6 research outputs found

    Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network

    Get PDF
    科研費報告書収録論文(課題番号:17500030/研究代表者:加藤寧/インターネットと高親和性を有する次世代低軌道衛星ネットワークに関する基盤研究

    Toward energy-efficient and trustworthy eHealth monitoring system

    Get PDF
    The rapid technological convergence between Internet of Things (IoT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions

    Enhanced routing-aware adaptive MAC with traffic differentiation and smoothed contention window in wireless Ad-Hoc networks

    No full text
    In wireless mobile ad-hoc networks, data packets have to be relayed hop by hop from a given source node to a destination node. This means that some or all of the mobile nodes must accept to forward information for the benefit of other nodes. It has been shown in [10] that this ability of forwarding packets leads to a new unfairness problem in wireless ad-hoc networks, where a node which is forwarding other nodes' packets gets less bandwidth, for its own use, than a node which is not participating to the routing service. The proposed RAMAC scheme in [10], has showed all its effectiveness to cope with this unfairness problem. However, an extra bandwidth is sometimes allowed to the routing node's own traffic comparing to other non routing nodes' own traffics, and the routing node's routed traffic gets much less bandwidth. This is explained by the fact that at the upper layer (for instance the IP layer) does not differentiate between the routing and the own traffics, and th at the multiplicative factor used to compute the new contention window is too aggressive. In this paper, an enhanced RAMAC scheme is proposed, by taking into account the differentiation on top of the MAC layer, between the and routed traffics within a routing node, and by smoothing the multiplicative factor used to compute the new contention window. The simulation results obtained showed a good improvement of the original RAMAC scheme, leading to better approximate equal bandwidth share among all the mobile nodes in the wireless ad-hoc network

    Privacy-preserving wireless medical sensor network

    No full text
    In a wireless medical sensor network, the sensitive patient data is transmitted through the open air. It is more vulnerable to eavesdropping, spoofing, altering and replaying attacks, compared with the wired network. Some work has been done to secure the wireless medical sensor network using efficient symmetric key cryptosystems. The efforts can protect the patient data during transmission, but cannot stop the inside attack where the administrator of the patient database reveals the sensitive patient data. To prevent from the inside attack, more advanced cryptographic techniques, such as attribute-based encryption, may be used. However, it is too expensive to implement the techniques in the wireless sensor networks with low-power and low-cost sensor nodes. In this paper, we propose a practical approach to prevent from the inside attack by using Sharemind system, developed by Cybernetica to perform computations on input data without compromising its privacy. This paper has two main contributions. One contribution is proposing a lightweight encryption algorithm to protect the communication between the sensor node and the Sharemind system. Another contribution is employing Sharemind system to protect patient data privacy and support medical research
    corecore