14 research outputs found

    Improving Neural Recording Technology at the Nanoscale

    Get PDF
    University of Minnesota Ph.D. dissertation. august 2011. Major: Biomedical Engineering. Advisor: A Redish. 1 computer file (PDF); xviii, 119 pages.Neural recording electrodes are widely used to study normal brain function (e.g., learning, memory, and sensation) and abnormal brain function (e.g., epilepsy, addiction, and depression) and to interface with the nervous system for neuroprosthetics. With a deep understanding of the electrode interface at the nanoscale and the use of novel nanofabrication processes, neural recording electrodes can be designed that surpass previous limits and enable new applications. In this thesis, I will discuss three projects. In the first project, we created an ultralow-impedance electrode coating by controlling the nanoscale texture of electrode surfaces. In the second project, we developed a novel nanowire electrode for long-term intracellular recordings. In the third project, we created a means of wirelessly communicating with ultra-miniature, implantable neural recording devices. The techniques developed for these projects offer significant improvements in the quality of neural recordings. They can also open the door to new types of experiments and medical devices, which can lead to a better understanding of the brain and can enable novel and improved tools for clinical applications

    Wireless body sensor networks for health-monitoring applications

    Get PDF
    This is an author-created, un-copyedited version of an article accepted for publication in Physiological Measurement. The publisher is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The Version of Record is available online at http://dx.doi.org/10.1088/0967-3334/29/11/R01

    Cybersecurity in implantable medical devices

    Get PDF
    Mención Internacional en el título de doctorImplantable Medical Devices (IMDs) are electronic devices implanted within the body to treat a medical condition, monitor the state or improve the functioning of some body part, or just to provide the patient with a capability that he did not possess before [86]. Current examples of IMDs include pacemakers and defibrillators to monitor and treat cardiac conditions; neurostimulators for deep brain stimulation in cases such as epilepsy or Parkinson; drug delivery systems in the form of infusion pumps; and a variety of biosensors to acquire and process different biosignals. Some of the newest IMDs have started to incorporate numerous communication and networking functions—usually known as “telemetry”—, as well as increasingly more sophisticated computing capabilities. This has provided implants with more intelligence and patients with more autonomy, as medical personnel can access data and reconfigure the implant remotely (i.e., without the patient being physically present in medical facilities). Apart from a significant cost reduction, telemetry and computing capabilities also allow healthcare providers to constantly monitor the patient’s condition and to develop new diagnostic techniques based on an Intra Body Network (IBN) of medical devices [25, 26, 201]. Evolving from a mere electromechanical IMD to one with more advanced computing and communication capabilities has many benefits but also entails numerous security and privacy risks for the patient. The majority of such risks are relatively well known in classical computing scenarios, though in many respects their repercussions are far more critical in the case of implants. Attacks against an IMD can put at risk the safety of the patient who carries it, with fatal consequences in certain cases. Causing an intentional malfunction of an implant can lead to death and, as recognized by the U.S. Food and Drug Administration (FDA), such deliberate attacks could be far more difficult to detect than accidental ones [61]. Furthermore, these devices store and transmit very sensitive medical information that requires protection, as dictated by European (e.g., Directive 95/46/ECC) and U.S. (e.g., CFR 164.312) Directives [94, 204]. The wireless communication capabilities present in many modern IMDs are a major source of security risks, particularly while the patient is in open (i.e., non-medical) environments. To begin with, the implant becomes no longer “invisible”, as its presence could be remotely detected [48]. Furthermore, it facilitates the access to transmitted data by eavesdroppers who simply listen to the (insecure) channel [83]. This could result in a major privacy breach, as IMDs store sensitive information such as vital signals, diagnosed conditions, therapies, and a variety of personal data (e.g., birth date, name, and other medically relevant identifiers). A vulnerable communication channel also makes it easier to attack the implant in ways similar to those used against more common computing devices [118, 129, 156], i.e., by forging, altering, or replying previously captured messages [82]. This could potentially allow an adversary to monitor and modify the implant without necessarily being close to the victim [164]. In this regard, the concerns of former U.S. vice-president Dick Cheney constitute an excellent example: he had his Implantable Cardioverter Defibrillator (ICD) replaced by another without WiFi capability [219]. While there are still no known real-world incidents, several attacks on IMDs have been successfully demonstrated in the lab [83, 133, 143]. These attacks have shown how an adversary can disable or reprogram therapies on an ICD with wireless connectivity, and even inducing a shock state to the patient [65]. Other attacks deplete the battery and render the device inoperative [91], which often implies that the patient must undergo a surgical procedure to have the IMD replaced. Moreover, in the case of cardiac implants, they have a switch that can be turned off merely by applying a magnetic field [149]. The existence of this mechanism is motivated by the need to shield ICDs to electromagnetic fields, for instance when the patient undergoes cardiac surgery using electrocautery devices [47]. However, this could be easily exploited by an attacker, since activating such a primitive mechanism does not require any kind of authentication. In order to prevent attacks, it is imperative that the new generation of IMDs will be equipped with strong mechanisms guaranteeing basic security properties such as confidentiality, integrity, and availability. For example, mutual authentication between the IMD and medical personnel is essential, as both parties must be confident that the other end is who claims to be. In the case of the IMD, only commands coming from authenticated parties should be considered, while medical personnel should not trust any message claiming to come from the IMD unless sufficient guarantees are given. Preserving the confidentiality of the information stored in and transmitted by the IMD is another mandatory aspect. The device must implement appropriate security policies that restrict what entities can reconfigure the IMD or get access to the information stored in it, ensuring that only authorized operations are executed. Similarly, security mechanisms have to be implemented to protect the content of messages exchanged through an insecure wireless channel. Integrity protection is equally important to ensure that information has not been modified in transit. For example, if the information sent by the implant to the Programmer is altered, the doctor might make a wrong decision. Conversely, if a command sent to the implant is forged, modified, or simply contains errors, its execution could result in a compromise of the patient’s physical integrity. Technical security mechanisms should be incorporated in the design phase and complemented with appropriate legal and administrative measures. Current legislation is rather permissive in this regard, allowing the use of implants like ICDs that do not incorporate any security mechanisms. Regulatory authorities like the FDA in the U.S or the EMA (European Medicines Agency) in Europe should promote metrics and frameworks for assessing the security of IMDs. These assessments should be mandatory by law, requiring an adequate security level for an implant before approving its use. Moreover, both the security measures supported on each IMD and the security assessment results should be made public. Prudent engineering practices well known in the safety and security domains should be followed in the design of IMDs. If hardware errors are detected, it often entails a replacement of the implant, with the associated risks linked to a surgery. One of the main sources of failure when treating or monitoring a patient is precisely malfunctions of the device itself. These failures are known as “recalls” or “advisories”, and it is estimated that they affect around 2.6% of patients carrying an implant. Furthermore, the software running on the device should strictly support the functionalities required to perform the medical and operational tasks for what it was designed, and no more [66, 134, 213]. In Chapter 1, we present a survey of security and privacy issues in IMDs, discuss the most relevant mechanisms proposed to address these challenges, and analyze their suitability, advantages, and main drawbacks. In Chapter 2, we show how the use of highly compressed electrocardiogram (ECG) signals (only 24 coefficients of Hadamard Transform) is enough to unequivocally identify individuals with a high performance (classification accuracy of 97% and with identification system errors in the order of 10−2). In Chapter 3 we introduce a new Continuous Authentication scheme that, contrarily to previous works in this area, considers ECG signals as continuous data streams. The proposed ECG-based CA system is intended for real-time applications and is able to offer an accuracy up to 96%, with an almost perfect system performance (kappa statistic > 80%). In Chapter 4, we propose a distance bounding protocol to manage access control of IMDs: ACIMD. ACIMD combines two features namely identity verification (authentication) and proximity verification (distance checking). The authentication mechanism we developed conforms to the ISO/IEC 9798-2 standard and is performed using the whole ECG signal of a device holder, which is hardly replicable by a distant attacker. We evaluate the performance of ACIMD using ECG signals of 199 individuals over 24 hours, considering three adversary strategies. Results show that an accuracy of 87.07% in authentication can be achieved. Finally, in Chapter 5 we extract some conclusions and summarize the published works (i.e., scientific journals with high impact factor and prestigious international conferences).Los Dispositivos Médicos Implantables (DMIs) son dispositivos electrónicos implantados dentro del cuerpo para tratar una enfermedad, controlar el estado o mejorar el funcionamiento de alguna parte del cuerpo, o simplemente para proporcionar al paciente una capacidad que no poseía antes [86]. Ejemplos actuales de DMI incluyen marcapasos y desfibriladores para monitorear y tratar afecciones cardíacas; neuroestimuladores para la estimulación cerebral profunda en casos como la epilepsia o el Parkinson; sistemas de administración de fármacos en forma de bombas de infusión; y una variedad de biosensores para adquirir y procesar diferentes bioseñales. Los DMIs más modernos han comenzado a incorporar numerosas funciones de comunicación y redes (generalmente conocidas como telemetría) así como capacidades de computación cada vez más sofisticadas. Esto ha propiciado implantes con mayor inteligencia y pacientes con más autonomía, ya que el personal médico puede acceder a los datos y reconfigurar el implante de forma remota (es decir, sin que el paciente esté físicamente presente en las instalaciones médicas). Aparte de una importante reducción de costos, las capacidades de telemetría y cómputo también permiten a los profesionales de la atención médica monitorear constantemente la condición del paciente y desarrollar nuevas técnicas de diagnóstico basadas en una Intra Body Network (IBN) de dispositivos médicos [25, 26, 201]. Evolucionar desde un DMI electromecánico a uno con capacidades de cómputo y de comunicación más avanzadas tiene muchos beneficios pero también conlleva numerosos riesgos de seguridad y privacidad para el paciente. La mayoría de estos riesgos son relativamente bien conocidos en los escenarios clásicos de comunicaciones entre dispositivos, aunque en muchos aspectos sus repercusiones son mucho más críticas en el caso de los implantes. Los ataques contra un DMI pueden poner en riesgo la seguridad del paciente que lo porta, con consecuencias fatales en ciertos casos. Causar un mal funcionamiento intencionado en un implante puede causar la muerte y, tal como lo reconoce la Food and Drug Administration (FDA) de EE.UU, tales ataques deliberados podrían ser mucho más difíciles de detectar que los ataques accidentales [61]. Además, estos dispositivos almacenan y transmiten información médica muy delicada que requiere se protegida, según lo dictado por las directivas europeas (por ejemplo, la Directiva 95/46/ECC) y estadunidenses (por ejemplo, la Directiva CFR 164.312) [94, 204]. Si bien todavía no se conocen incidentes reales, se han demostrado con éxito varios ataques contra DMIs en el laboratorio [83, 133, 143]. Estos ataques han demostrado cómo un adversario puede desactivar o reprogramar terapias en un marcapasos con conectividad inalámbrica e incluso inducir un estado de shock al paciente [65]. Otros ataques agotan la batería y dejan al dispositivo inoperativo [91], lo que a menudo implica que el paciente deba someterse a un procedimiento quirúrgico para reemplazar la batería del DMI. Además, en el caso de los implantes cardíacos, tienen un interruptor cuya posición de desconexión se consigue simplemente aplicando un campo magnético intenso [149]. La existencia de este mecanismo está motivada por la necesidad de proteger a los DMIs frete a posibles campos electromagnéticos, por ejemplo, cuando el paciente se somete a una cirugía cardíaca usando dispositivos de electrocauterización [47]. Sin embargo, esto podría ser explotado fácilmente por un atacante, ya que la activación de dicho mecanismo primitivo no requiere ningún tipo de autenticación. Garantizar la confidencialidad de la información almacenada y transmitida por el DMI es otro aspecto obligatorio. El dispositivo debe implementar políticas de seguridad apropiadas que restrinjan qué entidades pueden reconfigurar el DMI o acceder a la información almacenada en él, asegurando que sólo se ejecuten las operaciones autorizadas. De la misma manera, mecanismos de seguridad deben ser implementados para proteger el contenido de los mensajes intercambiados a través de un canal inalámbrico no seguro. La protección de la integridad es igualmente importante para garantizar que la información no se haya modificado durante el tránsito. Por ejemplo, si la información enviada por el implante al programador se altera, el médico podría tomar una decisión equivocada. Por el contrario, si un comando enviado al implante se falsifica, modifica o simplemente contiene errores, su ejecución podría comprometer la integridad física del paciente. Los mecanismos de seguridad deberían incorporarse en la fase de diseño y complementarse con medidas legales y administrativas apropiadas. La legislación actual es bastante permisiva a este respecto, lo que permite el uso de implantes como marcapasos que no incorporen ningún mecanismo de seguridad. Las autoridades reguladoras como la FDA en los Estados Unidos o la EMA (Agencia Europea de Medicamentos) en Europa deberían promover métricas y marcos para evaluar la seguridad de los DMIs. Estas evaluaciones deberían ser obligatorias por ley, requiriendo un nivel de seguridad adecuado para un implante antes de aprobar su uso. Además, tanto las medidas de seguridad implementadas en cada DMI como los resultados de la evaluación de su seguridad deberían hacerse públicos. Buenas prácticas de ingeniería en los dominios de la protección y la seguridad deberían seguirse en el diseño de los DMIs. Si se detectan errores de hardware, a menudo esto implica un reemplazo del implante, con los riesgos asociados y vinculados a una cirugía. Una de las principales fuentes de fallo al tratar o monitorear a un paciente es precisamente el mal funcionamiento del dispositivo. Estos fallos se conocen como “retiradas”, y se estima que afectan a aproximadamente el 2,6 % de los pacientes que llevan un implante. Además, el software que se ejecuta en el dispositivo debe soportar estrictamente las funcionalidades requeridas para realizar las tareas médicas y operativas para las que fue diseñado, y no más [66, 134, 213]. En el Capítulo 1, presentamos un estado de la cuestión sobre cuestiones de seguridad y privacidad en DMIs, discutimos los mecanismos más relevantes propuestos para abordar estos desafíos y analizamos su idoneidad, ventajas y principales inconvenientes. En el Capítulo 2, mostramos cómo el uso de señales electrocardiográficas (ECGs) altamente comprimidas (sólo 24 coeficientes de la Transformada Hadamard) es suficiente para identificar inequívocamente individuos con un alto rendimiento (precisión de clasificación del 97% y errores del sistema de identificación del orden de 10−2). En el Capítulo 3 presentamos un nuevo esquema de Autenticación Continua (AC) que, contrariamente a los trabajos previos en esta área, considera las señales ECG como flujos de datos continuos. El sistema propuesto de AC basado en señales cardíacas está diseñado para aplicaciones en tiempo real y puede ofrecer una precisión de hasta el 96%, con un rendimiento del sistema casi perfecto (estadístico kappa > 80 %). En el Capítulo 4, proponemos un protocolo de verificación de la distancia para gestionar el control de acceso al DMI: ACIMD. ACIMD combina dos características, verificación de identidad (autenticación) y verificación de la proximidad (comprobación de la distancia). El mecanismo de autenticación es compatible con el estándar ISO/IEC 9798-2 y se realiza utilizando la señal ECG con todas sus ondas, lo cual es difícilmente replicable por un atacante que se encuentre distante. Hemos evaluado el rendimiento de ACIMD usando señales ECG de 199 individuos durante 24 horas, y hemos considerando tres estrategias posibles para el adversario. Los resultados muestran que se puede lograr una precisión del 87.07% en la au tenticación. Finalmente, en el Capítulo 5 extraemos algunas conclusiones y resumimos los trabajos publicados (es decir, revistas científicas con alto factor de impacto y conferencias internacionales prestigiosas).Programa Oficial de Doctorado en Ciencia y Tecnología InformáticaPresidente: Arturo Ribagorda Garnacho.- Secretario: Jorge Blasco Alís.- Vocal: Jesús García López de Lacall

    Antenna Development in Brain-Implantable Biotelemetric Systems for Next-Generation of Human Healthcare

    Get PDF
    In the growing efforts of promoting patients’ life quality through health technology solutions, implantable wireless medical devices (IMDs) have been identified as one of the frontrunners. They are bringing compelling wireless solutions for medical diagnosis and treatment through bio-telemetric systems that deliver real-time transmission of in-body physiological data to an external monitoring/control unit. To set up this bidirectional wireless biomedical communication link for the long- term, the IMDs need small and efficient antennas. Designing antenna-enabled biomedical telemetry is a challenging aim, which must fulfill demanding issues and criteria including miniaturization, appropriate radiation performance, bandwidth enhancement, good impedance matching, and biocompatibility. Overcoming the size restriction mainly depends on the resonant frequency of the required applications. Defined frequency bands for biomedical telemetry systems contain the Medical Implant Communication Service (MICS) operating at the frequency band of 402– 405 MHz, Medical Device Radiocommunication Service (MedRadio) resonating at the frequency ranges of 401– 406 MHz, 413 – 419 MHz, 426 – 432 MHz, 438 – 444 MHz, and 451 – 457 MHz, Wireless Medical Telemetry Service (WMTS) operating at frequency specturms of 1395 to 1400 MHz and 1427 to 1432 MHz, and Industrial, Scientific, and Medical (ISM) bands of 433.1–434.8 MHz, 868–868.6 MHz, 902.8–928.0 MHz, and 2.4–2.48 GHz. On the other hand, a single band antenna may not fulfill all requirements of a bio-telemetry system in either MedRadio, WMTS, or ISM bands. As a result, analyzing dual/multi-band implantable antenna supporting wireless power, data transmission, and control signaling can meet the demand for multitasking biotelemetry systems. In addition, among different antenna structures, PIFA has been found a promising type in terms of size-performance balance in lossy human tissues. To overcome the above-mentioned challenges, this thesis, first, starts with a discussion of antenna radiation in a lossy medium, the requirements of implantable antenna development, and numerical modeling of the human head tissues. In the following discussion, we concentrate on approaching a new design for far-field small antennas integrated into brain-implantable biotelemetric systems that provide attractive features for versatile functions in modern medical applications. To this end, we introduce three different implantable antenna structures including a compact dual-band PIFA, a miniature triple-band PIFA and a small quad-band PIFA for brain care applications. The compelling performance of the proposed antennas is analyzed and discussed with simulation results and the triple-band PIFA is evaluated using simulation outcomes compared with the measurement results of the fabricated prototype. Finally, the first concept and platform of in-body and off-body units are proposed for wireless dopamine monitoring as a brain care application. In addition to the main focus of this thesis, in the second stage, we focus on introducing an equivalent circuit model to the electrical connector-line transition. We present a data fitting technique for two transmission lines characterization independent of the dielectric properties of the substrate materials at the ultra-high frequency band (UHF). This approach is a promising solution for the development of wearable and off-body antennas employing textile materials in biomedical telemetry systems. The approach method is assessed with measurement results of several fabricated transmission lines on different substrate materials

    Contribuições às redes de comunicação pelo corpo humano: Modelagem de canal e projeto de um transceptor integrado

    Get PDF
    Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Engenharia Elétrica, Florianópolis, 2017.As redes de sensores sem fio (WSN) são uma tecnologia importante e consolidada em diversas áreas, desde monitoramento industrial à assistência médica, contudo, muitos desafios ainda persistem. Um destes desafios é o consumo de potência dos nós da rede, que é um fator limitante para criação de nós duráveis, desejáveis sobretudo em nós vestíveis e implantáveis. Em geral, em um nó sem fio, o bloco de comunicação apresenta o maior consumo do dispositivo. Para reduzir o consumo e aumentar a vida útil dos nós, além da otimização do projeto dos circuitos e da rede, novos métodos de comunicação podem ser utilizados. Neste sentido, a comunicação pelo corpo humano (HBC) tem atraído interesse tanto da academia quando da indústria como uma alternativa para implementar um subtipo das WSN, as redes sem fio corporais (WBAN). No HBC, o corpo humano é utilizado como o canal de comunicação. Um aspecto importante do desenvolvimento desta tecnologia é a caracterização do canal para permitir o projeto adequado dos transceptores. Com este objetivo, neste trabalho foram realizadas várias medições do canal HBC. A análise dos resultados experimentais, contudo, permitiu identificar uma influência não desprezível no perfil de frequência do canal e nos níveis de atenuação medidos. Estes efeitos, em geral, não são reconhecidos ou corrigidos por outros trabalhos encontrados na bibliografia, principalmente poque não podem ser removidos por métodos comuns de calibração ou de-embedding. Para entender e explicar os resultados de medição, são propostas uma metodologia para identificação das partes que compõem o canal e um modelo estendido para o canal, que inclui modelos para os acessórios de testes. A metodologia de identificação auxilia a diferenciação e a modelagem dos componentes essenciais do canal, que é feita por meio de modelos baseados em circuitos concentrados e distribuídos e permite identificar o comportamento esperado do canal primário real. O modelo estendido proposto é verificado com medições do canal e apresenta uma boa correlação com as medições. Este modelo é então utilizado no projeto de um transceptor HBC integrado, que buscou o baixo consumo e a capacidade de operação em banda larga, com múltiplos canais cobrindo a faixa de frequências entre 10-100 MHz do canal de comunicação. Com estes objetivos, projetou-se um transmissor BFSK de modulação direta, composto por um oscilador current starved controlado por tensão e um driver de saída, para acoplamento do sinal ao canal. O receptor é baseado na técnica de injection locking e emprega a conversão frequência-fase para demodulação banda larga do sinal, sendo composto por um amplificador de entrada push-pull, um oscilador current starved com injection locking controlado por tensão, um detector de fase tristate, um filtro RC e um conversor analógico digital. O transceptor foi projetado e fabricado em tecnologia CMOS 130 nm e possui cinco canais de comunicação na faixa entre 10-100 MHz, apresenta uma taxa de dados de 2 Mbps e uma taxa de erro de bit de 0,5.10-3 para sinais de -35,8 dBm no canal HBC. O consumo do transmissor é 6,6 mW e do receptor é 1,68 mW, alcançando a eficiência de comunicação de 3,3 nJ/bit e 0,84 nJ/bit, respectivamente, para uma tensão de alimentação de 1,2 V.Abstract : Wireless sensor networks (WSN) are a consolidated and important technology in several areas, from industrial monitoring to health care, however, many issues are open to be solved. One of the greatest challenges lies on the power consumption of the network nodes, which is a limiting factor for durable wearable and implantable devices. In most cases the communication block is the most power hungry section in the wireless node. To reduce power consumption and increase the node's lifetime, besides optimizing the transceiver hardware and network design, alternative communication methods can be employed. In this regard, Human body communication (HBC) has attracted growing interest from both academy and industry as an alternative to implement Wireless Body Area Networks (WBAN). In HBC the human body is used as the communication channel. A very important aspect concerning the development of the HBC technology is the characterization of the channel for proper transceiver design. With this in mind, this work presents various channel measurements performed in the HBC channel to evaluate its behavior. From the measurement results, it is identified that the test fixtures affect the HBC measurements, changing the channel frequency profile and the channel attenuation levels. These issues were not identified or corrected in the literature studied, mostly because they cannot be removed by common calibration and de-embedding methods. To understand and explain the measured channel response, an channel identification methodology and an extended channel model, which includes the test fixtures models are proposed. The channel identification methodology aides the correct identification and modeling of the essential channel components using distributed and lumped circuit representations that provide a useful insight into the expected primary channel behavior. The proposed extended channel model is tested against channel measurement results and good correlation with experiments is obtained. The proposed primary channel model is then used for a more reliable transceiver design, which focused in lower power consumption and multi-band operation in the 10-100 MHz range of the channel. With these requirements, in the integrated HBC transmitter a direct modulation BFSk architecture is used, consisting of a voltage controlled current starved oscillator and an output driver, for coupling the signal to the channel. The HBC receiver is based on injection locking technique and does broadband demodulation with frequency-to-phase conversion. The receiver consists of a push-pull input amplifier, a voltage-controlled current starved oscillator, a tristate phase detector, a RC filter and analog to digital converter. The transceiver was designed and fabricated in CMOS 130 nm technology and has five communication channels in the range of 10-100 MHz, a data rate of 2 Mbps and a bit error rate of 0.5x10-3 for -35,8 dBm signals on the HBC channel. The transmitter and receiver power consumption are 6.6 mW and 1.68 mW, respectivelly, which enables a communication efficiency of 3.3 nJ/bit and 0.84 nJ/bit with a 1.2 V supply voltage

    Communication and energy delivery architectures for personal medical devices

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.Cataloged from PDF version of thesis.Includes bibliographical references (p. 219-232).Advances in sensor technologies and integrated electronics are revolutionizing how humans access and receive healthcare. However, many envisioned wearable or implantable systems are not deployable in practice due to high energy consumption and anatomically-limited size constraints, necessitating large form-factors for external devices, or eventual surgical re-implantation procedures for in-vivo applications. Since communication and energy-management sub-systems often dominate the power budgets of personal biomedical devices, this thesis explores alternative usecases, system architectures, and circuit solutions to reduce their energy burden. For wearable applications, a system-on-chip is designed that both communicates and delivers power over an eTextiles network. The transmitter and receiver front-ends are at least an order of magnitude more efficient than conventional body-area networks. For implantable applications, two separate systems are proposed that avoid reimplantation requirements. The first system extracts energy from the endocochlear potential, an electrochemical gradient found naturally within the inner-ear of mammals, in order to power a wireless sensor. Since extractable energy levels are limited, novel sensing, communication, and energy management solutions are proposed that leverage duty-cycling to achieve enabling power consumptions that are at least an order of magnitude lower than previous work. Clinical measurements show the first system demonstrated to sustain itself with a mammalian-generated electrochemical potential operating as the only source of energy into the system. The second system leverages the essentially unlimited number of re-charge cycles offered by ultracapacitors. To ease patient usability, a rapid wireless capacitor charging architecture is proposed that employs a multi-tapped secondary inductive coil to provide charging times that are significantly faster than conventional approaches.by Patrick Philip Mercier.Ph.D

    High Power Capacitive Power Transfer for Electric Vehicle Charging Applications

    Full text link
    Capacitive power transfer (CPT) technology is an effective way to charge electric vehicles, in which electric fields between metal plates are used to transfer power. Compared to the conventional inductive power transfer (IPT) system, a CPT system has three advantages: it does not generate eddy-current loss in nearby metal objects; it can reduce the system weight and cost; it has better misalignment performance. However, the coupling capacitance in a CPT system is usually in the pF range, which limits the CPT system power and efficiency. Through overcoming the limitation of small capacitance in a CPT system, this dissertation has achieved three breakthroughs in CPT technology: the system power is increased from several tens of watts to several kW; the transfer distance is increased from less than 1 mm to hundreds of mm; the transfer efficiency is increased from about 30% to over 90%. A double-sided LCLC compensation circuit has been proposed to realize high-power and long-distance capacitive power transfer. The compensation circuit provides resonances with the coupling capacitance, and increases the voltages on metal plates to kV level to achieve kW power transfer. A prototype has been constructed and validates the proposed circuit. Experimental results show that the prototype realizes 2.4 kW power transfer across an air-gap distance of 150 mm with a dc-dc efficiency of 90.8%. The experiments also show that the CPT system has better misalignment performance than the conventional IPT system. An IPT-CPT combined system has also been proposed to integrate the IPT and CPT technology together. The combination can increase the efficiency of the CPT system, and improve the misalignment performance of the IPT system. A prototype has been constructed to validate the combined idea. Experimental results show that the prototype realizes 2.84 kW power transfer across an air-gap distance of 150 mm with a dc-dc efficiency of 94.4%. Using the designed LCLC compensation circuit, a dynamic CPT system has been proposed to realize power transfer to receivers in moving status. A long-track coupler structure is used to reduce the pulsation of received power. A prototype has been constructed to validate dynamic charging. Experimental results show that the prototype realizes 154W power transfer across an air-gap distance of 50 mm with a dc-dc efficiency of 85.4%. Considering practical applications, the safety issues and foreign object influence have been studied in this dissertation. The high voltage issue can be solved by reliable insulation, and the electric field emissions can be reduced through capacitive coupler structure design. The foreign object, either metallic or dielectric, can influence the coupling capacitances in a CPT system depends on the position and size. The CPT system can also influence the voltage and power loss in the foreign object. To sum up, this dissertation has demonstrated that the CPT technology is a good solution to realize the charging of electric vehicles. In future work, the power density and efficiency of the CPT system will be further improved to make it more competitive with the inductive and conductive charging technology.PHDElectrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/138493/1/feilu_1.pd

    Determining the potential of wearable technologies within the disease landscape of sub-Saharan Africa

    Get PDF
    Thesis (MEng)--Stellenbosch University, 2019.ENGLISH ABSTRACT: Please refer to full text for abstract.AFRIKAANSE OPSOMMING: Raadpleeg asseblief vol teks vir opsomming

    Reliable and Energy Efficient Network Protocols for Wireless Body Area Networks

    Get PDF
    In a wireless Body Area Network (WBAN) various sensors are attached on clothing, on the body or are even implanted under the skin. The wireless nature of the network and the wide variety of sensors offers numerous new, practical and innovative applications. A motivating example can be found in the world of health monitoring. The sensors of the WBAN measure for example the heartbeat, the body temperature or record a prolonged electrocardiogram. Using a WBAN, the patient experiences a greater physical mobility and is no longer compelled to stay in a hospital. A WBAN imposes the networks some strict and specific requirements. The devices are tiny, leaving only limited space for a battery. It is therefore of uttermost importance to restrict the energy consumption in the network. A possible solution is the development of energy efficient protocols that regulate the communication between the radios. Further, it is also important to consider the reliability of the communication. The data sent contains medical information and one has to make sure that it is correctly received at the personal device. It is not allowed that a critical message gets lost. In addition, a WBAN has to support the heterogeneity of its devices. This thesis focuses on the development of energy efficient and reliable network protocols for WBANs. Considered solutions are the use of multi-hop communication and the improved interaction between the different network layers. Mechanisms to reduce the energy consumption and to grade up the reliability of the communication are presented. In a first step, the physical layer of the communication near the human body is studied and investigated. The probability of a connection between two nodes on the body is modeled and used to investigate which network topologies can be considered as the most energy efficient and reliable. Next, MOFBAN, a lightweight framework for network architecture is presented. Finally, CICADA is presented: a new cross layer protocol for WBANs that both handles channel medium access and routing
    corecore