Spirit: Security and Privacy in Real-Time Monitoring System Huafeng Wu, Chaojian Shi, Seiya Miyazaki

Size: px
Start display at page:

Download "Spirit: Security and Privacy in Real-Time Monitoring System Huafeng Wu, Chaojian Shi, Seiya Miyazaki"

Transcription

1 Spirit: Security and Privacy in Real-Time Monitoring System Merchant Marine College, Shanghai Maritime University, Shanghai, , China doi: /jcit.vol5. issue10.4 Abstract In this paper, we investigate the effect of data size on mobile device s computing power for different security protocol. Based on the fact that the computing power efficiency of security protocol may depend on the data size, we propose a system prototype, Spirit, which can minimize its computation power by selecting the security protocol dynamically according to different data types which may be of different data size, such as blood pressure, brain wave, overall health status, etc.. 1. Introduction Keywords: Privacy, Rea-Time, Health Monitoring A new computing paradigm is emerging wherein users wear small monitoring devices, especially for medical conditions, that transmit selected information to a local wireless hub wherever at home, in the hospital, and potentially in public areas. The collected information is relayed to and summarized for medical staff and/or caregivers. The goal of this research is to explore the dimensions of security and privacy in a new data paradigm: real-time monitoring systems. Previous research has shown that small embedded systems in the form of a wrist watch incorporating accelerometers and sensors for light, sound and temperature can, with more than 90% accuracy, determine activity (standing, sitting, walking, running, driving, eating, etc.) using accelerometers and location using light and sound fingerprints [1-3]. This paper presents the partial work of the project Privacy and security in real time monitoring systems in which we will apply the machine learning algorithms we've developed for activity, location identification and "exceptional" behavior identification and deploy them for two populations: mobile workers and people with disabilities including the elderly. The target application will be monitoring feedback and encouraging the users to comply with goals set by a clinician or care-giver. We will explore the paradigm where sensors on mobile devices collect and analyze data to determine user activities. Either the user or a clinician, if the user is under medical guidance, will set activity goals that will be downloaded into the mobile device. The mobile device will monitor for compliance and give feedback to the user. In addition, summaries and notifications will be provided to the clinician or caregiver. All these communications should be secure, that means we would apply some security protocol to them. In addition, the user should have control over what information is given to whom, that means we also need to take some privacy mechanisms. Both of the applied security protocols and the privacy mechanisms could be over burdening on the system. To secure the communication, we may adopt different secure protocols which may bring different burden over the mobile device under different conditions, such as data size, network connectivity. We probably don t have one security protocol which suits all conditions. That makes us think about changing the applied secure protocol dynamically according to the current conditions. To implement such an idea, we firstly investigate the different effects on the device caused by different security protocols, such as 3DES, AES, and RC4. Based on the investigation results, we then propose a protocol adaption scheme, which dynamically change the applied secure protocol according to the different data types of that time. The remainder of this paper is organized as follows. In Section 2 we briefly introduce the system overview. The burden brought by different security protocols over the mobile device is investigated in Section 3. We then propose a secure protocol adaption scheme in Section 4. Section 5 is the related work. Finally we draw a conclusion in Section System overview

2 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 The system overview is shown as figure 1. In such a health monitoring system, there are mainly three components as follows: Figure 1. System overview Sensing device: like ewatch or Glucometer, it is a kind of wearable sensing, notification and computing platform, responsible for sensing the user s health status and even the activity. It can not only make notification on itself, but also transmit the sensed information to the cell phone carried by the users via Bluetooth. Cell phone: like Nokia N95, it is just a normal smart phone, however, with the special health monitoring application, which can communicate with the sensing device via Bluetooth, and with the remote monitoring server via some wireless network, such as Wi-Fi or GPRS. The application running on this device is used to manage the sensed health information and the feedback information respectively from the sensing devices and the remote monitoring server. These applications also provide UI to the users for privacy and security option setting. Remote monitoring server: it will receive the health status information from the users, and provide them for the interested person, such as the clinician or caregiver, who may send some feedback via the server to the user. Let s give an example of system s operation. Suppose a diabetic wearing a Glucometer which monitors the blood sugar and transmits the result to the cell phone. The phone then sends the information wirelessly to the server. The clinician could read the diabetic s blood sugar from the server and correspondingly write a feedback, suggesting to take one more or less tablet, to the diabetic. For the communication between the device and the server of such a system, it needs to encrypt/decrypt data all the time for protecting user privacy. However, the computational power of the monitoring and mobile devices is limited. In this paper, what we do is to secure the wireless communication between the cell phone and the network server with minimized mobile device s computing power and energy consumed. 3. Experiment To investigate the effects on the computing power of the cell phone by various applied secure protocols, we performed some experiments Experiment setup As in this heading, they should be Times New Roman 11-point boldface, initially capitalized, flush left, with one blank line before, and one after Server, client and network

3 In the client side, running on the cell phone Nokia 95, we use CarBide C++ to develop and compile a SSH (Secure Shell) client, and we also run a performance investigator on the client. While in the server side, running on the PC WinVista, we use Eclipse Java to develop a SocketManager Server, which keeps listening to the clients. The communication between the server and client is through Wi-Fi network ( b/g) Traffic Data According to the health monitoring scenario, we set the traffic, packet structure and the variable reporting rate respectively as shown in table 1, table 2 and table 3. Table 1. Traffic data Data Byte/Time Heart Beat 8Byte/Sec Blood Pressure 12Byte/Min Body Temperature 8Byte/Min Action Status 8Byte/Min Blood Sugar 8Byte/Hour Pulse Wave 520Byte/Sec Brain Wave 2052Byte/Sec Table 2. Packet structure Header (ID, Version, Time, etc) 4byte Type Header (Type, Body (Heart Beat) Len, etc) 4 byte 4byte * Len Type Header (Type, Body (Blood Pressure) Len, etc) 4 byte 8byte * Len Type Header (Type, Body (Body Temp) Len, etc) 4 byte 4byte * Len Type Header (Type, Body (Activity) 4byte * Len, etc) 4 byte Len Type Header (Type, Body (Blood Sugar) Len, etc) 4 byte 4byte * Len Type Header (Type, Body (Pulse Wave) Len, etc) 4 byte 512byte * Len Type Header (Type, Body (Brain Wave) Len, etc) 4 byte 2048byte * Len Footer (Checksum, etc) 4byte Table 3. Variable reporting rate Every Every Reporting Rate Second Minute Small Data (w/o Pulse wave, Brain wave) Every Hour 16 byte 52 byte 18 Kbyte Total Data (with Pulse wave, Brain wave) 2.5 Kbyte 150 Kbyte 9 Mbyte From table 3, we can see that the traffic data size varies with time, from 16B to 9MB. It could be envisioned that we may use different cipher to encrypt the data to minimize the CPU usage of the device. The data size in the table 3 provides us a reference to the data size setting of our experiment Secure protocol

4 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 The ciphers which we apply to the transmitted data mainly include the following 4 types: RC4: the most widely-used software stream cipher AES: a new encryption standard (Block cipher) DES: classical symmetric-key algorithm 3DES: three iterations of DES 3.2. Performance metrics We use the performance investigator program running in the mobile device to measure the mobile device s computing power and cell energy consumed by each of the secure protocols stated in section for transmitted data of different type (length). The computing power is described by duty cycle and the CPU usage pattern is as following figure 2. The highlighted area represents the CPU usage when it transmits data with encryption/decryption. Search Access Points List Open Menu Encrypt+Send Data Receive Data+Decrypt efile::loaderthread c32exe::esock_ip Figure 2. CPU usage monitoring ekern::spi2thread 3.3. Experimental results Through this experiment, we get the results of encryption CPU time as shown in figure 3. Figure 3. CPU Power usage vs. cipher and data size

5 The results show that DES uses less CPU than other three when data size is less than 100B. However, AES uses the least CPU when the data size is getting larger. That means the system could select different cipher dynamically according to the data size to minimize the CPU usage. We also get the cipher initialization time as following figure 4. Figure 4. Cipher initialization time In figure 4, it is illustrated that RC4 uses least CPU power. If the network condition is bad, these initialization costs have an effect on total CPU usage. 4. Cipher adaptation logic The experimental results imply kind of logic relationship between cipher and the data size as shown in figure 5. CPU 3DES AES Data Figure 5. Cipher adaption logic Based on the above logic and the cipher s own performance, we propose a security protocol adaption scheme as figure

6 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 Figure 6. Cipher adaption scheme Through using this cipher adaption scheme, we increase the system s cipher efficiency of CPU usage from 50% to 67% compared to when using only one kind of ciphers. 5. Related work There are a number of security schemes proposed for sensor networks in general [4, 5] but only a few of them focus on healthcare perspectives [6-9]. CodeBlue has implemented the ECC using only integer arithmetic on the MICA2. It generates a key in 35 seconds which is far from satisfactory [6]. Warren et al [7] utilizes hardware encryption supported by the ChipCon 2420 ZigBee-compliant RF transceiver on the Telos platform. The Advanced Encryption Standard (AES) hardware encryption in the CC2420 uses a 128-bit encryption key. The goal is to use one key per session, where the personal server shares the encryption key with all the sensors in the wireless BAN during the session initialization. The key is loaded on to the controller and used throughout the session. The global key sharing approach may not be suitable in the healthcare environment where an individual patient s data and privacy must be secured. Furthermore, there are some security considerations as highlighted in Naveen and David [8] which may reduce the security capability. The security issues discussed in [9] are mainly focused on key management for mobile sensor networks, where the identified (possible) solutions include sensor node fast authentication with handoff in hierarchical network architecture, and efficient key distribution in large distributed topology. However, the resource-constraint nature of sensor nodes raises stringent challenges in embedding the multi-layer security solution. More work and effort are therefore needed in this area to facilitate the wider application of pervasive computing in the healthcare industry for the benefit of the entire population. Different with above mentioned references, this paper takes another perspective: not trying to design a brand new security protocol, but to find out a security-protocol-adaptive scheme which could help select different protocol suitable for different scenario. 6. Summary We develop a prototype secure protocol adaptation scheme for real time health monitoring system, which could dynamically adapt the applied secure protocol to the transmitted data size to minimize the mobile device s CPU usage. This work is only the starting point of our efforts towards a secure and privacy real time monitoring system, Spirit. 7. Acknowledgment This work was supported by Innovation Program of Shanghai Municipal Education Commission (09YZ247) and Shanghai Leading Academic Discipline Project (S30602)

7 8. References [1] J. Chen, Karric Kwong, D. Chang, J. Luk and R. Bajcsy, Wearable Sensors for Reliable Fall Detection, Engineering in Medicine and Biology Society, IEEE-EMBS th Annual International Conference of the Volume, Issue, Jan pp [2] K. Pister, Ivy - A Sensor Network Infrastructure for the College of Engineering, URL: [3] M.J. Mathie, A.C. Coster, N.H. Lovell, and B.G. Celler, Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement, Physiol. Meas Apr;25(2):R1-20. [4] Adrian P, John S and David W: Security in wireless sensor networks, Commun ACM, 47, 2004, pp [5] Shi E and Perrig A: Designing secure sensor networks, Wireless Communications, IEEE, 11, 2004, pp [6] Lorincz K, Malan D J, Fulford-Jones T R F, Nawoj A, Clavel A, Shnayder V, Mainland G, Welsh M and Moulton S: Sensor networks for emergency response: challenges and opportunities, Pervasive Computing, IEEE, 3, 2004, pp [7] Warren S, Lebak J, Yao J, Creekmore J, Milenkovic A and Jovanov E: Interoperability and Security in Wireless Body Area Network Infrastructures, in 27th IEEE Annual Conference on Engineering in Medicine and Biology, EMBC Shanghai, China, [8] Naveen S and David W: Security considerations for IEEE networks, Proc of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, ACM Press (2004). [9] H. S. Ng, M. L. Sim and C. M. Tan, Security issues of wireless sensor networks in healthcare applications, BT Technology Journal Vol 24 No 2 April 144 l 2006 pp

WAITER: A Wearable Personal Healthcare and Emergency Aid System

WAITER: A Wearable Personal Healthcare and Emergency Aid System Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping

More information

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Security and Privacy Issues in Wireless Sensor Networks for Healthcare Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring

More information

The HYDRA project. Personal health monitoring

The HYDRA project. Personal health monitoring The HYDRA project A middleware platform for personal health monitoring Peter Rosengren, Technical Coordinator peter.rosengren@cnet.se IST-2005-034891 Personal health monitoring Patient has some medical

More information

An ECG Monitoring and Alarming System Based On Android Smart Phone

An ECG Monitoring and Alarming System Based On Android Smart Phone Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android

More information

ANDROID APPLICATION TO EXTRACT THE STATISTICS OF AN HPC CLUSTER

ANDROID APPLICATION TO EXTRACT THE STATISTICS OF AN HPC CLUSTER ANDROID APPLICATION TO EXTRACT THE STATISTICS OF AN HPC CLUSTER ABSTRACT S.Chakraborty, Miraz Nabi Azad, Sourav Sen, Pritomrit Bora Aditya Singh, Bipal Das and Mohd.Tabeesh Noori Department of Computer

More information

Security Issues in Biomedical Wireless Sensor Networks

Security Issues in Biomedical Wireless Sensor Networks Security Issues in Biomedical Wireless Sensor Networks Tassos Dimitriou, Krontiris Ioannis Athens Information Technology, 19002 Peania, Athens, Greece {tdim,ikro}@ait.edu.gr Abstract Within the hospital

More information

Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract

Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application

More information

Monitoring the BlackBerry Enterprise Server

Monitoring the BlackBerry Enterprise Server Monitoring the BlackBerry Enterprise Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Medical Applications of Wireless Networks

Medical Applications of Wireless Networks Ranjana R.Chittal M.Tech(C.S.E), Dept. of C.S.E, R.V.C.E, Bangalore ranjana_chittal@yahoo.com Medical Applications of Wireless Networks Dr. Shobha G Assistant Professor, Dept. of C.S.E, R.V.C.E, Bangalore

More information

Wireless Multimedia Technologies for Assisted Living

Wireless Multimedia Technologies for Assisted Living Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004) Challenges and Opportunities for Engineering Education, Research and Development 2-4 June

More information

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System , pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133

More information

Using Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare

Using Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare Using Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare Patrick Crilly 1, Vallipuram Muthukkumarasamy 2 School of Information and Communication Technology, Griffith University,

More information

Depiction of Body Area Network in Cloud Environment

Depiction of Body Area Network in Cloud Environment I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Design of Home Automation Framework With Social Network Integration

Design of Home Automation Framework With Social Network Integration Design of Home Automation Framework With Social Network Integration Warodom Werapun, Amatawit Kamhang, Aekawat Wachiraphan Department of Computer Engineering, Faculty of Engineering Prince of Songkla University

More information

Remote Patient Monitoring- An Implementation in ICU Ward

Remote Patient Monitoring- An Implementation in ICU Ward 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,

More information

ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES

ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ABSTRACT K. Krishnakanth 1 and P. Kavipriya 2 1 M.E Embedded Systems, Sathyabama University, Chennai, India. krishnakoneru99@gmail.com

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

Wireless Sensors and Control Networks: Enabling New Opportunities with ZigBee

Wireless Sensors and Control Networks: Enabling New Opportunities with ZigBee Wireless Sensors and Control Networks: Enabling New Opportunities with ZigBee Bob Heile Chairman, ZigBee Alliance October 12, 2006 Copyright 2006 ZigBee TM Alliance. All Rights Reserved. From Popular Science

More information

Performance Oriented Management System for Reconfigurable Network Appliances

Performance Oriented Management System for Reconfigurable Network Appliances Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications

DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications Felix Büsching, Maximiliano Bottazzi, Wolf-Bastian

More information

Fig. 1 BAN Architecture III. ATMEL BOARD

Fig. 1 BAN Architecture III. ATMEL BOARD Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

RESEARCH OF IOT CONCEPT IN MONITORING THE ACTIVITIES OF THE ELDERLY PERSON

RESEARCH OF IOT CONCEPT IN MONITORING THE ACTIVITIES OF THE ELDERLY PERSON Proceedings of the 7 th International Conference Day of New technologies (DoNT 2015), 12. November 2015, Žilina, Slovakia republic, p. 66-75. ISBN 978-80-554-0932-0 University of Žilina, the Faculty of

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

Smart Systems: the key enabling technology for future IoT

Smart Systems: the key enabling technology for future IoT Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC

High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Introducing BEEKS Proximity Solutions. Developer Kit Gets You Started

Introducing BEEKS Proximity Solutions. Developer Kit Gets You Started Introducing BEEKS Proximity Solutions BEEKS from BluVision provides industry-leading Bluetooth beacon solutions to enterprises and innovative developers. Leveraging a cutting-edge, cloudbased solution,

More information

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP

More information

Implementation of Smart Homes and Industrial Automation System with Secure Communication over GSM

Implementation of Smart Homes and Industrial Automation System with Secure Communication over GSM Universal Journal of Electrical and Electronic Engineering 3(4): 125-131, 2015 DOI: 10.13189/ujeee.2015.030403 http://www.hrpub.org Implementation of Smart Homes and Industrial Automation System with Secure

More information

A Smart Phone-based Personal Area Network for Remote Monitoring of Biosignals

A Smart Phone-based Personal Area Network for Remote Monitoring of Biosignals A Smart Phone-based Personal Area Network for Remote Monitoring of Biosignals M.J. Morón, J.R. Luque, A.A. Botella, E.J. Cuberos, E. Casilari and A. Diaz-Estrella Dpto. Tecnología Electrónica, University

More information

Report of Research Results

Report of Research Results Report of Research Results Scaling and Deployment of e-guardian to Eldercare Centers and Single Elderly Homes Primary Researcher: Prof. Tan Kok Kiong, Department of Electrical and Computer Engineering

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

A LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION

A LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION A LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION Veysel Aslantas Rifat Kurban Tuba Caglikantar e-mail: aslantas@erciyes.edu.tr e-mail: rkurban@erciyes.edu.tr

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified

More information

Annual review FLORENCE 2013. WP4 Network: prototypes

Annual review FLORENCE 2013. WP4 Network: prototypes Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Spring 2014. Final Project Report

Spring 2014. Final Project Report ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Current and Future Trends in Medical Electronics

Current and Future Trends in Medical Electronics Current and Future Trends in Medical Electronics By Steven Dean, Medical Marketing Director, Texas Instruments www.arrownac.com 800.833.3557 Current and Future Trends in Medical Electronics By Steven Dean,

More information

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU! SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu

CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends

More information

A Wireless Medical Monitoring Over a Heterogeneous Sensor Network

A Wireless Medical Monitoring Over a Heterogeneous Sensor Network A Wireless Medical Monitoring Over a Heterogeneous Sensor Network Mehmet R. Yuce, Peng Choong Ng, Chin K. Lee, Jamil Y. Khan, and Wentai Liu Abstract This paper presents a heterogeneous sensor network

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Waspmote Encryption Libraries. Programming guide

Waspmote Encryption Libraries. Programming guide Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7

More information

Authentication is not Authorization?! And what is a "digital signature" anyway?

Authentication is not Authorization?! And what is a digital signature anyway? Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information

More information

A WSN healthcare monitoring system for elderly people in geriatric facilities

A WSN healthcare monitoring system for elderly people in geriatric facilities Digital Healthcare Empowering Europeans R. Cornet et al. (Eds.) 2015 European Federation for Medical Informatics (EFMI). This article is published online with Open Access by IOS Press and distributed under

More information

Opus Guide for IT Managers

Opus Guide for IT Managers Opus Guide for IT Managers Table of Contents Introduction...1 System Requirements...2 Configuration...3 Integration...3 Networking...3 Security...5 Interconnectivity...6 History Archival Sizing...7 Introduction

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE

More information

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074 Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.

More information

Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3

Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3 Vulnerabilities in WEP Christopher Hoffman Cryptography 2 2011-3 1. Abstract Wired Equivalent Privacy (WEP) was the first encryption scheme used for protecting wireless traffic. It consisted of a private

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department

More information

Disfer. Sink - Sensor Connectivity and Sensor Android Application. Protocol implementation: Charilaos Stais (stais AT aueb.gr)

Disfer. Sink - Sensor Connectivity and Sensor Android Application. Protocol implementation: Charilaos Stais (stais AT aueb.gr) Disfer Sink - Sensor Connectivity and Sensor Android Application Protocol implementation: Charilaos Stais (stais AT aueb.gr) Android development: Dimitri Balerinas (dimi.balerinas AT gmail.com) Supervised

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Data Loggers for Real Time Temperature Monitoring - WiFi

Data Loggers for Real Time Temperature Monitoring - WiFi Data Loggers for Real Time Temperature Monitoring - WiFi Main Features Complete standalone system. Even if computer/network does not operate the recording system will continue to record without any interruption.

More information

Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing

Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing Performance Evaluation of Mobile Wi-Fi-based M2M Data Traffic Multiplexing Muhammad Tariq Afridi 1, Safdar Nawaz Khan Marwat 1, Yasir Mehmood 2, Jebran Khan 1, Carmelita Görg 2 1 Department of Computer

More information

The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications.

The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. 1 Study Approach We have performed a study to analyze Smart Grid Communication

More information

SSH Secure Shell. What is SSH?

SSH Secure Shell. What is SSH? Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Introduction to IPv6 and Benefits of IPv6

Introduction to IPv6 and Benefits of IPv6 Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet

More information

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M STRATEGIC WHITE PAPER INTRODUCTION Machine-to-machine (M2M) communications is on the rise. Most mobile network operators (MNOs) are turning to M2M

More information

A Study for Home and Mobile U-Healthcare System

A Study for Home and Mobile U-Healthcare System , pp. 255-260 http://dx.doi.org/10.14257/ijseia.2015.9.5.24 A Study for Home and Mobile U-Healthcare System Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic University

More information

Wlan Monitoring Using Android Phone

Wlan Monitoring Using Android Phone International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.23-27 Wlan Monitoring Using Android Phone Pooja Chaudhary

More information

CSci 530 Midterm Exam. Fall 2012

CSci 530 Midterm Exam. Fall 2012 CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers

More information

Semi-Automatic Generation of Monitoring Applications for Wireless Networks

Semi-Automatic Generation of Monitoring Applications for Wireless Networks Semi-Automatic Generation of Monitoring Applications for Wireless Networks André Lins, Eduardo F. Nakamura, Lincoln S. Rocha, Antônio A.F. Loureiro, Claudionor J.N. Coelho Jr. Department of Technological

More information

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very

More information

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang International Conference on Computational Science and Engineering (ICCSE 2015) Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang Informatization

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

Best Practices for SIP Security

Best Practices for SIP Security Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware

More information

As enterprises conduct more and more

As enterprises conduct more and more Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside

More information