Results 1 - 10
of
109
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
"... Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs ’ transmitted data or to send unauthorized commands to IMDs—even commands tha ..."
Abstract
-
Cited by 43 (4 self)
- Add to MetaCart
(Show Context)
Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs ’ transmitted data or to send unauthorized commands to IMDs—even commands that cause the device todeliver anelectricshocktothe patient.Thekeychallenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself.We present a physicallayer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it tojam the IMD’s messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands—even those that try to alter the shield’s own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentialityfor private data andprotects the IMD from unauthorized commands.
An ultrawearable, wireless, low power ECG monitoring system
- Proc. IEEE International Conference on Complex Medical Engineering
, 2006
"... Abstract — Wearable electrocardiograph (ECG) monitoring systems today use electrodes that require skin preparation in advance, and require pastes or gels to make electrical contact to the skin. Moreover, they are not suitable for subjects at high levels of activity due to high noise spikes that can ..."
Abstract
-
Cited by 31 (0 self)
- Add to MetaCart
(Show Context)
Abstract — Wearable electrocardiograph (ECG) monitoring systems today use electrodes that require skin preparation in advance, and require pastes or gels to make electrical contact to the skin. Moreover, they are not suitable for subjects at high levels of activity due to high noise spikes that can appear in the data. To address these problems, a new class of miniature, ultra low noise, capacitive sensor that does not require direct contact to the skin, and has comparable performance to gold standard ECG electrodes, has been developed. This paper presents a description and evaluation of a wireless version of a system based on these innovative ECG sensors. We use a wearable and ultra low power wireless sensor node called Eco. Experimental results show that the wireless interface will add minimal size and weight to the system while providing reliable, untethered operation. (a) Top View (b) Side View
Medium access control issues in sensor networks
- SIGCOMM Comput. Commun. Rev
, 2006
"... Medium access control for wireless sensor networks has been a very active research area for the past couple of years. The sensor networks literature presents an alphabet soup of medium access control protocols with almost all of the works focusing only on energy efficiency. There is much more innova ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
(Show Context)
Medium access control for wireless sensor networks has been a very active research area for the past couple of years. The sensor networks literature presents an alphabet soup of medium access control protocols with almost all of the works focusing only on energy efficiency. There is much more innovative work to be done at the MAC layer, but current efforts are not addressing the hard unsolved problems. Majority of the works appearing in the literature are “least publishable incremental improvements ” over the popular S-MAC [1] protocol. In this paper we present research directions for future medium access research. We identify some open issues and discuss possible solutions.
Wireless sensor network for wearable physiological monitoring
- Wireless Sensor Network Protocols. In: Boukerche, A., (Ed.), Algorithms and Protocols for Wireless and Mobile Networks
, 2008
"... Abstract — Wearable physiological monitoring system consists of an array of sensors embedded into the fabric of the wearer to continuously monitor the physiological parameters and transmit wireless to a remote monitoring station. At the remote monitoring station the data is correlated to study the o ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
(Show Context)
Abstract — Wearable physiological monitoring system consists of an array of sensors embedded into the fabric of the wearer to continuously monitor the physiological parameters and transmit wireless to a remote monitoring station. At the remote monitoring station the data is correlated to study the overall health status of the wearer. In the conventional wearable physiological monitoring system, the sensors are integrated at specific locations on the vest and are interconnected to the wearable data acquisition hardware by wires woven into the fabric. The drawbacks associated with these systems are the cables woven in the fabric pickup noise such as power line interference and signals from nearby radiating sources and thereby corrupting the physiological signals. Also repositioning the sensors in the fabric is difficult once integrated. The problems can be overcome by the use of physiological sensors with miniaturized electronics to condition, process, digitize and wireless transmission integrated into the single module. These sensors are strategically placed at various locations on the vest. Number of sensors integrated into the fabric form a network (Personal Area Network) and interacts with the human system to acquire and transmit the physiological data to a wearable data acquisition system. The wearable data acquisition hardware collects the data from various sensors and transmits the processed data to the remote monitoring station. The paper discusses wireless sensor network and its application to wearable physiological monitoring and its applications. Also the problems associated with conventional wearable physiological monitoring are discussed. Index Terms — Wearable monitor, physiological parameters, data acquisition hardware, remote monitoring station, wireless sensor network I.
Archetype-based design: sensor network programming for application experts, not just programming experts
- In Proc. Int. Conf. Information Processing in Sensor Networks
, 2009
"... ABSTRACT Sensor network application experts such as biologists, geologists, and environmental engineers generally have little experience with, and little patience for, general-purpose and often low-level sensor network programming languages. We believe sensor network languages should be designed fo ..."
Abstract
-
Cited by 13 (4 self)
- Add to MetaCart
ABSTRACT Sensor network application experts such as biologists, geologists, and environmental engineers generally have little experience with, and little patience for, general-purpose and often low-level sensor network programming languages. We believe sensor network languages should be designed for application experts, who may not be expert programmers. To further that goal, we propose the concepts of sensor network application archetypes, archetype-specific languages, and archetype templates. Our work makes the following contributions.
Component-based hardware/software co-verification
- In MEMOCODE
, 2007
"... In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge in component-based co-verification is the property formulation problem: (1) what are the system properties to verify, (2) ..."
Abstract
-
Cited by 11 (7 self)
- Add to MetaCart
(Show Context)
In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge in component-based co-verification is the property formulation problem: (1) what are the system properties to verify, (2) what are the component properties needed for verifying the system properties, and (3) what are the environment assumptions for establishing these properties. We present a pattern-guided approach to the property formulation problem. We develop an embedded architecture description language (EADL). A key feature of EADL is its support to specification of architectural patterns for embedded systems. Such patterns capture recurring system structures and, furthermore, templates for properties to verify on systems following these patterns and strategies for decomposing system properties into component properties. We have applies EADL in co-verification of medical sensor systems, which shows that architectural patterns have major potential in facilitating component-based co-verification. 1
People-Centric Mobile Sensing Networks
, 2008
"... This thesis contributes a new system in support of large scale people-centric sensing applications. Over the last decade, wireless sensor networking has developed into ar-guably the most active area in networking research. The state of the art largely follows an application-specific philosophy, wher ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
This thesis contributes a new system in support of large scale people-centric sensing applications. Over the last decade, wireless sensor networking has developed into ar-guably the most active area in networking research. The state of the art largely follows an application-specific philosophy, where modest numbers of static wirelessly-connected sensor nodes are placed in the target environment in support of a single application. In a properly engineered network, sensor nodes are well-equipped and well-positioned to best provide the connectivity and sensing required by the application. Such networks are ill-suited, however, to the demands of a new class of applications focused on providing sensor information about people, their daily lives, and their environments. These people-centric applications require the ability to both sample very detailed information on the individual scale, and to provide a view of the urban landscape- a very large scale challenge. A new approach is required. Therefore, we propose the novel MetroSense architecture in support of people-centric sensing. While incorporating static infrastructure elements, to get large scale sensing cover-age the architecture primarily makes use of devices with embedded sensors, such as mobile
Exploiting half-wits: Smarter storage for low-power devices
- In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST ’11
, 2011
"... This work analyzes the stochastic behavior of writing to embedded flash memory at voltages lower than recommended by a microcontroller’s specifications to reduce energy consumption. Flash memory integrated within a microcontroller typically requires the entire chip to operate on common supply voltag ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
(Show Context)
This work analyzes the stochastic behavior of writing to embedded flash memory at voltages lower than recommended by a microcontroller’s specifications to reduce energy consumption. Flash memory integrated within a microcontroller typically requires the entire chip to operate on common supply voltage almost double what the CPU portion requires. Our approach tolerates a lower supply voltage so that the CPU may operate in a more energy efficient manner. Energy efficient coding algorithms then cope with flash memory that behaves unpredictably. Our software-only coding algorithms (in-place writes, multiple-place writes, RS-Berger codes) enable reliable storage at low voltages on unmodified hardware by exploiting the electrically cumulative nature of half-written data in write-once bits. For a sensor monitoring application using the MSP430, coding with in-place writes reduces the overall energy consumption by 34%. In-place writes are competitive when the time spent on computation is at least four times greater than the time spent on writes to flash memory. Our evaluation shows that tightly maintaining the digital abstraction for storage in embedded flash memory comes at a significant cost to energy consumption with minimal gain in reliability. 1
Review A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks
, 2011
"... sensors ..."
(Show Context)
SEKEBAN (Secure and Efficient Key Exchange for wireless Body
- Area Network)”, International Journal of Advanced Science and Technology
, 2009
"... Recent technological advances in sensors, low-power microelectronics and miniaturization, and wireless networking enabled the design and proliferation of wireless sensor networks capable of autonomously monitoring and controlling environments. One of the most promising applications of sensor network ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Recent technological advances in sensors, low-power microelectronics and miniaturization, and wireless networking enabled the design and proliferation of wireless sensor networks capable of autonomously monitoring and controlling environments. One of the most promising applications of sensor networks is for human health monitoring. A number of tiny wireless sensors, strategically placed on the human body, create a wireless body area network (WBAN) that can monitor various vital signs, providing real-time feedback to the user and medical personnel. The wireless body area networks promise to revolutionize health monitoring. Since the sensors collect personal medical data, security and privacy are important components in this kind of networks (WBAN). It is a challenge to implement traditional security infrastructures in these types of lightweight networks, since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in WBANs has emerged to be biometrics. In this paper, we present an approach which exploits physiological signals (electrocardiogram (ECG)) to address security issues in WBAN: a Secure and Efficient Key Exchange for wireless Body Area Network (SEKEBAN). SEKEBAN manages the generation and distribution of symmetric cryptographic keys to constituent sensors in a WBAN and protect the privacy.