Spirit: Security and Privacy in Real-Time Monitoring System Huafeng Wu, Chaojian Shi, Seiya Miyazaki
|
|
- Bertha Morris
- 8 years ago
- Views:
Transcription
1 Spirit: Security and Privacy in Real-Time Monitoring System Merchant Marine College, Shanghai Maritime University, Shanghai, , China doi: /jcit.vol5. issue10.4 Abstract In this paper, we investigate the effect of data size on mobile device s computing power for different security protocol. Based on the fact that the computing power efficiency of security protocol may depend on the data size, we propose a system prototype, Spirit, which can minimize its computation power by selecting the security protocol dynamically according to different data types which may be of different data size, such as blood pressure, brain wave, overall health status, etc.. 1. Introduction Keywords: Privacy, Rea-Time, Health Monitoring A new computing paradigm is emerging wherein users wear small monitoring devices, especially for medical conditions, that transmit selected information to a local wireless hub wherever at home, in the hospital, and potentially in public areas. The collected information is relayed to and summarized for medical staff and/or caregivers. The goal of this research is to explore the dimensions of security and privacy in a new data paradigm: real-time monitoring systems. Previous research has shown that small embedded systems in the form of a wrist watch incorporating accelerometers and sensors for light, sound and temperature can, with more than 90% accuracy, determine activity (standing, sitting, walking, running, driving, eating, etc.) using accelerometers and location using light and sound fingerprints [1-3]. This paper presents the partial work of the project Privacy and security in real time monitoring systems in which we will apply the machine learning algorithms we've developed for activity, location identification and "exceptional" behavior identification and deploy them for two populations: mobile workers and people with disabilities including the elderly. The target application will be monitoring feedback and encouraging the users to comply with goals set by a clinician or care-giver. We will explore the paradigm where sensors on mobile devices collect and analyze data to determine user activities. Either the user or a clinician, if the user is under medical guidance, will set activity goals that will be downloaded into the mobile device. The mobile device will monitor for compliance and give feedback to the user. In addition, summaries and notifications will be provided to the clinician or caregiver. All these communications should be secure, that means we would apply some security protocol to them. In addition, the user should have control over what information is given to whom, that means we also need to take some privacy mechanisms. Both of the applied security protocols and the privacy mechanisms could be over burdening on the system. To secure the communication, we may adopt different secure protocols which may bring different burden over the mobile device under different conditions, such as data size, network connectivity. We probably don t have one security protocol which suits all conditions. That makes us think about changing the applied secure protocol dynamically according to the current conditions. To implement such an idea, we firstly investigate the different effects on the device caused by different security protocols, such as 3DES, AES, and RC4. Based on the investigation results, we then propose a protocol adaption scheme, which dynamically change the applied secure protocol according to the different data types of that time. The remainder of this paper is organized as follows. In Section 2 we briefly introduce the system overview. The burden brought by different security protocols over the mobile device is investigated in Section 3. We then propose a secure protocol adaption scheme in Section 4. Section 5 is the related work. Finally we draw a conclusion in Section System overview
2 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 The system overview is shown as figure 1. In such a health monitoring system, there are mainly three components as follows: Figure 1. System overview Sensing device: like ewatch or Glucometer, it is a kind of wearable sensing, notification and computing platform, responsible for sensing the user s health status and even the activity. It can not only make notification on itself, but also transmit the sensed information to the cell phone carried by the users via Bluetooth. Cell phone: like Nokia N95, it is just a normal smart phone, however, with the special health monitoring application, which can communicate with the sensing device via Bluetooth, and with the remote monitoring server via some wireless network, such as Wi-Fi or GPRS. The application running on this device is used to manage the sensed health information and the feedback information respectively from the sensing devices and the remote monitoring server. These applications also provide UI to the users for privacy and security option setting. Remote monitoring server: it will receive the health status information from the users, and provide them for the interested person, such as the clinician or caregiver, who may send some feedback via the server to the user. Let s give an example of system s operation. Suppose a diabetic wearing a Glucometer which monitors the blood sugar and transmits the result to the cell phone. The phone then sends the information wirelessly to the server. The clinician could read the diabetic s blood sugar from the server and correspondingly write a feedback, suggesting to take one more or less tablet, to the diabetic. For the communication between the device and the server of such a system, it needs to encrypt/decrypt data all the time for protecting user privacy. However, the computational power of the monitoring and mobile devices is limited. In this paper, what we do is to secure the wireless communication between the cell phone and the network server with minimized mobile device s computing power and energy consumed. 3. Experiment To investigate the effects on the computing power of the cell phone by various applied secure protocols, we performed some experiments Experiment setup As in this heading, they should be Times New Roman 11-point boldface, initially capitalized, flush left, with one blank line before, and one after Server, client and network
3 In the client side, running on the cell phone Nokia 95, we use CarBide C++ to develop and compile a SSH (Secure Shell) client, and we also run a performance investigator on the client. While in the server side, running on the PC WinVista, we use Eclipse Java to develop a SocketManager Server, which keeps listening to the clients. The communication between the server and client is through Wi-Fi network ( b/g) Traffic Data According to the health monitoring scenario, we set the traffic, packet structure and the variable reporting rate respectively as shown in table 1, table 2 and table 3. Table 1. Traffic data Data Byte/Time Heart Beat 8Byte/Sec Blood Pressure 12Byte/Min Body Temperature 8Byte/Min Action Status 8Byte/Min Blood Sugar 8Byte/Hour Pulse Wave 520Byte/Sec Brain Wave 2052Byte/Sec Table 2. Packet structure Header (ID, Version, Time, etc) 4byte Type Header (Type, Body (Heart Beat) Len, etc) 4 byte 4byte * Len Type Header (Type, Body (Blood Pressure) Len, etc) 4 byte 8byte * Len Type Header (Type, Body (Body Temp) Len, etc) 4 byte 4byte * Len Type Header (Type, Body (Activity) 4byte * Len, etc) 4 byte Len Type Header (Type, Body (Blood Sugar) Len, etc) 4 byte 4byte * Len Type Header (Type, Body (Pulse Wave) Len, etc) 4 byte 512byte * Len Type Header (Type, Body (Brain Wave) Len, etc) 4 byte 2048byte * Len Footer (Checksum, etc) 4byte Table 3. Variable reporting rate Every Every Reporting Rate Second Minute Small Data (w/o Pulse wave, Brain wave) Every Hour 16 byte 52 byte 18 Kbyte Total Data (with Pulse wave, Brain wave) 2.5 Kbyte 150 Kbyte 9 Mbyte From table 3, we can see that the traffic data size varies with time, from 16B to 9MB. It could be envisioned that we may use different cipher to encrypt the data to minimize the CPU usage of the device. The data size in the table 3 provides us a reference to the data size setting of our experiment Secure protocol
4 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 The ciphers which we apply to the transmitted data mainly include the following 4 types: RC4: the most widely-used software stream cipher AES: a new encryption standard (Block cipher) DES: classical symmetric-key algorithm 3DES: three iterations of DES 3.2. Performance metrics We use the performance investigator program running in the mobile device to measure the mobile device s computing power and cell energy consumed by each of the secure protocols stated in section for transmitted data of different type (length). The computing power is described by duty cycle and the CPU usage pattern is as following figure 2. The highlighted area represents the CPU usage when it transmits data with encryption/decryption. Search Access Points List Open Menu Encrypt+Send Data Receive Data+Decrypt efile::loaderthread c32exe::esock_ip Figure 2. CPU usage monitoring ekern::spi2thread 3.3. Experimental results Through this experiment, we get the results of encryption CPU time as shown in figure 3. Figure 3. CPU Power usage vs. cipher and data size
5 The results show that DES uses less CPU than other three when data size is less than 100B. However, AES uses the least CPU when the data size is getting larger. That means the system could select different cipher dynamically according to the data size to minimize the CPU usage. We also get the cipher initialization time as following figure 4. Figure 4. Cipher initialization time In figure 4, it is illustrated that RC4 uses least CPU power. If the network condition is bad, these initialization costs have an effect on total CPU usage. 4. Cipher adaptation logic The experimental results imply kind of logic relationship between cipher and the data size as shown in figure 5. CPU 3DES AES Data Figure 5. Cipher adaption logic Based on the above logic and the cipher s own performance, we propose a security protocol adaption scheme as figure
6 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 Figure 6. Cipher adaption scheme Through using this cipher adaption scheme, we increase the system s cipher efficiency of CPU usage from 50% to 67% compared to when using only one kind of ciphers. 5. Related work There are a number of security schemes proposed for sensor networks in general [4, 5] but only a few of them focus on healthcare perspectives [6-9]. CodeBlue has implemented the ECC using only integer arithmetic on the MICA2. It generates a key in 35 seconds which is far from satisfactory [6]. Warren et al [7] utilizes hardware encryption supported by the ChipCon 2420 ZigBee-compliant RF transceiver on the Telos platform. The Advanced Encryption Standard (AES) hardware encryption in the CC2420 uses a 128-bit encryption key. The goal is to use one key per session, where the personal server shares the encryption key with all the sensors in the wireless BAN during the session initialization. The key is loaded on to the controller and used throughout the session. The global key sharing approach may not be suitable in the healthcare environment where an individual patient s data and privacy must be secured. Furthermore, there are some security considerations as highlighted in Naveen and David [8] which may reduce the security capability. The security issues discussed in [9] are mainly focused on key management for mobile sensor networks, where the identified (possible) solutions include sensor node fast authentication with handoff in hierarchical network architecture, and efficient key distribution in large distributed topology. However, the resource-constraint nature of sensor nodes raises stringent challenges in embedding the multi-layer security solution. More work and effort are therefore needed in this area to facilitate the wider application of pervasive computing in the healthcare industry for the benefit of the entire population. Different with above mentioned references, this paper takes another perspective: not trying to design a brand new security protocol, but to find out a security-protocol-adaptive scheme which could help select different protocol suitable for different scenario. 6. Summary We develop a prototype secure protocol adaptation scheme for real time health monitoring system, which could dynamically adapt the applied secure protocol to the transmitted data size to minimize the mobile device s CPU usage. This work is only the starting point of our efforts towards a secure and privacy real time monitoring system, Spirit. 7. Acknowledgment This work was supported by Innovation Program of Shanghai Municipal Education Commission (09YZ247) and Shanghai Leading Academic Discipline Project (S30602)
7 8. References [1] J. Chen, Karric Kwong, D. Chang, J. Luk and R. Bajcsy, Wearable Sensors for Reliable Fall Detection, Engineering in Medicine and Biology Society, IEEE-EMBS th Annual International Conference of the Volume, Issue, Jan pp [2] K. Pister, Ivy - A Sensor Network Infrastructure for the College of Engineering, URL: [3] M.J. Mathie, A.C. Coster, N.H. Lovell, and B.G. Celler, Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement, Physiol. Meas Apr;25(2):R1-20. [4] Adrian P, John S and David W: Security in wireless sensor networks, Commun ACM, 47, 2004, pp [5] Shi E and Perrig A: Designing secure sensor networks, Wireless Communications, IEEE, 11, 2004, pp [6] Lorincz K, Malan D J, Fulford-Jones T R F, Nawoj A, Clavel A, Shnayder V, Mainland G, Welsh M and Moulton S: Sensor networks for emergency response: challenges and opportunities, Pervasive Computing, IEEE, 3, 2004, pp [7] Warren S, Lebak J, Yao J, Creekmore J, Milenkovic A and Jovanov E: Interoperability and Security in Wireless Body Area Network Infrastructures, in 27th IEEE Annual Conference on Engineering in Medicine and Biology, EMBC Shanghai, China, [8] Naveen S and David W: Security considerations for IEEE networks, Proc of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, ACM Press (2004). [9] H. S. Ng, M. L. Sim and C. M. Tan, Security issues of wireless sensor networks in healthcare applications, BT Technology Journal Vol 24 No 2 April 144 l 2006 pp
WAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
More informationSecurity and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
More informationThe HYDRA project. Personal health monitoring
The HYDRA project A middleware platform for personal health monitoring Peter Rosengren, Technical Coordinator peter.rosengren@cnet.se IST-2005-034891 Personal health monitoring Patient has some medical
More informationAn ECG Monitoring and Alarming System Based On Android Smart Phone
Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android
More informationANDROID APPLICATION TO EXTRACT THE STATISTICS OF AN HPC CLUSTER
ANDROID APPLICATION TO EXTRACT THE STATISTICS OF AN HPC CLUSTER ABSTRACT S.Chakraborty, Miraz Nabi Azad, Sourav Sen, Pritomrit Bora Aditya Singh, Bipal Das and Mohd.Tabeesh Noori Department of Computer
More informationSecurity Issues in Biomedical Wireless Sensor Networks
Security Issues in Biomedical Wireless Sensor Networks Tassos Dimitriou, Krontiris Ioannis Athens Information Technology, 19002 Peania, Athens, Greece {tdim,ikro}@ait.edu.gr Abstract Within the hospital
More informationStudy of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application
More informationMonitoring the BlackBerry Enterprise Server
Monitoring the BlackBerry Enterprise Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationMedical Applications of Wireless Networks
Ranjana R.Chittal M.Tech(C.S.E), Dept. of C.S.E, R.V.C.E, Bangalore ranjana_chittal@yahoo.com Medical Applications of Wireless Networks Dr. Shobha G Assistant Professor, Dept. of C.S.E, R.V.C.E, Bangalore
More informationWireless Multimedia Technologies for Assisted Living
Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004) Challenges and Opportunities for Engineering Education, Research and Development 2-4 June
More informationA Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
More informationUsing Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare
Using Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare Patrick Crilly 1, Vallipuram Muthukkumarasamy 2 School of Information and Communication Technology, Griffith University,
More informationDepiction of Body Area Network in Cloud Environment
I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5
More informationPrivacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
More informationDesign of Home Automation Framework With Social Network Integration
Design of Home Automation Framework With Social Network Integration Warodom Werapun, Amatawit Kamhang, Aekawat Wachiraphan Department of Computer Engineering, Faculty of Engineering Prince of Songkla University
More informationRemote Patient Monitoring- An Implementation in ICU Ward
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,
More informationANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ABSTRACT K. Krishnakanth 1 and P. Kavipriya 2 1 M.E Embedded Systems, Sathyabama University, Chennai, India. krishnakoneru99@gmail.com
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationDesign and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
More informationA PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
More informationWireless Sensors and Control Networks: Enabling New Opportunities with ZigBee
Wireless Sensors and Control Networks: Enabling New Opportunities with ZigBee Bob Heile Chairman, ZigBee Alliance October 12, 2006 Copyright 2006 ZigBee TM Alliance. All Rights Reserved. From Popular Science
More informationPerformance Oriented Management System for Reconfigurable Network Appliances
Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate
More informationPerformance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
More informationDT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications
Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications Felix Büsching, Maximiliano Bottazzi, Wolf-Bastian
More informationFig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationWireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
More informationRESEARCH OF IOT CONCEPT IN MONITORING THE ACTIVITIES OF THE ELDERLY PERSON
Proceedings of the 7 th International Conference Day of New technologies (DoNT 2015), 12. November 2015, Žilina, Slovakia republic, p. 66-75. ISBN 978-80-554-0932-0 University of Žilina, the Faculty of
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationSmart Systems: the key enabling technology for future IoT
Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationHigh-Speed Thin Client Technology for Mobile Environment: Mobile RVEC
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from
More informationTowards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain
Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,
More informationIntroducing BEEKS Proximity Solutions. Developer Kit Gets You Started
Introducing BEEKS Proximity Solutions BEEKS from BluVision provides industry-leading Bluetooth beacon solutions to enterprises and innovative developers. Leveraging a cutting-edge, cloudbased solution,
More informationTOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
More informationImplementation of Smart Homes and Industrial Automation System with Secure Communication over GSM
Universal Journal of Electrical and Electronic Engineering 3(4): 125-131, 2015 DOI: 10.13189/ujeee.2015.030403 http://www.hrpub.org Implementation of Smart Homes and Industrial Automation System with Secure
More informationA Smart Phone-based Personal Area Network for Remote Monitoring of Biosignals
A Smart Phone-based Personal Area Network for Remote Monitoring of Biosignals M.J. Morón, J.R. Luque, A.A. Botella, E.J. Cuberos, E. Casilari and A. Diaz-Estrella Dpto. Tecnología Electrónica, University
More informationReport of Research Results
Report of Research Results Scaling and Deployment of e-guardian to Eldercare Centers and Single Elderly Homes Primary Researcher: Prof. Tan Kok Kiong, Department of Electrical and Computer Engineering
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationEvaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
More informationA LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION
A LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION Veysel Aslantas Rifat Kurban Tuba Caglikantar e-mail: aslantas@erciyes.edu.tr e-mail: rkurban@erciyes.edu.tr
More informationSecurity in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationMeasurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
More informationAnnual review FLORENCE 2013. WP4 Network: prototypes
Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and
More informationWIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationSpring 2014. Final Project Report
ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca
More informationOpen Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationCurrent and Future Trends in Medical Electronics
Current and Future Trends in Medical Electronics By Steven Dean, Medical Marketing Director, Texas Instruments www.arrownac.com 800.833.3557 Current and Future Trends in Medical Electronics By Steven Dean,
More informationSTMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!
SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationReal Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
More informationCS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends
More informationA Wireless Medical Monitoring Over a Heterogeneous Sensor Network
A Wireless Medical Monitoring Over a Heterogeneous Sensor Network Mehmet R. Yuce, Peng Choong Ng, Chin K. Lee, Jamil Y. Khan, and Wentai Liu Abstract This paper presents a heterogeneous sensor network
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationWaspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
More informationAuthentication is not Authorization?! And what is a "digital signature" anyway?
Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information
More informationA WSN healthcare monitoring system for elderly people in geriatric facilities
Digital Healthcare Empowering Europeans R. Cornet et al. (Eds.) 2015 European Federation for Medical Informatics (EFMI). This article is published online with Open Access by IOS Press and distributed under
More informationOpus Guide for IT Managers
Opus Guide for IT Managers Table of Contents Introduction...1 System Requirements...2 Configuration...3 Integration...3 Networking...3 Security...5 Interconnectivity...6 History Archival Sizing...7 Introduction
More informationPerformance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
More informationA MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
More informationDesign of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2
Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.
More informationChapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
More informationWireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More informationWireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
More informationSummer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
More informationJournal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.
More informationVulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3
Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3 1. Abstract Wired Equivalent Privacy (WEP) was the first encryption scheme used for protecting wireless traffic. It consisted of a private
More informationMobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
More informationDETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES
IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department
More informationDisfer. Sink - Sensor Connectivity and Sensor Android Application. Protocol implementation: Charilaos Stais (stais AT aueb.gr)
Disfer Sink - Sensor Connectivity and Sensor Android Application Protocol implementation: Charilaos Stais (stais AT aueb.gr) Android development: Dimitri Balerinas (dimi.balerinas AT gmail.com) Supervised
More informationOther VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationData Loggers for Real Time Temperature Monitoring - WiFi
Data Loggers for Real Time Temperature Monitoring - WiFi Main Features Complete standalone system. Even if computer/network does not operate the recording system will continue to record without any interruption.
More informationPerformance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing
Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing Muhammad Tariq Afridi 1, Safdar Nawaz Khan Marwat 1, Yasir Mehmood 2, Jebran Khan 1, Carmelita Görg 2 1 Department of Computer
More informationThe topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications.
The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. 1 Study Approach We have performed a study to analyze Smart Grid Communication
More informationSSH Secure Shell. What is SSH?
Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationIntroduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
More informationEXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M
EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M STRATEGIC WHITE PAPER INTRODUCTION Machine-to-machine (M2M) communications is on the rise. Most mobile network operators (MNOs) are turning to M2M
More informationA Study for Home and Mobile U-Healthcare System
, pp. 255-260 http://dx.doi.org/10.14257/ijseia.2015.9.5.24 A Study for Home and Mobile U-Healthcare System Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic University
More informationWlan Monitoring Using Android Phone
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.23-27 Wlan Monitoring Using Android Phone Pooja Chaudhary
More informationCSci 530 Midterm Exam. Fall 2012
CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers
More informationSemi-Automatic Generation of Monitoring Applications for Wireless Networks
Semi-Automatic Generation of Monitoring Applications for Wireless Networks André Lins, Eduardo F. Nakamura, Lincoln S. Rocha, Antônio A.F. Loureiro, Claudionor J.N. Coelho Jr. Department of Technological
More informationBluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
More informationResearch on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang
International Conference on Computational Science and Engineering (ICCSE 2015) Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang Informatization
More informationTitle Page. Hosted Payment Page Guide ACI Commerce Gateway
Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is
More informationBest Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
More informationThe Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial
More informationThe BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware
More informationAs enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
More information