41 research outputs found
Internet of Things for Mental Health: Open Issues in Data Acquisition, Self-Organization, Service Level Agreement, and Identity Management
The increase of mental illness cases around the world can be described as an urgent
and serious global health threat. Around 500 million people suffer from mental disorders, among
which depression, schizophrenia, and dementia are the most prevalent. Revolutionary technological
paradigms such as the Internet of Things (IoT) provide us with new capabilities to detect, assess,
and care for patients early. This paper comprehensively survey works done at the intersection
between IoT and mental health disorders. We evaluate multiple computational platforms, methods
and devices, as well as study results and potential open issues for the effective use of IoT systems
in mental health. We particularly elaborate on relevant open challenges in the use of existing IoT
solutions for mental health care, which can be relevant given the potential impairments in some
mental health patients such as data acquisition issues, lack of self-organization of devices and service
level agreement, and security, privacy and consent issues, among others. We aim at opening the
conversation for future research in this rather emerging area by outlining possible new paths based
on the results and conclusions of this work.Consejo Nacional de Ciencia y Tecnologia (CONACyT)Sonora Institute of Technology (ITSON) via the PROFAPI program
PROFAPI_2020_0055Spanish Ministry of Science, Innovation and Universities (MICINN) project "Advanced Computing Architectures and Machine Learning-Based Solutions for Complex Problems in Bioinformatics, Biotechnology and Biomedicine"
RTI2018-101674-B-I0
Routing Protocols for Underwater Acoustic Sensor Networks: A Survey from an Application Perspective
Underwater acoustic communications are different from terrestrial radio communications; acoustic channel is asymmetric and has large and variable endâtoâend propagation delays, distanceâdependent limited bandwidth, high bit error rates, and multiâpath fading. Besides, nodesâ mobility and limited battery power also cause problems for networking protocol design. Among them, routing in underwater acoustic networks is a challenging task, and many protocols have been proposed. In this chapter, we first classify the routing protocols according to application scenarios, which are classified according to the number of sinks that an underwater acoustic sensor network (UASN) may use, namely singleâsink, multiâsink, and noâsink. We review some typical routing strategies proposed for these application scenarios, such as crossâlayer and reinforcement learning as well as opportunistic routing. Finally, some remaining key issues are highlighted
Target localization in wireless sensor networks for industrial control with selected sensors
This paper presents a novel energy-based target localization method in wireless sensor networks with selected sensors. In this method, sensors use Turbo Product Code (TPC) to transmit decisions to the fusion center. TPC can reduce bit error probability if communication channel errors exist. Moreover, in this method, thresholds for the energy-based target localization are designed using a heuristic method. This design method to find thresholds is suitable for uniformly distributed sensors and normally distributed targets. Furthermore, to save sensor energy, a sensor selection method is also presented. Simulation results showed that if sensors used TPC instead of Hamming code to transmit decisions to the fusion center, localization performance could be improved. Furthermore, the sensor selection method used can substantially reduce energy consumption for our target localization method. At the same time, this target localization method with selected sensors also provides satisfactory localization performance
Porous Territories: the Internet beyond Borderless versus Balkanized
If the internet was once viewed as a borderless realm, critics now warn it is in danger of being âbalkanizedâ, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as âtheirâ internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the internet an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultaneously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by âextra- territorialâ activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized
A Hybrid Approach to Protect Palmprint Templates
Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
Autonomous âThingsâ is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenbergâs uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.</p