74 research outputs found

    A survey on wireless body area networks for eHealthcare systems in residential environments

    Get PDF
    The progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to the base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments

    A patient agent controlled customized blockchain based framework for internet of things

    Get PDF
    Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.Doctor of Philosoph

    Augmented reality device for first response scenarios

    Get PDF
    A prototype of a wearable computer system is proposed and implemented using commercial off-shelf components. The system is designed to allow the user to access location-specific information about an environment, and to provide capability for user tracking. Areas of applicability include primarily first response scenarios, with possible applications in maintenance or construction of buildings and other structures. Necessary preparation of the target environment prior to system\u27s deployment is limited to noninvasive labeling using optical fiducial markers. The system relies on computational vision methods for registration of labels and user position. With the system the user has access to on-demand information relevant to a particular real-world location. Team collaboration is assisted by user tracking and real-time visualizations of team member positions within the environment. The user interface and display methods are inspired by Augmented Reality1 (AR) techniques, incorporating a video-see-through Head Mounted Display (HMD) and fingerbending sensor glove.*. 1Augmented reality (AR) is a field of computer research which deals with the combination of real world and computer generated data. At present, most AR research is concerned with the use of live video imagery which is digitally processed and augmented by the addition of computer generated graphics. Advanced research includes the use of motion tracking data, fiducial marker recognition using machine vision, and the construction of controlled environments containing any number of sensors and actuators. (Source: Wikipedia) *This dissertation is a compound document (contains both a paper copy and a CD as part of the dissertation). The CD requires the following system requirements: Adobe Acrobat; Microsoft Office; Windows MediaPlayer or RealPlayer

    Security and Privacy in Mobile Computing: Challenges and Solutions

    Get PDF
    abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Robust, Energy-Efficient, and Scalable Indoor Localization with Ultra-Wideband Technology

    Get PDF
    Ultra-wideband (UWB) technology has been rediscovered in recent years for its potential to provide centimeter-level accuracy in GNSS-denied environments. The large-scale adoption of UWB chipsets in smartphones brings demanding needs on the energy-efficiency, robustness, scalability, and crossdevice compatibility of UWB localization systems. This thesis investigates, characterizes, and proposes several solutions for these pressing concerns. First, we investigate the impact of different UWB device architectures on the energy efficiency, accuracy, and cross-platform compatibility of UWB localization systems. The thesis provides the first comprehensive comparison between the two types of physical interfaces (PHYs) defined in the IEEE 802.15.4 standard: with low and high pulse repetition frequency (LRP and HRP, respectively). In the comparison, we focus not only on the ranging/localization accuracy but also on the energy efficiency of the PHYs. We found that the LRP PHY consumes between 6.4–100 times less energy than the HRP PHY in the evaluated devices. On the other hand, distance measurements acquired with the HRP devices had 1.23–2 times lower standard deviation than those acquired with the LRP devices. Therefore, the HRP PHY might be more suitable for applications with high-accuracy constraints than the LRP PHY. The impact of different UWB PHYs also extends to the application layer. We found that ranging or localization error-mitigation techniques are frequently trained and tested on only one device and would likely not generalize to different platforms. To this end, we identified four challenges in developing platform-independent error-mitigation techniques in UWB localization, which can guide future research in this direction. Besides the cross-platform compatibility, localization error-mitigation techniques raise another concern: most of them rely on extensive data sets for training and testing. Such data sets are difficult and expensive to collect and often representative only of the precise environment they were collected in. We propose a method to detect and mitigate non-line-of-sight (NLOS) measurements that does not require any manually-collected data sets. Instead, the proposed method automatically labels incoming distance measurements based on their distance residuals during the localization process. The proposed detection and mitigation method reduces, on average, the mean and standard deviation of localization errors by 2.2 and 5.8 times, respectively. UWB and Bluetooth Low Energy (BLE) are frequently integrated in localization solutions since they can provide complementary functionalities: BLE is more energy-efficient than UWB but it can provide location estimates with only meter-level accuracy. On the other hand, UWB can localize targets with centimeter-level accuracy albeit with higher energy consumption than BLE. In this thesis, we provide a comprehensive study of the sources of instabilities in received signal strength (RSS) measurements acquired with BLE devices. The study can be used as a starting point for future research into BLE-based ranging techniques, as well as a benchmark for hybrid UWB–BLE localization systems. Finally, we propose a flexible scheduling scheme for time-difference of arrival (TDOA) localization with UWB devices. Unlike in previous approaches, the reference anchor and the order of the responding anchors changes every time slot. The flexible anchor allocation makes the system more robust to NLOS propagation than traditional approaches. In the proposed setup, the user device is a passive listener which localizes itself using messages received from the anchors. Therefore, the system can scale with an unlimited number of devices and can preserve the location privacy of the user. The proposed method is implemented on custom hardware using a commercial UWB chipset. We evaluated the proposed method against the standard TDOA algorithm and range-based localization. In line of sight (LOS), the proposed TDOA method has a localization accuracy similar to the standard TDOA algorithm, down to a 95% localization error of 15.9 cm. In NLOS, the proposed TDOA method outperforms the classic TDOA method in all scenarios, with a reduction of up to 16.4 cm in the localization error.Cotutelle -yhteisväitöskirj

    Data Processing and Fusion For Multi-Source Wireless Systems

    Get PDF
    The constant evolution of the telecommunication technologies is one fundamental aspect that characterizes the modern era. In the context of healthcare and security, different scenarios are characterized by the presence of multiple sources of information that can support a large number of innovative services. For example, in emergency scenarios, reliable transmission of heterogeneous information (health conditions, ambient and diagnostic videos) can be a valid support for managing the first-aid operations. The presence of multiple sources of information requires a careful communication management, especially in case of limited transmission resource availability. The objective of my Ph.D. activity is to develop new optimization techniques for multimedia communications, considering emergency scenarios characterized by wireless connectivity. Different criteria are defined in order to prioritize the available heterogeneous information before transmission. The proposed solutions are based on the modern concept of content/context awareness: the transmission parameters are optimized taking into account the informative content of the data and the general context in which the information sources are located. To this purpose, novel cross-layer adaptation strategies are proposed for multiple SVC videos delivered over wireless channel. The objective is to optimize the resource allocation dynamically adjusting the overall transmitted throughput to meet the actual available bandwidth. After introducing a realistic camera network, some numerical results obtained with the proposed techniques are showed. In addition, through numerical simulations the benefits are showed, in terms of QoE, introduced by the proposed adaptive aggregation and transmission strategies applied in the context of emergency scenarios. The proposed solution is fully integrated in European research activities, including the FP7 ICT project CONCERTO. To implement, validate and demonstrate the functionalities of the proposed solutions, extensive transmission simulation campaigns are performed. Hence, the presented solutions are integrated on a common system simulator which is been developed within the CONCERTO project

    Intelligent Sensing and Learning for Advanced MIMO Communication Systems

    Get PDF

    Sensores passivos alimentados por transmissão de energia sem fios para aplicações de Internet das coisas

    Get PDF
    Nowadays, the Wireless Sensor Networks (WSNs) depend on the battery duration of the sensors and there is a renewed interest in creating a passive sensor network scheme in the area of Internet of Things (IoT) and space oriented WSN systems. The challenges for the future of radio communications have a twofold evolution, one being the low power consumption and, another, the adaptability and intelligent use of the available resources. Specially designed radios should be used to reduce power consumption, and adapt to the environment in a smart and e cient way. This thesis will focus on the development of passive sensors based on low power communication (backscatter) with Wireless Power Transfer (WPT) capabilities used in IoT applications. In that sense, several high order modulations for the communication will be explored and proposed in order to increase the data rate. Moreover, the sensors need to be small and cost e ective in order to be embedded in other technologies or devices. Consequently, the RF front-end of the sensors will be designed and implemented in Monolithic Microwave Integrated Circuit (MMIC).Atualmente, as redes de sensores sem fios dependem da duração da bateria e,deste modo, existe um interesse renovado em criar um esquema de rede de sensores passivos na área de internet das coisas e sistemas de redes de sensores sem fios relacionados com o espaço. Os desafios do futuro das comunicações de rádio têm uma dupla evolução, sendo um o baixo consumo de energia e, outro, a adaptação e o uso inteligente dos recursos disponíveis. Rádios diferentes dos convencionais devem ser usados para reduzir o consumo de energia e devem adaptar-se ao ambiente de forma inteligente e eficiente, de modo a que este use a menor quantidade de energia possível para estabelecer a comunicação. Esta tese incide sobre o desenvolvimento de sensores passivos baseados em comunicação de baixo consumo energético (backscatter) com recurso a transmissão de energia sem fios de modo a que possam ser usados em diferentes aplicações inseridas na internet das coisas. Nesse sentido, várias modulações de alta ordem para a comunicação backscatter serão exploradas e propostas com o objectivo de aumentar a taxa de transmissão de dados. Além disso, os sensores precisam de ser reduzidos em tamanho e económicos de modo a serem incorporados em outras tecnologias ou dispositivos. Consequentemente, o front-end de rádio frequência dos sensores será projetado e implementado em circuito integrado de microondas monolítico.Programa Doutoral em Engenharia Eletrotécnic

    Políticas de Copyright de Publicações Científicas em Repositórios Institucionais: O Caso do INESC TEC

    Get PDF
    A progressiva transformação das práticas científicas, impulsionada pelo desenvolvimento das novas Tecnologias de Informação e Comunicação (TIC), têm possibilitado aumentar o acesso à informação, caminhando gradualmente para uma abertura do ciclo de pesquisa. Isto permitirá resolver a longo prazo uma adversidade que se tem colocado aos investigadores, que passa pela existência de barreiras que limitam as condições de acesso, sejam estas geográficas ou financeiras. Apesar da produção científica ser dominada, maioritariamente, por grandes editoras comerciais, estando sujeita às regras por estas impostas, o Movimento do Acesso Aberto cuja primeira declaração pública, a Declaração de Budapeste (BOAI), é de 2002, vem propor alterações significativas que beneficiam os autores e os leitores. Este Movimento vem a ganhar importância em Portugal desde 2003, com a constituição do primeiro repositório institucional a nível nacional. Os repositórios institucionais surgiram como uma ferramenta de divulgação da produção científica de uma instituição, com o intuito de permitir abrir aos resultados da investigação, quer antes da publicação e do próprio processo de arbitragem (preprint), quer depois (postprint), e, consequentemente, aumentar a visibilidade do trabalho desenvolvido por um investigador e a respetiva instituição. O estudo apresentado, que passou por uma análise das políticas de copyright das publicações científicas mais relevantes do INESC TEC, permitiu não só perceber que as editoras adotam cada vez mais políticas que possibilitam o auto-arquivo das publicações em repositórios institucionais, como também que existe todo um trabalho de sensibilização a percorrer, não só para os investigadores, como para a instituição e toda a sociedade. A produção de um conjunto de recomendações, que passam pela implementação de uma política institucional que incentive o auto-arquivo das publicações desenvolvidas no âmbito institucional no repositório, serve como mote para uma maior valorização da produção científica do INESC TEC.The progressive transformation of scientific practices, driven by the development of new Information and Communication Technologies (ICT), which made it possible to increase access to information, gradually moving towards an opening of the research cycle. This opening makes it possible to resolve, in the long term, the adversity that has been placed on researchers, which involves the existence of barriers that limit access conditions, whether geographical or financial. Although large commercial publishers predominantly dominate scientific production and subject it to the rules imposed by them, the Open Access movement whose first public declaration, the Budapest Declaration (BOAI), was in 2002, proposes significant changes that benefit the authors and the readers. This Movement has gained importance in Portugal since 2003, with the constitution of the first institutional repository at the national level. Institutional repositories have emerged as a tool for disseminating the scientific production of an institution to open the results of the research, both before publication and the preprint process and postprint, increase the visibility of work done by an investigator and his or her institution. The present study, which underwent an analysis of the copyright policies of INESC TEC most relevant scientific publications, allowed not only to realize that publishers are increasingly adopting policies that make it possible to self-archive publications in institutional repositories, all the work of raising awareness, not only for researchers but also for the institution and the whole society. The production of a set of recommendations, which go through the implementation of an institutional policy that encourages the self-archiving of the publications developed in the institutional scope in the repository, serves as a motto for a greater appreciation of the scientific production of INESC TEC
    corecore