7,491 research outputs found
A Novel Framework for Software Defined Wireless Body Area Network
Software Defined Networking (SDN) has gained huge popularity in replacing
traditional network by offering flexible and dynamic network management. It has
drawn significant attention of the researchers from both academia and
industries. Particularly, incorporating SDN in Wireless Body Area Network
(WBAN) applications indicates promising benefits in terms of dealing with
challenges like traffic management, authentication, energy efficiency etc.
while enhancing administrative control. This paper presents a novel framework
for Software Defined WBAN (SDWBAN), which brings the concept of SDN technology
into WBAN applications. By decoupling the control plane from data plane and
having more programmatic control would assist to overcome the current lacking
and challenges of WBAN. Therefore, we provide a conceptual framework for SDWBAN
with packet flow model and a future direction of research pertaining to SDWBAN.Comment: Presented on 8th International Conference on Intelligent Systems,
Modelling and Simulatio
Channel-based key generation for encrypted body-worn wireless sensor networks
Body-worn sensor networks are important for rescue-workers, medical and many other applications. Sensitive data are often transmitted over such a network, motivating the need for encryption. Body-worn sensor networks are deployed in conditions where the wireless communication channel varies dramatically due to fading and shadowing, which is considered a disadvantage for communication. Interestingly, these channel variations can be employed to extract a common encryption key at both sides of the link. Legitimate users share a unique physical channel and the variations thereof provide data series on both sides of the link, with highly correlated values. An eavesdropper, however, does not share this physical channel and cannot extract the same information when intercepting the signals. This paper documents a practical wearable communication system implementing channel-based key generation, including an implementation and a measurement campaign comprising indoor as well as outdoor measurements. The results provide insight into the performance of channel-based key generation in realistic practical conditions. Employing a process known as key reconciliation, error free keys are generated in all tested scenarios. The key-generation system is computationally simple and therefore compatible with the low-power micro controllers and low-data rate transmissions commonly used in wireless sensor networks
Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems
RF-based wireless power transfer networks (WPTNs) are deployed to transfer
power to embedded devices over the air via RF waves. Up until now, a
considerable amount of effort has been devoted by researchers to design WPTNs
that maximize several objectives such as harvested power, energy outage and
charging delay. However, inherent security and safety issues are generally
overlooked and these need to be solved if WPTNs are to be become widespread.
This article focuses on safety and security problems related WPTNs and
highlight their cruciality in terms of efficient and dependable operation of
RF-based WPTNs. We provide a overview of new research opportunities in this
emerging domain.Comment: Removed some references, added new references, corrected typos,
revised some sections (mostly I-B and III-C
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices
To facilitate monitoring and management, modern Implantable Medical Devices
(IMDs) are often equipped with wireless capabilities, which raise the risk of
malicious access to IMDs. Although schemes are proposed to secure the IMD
access, some issues are still open. First, pre-sharing a long-term key between
a patient's IMD and a doctor's programmer is vulnerable since once the doctor's
programmer is compromised, all of her patients suffer; establishing a temporary
key by leveraging proximity gets rid of pre-shared keys, but as the approach
lacks real authentication, it can be exploited by nearby adversaries or through
man-in-the-middle attacks. Second, while prolonging the lifetime of IMDs is one
of the most important design goals, few schemes explore to lower the
communication and computation overhead all at once. Finally, how to safely
record the commands issued by doctors for the purpose of forensics, which can
be the last measure to protect the patients' rights, is commonly omitted in the
existing literature. Motivated by these important yet open problems, we propose
an innovative scheme e-SAFE, which significantly improves security and safety,
reduces the communication overhead and enables IMD-access forensics. We present
a novel lightweight compressive sensing based encryption algorithm to encrypt
and compress the IMD data simultaneously, reducing the data transmission
overhead by over 50% while ensuring high data confidentiality and usability.
Furthermore, we provide a suite of protocols regarding device pairing,
dual-factor authentication, and accountability-enabled access. The security
analysis and performance evaluation show the validity and efficiency of the
proposed scheme
An objective based classification of aggregation techniques for wireless sensor networks
Wireless Sensor Networks have gained immense popularity in recent years due to their ever increasing capabilities and wide range of critical applications. A huge body of research efforts has been dedicated to find ways to utilize limited resources of these sensor nodes in an efficient manner. One of the common ways to minimize energy consumption has been aggregation of input data. We note that every aggregation technique has an improvement objective to achieve with respect to the output it produces. Each technique is designed to achieve some target e.g. reduce data size, minimize transmission energy, enhance accuracy etc. This paper presents a comprehensive survey of aggregation techniques that can be used in distributed manner to improve lifetime and energy conservation of wireless sensor networks. Main contribution of this work is proposal of a novel classification of such techniques based on the type of improvement they offer when applied to WSNs. Due to the existence of a myriad of definitions of aggregation, we first review the meaning of term aggregation that can be applied to WSN. The concept is then associated with the proposed classes. Each class of techniques is divided into a number of subclasses and a brief literature review of related work in WSN for each of these is also presented
SIMPLE: Stable Increased-throughput Multi-hop Protocol for Link Efficiency in Wireless Body Area Networks
In this work, we propose a reliable, power efficient and high throughput
routing protocol for Wireless Body Area Networks (WBANs). We use multi-hop
topology to achieve minimum energy consumption and longer network lifetime. We
propose a cost function to select parent node or forwarder. Proposed cost
function selects a parent node which has high residual energy and minimum
distance to sink. Residual energy parameter balances the energy consumption
among the sensor nodes while distance parameter ensures successful packet
delivery to sink. Simulation results show that our proposed protocol maximize
the network stability period and nodes stay alive for longer period. Longer
stability period contributes high packet delivery to sink which is major
interest for continuous patient monitoring.Comment: IEEE 8th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
- …