562 research outputs found

    An Assessment of Single-Channel EMG Sensing for Gestural Input

    Get PDF
    Wearable devices of all kinds are becoming increasingly popular. One problem that plagues wearable devices, however, is how to interact with them. In this paper we construct a prototype electromyography (EMG) sensing device that captures a single channel of EMG sensor data corresponding to user gestures. We also implement a machine learning pipeline to recognize gestural input received via our prototype sensing device. Our goal is to assess the feasibility of using a BITalino EMG sensor to recognize gestural input on a mobile health (mHealth) wearable device known as Amulet. We conduct three experiments in which we use the EMG sensor to collect gestural input data from (1) the wrist, (2) the forearm, and (3) the bicep. Our results show that a single channel EMG sensor located near the wrist may be a viable approach to reliably recognizing simple gestures without mistaking them for common daily activities such as drinking from a cup, walking, or talking while moving your arms

    A Survey of Trustworthy Computing on Mobile & Wearable Systems

    Get PDF
    Mobile and wearable systems have generated unprecedented interest in recent years, particularly in the domain of mobile health (mHealth) where carried or worn devices are used to collect health-related information about the observed person. Much of the information - whether physiological, behavioral, or social - collected by mHealth systems is sensitive and highly personal; it follows that mHealth systems should, at the very least, be deployed with mechanisms suitable for ensuring confidentiality of the data it collects. Additional properties - such as integrity of the data, source authentication of data, and data freshness - are also desirable to address other security, privacy, and safety issues. Developing systems that are robust against capable adversaries (including physical attacks) is, and has been, an active area of research. While techniques for protecting systems that handle sensitive data are well-known today, many of the solutions in use today are not well suited for mobile and wearable systems, which are typically limited with respect to power, memory, computation, and other capabilities. In this paper we look at prior research on developing trustworthy mobile and wearable systems. To survey this topic we begin by discussing solutions for securing computing systems that are not subject to the type of strict constraints associated with mobile and wearable systems. Next, we present other efforts to design and implement trustworthy mobile and wearable systems. We end with a discussion of future directions

    Trustworthy Wireless Personal Area Networks

    Get PDF
    In the Internet of Things (IoT), everyday objects are equipped with the ability to compute and communicate. These smart things have invaded the lives of everyday people, being constantly carried or worn on our bodies, and entering into our homes, our healthcare, and beyond. This has given rise to wireless networks of smart, connected, always-on, personal things that are constantly around us, and have unfettered access to our most personal data as well as all of the other devices that we own and encounter throughout our day. It should, therefore, come as no surprise that our personal devices and data are frequent targets of ever-present threats. Securing these devices and networks, however, is challenging. In this dissertation, we outline three critical problems in the context of Wireless Personal Area Networks (WPANs) and present our solutions to these problems. First, I present our Trusted I/O solution (BASTION-SGX) for protecting sensitive user data transferred between wirelessly connected (Bluetooth) devices. This work shows how in-transit data can be protected from privileged threats, such as a compromised OS, on commodity systems. I present insights into the Bluetooth architecture, Intel’s Software Guard Extensions (SGX), and how a Trusted I/O solution can be engineered on commodity devices equipped with SGX. Second, I present our work on AMULET and how we successfully built a wearable health hub that can run multiple health applications, provide strong security properties, and operate on a single charge for weeks or even months at a time. I present the design and evaluation of our highly efficient event-driven programming model, the design of our low-power operating system, and developer tools for profiling ultra-low-power applications at compile time. Third, I present a new approach (VIA) that helps devices at the center of WPANs (e.g., smartphones) to verify the authenticity of interactions with other devices. This work builds on past work in anomaly detection techniques and shows how these techniques can be applied to Bluetooth network traffic. Specifically, we show how to create normality models based on fine- and course-grained insights from network traffic, which can be used to verify the authenticity of future interactions

    Amulet: a Secure Architecture for Mhealth Applications for Low-Power Wearable Devices

    Get PDF
    Interest in using mobile technologies for health-related applications (mHealth) has increased. However, none of the available mobile platforms provide the essential properties that are needed by these applications. An mHealth platform must be (i) secure; (ii) provide high availability; and (iii) allow for the deployment of multiple third-party mHealth applications that share access to an individual\u27s devices and data. Smartphones may not be able to provide property (ii) because there are activities and situations in which an individual may not be able to carry them (e.g., while in a contact sport). A low-power wearable device can provide higher availability, remaining attached to the user during most activities. Furthermore, some mHealth applications require integrating multiple on-body or near-body devices, some owned by a single individual, but others shared with multiple individuals. In this paper, we propose a secure system architecture for a low-power bracelet that can run multiple applications and manage access to shared resources in a body-area mHealth network. The wearer can install a personalized mix of third-party applications to support the monitoring of multiple medical conditions or wellness goals, with strong security safeguards. Our preliminary implementation and evaluation supports the hypothesis that our approach allows for the implementation of a resource monitor on far less power than would be consumed by a mobile device running Linux or Android. Our preliminary experiments demonstrate that our secure architecture would enable applications to run for several weeks on a small wearable device without recharging

    The Amulet Wearable Platform: Demo Abstract

    Get PDF
    In this demonstration we present the Amulet Platform; a hardware and software platform for developing energy- and resource-efficient applications on multi-application wearable devices. This platform, which includes the Amulet Firmware Toolchain, the Amulet Runtime, the ARP-View graphical tool, and open reference hardware, efficiently protects applications from each other without MMU support, allows developers to interactively explore how their implementation decisions impact battery life without the need for hardware modeling and additional software development, and represents a new approach to developing long-lived wearable applications. We envision the Amulet Platform enabling long-duration experiments on human subjects in a wide variety of studies

    Amulet: An Energy-Efficient, Multi-Application Wearable Platform

    Get PDF
    Wearable technology enables a range of exciting new applications in health, commerce, and beyond. For many important applications, wearables must have battery life measured in weeks or months, not hours and days as in most current devices. Our vision of wearable platforms aims for long battery life but with the flexibility and security to support multiple applications. To achieve long battery life with a workload comprising apps from multiple developers, these platforms must have robust mechanisms for app isolation and developer tools for optimizing resource usage.\r\n\r\nWe introduce the Amulet Platform for constrained wearable devices, which includes an ultra-low-power hardware architecture and a companion software framework, including a highly efficient event-driven programming model, low-power operating system, and developer tools for profiling ultra-low-power applications at compile time. We present the design and evaluation of our prototype Amulet hardware and software, and show how the framework enables developers to write energy-efficient applications. Our prototype has battery lifetime lasting weeks or even months, depending on the application, and our interactive resource-profiling tool predicts battery lifetime within 6-10% of the measured lifetime

    Local and regional ecological morphology of dung beetle assemblages across four biogeographic regions

    Get PDF
    Aim Niche partitioning within species assemblages is thought to influence species packing and/or total niche space occupied. The evolution of dung beetles (Scarabaeinae) is likely to have been strongly influenced by inter-specific competition, leading to niche partitioning. We consider whether local-scale processes leave a signature in regional patterns of functional diversity in dung beetle assemblages, and investigate the correlation between total exploited ecomorphological space and density of species packing with increased species richness. We test whether ecomorphological space occupied by local assemblages reflects that of their regional species pool, and the extent to which ecomorphological space is convergent or divergent within functional groups across regional pools. Location Neotropics, Africa, Australia and Madagascar. Methods Dung beetle assemblages were collected in a standardized manner from four biogeographic regions. Ecomorphological similarity among the assemblages was assessed by multivariate analysis of 19 linear measurements for 300 species and three functional nesting types (roller, tunneller or dweller), firstly on a local level within the Neotropics and Afrotropics, and then between the regional species pools. Results Key body measurements, in particular the hind tibia, separated rollers and tunnellers into largely non-overlapping entities along the first three axes of the shape analysis. Three Neotropical assemblages, which vary widely in species numbers, each harboured a similar amount of morphometric variation, resulting in increasingly dense species packing with greater species richness. Similar findings were obtained in two South African assemblages. Assemblages in the four biogeographic regions showed largely similar distributions of ecomorphological variation, including the separation of rollers and tunnellers, despite their distant phylogenetic relationships. Ecomorphological similarity among regions was particularly high in tunnellers, whilst the rollers exhibited greater regional differentiation. Main conclusions Local assemblages evidently represent the full diversity of functional groups available in the regional pool, even in species-poor assemblages. There is a strong trend towards convergence in morphology separating tunnellers and rollers in phylogenetically independent lineages. The ecomorphological similarity of regional assemblages suggests that morphological convergence is the result of common selective forces active within the assemblages themselves. This lends support to the widely hypothesized effect of inter-specific interactions and niche partitioning in determining assemblage composition and lineage evolution in the Scarabaeinae. © 2011 Blackwell Publishing Ltd

    A possible new syndrome with growth-hormone secreting pituitary adenoma, colonic polyposis, lipomatosis, lentigines and renal carcinoma in association with familial testicular germ cell malignancy: A case report

    Get PDF
    BACKGROUND: Germ-cell testicular cancer has not been definitively linked to any known hereditary cancer susceptibility disorder. Familial testicular cancer in the presence of other findings in affected and unaffected family members might indicate a previously-unidentified hereditary cancer syndrome. CASE PRESENTATION: The patient was diagnosed with a left testicular seminoma at age 28, and treated with left orchiectomy followed by adjuvant cobalt radiation. His family history is significant for testicular seminoma in his son, bladder cancer in his sister, and lipomatosis in his father. His evaluation as part of an etiologic study of familial testicular cancer revealed multiple colon polyps (adenomatous, hyperplastic, and hamartomatous) first found in his 50 s, multiple lipomas, multiple hyperpigmented skin lesions, left kidney cancer diagnosed at age 64, and a growth-hormone producing pituitary adenoma with associated acromegaly diagnosed at age 64. The patient underwent genetic testing for Cowden syndrome (PTEN gene), Carney complex (PRKAR1A gene), and multiple endocrine neoplasia syndrome type 1 (MEN1 gene); no deleterious mutations were identified. DISCUSSION: The constellation of benign and malignant neoplasms in the context of this patient's familial testicular cancer raised the possibility that these might be manifestations of a known hereditary susceptibility cancer syndrome; however, genetic testing for the three syndromes that were most likely to explain these findings did not show any mutation. Alternatively, this family's phenotype might represent a novel neoplasm susceptibility disorder. This possibility cannot be evaluated definitively on the basis of a single case report; additional observations and studies are necessary to investigate this hypothesis further
    • …
    corecore