antennae on each device and use polarization in a way to receive
signals from one direction. Channel estimation possible when distinct
antennae have different polarization or significant spatial separation.
Slide 5
 Fault-tolerant Authentication
o If base station fails, use backup controller in the immediate neighborhood.
o Hierarchy of base stations with multiple keys can be used.
 Denial of Service Attacks and Intruder Identification
o Flooding by a malicious host, impersonation, gang attack, Byzantine behavior.
o Suspicion lists, black list can be created to ignore sensors.
 Privacy and Anonymity
o Location of sensor.
o Source of data.
o False accusation.
o HIPPA regulations for medical data.
o Limited access and disclosure.
 Energy Conservation
o Aggregation of data and pattern identification.
o Routers need to be computationally efficient for energy.
Slide 6
Sensors in a Patient’s Environment
 Safety and Security in Patient’s Room
o Monitor the entrance and access to a patient’s room.
o Monitor pattern of activity with respect to devices connected to a patient.
o Protect patients from neglect, abuse, harm, tampering, movement of patient outside
the safety zone.
o Monitor visitor clothing to guarantee hygiene and prevention of infections.
 Safety and Security of the Hospital
o Monitor temperature, humidity, air quality.
o Identify obstacles for mobile stretchers.
o Protect access to FDA controlled products, narcotics, and special drugs.
o Monitor tampering with medicine, fraud in prescriptions.
o Protect against electromagnetic attacks, power outages, and discharge of biological
agent.
Slide 7
Privacy and Security of Network and
Computer Systems
 Privacy of patient record and identification.
 Protect against changes to patient records or treatment plan.
 Protect against disabling monitoring devices, switching off/crashing
computers, flawed software, disabling messages.
 QoS issues for multimedia data
 Vulnerabilities of wireless communication protocols such as 802.11
and bluetooth. Decrypting traffic, injection of new traffic, attacks from
jamming devices.
Slide 8
Measures of Safety and Security
 Number of incidents per day in patient room, ward, or
hospital.
 Non-emergency calls to nurses and doctors due to
malfunctions, failures, or intrusions.
 False fire alarms, smoke detectors, pagers activation.
 Wrong information, data values, lost or delayed
messages.
 Timeliness, Accuracy, Precision.
Slide 9
Conclusion
 Use of sensors can increase safety and security.
 But can be used by terrorists to kill all electronic,
disrupt or destroy digital devices, and control
information flow.
Slide 9
Conclusion
 Use of sensors can increase safety and security.
 But can be used by terrorists to kill all electronic,
disrupt or destroy digital devices, and control
information flow.

More Related Content

Similar to Sensors for medicalcare

Nanotech enabled sensors
Nanotech enabled sensorsNanotech enabled sensors
Nanotech enabled sensors
Mike Helmus
 
European Journal Epractice Volume 8.7
European Journal Epractice Volume 8.7European Journal Epractice Volume 8.7
European Journal Epractice Volume 8.7
ePractice.eu
 
Sunrise Beacons of Hope Case Prop
Sunrise Beacons of Hope Case PropSunrise Beacons of Hope Case Prop
Sunrise Beacons of Hope Case Prop
Daniel Feeman
 
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra
 
Telemedicine in Clinical Research
Telemedicine in Clinical ResearchTelemedicine in Clinical Research
Telemedicine in Clinical Research
ClinosolIndia
 

Similar to Sensors for medicalcare (20)

Nanotech enabled sensors
Nanotech enabled sensorsNanotech enabled sensors
Nanotech enabled sensors
 
European Journal Epractice Volume 8.7
European Journal Epractice Volume 8.7European Journal Epractice Volume 8.7
European Journal Epractice Volume 8.7
 
Iotslam healthcare 2015v2
Iotslam healthcare 2015v2Iotslam healthcare 2015v2
Iotslam healthcare 2015v2
 
wireless network
wireless networkwireless network
wireless network
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
IoT
IoTIoT
IoT
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
Sunrise Beacons of Hope Case Prop
Sunrise Beacons of Hope Case PropSunrise Beacons of Hope Case Prop
Sunrise Beacons of Hope Case Prop
 
Security in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applicationsSecurity in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applications
 
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020Innomantra viewpoint vital sign monitors covid 19  v1.0FF July 2020
Innomantra viewpoint vital sign monitors covid 19 v1.0FF July 2020
 
Introduction_wsn.pptx
Introduction_wsn.pptxIntroduction_wsn.pptx
Introduction_wsn.pptx
 
Io tree brief presentation en
Io tree brief presentation enIo tree brief presentation en
Io tree brief presentation en
 
C1031724
C1031724C1031724
C1031724
 
Wireless Sensor Networks for the Determination Wellness of Elderly People by ...
Wireless Sensor Networks for the Determination Wellness of Elderly People by ...Wireless Sensor Networks for the Determination Wellness of Elderly People by ...
Wireless Sensor Networks for the Determination Wellness of Elderly People by ...
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Telemedicine in Clinical Research
Telemedicine in Clinical ResearchTelemedicine in Clinical Research
Telemedicine in Clinical Research
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
Health Care IT Legal Issues
Health Care IT Legal IssuesHealth Care IT Legal Issues
Health Care IT Legal Issues
 
Wildlife Tracking
Wildlife Tracking Wildlife Tracking
Wildlife Tracking
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

Sensors for medicalcare

  • 1. Sensors and Wireless Communication for Medical Care This research is supported by CERIAS security center and NSF REU grant of Prof. Arif Ghafoor and Mike Zoltowski.
  • 2. Slide 2 Security and Safety  Medical care environments are vulnerable to malicious behavior, hostile setting, terrorism attacks, natural disaster, tampering.  Computing nodes and sensors can be malicious, selfish, malfunctioning, or compromised.  Challenge is to develop sensors that detect and monitor violations in medical care environments before threat to life occurs.  Reliability, Security, Accuracy can affect timeliness and precise information for patient monitoring.  Collaboration among physicians/nurses, pharmacies, emergency personnel, law enforcement agencies, government/community leaders over wireless network should be secure, private, reliable, consistent/correct and anonymous.
  • 3. Slide 3 Technology and Type of Sensors  Sensors and wireless devices have limited computation, communication, and energy.  High rate of temporary or lasting failure.  Tiny, inexpensive, mobile sensors are becoming available.  Microsensors consist of 8-bit 4-MHz processors.  Bio-sensors to detect Anthrax, viruses, toxins, bacteria uses chips coated with antibodies that attract a specific biological agent. Pattern changes result in alerts.  Ion trap mass spectrometer aids in locating fingerprints of proteins to detect toxin or bacteria.  Neutron-based detectors detect chemical and nuclear materials.  Research is underway on sensor fusion, topology management, smart dust, scalability, and wireless communication issues.  Characteristics of sensors include size, battery consumption, energy level, movement, position, redundancy, failure mode (failed, degrading, Byzantine).
  • 4. Slide 4 Research Issues  Smart Antennae Omni-directional antenna has a problem with congestion and eavesdropping. One solution is smart antennae with multiple sub-antennae and switches (sectorized, phase array, and adaptive array). Sectorized has elements that aim in different directions and only one sector is energized with Radio Frequency. Phase-array can steer a main lobe in any direction, but not capable of forming nulls. Adaptive-arrays can form multiple main lobes and steerable nulls in the direction of interferes.  Jam Resistant Antennae Two antennae on each device and use polarization in a way to receive signals from one direction. Channel estimation possible when distinct antennae have different polarization or significant spatial separation.
  • 5. Slide 5  Fault-tolerant Authentication o If base station fails, use backup controller in the immediate neighborhood. o Hierarchy of base stations with multiple keys can be used.  Denial of Service Attacks and Intruder Identification o Flooding by a malicious host, impersonation, gang attack, Byzantine behavior. o Suspicion lists, black list can be created to ignore sensors.  Privacy and Anonymity o Location of sensor. o Source of data. o False accusation. o HIPPA regulations for medical data. o Limited access and disclosure.  Energy Conservation o Aggregation of data and pattern identification. o Routers need to be computationally efficient for energy.
  • 6. Slide 6 Sensors in a Patient’s Environment  Safety and Security in Patient’s Room o Monitor the entrance and access to a patient’s room. o Monitor pattern of activity with respect to devices connected to a patient. o Protect patients from neglect, abuse, harm, tampering, movement of patient outside the safety zone. o Monitor visitor clothing to guarantee hygiene and prevention of infections.  Safety and Security of the Hospital o Monitor temperature, humidity, air quality. o Identify obstacles for mobile stretchers. o Protect access to FDA controlled products, narcotics, and special drugs. o Monitor tampering with medicine, fraud in prescriptions. o Protect against electromagnetic attacks, power outages, and discharge of biological agent.
  • 7. Slide 7 Privacy and Security of Network and Computer Systems  Privacy of patient record and identification.  Protect against changes to patient records or treatment plan.  Protect against disabling monitoring devices, switching off/crashing computers, flawed software, disabling messages.  QoS issues for multimedia data  Vulnerabilities of wireless communication protocols such as 802.11 and bluetooth. Decrypting traffic, injection of new traffic, attacks from jamming devices.
  • 8. Slide 8 Measures of Safety and Security  Number of incidents per day in patient room, ward, or hospital.  Non-emergency calls to nurses and doctors due to malfunctions, failures, or intrusions.  False fire alarms, smoke detectors, pagers activation.  Wrong information, data values, lost or delayed messages.  Timeliness, Accuracy, Precision.
  • 9. Slide 9 Conclusion  Use of sensors can increase safety and security.  But can be used by terrorists to kill all electronic, disrupt or destroy digital devices, and control information flow.
  • 10. Slide 9 Conclusion  Use of sensors can increase safety and security.  But can be used by terrorists to kill all electronic, disrupt or destroy digital devices, and control information flow.