SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 134
A SURVEY ON PROVIDE SECURITY TO WIRELESS MEDICAL
SENSOR DATA
Kiran More1, Prof. Jyoti Raghatwan2
1 Kiran More, RMD Sinhgad School of Engineering, Pune
2 Prof. Jyoti Raghatwan , RMD Sinhgad School of Engineering,Pune
Abstract- Now a days, wireless sensor networks have been
widely used in healthcare applications, such as hospital and
home patient monitoring. Wireless medical sensor networks
are more vulnerable than the wired networks to
eavesdropping, modification, impersonation and replaying
attacks. A lot of work has been done to secure wireless
medical sensor networks. The present solutions can protect
the patient data during transmission, but cannot stop the
inside attack wherever the administrator of the patient
database reveals the sensitive patient data. Here we propose
a practical approach to prevent the inside attack by using
several data servers to store patient data. The main
contribution is securely distributing the patient data in
numerous data servers by using the Paillier and ElGamal
cryptosystems to perform statistic analysis on the patient
data without compromising the patients’ privacy.
Key words: Paillier cryptosystem, ElGamal
cryptosystem, Wireless medical sensor network,
healthcare application, statistic analysis, Wireless
Sensor network.
1. INTRODUCTION
Wireless sensor networks (WSN), also called as
wireless sensor and actuator networks (WSAN) are
spatially scattered autonomous sensors to monitor
environmental or physical conditions, such as
temperature, sound, pressure, etc. and to helpfully pass
their data through the network to destination. The
development of wireless sensor networks was aggravated
by military applications such as battlefield surveillance.
Now a days, such networks are used in many industrial
and consumer applications, For Example industrial process
monitoring, machine health monitoring, and so on.
Healthcare applications are considered as
promising fields for wireless sensor networks, In which
patients can be monitored using wireless medical sensor
networks (WMSNs). Current WMSN healthcare research
trends focus on patient reliable patient mobility,
communication, and energy-efficient routing. Deploying
new technologies in healthcare applications without
considering security makes patient privacy vulnerable. The
physiological data of an individual are highly sensitive. So,
that the security is a paramount requirement of healthcare
applications, especially in the case of patient privacy, if the
patient has an embarrassing disease.
Any unauthorized collection or leakage of patient
data could harm the patient. However,
an unauthorized person may use the patient data (such as,
patient identity) for their personal benefit, such as for
fraudulent insurance claims, medical fraud, and sometimes
this may even pose life-threatening risks. This motivated
to provide security to Patient data when data is share on
distributed system.
In this paper we have surveyed on Privacy protection
for wireless medical sensor data. Section 2 of this paper
deals with literature survey and Section 3 presents
proposed system. Section 4 concludes this paper.
2. LITRATURE SURVEY
A comprehensive literature survey is performed in the
support of the Wireless Medical Sensor Data. In literature,
several techniques have been presented for securing
wireless medical sensor data by using Paillier and ElGamal
cryptosystems.
System [1] Wireless medical sensor networks
(MSNs) are a useful technology in e-healthcare which
allows the data of a patient’s vital body parameters is
collected by the wearable biosensors. However, the
security and privacy protection of the collected data is a
major unsolved issue, and the high demand for both
security/privacy and practicality. So, The lightweight and
secure system for MSNs is proposed. The system employs
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 135
hash-chain based key updating mechanism and proxy-
protected signature technique to achieve efficient secure
transmission and data access control ,although the system
to provide backward secrecy and privacy preservation.
Here we required symmetric-key encryption/decryption
and hash operations and is thus suitable for the low-power
sensor nodes. Among the all previous servey, this is the
first secure data transmission and access control system
for MSNs.
In [2] Energy efficient key management scheme is
proposed to the distributed systems like Body Sensor
Networks(BSNs) where biosensor nodes are scattered in
different positions to collect health data from the human
body and transport the information to a remote medical
center. As per the medical data policy, security of BSNs is
very important. The operational resources are very limited
of the biosensor nodes which are located in BSNs and
traditional security technologies are not directly applicable
to BSNs. Time synchronization and low-energy
communication are two challenging issues for BSNs. A
fuzzy commitment technology with weak time
synchronization mechanism for keys negotiation is
developed, with a multi-hop route key management
scheme used for efficient energy consumption
management. The Security analysis and performance
evaluation is provided to authenticate the proposed
scheme.
Present WMSN healthcare research trends focus
on patient reliable communication, patient mobility, and
energy-efficient routing [3]. Though, an Introducing new
technology in healthcare applications without considering
security makes patient privacy vulnerable. Furthermore,
the physiological data of an individual are highly sensitive
so, the security is a paramount requirement of healthcare
applications, mainly in the case of patient privacy or if the
patient has an embarrassing disease. Here we discussed
the security and privacy issues in healthcare application
using WMSNs.
System [4] proposed a Staff shortages and an
increasingly aging population are straining the ability of
emergency departments to provide high quality care. At
the same time, there is a rising concern about the
hospitals’ ability to provide effective care during disaster
events. So because of, the tools that automate patient
monitoring have the potential to greatly improve efficiency
and quality of health care. Towards this target, MEDiSN
developed, a wireless sensor network for monitoring
patients’ physiological data in hospitals and at a time of
disaster events. MEDiSN comprises Physiological Monitors
(PMs) that are custom-built, patient-worn motes that
sample, encrypt, and sign physiological data and Relay
Points (RPs). Which then self-organize into a multi-hop
wireless backbone for carrying physiological data.
Additionally, MEDiSN includes a back-end server that
persistently stores medical data and presents them to
authenticated GUI clients. The grouping of MEDiSN’s two-
tier architecture and optimized rate control protocols
allows it to address the complex challenge of reliably
delivering large volumes of data while meeting the
application’s QoS requirements.
In [5] telecardiology sensor networks, Recently
the remote-sensing platform based on wireless
interconnection of tiny ECG sensors called Telecardiology
Sensor Networks (TSN). It provided a hopeful approach to
perform lowcost real-time cardiac patient monitoring
whenever in community areas such as elder nursing
homes or hospitals. The contribution of this research is the
design of a practical TSN based on hardware/software
platform for a typical U.S. healthcare community scenario
such as large nursing homes with many elder patients to
perform real time healthcare data collections.
Alternatively, due to the radio broadcasting nature of
MANET, a TSN has the risk of losing the privacy of patients’
data. Medical privacy has been highly emphasized by U.S.
Department of Health and Human Services. The Proposed
work also designs a medical security scheme with low
communication overhead to achieve confidential electro
cardiogram data transmission in wireless medium.
3. PROPOSED SYSTEM
The proposed system is divided into following four
systems:
 A wireless medical sensor network which senses
the patient’s body and transmits the patient data
to a patient database system.
 A patient database system that stores the patient
data from medical sensors and provides querying
services to users such as physicians and medical
professionals.
 A patient data access control system which is used
by the user examples physician to access the
patient data and monitor the patient.
 A patient data analysis system that is used by the
user Example medical researcher to query the
patient database system and examine the patient
data statistically.
We propose various Cryptosystem algorithm such as
paillier, ElGamal to EncryptDecrypt data and store on
several data server.
That various data server are connected by WSN. Here
wireless medical sensor network senses the patient’s body
and then that data is splitted, and store on distributed data
server (here we used at least 3 data server). Whenever
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 136
that data is required by medical researcher or any doctor
then they access data in decrypted form by querying to
data server. The privacy of the patient data can be
preserved as long as one data server is not compromised.
Figure 1: Patient Data Transmission over internet.
4. CONCLUSION
We have surveyed different types of security
technique to secure the wireless medical sensor data. Here,
we also proposed the Paillier cryptosystem and ElGamal
cryptosystem to encryption and decryption of data.
Proposed solution can preserve the patient data privacy as
long as one of three data server is not compromised. Also
requires that the number of the compromised data servers
is at most one.
ACKNOWLEDGMENT
It is my privilege to acknowledge with deep sense of
gratitude to my guide Prof. Jyoti Raghatwan for her kind
cooperation, valuable suggestions and capable guidance
and timely help given to me in completion of my Paper. I
express my gratitude to Prof. Vina M. Lomte, Head of
Department, RMDSSOE (Computer Dept.) for her constant
encouragement, suggestions, help and cooperation.
REFERENCES
[1] Xun Yi, Athman Bouguettaya, ”Privacy Protection for
Wireless Medical Sensor Data”, in IEEE, VOL. 13, NO. 3,
MAY/JUNE 2016.
[2] D. He, S. Chan, and S. Tang, ”A novel and lightweight
system to secure wireless medical sensor networks,” IEEE
J. Biomed. Health Informat., vol. 18, no. 1, pp. 316-326, Jan.
2014.
[3] H. Zhao, J. Qin, and J. Hu, ”An energy efficient key
management scheme for body sensor networks,” IEEE
Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2202-2210,
Nov. 2013.
[4] P. Kumar and H. J. Lee, ”Security issues in healthcare
applications using wireless medical sensor networks: A
survey,” Sensors, vol. 12, pp. 55-91, 2012.
[5] J. Ko, J. H. Lim, Y. Chen, R. Musaloiu-E., A. Terzis, and G.
M. Masson, ”MEDiSN: Medical emergency detection in
sensor networks,” ACM Trans. Embedded Comput. Syst.,
vol. 10, pp. 1-29, 2010.
[6] F. Hu, M. Jiang, M.Wagner, and D. C. Dong, ”Privacy-
preserving telecardiology sensor networks: Toward a low-
cost portable wireless hardware/software codesign,” IEEE
Trans. Inf. Tech. Biomed., vol. 11, no. 6, pp. 619-627, Nov.
2007.

More Related Content

What's hot

What's hot (19)

A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring system
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2
 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
 
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
 
Ijcet 06 06_004
Ijcet 06 06_004Ijcet 06 06_004
Ijcet 06 06_004
 
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data Transmission
 
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
IRJET- A Block Chain Technology based Data Security in Medical Report for Hea...
 
Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare Network
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
wireless network
wireless networkwireless network
wireless network
 

Viewers also liked

Viewers also liked (20)

IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety ApproachIRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety Approach
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
 
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
 
IRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between SentencesIRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between Sentences
 
Auto verkaufen
Auto verkaufenAuto verkaufen
Auto verkaufen
 
Custom connectorsinmule
Custom connectorsinmuleCustom connectorsinmule
Custom connectorsinmule
 
CONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIACONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIA
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
 
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft bodyIRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
 
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
 
IRJET- Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET- 	  Sensrless Luenberger Observer Based Sliding Mode Control of DC MotorIRJET- 	  Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET- Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
 
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.
IRJET- Review of Vapour Absorption System and Vapour Compression System.
 
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
 
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL AcceleratorIRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL Accelerator
 
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air EngineIRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
 

Similar to IRJET-A Survey on provide security to wireless medical sensor data

Private & Secure.pptx
Private & Secure.pptxPrivate & Secure.pptx
Private & Secure.pptx
PoojaG86
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
BRNSSPublicationHubI
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 

Similar to IRJET-A Survey on provide security to wireless medical sensor data (20)

Private & Secure.pptx
Private & Secure.pptxPrivate & Secure.pptx
Private & Secure.pptx
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
Security in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applicationsSecurity in Body Sensor Networks for Healthcare applications
Security in Body Sensor Networks for Healthcare applications
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
Security Issues in Biomedical Wireless Sensor Networks Applications: A Survey
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveySecurity Issues in Biomedical Wireless Sensor Networks Applications: A Survey
Security Issues in Biomedical Wireless Sensor Networks Applications: A Survey
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Clinical Information system
Clinical Information systemClinical Information system
Clinical Information system
 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

IRJET-A Survey on provide security to wireless medical sensor data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 134 A SURVEY ON PROVIDE SECURITY TO WIRELESS MEDICAL SENSOR DATA Kiran More1, Prof. Jyoti Raghatwan2 1 Kiran More, RMD Sinhgad School of Engineering, Pune 2 Prof. Jyoti Raghatwan , RMD Sinhgad School of Engineering,Pune Abstract- Now a days, wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical sensor networks are more vulnerable than the wired networks to eavesdropping, modification, impersonation and replaying attacks. A lot of work has been done to secure wireless medical sensor networks. The present solutions can protect the patient data during transmission, but cannot stop the inside attack wherever the administrator of the patient database reveals the sensitive patient data. Here we propose a practical approach to prevent the inside attack by using several data servers to store patient data. The main contribution is securely distributing the patient data in numerous data servers by using the Paillier and ElGamal cryptosystems to perform statistic analysis on the patient data without compromising the patients’ privacy. Key words: Paillier cryptosystem, ElGamal cryptosystem, Wireless medical sensor network, healthcare application, statistic analysis, Wireless Sensor network. 1. INTRODUCTION Wireless sensor networks (WSN), also called as wireless sensor and actuator networks (WSAN) are spatially scattered autonomous sensors to monitor environmental or physical conditions, such as temperature, sound, pressure, etc. and to helpfully pass their data through the network to destination. The development of wireless sensor networks was aggravated by military applications such as battlefield surveillance. Now a days, such networks are used in many industrial and consumer applications, For Example industrial process monitoring, machine health monitoring, and so on. Healthcare applications are considered as promising fields for wireless sensor networks, In which patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable patient mobility, communication, and energy-efficient routing. Deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. The physiological data of an individual are highly sensitive. So, that the security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. Any unauthorized collection or leakage of patient data could harm the patient. However, an unauthorized person may use the patient data (such as, patient identity) for their personal benefit, such as for fraudulent insurance claims, medical fraud, and sometimes this may even pose life-threatening risks. This motivated to provide security to Patient data when data is share on distributed system. In this paper we have surveyed on Privacy protection for wireless medical sensor data. Section 2 of this paper deals with literature survey and Section 3 presents proposed system. Section 4 concludes this paper. 2. LITRATURE SURVEY A comprehensive literature survey is performed in the support of the Wireless Medical Sensor Data. In literature, several techniques have been presented for securing wireless medical sensor data by using Paillier and ElGamal cryptosystems. System [1] Wireless medical sensor networks (MSNs) are a useful technology in e-healthcare which allows the data of a patient’s vital body parameters is collected by the wearable biosensors. However, the security and privacy protection of the collected data is a major unsolved issue, and the high demand for both security/privacy and practicality. So, The lightweight and secure system for MSNs is proposed. The system employs
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 135 hash-chain based key updating mechanism and proxy- protected signature technique to achieve efficient secure transmission and data access control ,although the system to provide backward secrecy and privacy preservation. Here we required symmetric-key encryption/decryption and hash operations and is thus suitable for the low-power sensor nodes. Among the all previous servey, this is the first secure data transmission and access control system for MSNs. In [2] Energy efficient key management scheme is proposed to the distributed systems like Body Sensor Networks(BSNs) where biosensor nodes are scattered in different positions to collect health data from the human body and transport the information to a remote medical center. As per the medical data policy, security of BSNs is very important. The operational resources are very limited of the biosensor nodes which are located in BSNs and traditional security technologies are not directly applicable to BSNs. Time synchronization and low-energy communication are two challenging issues for BSNs. A fuzzy commitment technology with weak time synchronization mechanism for keys negotiation is developed, with a multi-hop route key management scheme used for efficient energy consumption management. The Security analysis and performance evaluation is provided to authenticate the proposed scheme. Present WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing [3]. Though, an Introducing new technology in healthcare applications without considering security makes patient privacy vulnerable. Furthermore, the physiological data of an individual are highly sensitive so, the security is a paramount requirement of healthcare applications, mainly in the case of patient privacy or if the patient has an embarrassing disease. Here we discussed the security and privacy issues in healthcare application using WMSNs. System [4] proposed a Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high quality care. At the same time, there is a rising concern about the hospitals’ ability to provide effective care during disaster events. So because of, the tools that automate patient monitoring have the potential to greatly improve efficiency and quality of health care. Towards this target, MEDiSN developed, a wireless sensor network for monitoring patients’ physiological data in hospitals and at a time of disaster events. MEDiSN comprises Physiological Monitors (PMs) that are custom-built, patient-worn motes that sample, encrypt, and sign physiological data and Relay Points (RPs). Which then self-organize into a multi-hop wireless backbone for carrying physiological data. Additionally, MEDiSN includes a back-end server that persistently stores medical data and presents them to authenticated GUI clients. The grouping of MEDiSN’s two- tier architecture and optimized rate control protocols allows it to address the complex challenge of reliably delivering large volumes of data while meeting the application’s QoS requirements. In [5] telecardiology sensor networks, Recently the remote-sensing platform based on wireless interconnection of tiny ECG sensors called Telecardiology Sensor Networks (TSN). It provided a hopeful approach to perform lowcost real-time cardiac patient monitoring whenever in community areas such as elder nursing homes or hospitals. The contribution of this research is the design of a practical TSN based on hardware/software platform for a typical U.S. healthcare community scenario such as large nursing homes with many elder patients to perform real time healthcare data collections. Alternatively, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients’ data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. The Proposed work also designs a medical security scheme with low communication overhead to achieve confidential electro cardiogram data transmission in wireless medium. 3. PROPOSED SYSTEM The proposed system is divided into following four systems:  A wireless medical sensor network which senses the patient’s body and transmits the patient data to a patient database system.  A patient database system that stores the patient data from medical sensors and provides querying services to users such as physicians and medical professionals.  A patient data access control system which is used by the user examples physician to access the patient data and monitor the patient.  A patient data analysis system that is used by the user Example medical researcher to query the patient database system and examine the patient data statistically. We propose various Cryptosystem algorithm such as paillier, ElGamal to EncryptDecrypt data and store on several data server. That various data server are connected by WSN. Here wireless medical sensor network senses the patient’s body and then that data is splitted, and store on distributed data server (here we used at least 3 data server). Whenever
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 136 that data is required by medical researcher or any doctor then they access data in decrypted form by querying to data server. The privacy of the patient data can be preserved as long as one data server is not compromised. Figure 1: Patient Data Transmission over internet. 4. CONCLUSION We have surveyed different types of security technique to secure the wireless medical sensor data. Here, we also proposed the Paillier cryptosystem and ElGamal cryptosystem to encryption and decryption of data. Proposed solution can preserve the patient data privacy as long as one of three data server is not compromised. Also requires that the number of the compromised data servers is at most one. ACKNOWLEDGMENT It is my privilege to acknowledge with deep sense of gratitude to my guide Prof. Jyoti Raghatwan for her kind cooperation, valuable suggestions and capable guidance and timely help given to me in completion of my Paper. I express my gratitude to Prof. Vina M. Lomte, Head of Department, RMDSSOE (Computer Dept.) for her constant encouragement, suggestions, help and cooperation. REFERENCES [1] Xun Yi, Athman Bouguettaya, ”Privacy Protection for Wireless Medical Sensor Data”, in IEEE, VOL. 13, NO. 3, MAY/JUNE 2016. [2] D. He, S. Chan, and S. Tang, ”A novel and lightweight system to secure wireless medical sensor networks,” IEEE J. Biomed. Health Informat., vol. 18, no. 1, pp. 316-326, Jan. 2014. [3] H. Zhao, J. Qin, and J. Hu, ”An energy efficient key management scheme for body sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2202-2210, Nov. 2013. [4] P. Kumar and H. J. Lee, ”Security issues in healthcare applications using wireless medical sensor networks: A survey,” Sensors, vol. 12, pp. 55-91, 2012. [5] J. Ko, J. H. Lim, Y. Chen, R. Musaloiu-E., A. Terzis, and G. M. Masson, ”MEDiSN: Medical emergency detection in sensor networks,” ACM Trans. Embedded Comput. Syst., vol. 10, pp. 1-29, 2010. [6] F. Hu, M. Jiang, M.Wagner, and D. C. Dong, ”Privacy- preserving telecardiology sensor networks: Toward a low- cost portable wireless hardware/software codesign,” IEEE Trans. Inf. Tech. Biomed., vol. 11, no. 6, pp. 619-627, Nov. 2007.