Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
Body Sensor Networks have considerably facilitated the continuous measurement of physiological
parameters of human body. The sensors used to measure the body parameters, have several limitations
in terms of power, computation capability, memory and communication capability. In this paper a novel
architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking
into account the inherent hardware constraints of the sensors. The proposed architecture would enable
senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely
monitored in the comfort of their homes. Security threats and challenges inherent to wireless
communication of sensor data have been discussed and a security mechanism to ensure data
confidentiality, integrity and authentication has been proposed.
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)AM Publications
Using Wireless sensor Networks (WSNs) in health care system has yielded an amazing effort in recent years. However, in most of those researches, tasks like detector processing, health state choices creating and emergency messages causing are completed by a foreign server. Transmission and handing with an oversized scale of knowledge from body sensors consume plenty of communication resource, bring a burden to the remote server and delay the choice time and notification time. During this paper, we tend to gift a paradigm of a sensible entranceway that we've enforced. This entranceway is associate degree interconnection and services management platform particularly for WSN health care systems reception setting. By building a bridge between a WSN and public communication networks, associate degreed being compatible with an aboard knowledge call system and a light-weight info, our sensible entranceway system is enabled to form patients' health state choices in low-power and affordable embedded system and find quicker time interval o the emergencies. We’ve conjointly designed the communication protocols between WSN, entranceway and remote servers. To boot LAN, Wi-Fi and GSM/GPRS communication module are integrated into the sensible entranceway so as to report and send word info to care-givers.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
Body Sensor Networks have considerably facilitated the continuous measurement of physiological
parameters of human body. The sensors used to measure the body parameters, have several limitations
in terms of power, computation capability, memory and communication capability. In this paper a novel
architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking
into account the inherent hardware constraints of the sensors. The proposed architecture would enable
senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely
monitored in the comfort of their homes. Security threats and challenges inherent to wireless
communication of sensor data have been discussed and a security mechanism to ensure data
confidentiality, integrity and authentication has been proposed.
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)AM Publications
Using Wireless sensor Networks (WSNs) in health care system has yielded an amazing effort in recent years. However, in most of those researches, tasks like detector processing, health state choices creating and emergency messages causing are completed by a foreign server. Transmission and handing with an oversized scale of knowledge from body sensors consume plenty of communication resource, bring a burden to the remote server and delay the choice time and notification time. During this paper, we tend to gift a paradigm of a sensible entranceway that we've enforced. This entranceway is associate degree interconnection and services management platform particularly for WSN health care systems reception setting. By building a bridge between a WSN and public communication networks, associate degreed being compatible with an aboard knowledge call system and a light-weight info, our sensible entranceway system is enabled to form patients' health state choices in low-power and affordable embedded system and find quicker time interval o the emergencies. We’ve conjointly designed the communication protocols between WSN, entranceway and remote servers. To boot LAN, Wi-Fi and GSM/GPRS communication module are integrated into the sensible entranceway so as to report and send word info to care-givers.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
In this paper, a novel cloud-based WBAN health management system is introduced to. This system can be used for people’s health information collection, record, storage and transmission, health status monitoring and assessment, health education, telemedicine, and remote health management. Therefore it can provide health management services on-demand timely, appropriately and without boundaries.
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...IJSRD
Rapid expansion of wireless technologies permits continuous healthcare monitoring of mobile patients using compact biomedical wireless sensor motes. These tiny wearable devices –have limited amount of memory, energy, computation, & communication capabilities – are positioned on a patient; after that , they self-configure to create a networked cluster that is capable to continuously monitor important signs like blood pressure and flow, ECG, core temperature, the oxygen saturation, and CO2 concentration (i.e. for the respiration monitoring). The WBAN is an energizing innovation that guarantees to convey the human services to a novel level of the personalization. The scaled down sensors can be worn on body and they can non-rudely screen individual's physiological state. The numerous sensors speak with mobile utilizing the remote interfaces shaping WBAN. The WBANs empower checking a singular's wellbeing consistently in the free living conditions, where individual is allowed to direct his or her day by day action. In propose, design a enhance cluster based protocol.
A remote patient monitoring based on WBAN implementation with internet of thi...journalBEEI
A healthcare employment is the mainly domain in emergent technology of WBAN, and an e-health system created of cloud computing in addition to a WSN considers an important part of this field. An implementation of remotely system for monitoring the patient's vital signs require continuous observation to form low-cost networks with the ability of portability and flexibility and may be applied with separate position and long-term intensive care of peoples in the absence of disturbance of their everyday activities. The patient carries body sensor's patches to get transmitted vital signs continuously to the cloud environment, and a website is designed for presenting and analyzing the data based on designed algorithm. A comparison is made every received measurement with a that stored in the algorithm. In remote specialist care, the execution of confidence and confidentiality conservation is critical, as essential restrictions were being communicating with remote locations. To ensure reliability, the implemented system offers real time monitoring and certification to the patient's condition by means of a medical record, with rapid medical data delivery to the medical staff and can also increase the service delivery ratio of hospital capacity and monitoring of large number of patients with concentrated average delay.
BANs are commonly regarded as an enabling technology for a variety of applications, including health and fitness monitoring, emergency response and device control. Recent breakthroughs in solid-state electronics afford for the creation of low-power, low-profile devices that can be modularly interconnected in order to create so-called sensor nodes comprised of one or more sensor devices, a microcontroller unit (MCU), and a radio transceiver that eliminates the need for wires to communicate with the coordinator node in order to transfer the collected data. In this survey, a review of the on-going research in WBANs in terms of system architecture, applications, how it different from Wireless Sensor Network and also describes the MAC protocols in WBAN.
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
A Body Area Network is a system of computing devices located in close proximityto the human body which coordinates and cooperates for the benefit of the user. Body
Area Networks have evolved out of sensor network technology and biomedicalengineering. In this paper we discuss various aspects of Body Area Networks,introduction section deals with various concepts associated with computer networks
and some supporting technologies of Wireless Body Area Networks (WBANs). Section
2 deals with the various definitions of Body Area Networks(BANs) followed by the
types of BAN in section 3 and system architecture in section 4. Section 5 gives the
draft guidelines by IEEE 802.15.6 for a communicationsstandard for BAN, the next
two sections list out the applications and current researctrends of BAN followed bythe conclusion.
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
Implantable and medical devices (IMDs) have been advanced with the advancements in engineering and
medical science. IMDs are used for applying new therapies to patients, monitoring human body parameters
and making diagnosis as per the monitoring result. Increased use of IMDs has enhanced the chances of
attacks to them. Therefore, to make use of IMDs for various applications, they need to be secured. A system is
developed to achieve the security. The system monitors various human body parameters wirelessly and
detects anomaly if unauthorized node participates in communication. The system uses request response
protocol in wireless communication. Experiments show that body parameters can be successfully monitored
and signal characteristic can be used to detect anomaly.
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
Nowadays, many researchers are contributing their research in the field of Internet of things IOT , since it is important and attractive technology. IOT means communication between human to device or device to device, anywhere in real time. This communication takes place with the help of different smart sensors which are connected via internet. In the IOT infrastructure different sensors can sense, analyse, transmit and store all the datas on cloud. This paper presents a wearable sensor network system for Internet of Things IoT connected safety and health applications. The wearable sensors on different subjects can communicate with each other and transmit the data to a gateway via a Local Area Network which forms a heterogeneous IoT platform with wifi based medical signal sensing network. It consists of two sections the basic information and condition of patient is collected in the wagon by the means IoT Internet of Things and make it available to hospital before the emergency vehicle reaches the hospital. On the base of such data, the system is able to detect anomalous situations and provide information about the status directly and exclusively to the hospital. The second path is control of traffic lights from the wagon and makes free for its path automatically. This project is to save the time of major late time aspects in more efficient manner and save the life. Mrs. S. Kirthica | Mrs. S. Priyadharsini "Design and Implementation of Smart Monitoring Systems in Hospital Wagon using IoT Technology: A Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31731.pdf Paper Url :https://www.ijtsrd.com/mathemetics/other/31731/design-and-implementation-of-smart-monitoring-systems-in-hospital-wagon-using-iot-technology-a-case-study/mrs-s-kirthica
In this paper, a novel cloud-based WBAN health management system is introduced to. This system can be used for people’s health information collection, record, storage and transmission, health status monitoring and assessment, health education, telemedicine, and remote health management. Therefore it can provide health management services on-demand timely, appropriately and without boundaries.
Energy-efficient cluster-based security mechanism for Wireless Body Area Netw...IJSRD
Rapid expansion of wireless technologies permits continuous healthcare monitoring of mobile patients using compact biomedical wireless sensor motes. These tiny wearable devices –have limited amount of memory, energy, computation, & communication capabilities – are positioned on a patient; after that , they self-configure to create a networked cluster that is capable to continuously monitor important signs like blood pressure and flow, ECG, core temperature, the oxygen saturation, and CO2 concentration (i.e. for the respiration monitoring). The WBAN is an energizing innovation that guarantees to convey the human services to a novel level of the personalization. The scaled down sensors can be worn on body and they can non-rudely screen individual's physiological state. The numerous sensors speak with mobile utilizing the remote interfaces shaping WBAN. The WBANs empower checking a singular's wellbeing consistently in the free living conditions, where individual is allowed to direct his or her day by day action. In propose, design a enhance cluster based protocol.
A remote patient monitoring based on WBAN implementation with internet of thi...journalBEEI
A healthcare employment is the mainly domain in emergent technology of WBAN, and an e-health system created of cloud computing in addition to a WSN considers an important part of this field. An implementation of remotely system for monitoring the patient's vital signs require continuous observation to form low-cost networks with the ability of portability and flexibility and may be applied with separate position and long-term intensive care of peoples in the absence of disturbance of their everyday activities. The patient carries body sensor's patches to get transmitted vital signs continuously to the cloud environment, and a website is designed for presenting and analyzing the data based on designed algorithm. A comparison is made every received measurement with a that stored in the algorithm. In remote specialist care, the execution of confidence and confidentiality conservation is critical, as essential restrictions were being communicating with remote locations. To ensure reliability, the implemented system offers real time monitoring and certification to the patient's condition by means of a medical record, with rapid medical data delivery to the medical staff and can also increase the service delivery ratio of hospital capacity and monitoring of large number of patients with concentrated average delay.
BANs are commonly regarded as an enabling technology for a variety of applications, including health and fitness monitoring, emergency response and device control. Recent breakthroughs in solid-state electronics afford for the creation of low-power, low-profile devices that can be modularly interconnected in order to create so-called sensor nodes comprised of one or more sensor devices, a microcontroller unit (MCU), and a radio transceiver that eliminates the need for wires to communicate with the coordinator node in order to transfer the collected data. In this survey, a review of the on-going research in WBANs in terms of system architecture, applications, how it different from Wireless Sensor Network and also describes the MAC protocols in WBAN.
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
A Body Area Network is a system of computing devices located in close proximityto the human body which coordinates and cooperates for the benefit of the user. Body
Area Networks have evolved out of sensor network technology and biomedicalengineering. In this paper we discuss various aspects of Body Area Networks,introduction section deals with various concepts associated with computer networks
and some supporting technologies of Wireless Body Area Networks (WBANs). Section
2 deals with the various definitions of Body Area Networks(BANs) followed by the
types of BAN in section 3 and system architecture in section 4. Section 5 gives the
draft guidelines by IEEE 802.15.6 for a communicationsstandard for BAN, the next
two sections list out the applications and current researctrends of BAN followed bythe conclusion.
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesIJMTST Journal
Implantable and medical devices (IMDs) have been advanced with the advancements in engineering and
medical science. IMDs are used for applying new therapies to patients, monitoring human body parameters
and making diagnosis as per the monitoring result. Increased use of IMDs has enhanced the chances of
attacks to them. Therefore, to make use of IMDs for various applications, they need to be secured. A system is
developed to achieve the security. The system monitors various human body parameters wirelessly and
detects anomaly if unauthorized node participates in communication. The system uses request response
protocol in wireless communication. Experiments show that body parameters can be successfully monitored
and signal characteristic can be used to detect anomaly.
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
Nowadays, many researchers are contributing their research in the field of Internet of things IOT , since it is important and attractive technology. IOT means communication between human to device or device to device, anywhere in real time. This communication takes place with the help of different smart sensors which are connected via internet. In the IOT infrastructure different sensors can sense, analyse, transmit and store all the datas on cloud. This paper presents a wearable sensor network system for Internet of Things IoT connected safety and health applications. The wearable sensors on different subjects can communicate with each other and transmit the data to a gateway via a Local Area Network which forms a heterogeneous IoT platform with wifi based medical signal sensing network. It consists of two sections the basic information and condition of patient is collected in the wagon by the means IoT Internet of Things and make it available to hospital before the emergency vehicle reaches the hospital. On the base of such data, the system is able to detect anomalous situations and provide information about the status directly and exclusively to the hospital. The second path is control of traffic lights from the wagon and makes free for its path automatically. This project is to save the time of major late time aspects in more efficient manner and save the life. Mrs. S. Kirthica | Mrs. S. Priyadharsini "Design and Implementation of Smart Monitoring Systems in Hospital Wagon using IoT Technology: A Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31731.pdf Paper Url :https://www.ijtsrd.com/mathemetics/other/31731/design-and-implementation-of-smart-monitoring-systems-in-hospital-wagon-using-iot-technology-a-case-study/mrs-s-kirthica
A Low Hardware Complex Bilinear Interpolation Algorithm of Image Scaling for ...arpublication
In this brief, a low-complexity, low-memoryrequirement, and high-quality algorithm is proposed for VLSI implementation of an image scaling processor. The proposed image scaling algorithm consists of a sharpening spatial filter, a clamp filter, and a bilinear interpolation. To reduce the blurring and aliasing artifacts produced by the bilinear interpolation, the sharpening spatial and clamp filters are added as pre-filters. To minimize the memory buffers and computing resources for the proposed image processor design, a T-model and inversed T-model convolution kernels are created for realizing the sharpening spatial and clamp filters. Furthermore, two T-model or inversed T-model filters are combined into a combined filter which requires only a one-line-buffer memory. Moreover, a reconfigurable calculation unit is invented for decreasing the hardware cost of the combined filter. Moreover, the computing resource and hardware cost of the bilinear interpolator can be efficiently reduced by an algebraic manipulation and hardware sharing techniques. The VLSI architecture in this work can achieve 280 MHz with 6.08-K gate counts, and its core area is 30 378 μm2 synthesized by a 0.13-μm CMOS process. Compared with previous low-complexity techniques, this work reduces gate counts by more than 34.4% and requires only a one-line-buffer memory.
Route Stability in Mobile Ad-Hoc Networksarpublication
A Mobile Ad Hoc Network (MANET) is a wireless network consisting of mobile nodes, which can communicate with each other without any infrastructure support. In these networks, nodes typically cooperate with each other, by forwarding packets for nodes which are not in the communication range of the source node. A fundamental issue arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. In this work we study the stability of a routing path, which is subject to link failures caused by node mobility, and we consider as metrics of interest the duration and the availability of a path. Moreover, using the results on path duration and availability, we show how to determine the optimal path in terms of route stability, under the Random Direction mobility models.
A review of security protocols in m health wireless body area networks (wban)...James Kang
Kang, J. J., & Adibi, S. (2015). A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN). In W. Zhou, & R. Doss (Eds.), Future Network Systems and Security 2015 (FNSS 2015) Vol. 523 (pp. 61-83). Paris, France: Springer International Publishing. doi: http://dx.doi.org/10.1007/978-3-319-19210-9_5
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
In the age of today, technology pays attention to how it can be implemented in keeping people alive. It is clear that technology is offering the healthcare industry a much needed upgrade to mobile apps from medical translation resources that help patients lead healthier lives. One of the dizzying innovations that could change the healthcare industry is the wireless body area network WBAN .WBAN derives from the wireless sensor network WSN that deploys sensors over the human body. Wireless Body Area Network WBAN is a wireless networking system based on radio frequency RF that interconnects tiny nodes with sensor or actuator capabilities in, on, or around a human body. WBAN also links large and local area networks. As compared to WSN, WBAN has its own characteristics. Preeti Sondhi | Javaid Ahmad Malik "A Review of Wireless Body Area Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38384.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/38384/a-review-of-wireless-body-area-network/preeti-sondhi
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKSIJNSA Journal
The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which allows supervising various essential biological signals (rate of heartbeat, pressure, etc). The sensitivity of medical information requires mechanisms of safety. This performance constitutes a challenge for WBSN because of their limitation in resources energy and data-processing. In this paper we propose a new approach to symmetric cryptographic key establishment, based on biometrics physiology. This approach takes into account WBSN constraints and its topology.
IoT and machine learning (ML) are becoming increasingly efficient in the medical and telemedicine areas all around the world. This article describes a system that employs latest technology to give a more accurate method of forecasting disease. This technology uses sensors to collect data from the body of the patient. The obtained sensor information is collected with NodeMcU before being transferred to the Cloud Platform "ThinkSpeak" through an ESP8266 Wi-Fi module. ThinkSpeak is a cloud server that provides real-time data streams in the cloud. For the best results, data currently saved in the cloud is evaluated by one of the machine learning algorithms, the KNN algorithm. Based on the findings of the analysis and compared with the data sets, the disease is predicted and a prescription for the relevant disease is issued.
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
The International Journal of Digital Signal and Image Processing (IJDSIP) is an international peer reviewed open access journal. It publishes top-level work from all areas of signal and image processing. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to signal and image processing area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Science Applications & Information Technolo...arpublication
The International Journal of Computer Science Applications & Information Technologies (IJCSAIT) is an international peer reviewed open access journal. It publishes top-level work from all areas of computer science and information technologies applications. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to computer science and information technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Networking and Communication (IJCNAC)arpublication
The International Journal of Computer Networking and Communication (IJCNAC) is an international peer reviewed open access journal. It publishes top-level work from all areas of networking and communication. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to networking area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
The International Journal of Wireless and Mobile Networking (IJWAMN) is an open access peer-reviewed international research journal. It publishes top-level work from all areas of wireless and Mobile networking. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications..
International Journal of Advanced Research in Electrical and Electronics Engi...arpublication
The International Journal of Advanced Research in Electrical and Electronics Engineering(IJAREEE) is an international peer reviewed open access journal. It publishes top-level work from all areas of electrical and electronics engineering. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to electrical and electronics engineering area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)arpublication
The International Journal of Advanced Mechanical Engineering & Applications (IJAMEA) is an international peer reviewed open access journal. It publishes top-level work from all areas of mechanical engineering. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to mechanical engineering area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Artificial Intelligence & Machine Learning (IJAIML)arpublication
The International Journal of Artificial Intelligence & Machine Learning (IJAIML) is an international peer reviewed open access journal. It publishes top-level work from all areas of artificial intelligence and machine learning. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to artificial intelligence and machine learning area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
The International Journal of Digital Signal and Image Processing (IJDSIP) is an international peer reviewed open access journal. It publishes top-level work from all areas of signal and image processing. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to signal and image processing area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Science Applications & Information Technolo...arpublication
The International Journal of Computer Science Applications & Information Technologies (IJCSAIT) is an international peer reviewed open access journal. It publishes top-level work from all areas of computer science and information technologies applications. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to computer science and information technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Networking and Communication (IJCNAC)arpublication
The International Journal of Computer Networking and Communication (IJCNAC) is an international peer reviewed open access journal. It publishes top-level work from all areas of networking and communication. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to networking area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
The International Journal of Wireless and Mobile Networking (IJWAMN) is an open access peer-reviewed international research journal. It publishes top-level work from all areas of wireless and Mobile networking. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
The International Journal of Digital Signal and Image Processing (IJDSIP) is an international peer reviewed open access journal. It publishes top-level work from all areas of signal and image processing. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to signal and image processing area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Science Applications & Information Technolo...arpublication
The International Journal of Computer Science Applications & Information Technologies (IJCSAIT) is an international peer reviewed open access journal. It publishes top-level work from all areas of computer science and information technologies applications. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to computer science and information technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Wireless and Mobile Networking (IJWAMN)arpublication
The International Journal of Wireless and Mobile Networking (IJWAMN) is an open access peer-reviewed international research journal. It publishes top-level work from all areas of wireless and Mobile networking. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Networking and Communication (IJCNAC)arpublication
The International Journal of Computer Networking and Communication (IJCNAC) is an international peer reviewed open access journal. It publishes top-level work from all areas of networking and communication. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to networking area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Advanced Research in Electrical and Electronics Engi...arpublication
The International Journal of Advanced Research in Electrical and Electronics Engineering(IJAREEE) is an international peer reviewed open access journal. It publishes top-level work from all areas of electrical and electronics engineering. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to electrical and electronics engineering area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Advanced Mechanical Engineering & Applications (IJAMEA)arpublication
The International Journal of Advanced Mechanical Engineering & Applications (IJAMEA) is an international peer reviewed open access journal. It publishes top-level work from all areas of mechanical engineering. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to mechanical engineering area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Artificial Intelligence & Machine Learning (IJAIML)arpublication
The International Journal of Artificial Intelligence & Machine Learning (IJAIML) is an international peer reviewed open access journal. It publishes top-level work from all areas of artificial intelligence and machine learning. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to artificial intelligence and machine learning area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Digital Signal and Image Processing (IJDSIP)arpublication
The International Journal of Digital Signal and Image Processing (IJDSIP) is an international peer reviewed open access journal. It publishes top-level work from all areas of signal and image processing. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to signal and image processing area. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Science Applications & Information Technolo...arpublication
The International Journal of Computer Science Applications & Information Technologies (IJCSAIT) is an international peer reviewed open access journal. It publishes top-level work from all areas of computer science and information technologies applications. It aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to computer science and information technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review
1. International Journal of Computer Networking and Communication (IJCNAC)Vol. 2, No. 2(May 2014) 1
www.arpublication.org
Security Requirements, Counterattacks and
Projects in Healthcare Applications Using WSNs -
A Review
Nusrat Fatema1
, Remus Brad1
1
Department of Computer Science and Electrical Engineering, Faculty of Engineering, Lucian Blaga
University of Sibiu, Romania, B-dul Victoriei 10, 550024 Sibiu, Romania
knuz26@yahoo.com , remus.brad@ulbsibiu.ro
Abstract
Healthcare applications are well thought-out as interesting fields for WSN where patients
can be examine using wireless medical sensor networks. Inside the hospital or extensive
care surroundings there is a tempting need for steady monitoring of essential body
functions and support for patient mobility. Recent research cantered on patient reliable
communication, mobility, and energy-efficient routing. Yet deploying new expertise in
healthcare applications presents some understandable security concerns which are the
important concern in the inclusive deployment of wireless patient monitoring systems.
This manuscript presents a survey of the security features, its counter attacks in
healthcare applications including some proposed projects which have been done
recently.
Keywords: Wireless Body Sensor Networks, Wireless Body Area Network, Security
1. INTRODUCTION
Wireless Sensor Networks (WSNs) is the new class of infinitesimal influential computer
which have been ready due to possible advances in wireless communication field. This constructs
of networks which is distributed and self-organized to supervise a healthcare monitoring system
[1]. This paper has come up with a survey on the security issues along with different published
projects regarding the Wireless body sensor networks (WBSN).
WBSN also refers to wireless body area network (WBAN) is a wireless architecture consists
of a number of body sensor units (BSUs) jointly with a single body central unit (BCU). This
network consists of wearable computing devices which are under advancement. Yet these kinds
of researches do not handle the argument it face while checking human body sensors.
WBAN is an on-body implanted sensor having little power included in wireless devices to
facilitate secluded monitoring [2]. In real time, the situation of various patients is being monitored
constantly by this architecture. To monitor this physiological situation is one of the contemporary
needs to input WSN in medical system. However this kind of applications has faced different
challenges while designing. For instance communication between sensors needs to be reliable and
interference free and also should provide flexibility to the user. The growth in WBAN should
embody the advancement of diagnosis tools of the medical monitoring scheme.
2. 2
www.arpublication.org
WBAN when implemented in health centres has notable advantages over the traditional user-
data collection schemes. This scheme gives remedy and enhances the quality of life (Fig 1).
Fig. 1 Data flow in healthcare monitoring system
2. PROJECTS AND RELATED WORK
Lately researcher dedicated much time to the vicinity of wireless medical care systems.
Recent projects concentrates on wearable health devices. These projects are taken care of by
public and private organizations which swathe many areas in healthcare like glucose level
monitoring, stress monitoring, cancer detection, elderly people monitoring, ECG monitoring etc.
Some recent projects are presented below:
Satire project [3], [4] (software architecture for smart attire) is a non-obtrusive wearable
personal monitoring platform for data sensing, storage and upload allowing to maintain a record
of patient’s daily activities calculated by location and motion sensors. In [7], a patient wearing a
Satire jacket records his/her daily activities. When he/ she comes in contact with a vicinity of an
access mote, logged data is updated to a repository. These logged data can be used to find out the
location and activity of the patient who is wearing the Satire jacket. Here security for
physiological data can be a discussion for future study or work.
SMART [3] is deployed to scrutinize physiological signals of patients in the waiting areas of
emergency unit. A variety of cases have been seen in waiting room where patient’s health
deteriorates rapidly while waiting. To solve this, this is used to collect information and wirelessly
send it to a central station which accumulates and compute the data to issue an alert signal when
the health deteriorates. Thus before the condition get worsens patients receives treatment.
HealthGear [3] are sensors connected to a phone by Bluetooth. It is a wearable real-time
health monitoring system to analyse physiological signals.
MobiHealth/ Mobicare [3], [5], [6] is a wide area mobile healthcare scheme which allows
patients to be movable while going through incessant health monitoring with the help of GPRS
and UMTS cellular networks. It timely senses the patient’s body data and broadcast it to client.
The client aggregates the data and sends to the server for patient’s improved quality of life. It
make possible incessant and timely scrutinizing the physiological status of a patient. Here,
MobiCare client uses the HTTP POST protocol of the application layer to send data (BSN) to the
server.
CareNet [5] is deployed in an integrated wireless milieu which is used for unapproachable
health care systems and it has features like high reliability, security, integration and performance.
3. International Journal of Computer Networking and Communication (IJCNAC)Vol. 2, No. 2(May 2014) 3
www.arpublication.org
CodeBlue [5] is a self organized platform which is easy to connect due to its adhoc
architecture and it integrates different wireless devices sensor nodes into disaster response
surroundings. In paper [6], a lot of body sensors like pulse oximeter, ECG sensor are connected to
Zigbee-enabled transmitters individually, which corresponds with APs. Thus no intra BAN
communication takes place in CodeBlue. In this approach, multiple APs are closed to a wall.
Without any control from the central unit, its inter BAN communication shapes a mesh structure
where physicians subscribe by multicasting to the network and the sensor devices of patients
bring out all applicable information. By using these messages, physicians understands the
information they need to collect. This model is flexible and secure.
The Vital Jacket [5] is a kind of wearable garment that is able to incessantly monitor Heart
Rate and electrocardiogram (ECG) waves for different medical and fitness applications. Here at
the same time data can be hurled via Bluetooth to PDA (Personal Digital Assistant) and is stored
in a memory. Ubimon [5], [6], [7] (Ubiquitous monitoring environment for wearable and
implantable sensors) aims to tackle the issues allied with wearable distributed mobile monitoring
so that transient but life threatening abnormalities can be detected, captured and solved. It uses an
ad-hoc network to tackle various issues.
Alarm-Net [5] presents pervasive and adaptive healthcare for nonstop scrutinizing using
wireless sensors for smart healthcare by creating a history log, while preserving the patient’s
privacy. These sensor devices can intellect diminutive changes in decisive signals that humans
might fail to notice, like heart rate, blood oxygen levels, boosting accuracy, circadian rhythm
changes which may indicate changes in healthcare requirements.
AID-N [5] deals with mass casualty targeted incidents. Instead of deploying APs (Access
policy) on wall, wireless repeaters are positioned to a defined emergency course. When APs flash
green lights, medical staff can be aware of the accurate emergency course.
Bike Net project [8] deployed for sensing the environment and mobile bicycle activities
assigned to bike area networks, while SNAP [8] architecture focuses on security. Here wireless
sensors are attached to the patient. The broadcast are forwarded by a number of wireless relay
nodes all over the hospital area.
eWatch [8] fits into a wrist watch provides palpable audio and visual warning while sensing
and it records temperature and motion. The Tmote Sky [8] is an interesting ongoing project in the
biomedical WSN. This hardware platform with integrated sensors such as persistent arterial blood
pressure, ECG, epicardial accelerometer etc. As the project spotted on wireless communication
and information throughput optimization, it does not tackle security issues.
3. SECURITY REQUIREMENTS
For suitable security mechanisms we need to comprehend the nature of applications, security
requirements and its techniques properly. Then we can actually come up with an inclusive
technique which can protect the system from possible safety intimidation [8]. Frequency band
selection, channel modeling, antenna design and protocol design, energy-efficient hardware, QoS
and reliability, real time connectivity over mixed networks, regulatory compliance, security and
privacy are different kinds of issues related to WBSN. These security requirements are discussed
as follows [7].
4. 4
www.arpublication.org
Fig.2 Healthcare information technology, threats, attacks and security concerns
a) Data Confidentiality
It is crucial to guarantee the secrecy of messages to protect data and communication
exchanges [8]. It is obligatory to guard data from disclosure. In medical applications sensitive
data is send throughout the network. A foe can overhear the critical information with no trouble
[10]. This over hearing can cause inexorable damage to the patient since the foe can use the
obtained data for much illegal intention. As public-key cryptography encryption method is an
expensive encryption method as a result the symmetric key encryption’s utilization is mostly used
in energy-constraint WBANs [9].
b) Data Authentication
It is compulsory for the sensor nodes to perceive new or replayed packets [8]. In a WBSN, it
can be attained by means of symmetric techniques [10]. It substantiates the eccentricity of the
original source node. A foe can change a packet stream or can modify it by amalgamating
fabricated packets. The node must be an expert one to verify the details of the original source [9].
c) Data Integrity
When data is transmitted over an insecure WBSN the important data can be altered or
moderated by a foe and this happens due to lack of integrity. This can be too dangerous in case of
life-critical events. But through data authentication protocols proper integrity can be obtained
further.
d) Data Freshness
It implies that the data is new and the frames of data are sorted and not reused. Sometimes a
foe may capture data while convey and can later replay them by means of the old key to the
sensor nodes. Two types of data freshness are available and they are:
• Weak freshness: assures fractional data frames ordering but does not assure delay.
5. International Journal of Computer Networking and Communication (IJCNAC)Vol. 2, No. 2(May 2014) 5
www.arpublication.org
• Strong freshness: guarantees both delay and data frames ordering.
e) Availability
It ensures patient’s information to be obtainable to the physician for all time. A foe may
target the availability of a WBSN by capturing or turning off an ECG node, which may cause
death to a patient [10]. Whereas designing security mechanisms that address the above
requirements we need to know the following factors which differentiate WBSN from other types
of sensor networks [8]:
• It is necessary to support multiple users in different roles having various privacy
interests and decision making power.
• It is necessary for the security protocol to add a small communication overhead
because throughput is decisive for those networks.
• Mobility of the patient must be maintained so that security mechanisms can be
adapted to dynamic topologies.
f) Secure Management
It is required because it gives key distribution to the nodes to allow both encryption and
decryption operation.
g) Secure Localization
Precise estimation of the patient’s location is needed in most WBSN applications. Due to lack
of smart tracking mechanisms permits a foe to send erroneous reports concerning the patient’s
location either by reporting fake signal strengths or by using rerun the signals [9].
h) Dependability
In most medical cases, unable to retrieve precise data is a life-threatening issue. To tackle
threats caused by the network dynamics, fault tolerance is requisite that is having patient’s data
willingly retrievable even under failure of nodes or malicious modifications [11].
i) Scalability
Distributed access control method must be scalable with the increase number of users in
following ways:
• To have low management overhead of the APs, which shall be set up and modified
• To have low computation and storage space overhead [11].
j) Flexibility
A basic obligation is that patient should have the flexibility to designate APs to control the
medical data within WBAN. For example, on-demand authorization to interpret patient’s data can
be given for the time being to an available physician who is not on the permissible list when an
emergency occurs. Inability or irresponsiveness in becoming accustomed the access rules may
threaten a patient’s life [11].
6. 6
www.arpublication.org
4. THREATS AND ATTACKS
Security breach occurs mostly in sensor networks of healthcare applications. These specific
breaches that a biomedical WBSN has to face can be labeled as outsider and insider attacks [8].
4.1 Insider/ Internal attack
From a security point, it is more unsafe where foes captures a node and reads its reminiscence
and get hold of its key material and falsify node messages. A foe can commence several kinds of
attacks by knowing the legal keys:
• Illegal access to health data: If without valid authentication any important patient’s
data is accessed then it might cause problems such as damaging significant data
• Fake data injection: where the intruder insert fake results which are very much
different from the realistic health data persistent by the sensors.
• Careful reporting: where an enemy freezes the report of actions by throwing
authenticate packets which pass through the node.
• Data alteration: where the foe alter data of a patient which leads to erroneous
diagnosis and treatment.
4.2 External attack (intruder node attack)
The principle purpose of attacks is to filch valuable personal data. Once the foe is aware of
the personal health data they try to steal it. Authentication and encryption practices can prevent
such an invader to gain any access to WBSN. The attacks are as follows:
• Passive eavesdropping: While routing the data packets it can take place. The foe may
alter the destination of packets or can make routing conflicting [3]. Here, the foe can
also steal health data by snooping to the wireless media.
• Denial of service attacks: where a foe attempts to upset the operation of the network
by broadcasting lofty energy signals or by jamming the communication media
between nodes.
• Replay attacks: where the foe captures messages switch over between legitimate
nodes and replays them to modify the aggregation results.
The authors in [3] have mentioned in details few types of attacks in health monitoring that is
modification, forging of alarms on medical data, overhearing, denial of service, location tracking
and activity tracking of users, physical tampering with devices and jamming attacks.
5. COUNTER ATTACKS AND DETECTION SYSTEMS
As mentioned in the research paper [3, 8], by ensuring only genuine devices can generate and
insert data to the scheme and by averting illegal modifications of data can evade many of the
previously argued attacks. To counter these threats the following security measures can be
applied.
7. International Journal of Computer Networking and Communication (IJCNAC)Vol. 2, No. 2(May 2014) 7
www.arpublication.org
5.1 Encryption & Authentication
Due to the perceptive nature of medical application we should be careful with encryption
mechanism and constant monitoring of the network. Both offer guards for mote-class outsider
threats. Spoofing attacks can be barred by using superior encryption techniques and suitable
authentication for communication Cryptography is not sufficient for preventing the insider
attacks. It is an open quandary for further research. The security safeguard measures are practical
in three stages – administrative, physical and technical.
• Administrative level security: A well defined hierarchy having tough authentication
measures may avert security breaches. Hence these security measures must comprise
of various types of access means so that only certified users have the permission to
access in the information.
• Physical level security: Devices at this level may be susceptible to stealing and
tampering hence vigilant designing is compulsory to formulate them tamper proof.
Only authorized public should be permitted to physically handle the devices while in
operation can be another preventive measure.
• Technical level security: Here at this level security checks are needed for wireless
means and also for proliferation of data. More influential and dominant motes should
be designed to support the escalating requirements for computation and
communication [7].
5.2 Securing routing data
Secure routing is needed as a security measure when the data is forwarded to some remote
host (physician or some hospital computers). Foes can cause routing discrepancy resulting in
wrong destinations and getting of incorrect data. Therefore correct routing protocol and
management is indispensable to stay away from such attacks. Watchdog helps to supervise the
route properly and provides secure network. Validation technique is used to prevent this routing
attack.
5.3 Intrusion Detection
As wireless networks are susceptible to intrusion, detection and prevention techniques are
hence a must. An automated method is established that identifies the source of an attack and
engenders an alarm to warn administrator so that suitable defensive actions can take place. But
intrusion detection for sensor networks requires considering constraints forced by the limited
resources of nodes. Still it is a major solution for biomedical sensor networks [8].
6. REQUIREMENTS FOR WIRELESS MEDICAL SENSORS
The main requirements for wireless medical sensor networks are:
a) Reliability and Robustness
For medical diagnosis and treatment sensors must function with sufficient reliability and must
be vigorous to yield high-confidence data [12].
b) Wearability
8. 8
www.arpublication.org
To attain non-invasive health monitoring, WBSN should be lightweight and small. The
weight and size of sensors is determined by the mass and size of batteries. But again at the
capacity of a battery is interrelated to its dimension. We can anticipate that further technology
advances in miniaturization of integrated circuits will assist designers to expand wearable
sensors.
c) Interoperability
The wireless medical system must give middleware interoperability among devices to carry
out unique relations among devices, and to collect robust WBSN depending on the user’s state of
health [3]. Due to the heterogeneity of the system, the communication between devices may use
numerous bands and utilize different protocols. For instance, motes may use ISM or unlicensed
bands for general telemetry. Implanted medical sensors are using allocated licensed band in order
to avoid interference [12].
d) Real-time data acquisition and analysis
Efficient communication, data acquisition and examination are essential. Event ordering,
time-stamping, synchronization, and rapid response in emergency circumstances will all be
requisite.
e) Reliable communication
The communication necessities of diverse healthcare sensors vary with requisite sampling
rates. An approach is to advance reliability is to go further than telemetry by performing on-
sensor signal processing. For instance without transferring raw data from an ECG sensor, we can
perform feature extraction on sensor and move information about an event. So a vigilant trade-off
between computation and communication is essential for finest system design.
f) New node architectures
The amalgamation of diverse sensors, RFID tags and back channel extended haul networks
require new and modular node architectures.
7. CONCLUSION AND FUTURE WORK
WBSN is one of the significant elements of the health care system and a promising technology.
After analyzing the whole manuscript we have come to a verdict that the counter attack which has
been researched till now is not enough and it is an unbolt challenge still needed further analysis.
Existing medical applications based on WSNs are the research scheme with first-rate potential for
utilization that is the future of WSNs and their medical appliances looks exceedingly promising.
Security issues are a significant area, and there still remain a number of extensive challenges to
overcome. This appraisal paper will motivate other researcher to defeat those challenges with
improving the quality of service (QoS), security, privacy, reliability, fault tolerance and
interoperability.
REFERENCES
[1] Paul Honeine, Farah Mourad, Maya Kallas, Hichem Snoussi, Hassan Amoud, Clovis Francis,
Wireless sensor networks in biomedical: body area networks, Systems, Signal Processing and
their Applications (WOSSPA), 7th International Workshop on. IEEE, (2011).
9. International Journal of Computer Networking and Communication (IJCNAC)Vol. 2, No. 2(May 2014) 9
www.arpublication.org
[2] Mehmet R. Yuce, Implementation of wireless body area networks for healthcare systems, Sensors
and Actuators, A 162, 116–129 (2010).
[3] Moshaddique Al Ameen and Kyug-sup Kwak , Social Issues in Wireless Sensor Networks with
Healthcare Perspective, The International Arab Journal of Information Technology, Vol. 8, No. 1,
(2011).
[4] Aleksandar Milenkovic, Chris Otto, Emil Jovanov, Wireless sensor networks for personal health
monitoring: Issues and an implementation, Elsevier, Computer Communications, (2006).
[5] Min Chen, Sergio Gonzalez, Athanasios Vasilakos, Huasong Cao, Victor C. M. Leung, Body Area
Networks: A Survey, Springer Science & Business Media, (2010).
[6] Min Chen, Jiafu Wan, Sergio Gonzalez, Xiaofei Liao, Victor C. M. Leung, A Survey of Recent
Developments in Home M2M Networks, IEEE, (2013).
[7] Pardeep Kumar and Hoon-Jae Lee, Security Issues in Healthcare Applications Using Wireless
Medical Sensor Networks: A Survey, Sensors, (2012).
[8] Stanković, Stanislava, Medical Applications Based on Wireless Sensor Networks, Retrived from:
http://internetjournals.net/journals/tir/2009/July/Full%20Journal.pdf#page=20.
[9] Tassos Dimitriou, Krontiris Ioannis, Security Issues in Biomedical Wireless Sensor Networks,
Applied Sciences on Biomedical and Communication Technologies, ISABEL'08. First
International Symposium on, (2008).
[10] Shahnaz Saleem, Sana Ullah, Hyeong Seon Yoo, On the Security Issues in Wireless Body Area
Networks, International Journal of Digital Content Technology and its Applications, Volume 3,
Number 3, (2009).
[11] M. Somasundaram and R. Sivakumar, Security in Wireless Body Area Networks: A survey,
International Conference on Advancements in Information Technology With workshop of ICBMG,
(2011).
[12] Ming Li and Wenjing Lou, Data Security and Privacy in Wireless Body Area Networks, IEEE
Wireless Communications, (2010).
[13] A. Stankovic, Q. Cao, T. Doan, L. Fang, Z. He, R. Kiran, S. Lin, S. Son, R. Stoleru, A. Wood,
Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges, High confidence
medical device software and systems (HCMDSS) workshop, (2005).
Authors
Nusrat Fatema is the student of Lucian Blaga University of Sibiu, Romania,
studying MSc in Embedded Systems.
Remus Brad received an Engineer Diploma degree in Automation and Computer
Science from the Lucian Blaga University of Sibiu, Romania, a M.S. degree from
Université Pierre et Marie Curie, Paris France in Artificial Intelligence and a PhD.
from Technical University of Cluj-Napoca Romania. Since 1994 he has joined the
Department of Computer Science at the Lucian Blaga University of Sibiu, Romania.
His current research interests include image processing, motion estimation and
biomedical imaging. Dr. Remus Brad is a member of the IEEE Signal Processing
Society.