15 research outputs found

    A Study of Mobility Support in Wearable Health Monitoring Systems: Design Framework

    Get PDF
    International audienceThe aim of this work is to investigate main techniques and technologies enabling user's mobility in wearable health monitoring systems. For this, design requirements for key enabling mechanisms are pointed out, and a number of conceptual and technological recommendations are presented. The whole is schematized and presented into the form of a design framework covering design layers and taking in consideration patient context constraints. This work aspires to bring a further contribution for the conception and possibly the evaluation of health monitoring systems with full support of mobility offering freedom to users while enhancing their life qualit

    Comparison of vertical handover decision-based techniques in heterogeneous networks

    Get PDF
    Industry leaders are currently setting out standards for 5G Networks projected for 2020 or even sooner. Future generation networks will be heterogeneous in nature because no single network type is capable of optimally meeting all the rapid changes in customer demands. Heterogeneous networks are typically characterized by some network architecture, base stations of varying transmission power, transmission solutions and the deployment of a mix of technologies (multiple radio access technologies). In heterogeneous networks, the processes involved when a mobile node successfully switches from one radio access technology to the other for the purpose of quality of service continuity is termed vertical handover or vertical handoff. Active calls that get dropped, or cases where there is discontinuity of service experienced by mobile users can be attributed to the phenomenon of delayed handover or an outright case of an unsuccessful handover procedure. This dissertation analyses the performance of a fuzzy-based VHO algorithm scheme in a Wi-Fi, WiMAX, UMTS and LTE integrated network using the OMNeT++ discrete event simulator. The loose coupling type network architecture is adopted and results of the simulation are analysed and compared for the two major categories of handover basis; multiple and single criteria based handover methods. The key performance indices from the simulations showed better overall throughput, better call dropped rate and shorter handover time duration for the multiple criteria based decision method compared to the single criteria based technique. This work also touches on current trends, challenges in area of seamless handover and initiatives for future Networks (Next Generation Heterogeneous Networks)

    Design for energy-efficient and reliable fog-assisted healthcare IoT systems

    Get PDF
    Cardiovascular disease and diabetes are two of the most dangerous diseases as they are the leading causes of death in all ages. Unfortunately, they cannot be completely cured with the current knowledge and existing technologies. However, they can be effectively managed by applying methods of continuous health monitoring. Nonetheless, it is difficult to achieve a high quality of healthcare with the current health monitoring systems which often have several limitations such as non-mobility support, energy inefficiency, and an insufficiency of advanced services. Therefore, this thesis presents a Fog computing approach focusing on four main tracks, and proposes it as a solution to the existing limitations. In the first track, the main goal is to introduce Fog computing and Fog services into remote health monitoring systems in order to enhance the quality of healthcare. In the second track, a Fog approach providing mobility support in a real-time health monitoring IoT system is proposed. The handover mechanism run by Fog-assisted smart gateways helps to maintain the connection between sensor nodes and the gateways with a minimized latency. Results show that the handover latency of the proposed Fog approach is 10%-50% less than other state-of-the-art mobility support approaches. In the third track, the designs of four energy-efficient health monitoring IoT systems are discussed and developed. Each energy-efficient system and its sensor nodes are designed to serve a specific purpose such as glucose monitoring, ECG monitoring, or fall detection; with the exception of the fourth system which is an advanced and combined system for simultaneously monitoring many diseases such as diabetes and cardiovascular disease. Results show that these sensor nodes can continuously work, depending on the application, up to 70-155 hours when using a 1000 mAh lithium battery. The fourth track mentioned above, provides a Fog-assisted remote health monitoring IoT system for diabetic patients with cardiovascular disease. Via several proposed algorithms such as QT interval extraction, activity status categorization, and fall detection algorithms, the system can process data and detect abnormalities in real-time. Results show that the proposed system using Fog services is a promising approach for improving the treatment of diabetic patients with cardiovascular disease

    Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors

    Get PDF
    Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain

    Estratégias para uso de redes industriais sem fio do tipo TSCH em aplicações de mobilidade

    Get PDF
    A utilização de redes sem fio para aplicações industriais surge como uma alternativa para os sistemas cabeados por apresentarem características como flexibilidade de ampliação ou atualização de dispositivos na rede e facilidade de instalação e manutenção. Protocolos de comunicação para redes sem fio industriais, como WirelessHART, foram desenvolvidos para atender a requisitos de operação do setor industrial garantindo entrega de mensagens em tempo real, segurança e confiabilidade. O protocolo WirelessHART foi desenvolvido para atender aplicações de automação de processos, onde as variáveis do processo são alteradas de forma lenta. Quando inseridos elementos de alta dinamicidade, como a presença de dispositivos móveis ou intermitentes, como nos processos de automação fabril, há um impacto negativo no desempenho destas redes devido à rápida mudança de topologia que não é prevista neste protocolo, e que resultam na redução da taxa de sucesso de transmissões. Dentro deste contexto, este trabalho apresenta a análise dos requisitos e a implementação de dispositivos móveis ou intermitentes e gerenciadores de rede em conformidade com a técnica TSCH (Time Synchronized Channel Hopping), como a empregada no WirelessHART. São propostas modificações em procedimentos do protocolo utilizado como base, visando fornecer o suporte a dispositivos móveis que incluem técnicas para agilizar o processo de conexão e desconexão e manter a conectividade do dispositivo enquanto ele se movimenta pela área de cobertura da rede. Os resultados revelam a viabilidade das técnicas propostas, porém, em detrimento de algumas características fundamentais, tais como segurança e baixo consumo de energia. Para mitigar os problemas gerados, são apresentadas propostas a serem implementadas em trabalhos futuros.The use of wireless networks for industrial applications appears as an alternative for wired systems due to its characteristics such as flexibility to add or remove devices on the network and ease of maintenance and installation. Communication protocols for industrial wireless networks, such as WirelessHART, were developed to meet the operating requirements of the industrial sector ensuring real-time communications, security and reliability. The WirelessHART protocol was developed to operate in process automation applications, where process variables are changed slowly. When high dynamics elements are inserted in these networks, such as the presence of mobile or intermittent devices, as seen in factory automation processes, there is a negative impact on the performance of these networks due to the fast topology change that is not supported in this protocol, resulting in the reduction of success rate of transmissions. In this context, this work presents the analysis of requirements and the implementation of mobile or intermittent devices and network managers in accordance with the TSCH (Time Synchronized Channel Hopping) technique, which is used in WirelessHART. Modifications to the procedures of the protocol used as a basis are proposed, aiming to provide support for mobile devices including techniques to reduce time in processes as connection and disconnection and maintain the connectivity of the device while it moves through the network coverage area. The results show the feasibility of the proposed techniques, however, to the detriment of some fundamental characteristics, such as safety and low energy consumption. In order to mitigate the problems generated, proposals are presented to be implemented in future works

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Recent Developments in Smart Healthcare

    Get PDF
    Medicine is undergoing a sector-wide transformation thanks to the advances in computing and networking technologies. Healthcare is changing from reactive and hospital-centered to preventive and personalized, from disease focused to well-being centered. In essence, the healthcare systems, as well as fundamental medicine research, are becoming smarter. We anticipate significant improvements in areas ranging from molecular genomics and proteomics to decision support for healthcare professionals through big data analytics, to support behavior changes through technology-enabled self-management, and social and motivational support. Furthermore, with smart technologies, healthcare delivery could also be made more efficient, higher quality, and lower cost. In this special issue, we received a total 45 submissions and accepted 19 outstanding papers that roughly span across several interesting topics on smart healthcare, including public health, health information technology (Health IT), and smart medicine
    corecore