Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (25)

Search Parameters:
Keywords = WBSN

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 626 KiB  
Article
Enhanced Random Forest Classifier with K-Means Clustering (ERF-KMC) for Detecting and Preventing Distributed-Denial-of-Service and Man-in-the-Middle Attacks in Internet-of-Medical-Things Networks
by Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed and Ahmed Fakhfakh
Computers 2023, 12(12), 262; https://doi.org/10.3390/computers12120262 - 17 Dec 2023
Cited by 4 | Viewed by 2854
Abstract
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that enabled the real-time monitoring of patient’s vital [...] Read more.
In recent years, the combination of wireless body sensor networks (WBSNs) and the Internet ofc Medical Things (IoMT) marked a transformative era in healthcare technology. This combination allowed for the smooth communication between medical devices that enabled the real-time monitoring of patient’s vital signs and health parameters. However, the increased connectivity also introduced security challenges, particularly as they related to the presence of attack nodes. This paper proposed a unique solution, an enhanced random forest classifier with a K-means clustering (ERF-KMC) algorithm, in response to these challenges. The proposed ERF-KMC algorithm combined the accuracy of the enhanced random forest classifier for achieving the best execution time (ERF-ABE) with the clustering capabilities of K-means. This model played a dual role. Initially, the security in IoMT networks was enhanced through the detection of attack messages using ERF-ABE, followed by the classification of attack types, specifically distinguishing between man-in-the-middle (MITM) and distributed denial of service (DDoS) using K-means. This approach facilitated the precise categorization of attacks, enabling the ERF-KMC algorithm to employ appropriate methods for blocking these attack messages effectively. Subsequently, this approach contributed to the improvement of network performance metrics that significantly deteriorated during the attack, including the packet loss rate (PLR), end-to-end delay (E2ED), and throughput. This was achieved through the detection of attack nodes and the subsequent prevention of their entry into the IoMT networks, thereby mitigating potential disruptions and enhancing the overall network efficiency. This study conducted simulations using the Python programming language to assess the performance of the ERF-KMC algorithm in the realm of IoMT, specifically focusing on network performance metrics. In comparison with other algorithms, the ERF-KMC algorithm demonstrated superior efficacy, showcasing its heightened capability in terms of optimizing IoMT network performance as compared to other common algorithms in network security, such as AdaBoost, CatBoost, and random forest. The importance of the ERF-KMC algorithm lies in its security for IoMT networks, as it provides a high-security approach for identifying and preventing MITM and DDoS attacks. Furthermore, improving the network performance metrics to ensure transmitted medical data are accurate and efficient is vital for real-time patient monitoring. This study takes the next step towards enhancing the reliability and security of IoMT systems and advancing the future of connected healthcare technologies. Full article
Show Figures

Figure 1

Figure 1
<p>The decision tree of ERF−ABE.</p>
Full article ">Figure 2
<p>The workflow of the ERF−KMC algorithm.</p>
Full article ">Figure 3
<p>Network simulation.</p>
Full article ">Figure 4
<p>Flowchart of ERF−KMC.</p>
Full article ">Figure 5
<p>End-to-end delay in scenarios with 25, 50, and 100 nodes.</p>
Full article ">Figure 6
<p>Packet loss rate in the case of 25, 50, and 100 nodes.</p>
Full article ">Figure 7
<p>Throughput in case of 25, 50, and 100 nodes.</p>
Full article ">
19 pages, 3832 KiB  
Article
EEDLABA: Energy-Efficient Distance- and Link-Aware Body Area Routing Protocol Based on Clustering Mechanism for Wireless Body Sensor Network
by Khalid Zaman, Zhaoyun Sun, Altaf Hussain, Tariq Hussain, Farhad Ali, Sayyed Mudassar Shah and Haseeb Ur Rahman
Appl. Sci. 2023, 13(4), 2190; https://doi.org/10.3390/app13042190 - 8 Feb 2023
Cited by 15 | Viewed by 2564
Abstract
In medical environments, a wireless body sensor network (WBSN) is used to operate remotely, and sensor nodes are employed. It consists of sensor nodes installed on a human body to monitor a patient’s condition, such as heartbeat, temperature, and blood sugar level, and [...] Read more.
In medical environments, a wireless body sensor network (WBSN) is used to operate remotely, and sensor nodes are employed. It consists of sensor nodes installed on a human body to monitor a patient’s condition, such as heartbeat, temperature, and blood sugar level, and are functionalized and controlled by remote devices. A WBSN consists of nodes that are actually sensors in nature and are operated with a short range of communication. These sensor nodes are fixed with limited computation power and the main concern is energy consumption and path loss. In this paper, we propose a new protocol named energy-efficient distance- and link-aware body area (EEDLABA) with a clustering mechanism and compare it with the current link-aware and energy-efficient body area (LAEEBA) and distance-aware relaying energy-efficient (DARE) routing protocols in a WBSN. The proposed protocol is an extended type of LAEEBA and DARE in which the positive features have been deployed. The clustering mechanism has been presented and deployed in EEDLABA for better performance. To solve these issues in LAEEBA and DARE, the EEDLABA protocol has been proposed to overcome these. Path loss and energy consumption are the major concerns in this network. For that purpose, the path loss and distance models are proposed in which the cluster head (CH) node, coordinator (C) node, and other nodes, for a total of nine nodes, are deployed on a human body. The results have been derived from MATLAB simulations in which the performance of the suggested EEDLABA has been observed in assessment with the LAEEBA and DARE. From the results, it has been concluded that the proposed protocol can perform well in the considered situations for WBSNs. Full article
(This article belongs to the Special Issue New Insights into Pervasive and Mobile Computing)
Show Figures

Figure 1

Figure 1
<p>Flow Chat of the Proposed EEDLABA Routing Protocol for WBANs.</p>
Full article ">Figure 2
<p>The Proposed Clustering Mechanism Illustration for EEDLABA for WBANs.</p>
Full article ">Figure 3
<p>Average Path loss. (<b>a</b>) Path loss of LAEEBA; (<b>b</b>) Path loss of DARE; (<b>c</b>) Path loss.</p>
Full article ">Figure 4
<p>Average Residual Energy. (<b>a</b>) Residual Energy of DARE; (<b>b</b>) Residual Energy LAEEBA; (<b>c</b>) Residual Energy.</p>
Full article ">Figure 5
<p>Average End-to-End Delay. (<b>a</b>) End-to-End Delay; (<b>b</b>) End-to-End Delay; (<b>c</b>) End-to-End Delay.</p>
Full article ">Figure 6
<p>Average Throughput. (<b>a</b>) Throughput of DARE; (<b>b</b>) Throughput of The LAEBA; (<b>c</b>) Throughput of the EEDLABA.</p>
Full article ">Figure 7
<p>The routing protocol EEDLABA stability period. (<b>a</b>) stability period; (<b>b</b>) stability period; (<b>c</b>) stability period.</p>
Full article ">
30 pages, 11930 KiB  
Article
Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications
by Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Saad Motahhir, Ouazzani Jamil, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman and Moustafa H. Aly
Electronics 2022, 11(23), 3867; https://doi.org/10.3390/electronics11233867 - 23 Nov 2022
Cited by 12 | Viewed by 2993
Abstract
Due to the rapid development of information and emerging communication technologies, developing and implementing solutions in the Internet of Medical Things (IoMTs) field have become relevant. This work developed a novel data security algorithm for deployment in emerging wireless biomedical sensor network (WBSN) [...] Read more.
Due to the rapid development of information and emerging communication technologies, developing and implementing solutions in the Internet of Medical Things (IoMTs) field have become relevant. This work developed a novel data security algorithm for deployment in emerging wireless biomedical sensor network (WBSN) and IoMTs applications while exchanging electronic patient folders (EPFs) over unsecured communication channels. These EPF data are collected using wireless biomedical sensors implemented in WBSN and IoMTs applications. Our algorithm is designed to ensure a high level of security for confidential patient information and verify the copyrights of bio-signal records included in the EPFs. The proposed scheme involves the use of Hahn’s discrete orthogonal moments for bio-signal feature vector extraction. Next, confidential patient information with the extracted feature vectors is converted into a QR code. The latter is then encrypted based on a proposed two-dimensional version of the modified chaotic logistic map. To demonstrate the feasibility of our scheme in IoMTs, it was implemented on a low-cost hardware board, namely Raspberry Pi, where the quad-core processors of this board are exploited using parallel computing. The conducted numerical experiments showed, on the one hand, that our scheme is highly secure and provides excellent robustness against common signal-processing attacks (noise, filtering, geometric transformations, compression, etc.). On the other hand, the obtained results demonstrated the fast running of our scheme when it is implemented on the Raspberry Pi board based on parallel computing. Furthermore, the results of the conducted comparisons reflect the superiority of our algorithm in terms of robustness when compared to recent bio-signal copyright protection schemes. Full article
(This article belongs to the Section Bioelectronics)
Show Figures

Figure 1

Figure 1
<p>The bifurcation diagram of <span class="html-italic">x</span> (<b>a</b>) and <span class="html-italic">y</span> (<b>b</b>) sequences produced by 2DSCLM for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>,</mo> <mi>δ</mi> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>3.54</mn> <mo>…</mo> <mn>4</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mi>φ</mi> <mo>=</mo> <mn>0.02</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>=</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>LE of <span class="html-italic">x</span> (<b>a</b>) and <span class="html-italic">y</span> (<b>b</b>) sequences produced by 2DSCLM for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>,</mo> <mi>δ</mi> <mo>∈</mo> <mo stretchy="false">[</mo> <mn>3.54</mn> <mo>…</mo> <mn>4</mn> <mo stretchy="false">]</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mi>φ</mi> <mo>=</mo> <mn>0.02</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>=</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>The first 500 iterations of <span class="html-italic">x</span>, <span class="html-italic">x*</span>, <span class="html-italic">y</span>, and <span class="html-italic">y*</span> sequences that are obtained using the parameters <math display="inline"><semantics> <mrow> <mfenced close="}" open="{"> <mrow> <mi>α</mi> <mo>,</mo> <mi>β</mi> <mo>,</mo> <mi>δ</mi> <mo>,</mo> <mi>φ</mi> <mo>,</mo> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> </mrow> </mfenced> <mo>=</mo> <mfenced close="}" open="{"> <mrow> <mrow> <mn>3.99</mn> </mrow> <mo>,</mo> <mrow> <mn>0.021</mn> </mrow> <mo>,</mo> <mrow> <mn>3.99</mn> </mrow> <mo>,</mo> <mrow> <mn>0.021</mn> </mrow> <mo>,</mo> <mn>0.5</mn> <mo>,</mo> <mn>0.5</mn> </mrow> </mfenced> <mrow> <mo> </mo> <mi>and</mi> <mo> </mo> </mrow> <mfenced close="}" open="{"> <mrow> <mi>α</mi> <mo>,</mo> <mi>β</mi> <mo>*</mo> <mo>,</mo> <mi>δ</mi> <mo>,</mo> <mi>φ</mi> <mo>,</mo> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> </mrow> </mfenced> <mo>=</mo> <mfenced close="}" open="{"> <mrow> <mrow> <mn>3.99</mn> </mrow> <mo>,</mo> <mrow> <mn>0.021</mn> <mo>+</mo> </mrow> <mo>Δ</mo> <mo>,</mo> <mrow> <mn>3.99</mn> </mrow> <mo>,</mo> <mrow> <mn>0.021</mn> </mrow> <mo>,</mo> <mn>0.5</mn> <mo>,</mo> <mn>0.5</mn> </mrow> </mfenced> </mrow> </semantics></math> of 2DSCLM, with <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mo>=</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>15</mn> </mrow> </msup> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The proposed security algorithm.</p>
Full article ">Figure 5
<p>Pre-processing phase of the bio-signal to be copyrighted.</p>
Full article ">Figure 6
<p>QR code of size <math display="inline"><semantics> <mrow> <mn>282</mn> <mo>×</mo> <mn>282</mn> </mrow> </semantics></math>, which includes the encrypted bio-signal feature vectors and confidential patient information.</p>
Full article ">Figure 7
<p>(<b>a</b>) Original QR code, (<b>b</b>) its encrypted form, and (<b>c</b>) its decrypted form using correct KEY.</p>
Full article ">Figure 8
<p>(<b>a</b>) The original QR code and its decrypted versions using the following wrong KEY parameters: (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> <mo>=</mo> <mi>α</mi> <mo>+</mo> <mo>Δ</mo> </mrow> </semantics></math>, (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <mi>β</mi> <mo>+</mo> <mo>Δ</mo> </mrow> </semantics></math>, (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>δ</mi> <mn>1</mn> </msub> <mo>=</mo> <mi>δ</mi> <mo>−</mo> <mo>Δ</mo> </mrow> </semantics></math>, (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>φ</mi> <mn>1</mn> </msub> <mo>=</mo> <mi>φ</mi> <mo>+</mo> <mo>Δ</mo> </mrow> </semantics></math>, (<b>f</b>) <math display="inline"><semantics> <mrow> <msubsup> <mi>x</mi> <mn>0</mn> <mn>1</mn> </msubsup> <mo>=</mo> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>−</mo> <mo>Δ</mo> </mrow> </semantics></math>, and (<b>g</b>) <math display="inline"><semantics> <mrow> <msubsup> <mi>y</mi> <mn>0</mn> <mn>1</mn> </msubsup> <mo>=</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> <mo>−</mo> <mo>Δ</mo> </mrow> </semantics></math>, with <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mo>=</mo> <msup> <mrow> <mn>10</mn> </mrow> <mrow> <mo>−</mo> <mn>15</mn> </mrow> </msup> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>The proposed patient data recovery and bio-signal copyright verification.</p>
Full article ">Figure 10
<p>Four test frames, each of size L = 1600, of ECG signal named “Record_100” that was selected from dataset presented in [<a href="#B41-electronics-11-03867" class="html-bibr">41</a>].</p>
Full article ">Figure 11
<p>Percentage corresponding to the execution time of the proposed scheme’s steps.</p>
Full article ">Figure 12
<p>Feature vectors extraction using (<b>a</b>) the sequential approach, and (<b>b</b>) the parallel one.</p>
Full article ">Figure 13
<p>Proposed parallel encryption of the QR code using multi-core CPUs.</p>
Full article ">Figure 14
<p>The hardware design of Raspberry Pi 4 model B that was used in our work.</p>
Full article ">Figure 15
<p>(<b>a</b>–<b>c</b>) Original and reconstructed bio-signal frames using 2DHMs.</p>
Full article ">Figure 16
<p>Noisy ECG signal frame of size N = 4096 with Gaussian noise of k-strength and the corresponding BER values.</p>
Full article ">Figure 17
<p>Example of binary sequences of size L = 512 used in the BER calculation for an ECG signal contaminated by “Gaussian” noise with k = 0.06.</p>
Full article ">Figure 18
<p>Original EMG signal and its cropped versions with the corresponding BER values.</p>
Full article ">Figure 19
<p>Original MMG signal and its compressed versions with the corresponding BER values.</p>
Full article ">Figure 20
<p>Original ECG signal and its filtered versions with the corresponding BER values.</p>
Full article ">Figure 21
<p>Original EEG signal and its circularly shifted versions with the corresponding BER values.</p>
Full article ">Figure 22
<p>Original ECG signal and its amplitude scaled versions with the corresponding BER values.</p>
Full article ">
18 pages, 5797 KiB  
Article
A Novel Energy Efficient Threshold Based Algorithm for Wireless Body Sensor Network
by Suresh Kumar Arumugam, Amin Salih Mohammed, Kalpana Nagarajan, Kanagachidambaresan Ramasubramanian, S. B. Goyal, Chaman Verma, Traian Candin Mihaltan and Calin Ovidiu Safirescu
Energies 2022, 15(16), 6095; https://doi.org/10.3390/en15166095 - 22 Aug 2022
Cited by 21 | Viewed by 1849
Abstract
Wireless body sensor networks (WBSNs) monitor the changes within the human body by having continuous interactions within the nodes in the body network. Critical issues with these continuous interactions include the limited energy within the node and the nodes becoming isolated from the [...] Read more.
Wireless body sensor networks (WBSNs) monitor the changes within the human body by having continuous interactions within the nodes in the body network. Critical issues with these continuous interactions include the limited energy within the node and the nodes becoming isolated from the network easily when it fails. Moreover, when the node’s burden increases because of the failure of other nodes, the energy utilization as well as the heat dissipated increases much more, causing damage to the network as well as human body. In this paper, we propose a threshold-based fail proof lifetime enhancement algorithm which schedules the nodes in an optimal way depending upon the available energy level. The proposed algorithm is experimented with a real time system setup and the proposed algorithm is compared with different routing mechanisms in terms of various network parameters. It is inferred that the proposed algorithm outperforms the existing routing mechanisms. Full article
(This article belongs to the Special Issue Energy Efficiency in Wireless Networks)
Show Figures

Figure 1

Figure 1
<p>Wireless Body Sensor Network topology.</p>
Full article ">Figure 2
<p>Finite-SM realization of subject.</p>
Full article ">Figure 3
<p>Voltage curve of the battery.</p>
Full article ">Figure 4
<p>Architecture of the proposed FPLE algorithm.</p>
Full article ">Figure 5
<p>Network lifetime.</p>
Full article ">Figure 6
<p>Network Throughput.</p>
Full article ">Figure 7
<p>Residual Energy of nodes after 500, 1000, 3000 and 4000 rounds (FPLE). (<b>a</b>) Remaining Energy after 500 rounds. (<b>b</b>) Remaining Energy after 1000 rounds. <span class="html-italic">(</span><b>c</b>) Remaining Energy after 3000 rounds. (<b>d</b>) Remaining Energy after 4000 rounds.</p>
Full article ">Figure 7 Cont.
<p>Residual Energy of nodes after 500, 1000, 3000 and 4000 rounds (FPLE). (<b>a</b>) Remaining Energy after 500 rounds. (<b>b</b>) Remaining Energy after 1000 rounds. <span class="html-italic">(</span><b>c</b>) Remaining Energy after 3000 rounds. (<b>d</b>) Remaining Energy after 4000 rounds.</p>
Full article ">Figure 8
<p>Average energy consumed per round.</p>
Full article ">Figure 9
<p>Sample ECG signal.</p>
Full article ">Figure 10
<p>Experimental Setup for validation of the algorithm.</p>
Full article ">Figure 11
<p>Battery Terminal voltage for every ten rounds of ECG signal by SingleHop, MultiHop, ATTEMPT and FPLE algorithms. (<b>a</b>) SingleHop; (<b>b</b>) MultiHop; (<b>c</b>) ATTEMPT; (<b>d</b>) FPLE.</p>
Full article ">Figure 11 Cont.
<p>Battery Terminal voltage for every ten rounds of ECG signal by SingleHop, MultiHop, ATTEMPT and FPLE algorithms. (<b>a</b>) SingleHop; (<b>b</b>) MultiHop; (<b>c</b>) ATTEMPT; (<b>d</b>) FPLE.</p>
Full article ">Figure 11 Cont.
<p>Battery Terminal voltage for every ten rounds of ECG signal by SingleHop, MultiHop, ATTEMPT and FPLE algorithms. (<b>a</b>) SingleHop; (<b>b</b>) MultiHop; (<b>c</b>) ATTEMPT; (<b>d</b>) FPLE.</p>
Full article ">
25 pages, 6271 KiB  
Review
Security in Wireless Body Sensor Network: A Multivocal Literature Study
by Najm Us Sama, Kartinah Zen, Mamoona Humayun, Noor Zaman Jhanjhi and Atiq Ur Rahman
Appl. Syst. Innov. 2022, 5(4), 79; https://doi.org/10.3390/asi5040079 - 15 Aug 2022
Cited by 7 | Viewed by 2604
Abstract
The wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging than designing conventional solutions, and [...] Read more.
The wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging than designing conventional solutions, and the recent study provides little guidance to designers and developers. The proposed study summarizes the multivocal literature study of security mechanisms for BSN. The investigation found 10,871 academic publications and 697 grey content; duplicates were removed, and selection criteria were employed, resulting in 73 academic papers and 30 grey publications. Various conventional security techniques, scope, and security contexts were used to classify the stated security solutions within each publication. It was crucial to inquire about the frequency of publications, research methods, security mechanisms, and contexts to answer the proposed questions. Our survey concludes that security methods and assessments are categorized into 15 categories, with the most frequently referenced being authentication and authorization; the majority of strategies concentrate on preventing and mitigating security breaches, with a limited number of works focusing on detection and recovery; and the techniques used to conduct the survey vary between the two types of publications. This evaluation might be the first step toward making the BSN platform more consistent by giving professionals and researchers a complete set of security strategies and methods. Experts will apply these solutions to fix security issues while establishing a trustworthy BSN after they have been identified through the process of discovering the most commonly utilized security solutions. Full article
Show Figures

Figure 1

Figure 1
<p>MLR process.</p>
Full article ">Figure 2
<p>Excellency scores as a percent of articles that meet each of them (academic literature: EC1 through EC3; grey literature: EC4 through EC7).</p>
Full article ">Figure 3
<p>Relevant publications per year for academic (ALR) and grey (GLR) literature, from 2017 to 2021.</p>
Full article ">Figure 4
<p>Publication types for ALR.</p>
Full article ">Figure 5
<p>Publication types for GLR.</p>
Full article ">Figure 6
<p>Research type of the academic (ALR) and grey (GLR) literature.</p>
Full article ">Figure 7
<p>Summary of methodological approaches to ALR. At the Y-axis, abbreviations used for validation types are CS: Case study; S: Simulation; PA: Performance analysis; PC: Proof of concept; Nill: Not mentioned, and for research types abbreviations are EV: Evaluation; VA: Validation; NS: Novel solution; PE: Personal experience.</p>
Full article ">Figure 8
<p>Summary of methodological approaches to GLR. In Y-axis, abbreviations used for research types are EV: Evaluation; NS: Novel solution; OP: Opinion paper; PE: Personal experience, and for validation types abbreviations are EP: Example and NS: Not specified.</p>
Full article ">Figure 9
<p>Validation types of research in ALR.</p>
Full article ">Figure 10
<p>Summary of methodologies used for ALR. In the Y-axis, abbreviations of methodologies are BS: Block structure; L: Logic; SD: Sequence diagram; CD: Class diagram; FD: Formation diagram; UCM: Use case model; TO: Text only; C: Code; PA: Proper analysis.</p>
Full article ">Figure 11
<p>Summary of methodologies used for GLR. In the Y-axis, abbreviations of methodologies are BS: Block structure; SD: Sequence diagram; TO: Text only; C: Code.</p>
Full article ">Figure 12
<p>Methodologies used for the academic (ALR) and grey (GLR) literature studies. The abbreviations used are BS: Block structure; L: Logic; SD: Sequence diagram; CD: Class diagram; FD: Formation diagram; UCM: Use case model; TO: Text only; C: Code; PA: Proper analysis.</p>
Full article ">Figure 13
<p>Security mechanisms and security scope identified in studies of academic and GLR. The abbreviations used are At: Authorization; Au: Authentication; AC: Access control; ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; SDM: Security data management; IS: Implementation security; SE: Security evaluation; TM: Threat modeling; GSA: Generic security architecture; SA: Secure application.</p>
Full article ">Figure 14
<p>Security mechanisms and security scope identified in studies of academic and GLR throughout the years. The numbers inside are quantities of papers. The abbreviations used are At: Authorization; Au: Authentication; AC: Access control, ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; SDM: Security data management; IS: Implementation security; SE: Security evaluation; TM: Threat modeling; GSA: Generic security architecture; SA: Secure application.</p>
Full article ">Figure 15
<p>Security contexts addressed by the security solutions. ALR: Academic literature; GLR: Grey literature.</p>
Full article ">Figure 16
<p>Summary of the security scope and security mechanisms reported by each study in the ALR. The abbreviations are At: Authorization; Au: Authentication; AC: Access control; ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; SDM: Security data management; IS: Implementation security; SE: Security evaluation; TM: Threat modeling; GSA: Generic security architecture; SA: Secure application.</p>
Full article ">Figure 17
<p>Review of the security scope and security mechanisms reported by each study in the GLR. The abbreviations are At: Authorization; Au: Authentication; AC: Access control; ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; IS: Implementation security; GSA: Generic security architecture.</p>
Full article ">
16 pages, 6318 KiB  
Article
Intelligent Medical System with Low-Cost Wearable Monitoring Devices to Measure Basic Vital Signals of Admitted Patients
by Siraporn Sakphrom, Thunyawat Limpiti, Krit Funsian, Srawouth Chandhaket, Rina Haiges and Kamon Thinsurat
Micromachines 2021, 12(8), 918; https://doi.org/10.3390/mi12080918 - 31 Jul 2021
Cited by 15 | Viewed by 5582
Abstract
This article presents the design of a low-cost Wireless Body Sensor Network (WBSN) for monitoring vital signs including a low-cost smart wristwatch that contains an ESP-32 microcontroller and three sensors: heart rate (HR), blood pressure (BP) and body temperature (BT), and an Internet [...] Read more.
This article presents the design of a low-cost Wireless Body Sensor Network (WBSN) for monitoring vital signs including a low-cost smart wristwatch that contains an ESP-32 microcontroller and three sensors: heart rate (HR), blood pressure (BP) and body temperature (BT), and an Internet of Things (IoT) platform. The vital signs data are processed and displayed on an OLED screen of the patient’s wristwatch and sent the data over a wireless connection (Wi-Fi) and a Cloud Thing Board system, to store and manage the data in a data center. The data can be analyzed and notified to medical staff when abnormal signals are received from the sensors based on a set parameters from specialists. The proposed low-cost system can be used in a wide range of applications including field hospitals for asymptotic or mild-condition COVID-19 patients as the system can be used to screen those patients out of symptomatic patients who require more costly facilities in a hospital with considerably low expense and installation time, also suitable for bedridden patients, palliative care patients, etc. Testing experiments of a 60-person sample size showed an acceptable accuracy level compared with standard devices when testing with 60 patient-samples with the mean errors heart rate of 1.22%, systolic blood pressure of 1.39%, diastolic blood pressure of 1.01%, and body temperature of 0.13%. According to testing results with 10 smart devices connected with the platform, the time delay caused by the distance between smart devices and the router is 10 s each round with the longest outdoor distance of 200 m. As there is a short-time delay, it does not affect the working ability of the smart system. It is still making the proposed system be able to show patient’s status and function in emergency cases. Full article
(This article belongs to the Section E:Engineering and Technology)
Show Figures

Figure 1

Figure 1
<p>An application of wireless sensor networks for the patients’ body.</p>
Full article ">Figure 2
<p>The technique of photoplethysmography (PPG): (<b>a</b>) using light transmission property; (<b>b</b>) using light reflection property [<a href="#B25-micromachines-12-00918" class="html-bibr">25</a>].</p>
Full article ">Figure 3
<p>Overall structure of body sensor nodes and the communication pathway.</p>
Full article ">Figure 4
<p>The intelligent wireless network system for monitoring the vital signs of internal patients.</p>
Full article ">Figure 5
<p>A structure of the communication between sensor node and room data sensor node (#I.D.) to the healthcare database center.</p>
Full article ">Figure 6
<p>A process flowchart of the device (<b>a</b>) tools used in smart device designs; (<b>b</b>) MAX-30102; (<b>c</b>) GY-906; (<b>d</b>) OLED display screen.</p>
Full article ">Figure 7
<p>Assembling a smart device (<b>a</b>–<b>d</b>) the PCB circuit design by the Proteus software.</p>
Full article ">Figure 8
<p>Ready to use sensor devices, MCU and a display screen.</p>
Full article ">Figure 9
<p>The comparison of measured heart rate results between the proposed smart device and the standard medical equipment (IOS Smart Watch): (<b>a</b>) the overlay plot; (<b>b</b>) the comparison plot.</p>
Full article ">Figure 10
<p>The comparison of systolic and diastolic blood pressure results between the proposed smart devices (PRO) and the standard medical equipment of OMRON HEM-7130 (STD): (<b>a</b>) the overlay plot; (<b>b</b>) the comparison plot.</p>
Full article ">Figure 11
<p>The comparison of body temperature results between the proposed smart devices (PRO) and the standard medical equipment of OMRON infrared thermometer (STD): (<b>a</b>) the overlay plot; (<b>b</b>) the comparison plot.</p>
Full article ">Figure 12
<p>Smart device monitoring on OLED.</p>
Full article ">Figure 13
<p>The dashboard screen in the Things Board and steps to display the details of Vital Signals of Patients for nurses and medical professionals monitoring.</p>
Full article ">
19 pages, 7999 KiB  
Article
Channel Modeling of an Optical Wireless Body Sensor Network for Walk Monitoring of Elderly
by Alassane Kaba, Stephanie Sahuguede and Anne Julien-Vergonjanne
Sensors 2021, 21(9), 2904; https://doi.org/10.3390/s21092904 - 21 Apr 2021
Cited by 6 | Viewed by 2275
Abstract
The growing aging of the world population is leading to an aggravation of diseases, which affect the autonomy of the elderly. Wireless body sensor networks (WBSN) are part of the solutions studied for several years to monitor and prevent loss of autonomy. The [...] Read more.
The growing aging of the world population is leading to an aggravation of diseases, which affect the autonomy of the elderly. Wireless body sensor networks (WBSN) are part of the solutions studied for several years to monitor and prevent loss of autonomy. The use of optical wireless communications (OWC) is seen as an alternative to radio frequencies, relevant when electromagnetic interference and data security considerations are important. One of the main challenges in this context is optical channel modeling for efficiently designing high-reliability systems. We propose here a suitable optical WBSN channel model for tracking the elderly during a walk. We discuss the specificities related to the model of the body, to movements, and to the walking speed by comparing elderly and young models, taking into account the walk temporal evolution using the sliding windowing technique. We point out that, when considering a young body model, performance is either overestimated or underestimated, depending on which windowing parameter is fixed. It is, therefore, important to consider the body model of the elderly in the design of the system. To illustrate this result, we then evaluate the minimal power according to the maximal bandwidth for a given quality of service. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Top view of studied environment and Rx locations.</p>
Full article ">Figure 2
<p>Illustration of 3D human body shape model: (<b>a</b>) elderly body shape model; (<b>b</b>) young body shape model.</p>
Full article ">Figure 3
<p>Illustration of walking cycle: (<b>a</b>) elderly model; (<b>b</b>) young model.</p>
Full article ">Figure 4
<p>Illustration of a node traveling pattern using RW mobility model.</p>
Full article ">Figure 5
<p>RW trajectory: (<b>a</b>) RW trajectory generation algorithm; (<b>b</b>) rotation angle for direction change.</p>
Full article ">Figure 6
<p>Illustration of direction changes.</p>
Full article ">Figure 7
<p>Node distribution for RW mobility.</p>
Full article ">Figure 8
<p>PDFs of <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>0</mn> </msub> </mrow> </semantics></math> for different values of <math display="inline"><semantics> <mrow> <msub> <mi>φ</mi> <mrow> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math> with young model (<b>a</b>) and with elderly model (<b>b</b>).</p>
Full article ">Figure 9
<p>PDF of <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mrow> <mi>RMS</mi> </mrow> </msub> </mrow> </semantics></math> with young and elderly models.</p>
Full article ">Figure 10
<p>Uncorrelated outage probability <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> </mrow> </semantics></math> for different emitted power.</p>
Full article ">Figure 11
<p><math display="inline"><semantics> <mi>γ</mi> </semantics></math> as a function of time for an example of RW trajectory during 1 min.</p>
Full article ">Figure 12
<p>Outage probability <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> </mrow> </semantics></math> for different window sizes in terms of time duration T.</p>
Full article ">Figure 13
<p>Outage probability <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> </mrow> </semantics></math> for different window sizes in terms of distance duration <span class="html-italic">D</span>.</p>
Full article ">Figure 14
<p>Outage probability <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> </mrow> </semantics></math> for different values of <math display="inline"><semantics> <mrow> <msub> <mi>φ</mi> <mrow> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>: with young model (<b>a</b>) and with elderly model (<b>b</b>).</p>
Full article ">Figure 14 Cont.
<p>Outage probability <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> </semantics></math> as a function of <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> </mrow> </semantics></math> for different values of <math display="inline"><semantics> <mrow> <msub> <mi>φ</mi> <mrow> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>: with young model (<b>a</b>) and with elderly model (<b>b</b>).</p>
Full article ">Figure 15
<p>Evolution of emitted power as a function of bandwidth for <math display="inline"><semantics> <mrow> <msub> <mi>γ</mi> <mn>0</mn> </msub> <mo>=</mo> <mn>15.6</mn> <mo> </mo> <mi>dB</mi> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>φ</mi> <mrow> <mn>1</mn> <mo>/</mo> <mn>2</mn> </mrow> </msub> <mo>=</mo> <msup> <mn>45</mn> <mo>°</mo> </msup> <mo> </mo> <mrow> <mo>(</mo> <mrow> <mi>m</mi> <mo>=</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">
21 pages, 1642 KiB  
Article
A Wireless Body Sensor Network for Clinical Assessment of the Flexion-Relaxation Phenomenon
by Michele Paoletti, Alberto Belli, Lorenzo Palma, Massimo Vallasciani and Paola Pierleoni
Electronics 2020, 9(6), 1044; https://doi.org/10.3390/electronics9061044 - 24 Jun 2020
Cited by 5 | Viewed by 5530
Abstract
An accurate clinical assessment of the flexion-relaxation phenomenon on back muscles requires objective tools for the analysis of surface electromyography signals correlated with the real movement performed by the subject during the flexion-relaxation test. This paper deepens the evaluation of the flexion-relaxation phenomenon [...] Read more.
An accurate clinical assessment of the flexion-relaxation phenomenon on back muscles requires objective tools for the analysis of surface electromyography signals correlated with the real movement performed by the subject during the flexion-relaxation test. This paper deepens the evaluation of the flexion-relaxation phenomenon using a wireless body sensor network consisting of sEMG sensors in association with a wearable device that integrates accelerometer, gyroscope, and magnetometer. The raw data collected from the sensors during the flexion relaxation test are processed by an algorithm able to identify the phases of which the test is composed, provide an evaluation of the myoelectric activity and automatically detect the phenomenon presence/absence. The developed algorithm was used to process the data collected in an acquisition campaign conducted to evaluate the flexion-relaxation phenomenon on back muscles of subjects with and without Low Back Pain. The results have shown that the proposed method is significant for myoelectric silence detection and for clinical assessment of electromyography activity patterns. Full article
(This article belongs to the Special Issue Recent Advances in Motion Analysis)
Show Figures

Figure 1

Figure 1
<p>Positioning of the sEMG sensors and the wearable device on the subject under analysis. The electrodes were positioned following European recommendations for surface electromyography [<a href="#B45-electronics-09-01044" class="html-bibr">45</a>].</p>
Full article ">Figure 2
<p>Representation of the movement performed by the subject during the flexion relaxation test.</p>
Full article ">Figure 3
<p>Block diagram of the proposed algorithm for clinical assessment of the FRP</p>
Full article ">Figure 4
<p>Signal processing of the inclination signal in order to obtain the “phases signal” which automatically defines the phases and cycles during a flexion-relaxation test.</p>
Full article ">Figure 5
<p>Graphic representation with the signals superimposition (filtered sEMG signal in blue, inclination signal in red, phases signal in green), phases (upper numbers) and cycles (lower numbers). It is referred to a healthy subject.</p>
Full article ">Figure 5 Cont.
<p>Graphic representation with the signals superimposition (filtered sEMG signal in blue, inclination signal in red, phases signal in green), phases (upper numbers) and cycles (lower numbers). It is referred to a healthy subject.</p>
Full article ">Figure 6
<p>sEMG filtered and rectified is normalized respect the max value of each cycle and the average sEMG levels, for each phase of each muscle, are expressed in percentage. Each phase is represented by a different colour: standing phase (red), flexion phase (green), full-flexion phase (blue), extension phase (yellow). They are referred to the same healthy subject of the previous graphs.</p>
Full article ">Figure 6 Cont.
<p>sEMG filtered and rectified is normalized respect the max value of each cycle and the average sEMG levels, for each phase of each muscle, are expressed in percentage. Each phase is represented by a different colour: standing phase (red), flexion phase (green), full-flexion phase (blue), extension phase (yellow). They are referred to the same healthy subject of the previous graphs.</p>
Full article ">Figure 7
<p>Myoelectric activity for each phase and each muscle. Blue signal represents the sEMG normalized respect the max value of the cycle and it is expressed in percentage terms. The red signal is the inclination signal normalized respect the max value in the cycle and it is expressed in percentage terms. The green graph is the phases signal. They are referred to the same healthy subject of the previous graphs</p>
Full article ">Figure 7 Cont.
<p>Myoelectric activity for each phase and each muscle. Blue signal represents the sEMG normalized respect the max value of the cycle and it is expressed in percentage terms. The red signal is the inclination signal normalized respect the max value in the cycle and it is expressed in percentage terms. The green graph is the phases signal. They are referred to the same healthy subject of the previous graphs</p>
Full article ">
13 pages, 1936 KiB  
Article
Body-to-Body Cooperation in Internet of Medical Things: Toward Energy Efficiency Improvement
by Dalal Abdulmohsin Hammood, Hasliza A. Rahim, Ahmed Alkhayyat and R. Badlishah Ahmad
Future Internet 2019, 11(11), 239; https://doi.org/10.3390/fi11110239 - 14 Nov 2019
Cited by 34 | Viewed by 4161
Abstract
Internet of Medical Things (IoMT) technologies provide suitability among physicians and patients because they are useful in numerous medical fields. Wireless body sensor networks (WBSNs) are one of the most crucial technologies from within the IoMT evolution of the healthcare system, whereby each [...] Read more.
Internet of Medical Things (IoMT) technologies provide suitability among physicians and patients because they are useful in numerous medical fields. Wireless body sensor networks (WBSNs) are one of the most crucial technologies from within the IoMT evolution of the healthcare system, whereby each patient is monitored by low-powered and lightweight sensors. When the WBSNs are integrated into IoMT networks, they are quite likely to overlap each other; thus, cooperation between WBSN sensors is possible. In this paper, we consider communication between WBSNs and beyond their communication range. Therefore, we propose inter-WBAN cooperation for the IoMT system, which is also known as inter-WBAN cooperation in an IoMT environment (IWC-IoMT). In this paper, first, a proposed architecture for the IoT health-based system is investigated. Then, a mathematical model of the outage probability for the IWC-IoMT is derived. Finally, the energy efficiency of the IWC-IoT is analysed and inspected. The simulation and numerical results show that the IWC-IoMT (cooperative IoMT) system provides superior performance compared to the non-cooperative system. Full article
Show Figures

Figure 1

Figure 1
<p>WBSN in IoMT-based health networks.</p>
Full article ">Figure 2
<p>Network architecture of the Inter-WBSN cooperation.</p>
Full article ">Figure 3
<p>Rate region of IWC-IoMT protocol, where <math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <mo> </mo> <msub> <mi>β</mi> <mrow> <mi>s</mi> <mn>1</mn> <mo>,</mo> <mi>c</mi> <mi>n</mi> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <mo> </mo> <msub> <mi>β</mi> <mrow> <mi>s</mi> <mn>1</mn> <mo>,</mo> <mi>c</mi> <mi>n</mi> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Outage probability versus internode distance, <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mi>o</mi> </msub> </mrow> </semantics></math>. For all cases and links, the transmission rate and power consumption,<math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>P</mi> <mi>o</mi> </msub> <mo>,</mo> </mrow> </semantics></math> are 2 <math display="inline"><semantics> <mrow> <mi mathvariant="normal">b</mi> <mo>/</mo> <mi mathvariant="normal">s</mi> <mo>/</mo> <mi>Hz</mi> </mrow> </semantics></math> and 10 <math display="inline"><semantics> <mrow> <mi>dBm</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Outage probability versus internode distance, <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mi>o</mi> </msub> </mrow> </semantics></math>. For all cases and links, power consumption,<math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>P</mi> <mi>o</mi> </msub> <mo>,</mo> </mrow> </semantics></math> is 10 <math display="inline"><semantics> <mrow> <mi>dBm</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Outage probability versus internode distance, <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mi>o</mi> </msub> </mrow> </semantics></math>. For all cases and links, power consumption,<math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>P</mi> <mi>o</mi> </msub> <mo>,</mo> </mrow> </semantics></math> is 10 <math display="inline"><semantics> <mrow> <mi>dBm</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Energy efficiency versus internode distance, <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mi>o</mi> </msub> </mrow> </semantics></math>. For all cases and links, power consumption,<math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>P</mi> <mi>o</mi> </msub> <mo>,</mo> </mrow> </semantics></math> is 10 <math display="inline"><semantics> <mrow> <mi>dBm</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Energy efficiency versus power consumption, <math display="inline"><semantics> <mrow> <msub> <mi>P</mi> <mi>o</mi> </msub> </mrow> </semantics></math>. For all cases and links, the transmission rate is 2 <math display="inline"><semantics> <mrow> <mi mathvariant="normal">b</mi> <mo>/</mo> <mi mathvariant="normal">s</mi> <mo>/</mo> <mi>Hz</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Energy efficiency versus transmission rate, <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mi>o</mi> </msub> </mrow> </semantics></math>. For all cases and links, power consumption,<math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>P</mi> <mi>o</mi> </msub> <mo>,</mo> </mrow> </semantics></math> is 10 <math display="inline"><semantics> <mrow> <mi>dBm</mi> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 2369 KiB  
Article
Energy-Efficient Elderly Fall Detection System Based on Power Reduction and Wireless Power Transfer
by Sadik Kamel Gharghan, Saif Saad Fakhrulddin, Ali Al-Naji and Javaan Chahl
Sensors 2019, 19(20), 4452; https://doi.org/10.3390/s19204452 - 14 Oct 2019
Cited by 9 | Viewed by 4075
Abstract
Elderly fall detection systems based on wireless body area sensor networks (WBSNs) have increased significantly in medical contexts. The power consumption of such systems is a critical issue influencing the overall practicality of the WBSN. Reducing the power consumption of these networks while [...] Read more.
Elderly fall detection systems based on wireless body area sensor networks (WBSNs) have increased significantly in medical contexts. The power consumption of such systems is a critical issue influencing the overall practicality of the WBSN. Reducing the power consumption of these networks while maintaining acceptable performance poses a challenge. Several power reduction techniques can be employed to tackle this issue. A human vital signs monitoring system (HVSMS) has been proposed here to measure vital parameters of the elderly, including heart rate and fall detection based on heartbeat and accelerometer sensors, respectively. In addition, the location of elderly people can be determined based on Global Positioning System (GPS) and transmitted with their vital parameters to emergency medical centers (EMCs) via the Global System for Mobile Communications (GSM) network. In this paper, the power consumption of the proposed HVSMS was minimized by merging a data-event (DE) algorithm and an energy-harvesting-technique-based wireless power transfer (WPT). The DE algorithm improved HVSMS power consumption, utilizing the duty cycle of the sleep/wake mode. The WPT successfully charged the HVSMS battery. The results demonstrated that the proposed DE algorithm reduced the current consumption of the HVSMS to 9.35 mA compared to traditional operation at 85.85 mA. Thus, an 89% power saving was achieved based on the DE algorithm and the battery life was extended to 30 days instead of 3 days (traditional operation). In addition, the WPT was able to charge the HVSMS batteries once every 30 days for 10 h, thus eliminating existing restrictions involving the use of wire charging methods. The results indicate that the HVSMS current consumption outperformed existing solutions from previous studies. Full article
(This article belongs to the Section Physical Sensors)
Show Figures

Figure 1

Figure 1
<p>Human vital signs monitoring system (HVSMS) with (<b>a</b>) schematic diagram and (<b>b</b>) attached to upper arm of elderly patient, (<b>c</b>) switching transistor at on state, and (<b>d</b>) switching transistor at off state.</p>
Full article ">Figure 2
<p>Hardware of entire HVSMS setup.</p>
Full article ">Figure 3
<p>Timing diagram of (<b>a</b>) ACC and HB sensors (monitoring time) and (<b>b</b>) GPS and GSM modules (fall time).</p>
Full article ">Figure 4
<p>Flow chart of data-event (DE) algorithm.</p>
Full article ">Figure 5
<p>Schematic diagram of XKT-412 module wireless power transfer.</p>
Full article ">Figure 6
<p>Wireless power transfer with (<b>a</b>) transmitter circuit and (<b>b</b>) receiver circuit with an FC-75 board.</p>
Full article ">Figure 7
<p>Current consumption measurements of the HVSMS when patient falls.</p>
Full article ">Figure 8
<p>Power consumption of each component in HVSMS before and after applying the DE algorithm.</p>
Full article ">Figure 9
<p>Relationship between distance and DC output voltage of the WPT.</p>
Full article ">Figure 10
<p>Current consumption comparison of HVSMS with previous works.</p>
Full article ">
23 pages, 10738 KiB  
Article
Validation of Wired and Wireless Interconnected Body Sensor Networks
by Anum Talpur, Faisal Karim Shaikh, Natasha Baloch, Emad Felemban, Abdelmajid Khelil and Muhammad Mahtab Alam
Sensors 2019, 19(17), 3697; https://doi.org/10.3390/s19173697 - 26 Aug 2019
Cited by 10 | Viewed by 6229
Abstract
Current medical facilities usually lead to a very high cost especially for developing countries, rural areas and mass casualty incidents. Therefore, advanced electronic health systems are gaining momentum. In this paper, we first compared our novel off the shelf experimental wired Body Sensor [...] Read more.
Current medical facilities usually lead to a very high cost especially for developing countries, rural areas and mass casualty incidents. Therefore, advanced electronic health systems are gaining momentum. In this paper, we first compared our novel off the shelf experimental wired Body Sensor Networks (BSN), that is, Digital First Aid (DigiAID) with the existing commercial product called as Hexoskin. We showed the viability of DigiAID through extensive real measurements during daily activities by both male and females. It was found that the major hurdle was wires to be worn by the subjects. Accordingly, we proposed and characterized the wireless DigiAID platform for wireless BSN (WBSN). Understanding the effect of body movements on wireless data transmission in WBSN is also of major importance. Therefore, this paper comprehensively evaluates and analyzes the impact of body movements, (a) to ensure transmission of data at different radio power levels and (b) its impact on the topology of the WBSN. Based on this we have proposed a dynamic power control algorithm that adapts the transmitting power according to the packet reception in an energy efficient manner. The results show that we have achieved substantial power savings at various nodes attached to the human body. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Generic body sensor network scenario.</p>
Full article ">Figure 2
<p>DigiAID hardware components.</p>
Full article ">Figure 3
<p>Wireless DigiAID system.</p>
Full article ">Figure 4
<p>Path Loss for typical wireless body sensor network (WBSN) environment.</p>
Full article ">Figure 5
<p>Distance variation between transmission node and base station while walking.</p>
Full article ">Figure 6
<p>Positioning and movements of different subjects during experiments. (<b>A</b>) Wired DigiAID and Hexoskin; (<b>B</b>) Wireless DigiAID.</p>
Full article ">Figure 7
<p>Measurements during walking activity. (<b>a</b>) Respiratory rate; (<b>b</b>) Heart rate.</p>
Full article ">Figure 8
<p>Measurements during sitting activity. (<b>a</b>) Respiratory rate; (<b>b</b>) Heart rate.</p>
Full article ">Figure 9
<p>Measurements during sleeping activity. (<b>a</b>) Respiratory rate; (<b>b</b>) Heart rate.</p>
Full article ">Figure 10
<p>No. of hops while walking activity. (<b>a</b>) At <span class="html-italic">TX</span><sub>1</sub>; (<b>b</b>) At <span class="html-italic">TX</span><sub>2</sub>; (<b>c</b>) At <span class="html-italic">TX</span><sub>3</sub>; (<b>d</b>) At <span class="html-italic">TX</span><sub>4</sub>.</p>
Full article ">Figure 11
<p>Typical network topology while walking activity. (<b>a</b>) At <span class="html-italic">TX</span><sub>1</sub>; (<b>b</b>) At <span class="html-italic">TX</span><sub>2</sub>; (<b>c</b>) At <span class="html-italic">TX</span><sub>3</sub>; (<b>d</b>) At <span class="html-italic">TX</span><sub>4</sub>.</p>
Full article ">Figure 12
<p>RX power based on default TX power while walking activity.</p>
Full article ">Figure 13
<p>RX power using proposed dynamic control algorithm while walking activity.</p>
Full article ">Figure 14
<p>Packet Reception Ratio at various nodes while walking activity.</p>
Full article ">Figure 15
<p>Average TX power consumption while walking activity.</p>
Full article ">Figure 16
<p>No. of hops while sitting activity. (<b>a</b>) At <span class="html-italic">TX</span><sub>2</sub>; (<b>b</b>) At <span class="html-italic">TX</span><sub>3</sub>; (<b>c</b>) At <span class="html-italic">TX</span><sub>4</sub>.</p>
Full article ">Figure 17
<p>Typical network topology while sitting activity. (<b>a</b>) At <span class="html-italic">TX</span><sub>1</sub>; (<b>b</b>) At <span class="html-italic">TX</span><sub>2</sub>; (<b>c</b>) At <span class="html-italic">TX</span><sub>3</sub>; (<b>d</b>) At <span class="html-italic">TX</span><sub>4</sub>.</p>
Full article ">Figure 18
<p>RX power based on default TX power while sitting activity.</p>
Full article ">Figure 19
<p>RX power using proposed dynamic control algorithm while sitting activity.</p>
Full article ">Figure 20
<p>Packet Reception Ratio at various nodes while sitting activity.</p>
Full article ">Figure 21
<p>Average TX power consumption while sitting activity.</p>
Full article ">Figure 22
<p>No. of Hops while sleeping activity. (<b>a</b>) At <span class="html-italic">TX</span><sub>2</sub>; (<b>b</b>) At <span class="html-italic">TX</span><sub>3</sub>; (<b>c</b>) At <span class="html-italic">TX</span><sub>4</sub>.</p>
Full article ">Figure 23
<p>Typical network topology while sleeping activity. (<b>a</b>) At <span class="html-italic">TX</span><sub>1</sub>; (<b>b</b>) At <span class="html-italic">TX</span><sub>2</sub>; (<b>c</b>) At <span class="html-italic">TX</span><sub>3</sub>; (<b>d</b>) At <span class="html-italic">TX</span><sub>4</sub>.</p>
Full article ">Figure 24
<p>RX power based on default TX power while sleeping activity.</p>
Full article ">Figure 25
<p>RX power using proposed dynamic control algorithm while sleeping activity.</p>
Full article ">Figure 26
<p>Packet Reception Ratio at various nodes while sleeping activity.</p>
Full article ">Figure 27
<p>Average TX power consumption while sleeping activity.</p>
Full article ">
28 pages, 8306 KiB  
Article
An Advanced First Aid System Based on an Unmanned Aerial Vehicles and a Wireless Body Area Sensor Network for Elderly Persons in Outdoor Environments
by Saif Saad Fakhrulddin, Sadik Kamel Gharghan, Ali Al-Naji and Javaan Chahl
Sensors 2019, 19(13), 2955; https://doi.org/10.3390/s19132955 - 4 Jul 2019
Cited by 33 | Viewed by 12696
Abstract
For elderly persons, a fall can cause serious injuries such as a hip fracture or head injury. Here, an advanced first aid system is proposed for monitoring elderly patients with heart conditions that puts them at risk of falling and for providing first [...] Read more.
For elderly persons, a fall can cause serious injuries such as a hip fracture or head injury. Here, an advanced first aid system is proposed for monitoring elderly patients with heart conditions that puts them at risk of falling and for providing first aid supplies using an unmanned aerial vehicle. A hybridized fall detection algorithm (FDB-HRT) is proposed based on a combination of acceleration and a heart rate threshold. Five volunteers were invited to evaluate the performance of the heartbeat sensor relative to a benchmark device, and the extracted data was validated using statistical analysis. In addition, the accuracy of fall detections and the recorded locations of fall incidents were validated. The proposed FDB-HRT algorithm was 99.16% and 99.2% accurate with regard to heart rate measurement and fall detection, respectively. In addition, the geolocation error of patient fall incidents based on a GPS module was evaluated by mean absolute error analysis for 17 different locations in three cities in Iraq. Mean absolute error was 1.08 × 10−5° and 2.01 × 10−5° for latitude and longitude data relative to data from the GPS Benchmark system. In addition, the results revealed that in urban areas, the UAV succeeded in all missions and arrived at the patient’s locations before the ambulance, with an average time savings of 105 s. Moreover, a time saving of 31.81% was achieved when using the UAV to transport a first aid kit to the patient compared to an ambulance. As a result, we can conclude that when compared to delivering first aid via ambulance, our design greatly reduces delivery time. The proposed advanced first aid system outperformed previous systems presented in the literature in terms of accuracy of heart rate measurement, fall detection, and information messages and UAV arrival time. Full article
(This article belongs to the Special Issue Body Sensors Networks for E-Health Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Block diagram of the overall AFAS.</p>
Full article ">Figure 2
<p>Proposed FDD (<b>a</b>) Block diagram, and (<b>b</b>) Hardware.</p>
Full article ">Figure 3
<p>First aid kit with contents.</p>
Full article ">Figure 4
<p>UAV adopted to deliver first aid; (<b>a</b>) All components of the DJI Phantom 3, (<b>b</b>) Battery pack.</p>
Full article ">Figure 5
<p>Flowchart algorithms of AFAS for (<b>a</b>) FDD and (<b>b</b>) CEC.</p>
Full article ">Figure 6
<p>Performance evaluation comparing the FDD and a BM device.</p>
Full article ">Figure 7
<p>Scenario to evaluate the performance of the FDB-HRT algorithm, with three stages of (<b>a</b>) Standing, (<b>b</b>) Running, and (<b>c</b>) Falling.</p>
Full article ">Figure 8
<p>Smartphone of caregivers with (<b>a</b>) Patient information (<b>b</b>) Autopilot window, (<b>c</b>) Location information, (<b>d</b>) Waypoint mode, and (<b>e</b>) Flight path planning.</p>
Full article ">Figure 9
<p>Time response experiment comparing the UAV and ambulance.</p>
Full article ">Figure 10
<p>HR measurements for (<b>a</b>) five adult volunteers (ages 22 to 28), and (<b>b</b>) five elderly volunteers (ages 61 to 65).</p>
Full article ">Figure 11
<p>Mean absolute error values for heart rate data from five young volunteers of different ages: (<b>a</b>) 22, (<b>b</b>) 23 (<b>c</b>) 23, (<b>d</b>) 27, and (<b>e</b>) 28 years old.</p>
Full article ">Figure 12
<p>Mean absolute error values for heart rate data from five elderly volunteers, aged 61 to 65 years old.</p>
Full article ">Figure 13
<p>Histogram analysis of HR data measured from both the FDD and BM devices for (<b>a</b>) adult volunteers, and (<b>b</b>) elderly volunteers.</p>
Full article ">Figure 14
<p>Measurements of the FDB-HRT algorithm for three volunteers: (<b>a</b>) 28, (<b>b</b>) 30, and (<b>c</b>) 31 years old.</p>
Full article ">Figure 15
<p>Mean absolute error of the GPS module in terms of latitude and longitude for different locations, (L: location).</p>
Full article ">Figure 16
<p>Messages received with details from four different volunteers on the smartphone of the caregivers; (<b>a</b>) Message 1, (<b>b</b>) Message 2, (<b>c</b>) Message 3, and (<b>d</b>) Message 4.</p>
Full article ">Figure 17
<p>Comparison of HR measurement accuracy between the FDD in this study and the results of related works.</p>
Full article ">Figure 18
<p>Comparison of the accuracy of the FDD with those of previous works.</p>
Full article ">Figure 19
<p>Comparison between the UAV-based system proposed here and other works for (<b>a</b>) Time savings and (<b>b</b>) Mission success.</p>
Full article ">
1987 KiB  
Article
Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks
by Song Li, Jie Cui, Hong Zhong and Lu Liu
Sensors 2017, 17(5), 1032; https://doi.org/10.3390/s17051032 - 5 May 2017
Cited by 7 | Viewed by 5878
Abstract
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, [...] Read more.
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users’ medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs’ applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs’ deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models. Full article
(This article belongs to the Collection Smart Industrial Wireless Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>The system model of cloud-assisted WBSNs.</p>
Full article ">Figure 2
<p>The network model of our proposed public auditing scheme. KGC, Key Generation Centre.</p>
Full article ">Figure 3
<p>The flowchart of the attacking games in our security proof.</p>
Full article ">Figure 4
<p>The time cost of the algorithm <b>ProofGen</b>, <b>TagGen</b>, <b>Encryption</b> and <b>Decryption</b> with regard to the numbers of data blocks in seconds.</p>
Full article ">Figure 5
<p>The time cost of the algorithms <b>PartialPrivateKeyExtract</b> and <b>JoinGroup</b> with regard to the requesting number of users in seconds.</p>
Full article ">Figure 6
<p>The time cost of the <b>ProofVerify</b> algorithm on the auditor sider with regard to the number of blocks in seconds.</p>
Full article ">
2180 KiB  
Article
Robust and Accurate Modeling Approaches for Migraine Per-Patient Prediction from Ambulatory Data
by Josué Pagán, M. Irene De Orbe, Ana Gago, Mónica Sobrado, José L. Risco-Martín, J. Vivancos Mora, José M. Moya and José L. Ayala
Sensors 2015, 15(7), 15419-15442; https://doi.org/10.3390/s150715419 - 30 Jun 2015
Cited by 35 | Viewed by 11197
Abstract
Migraine is one of the most wide-spread neurological disorders, and its medical treatment represents a high percentage of the costs of health systems. In some patients, characteristic symptoms that precede the headache appear. However, they are nonspecific, and their prediction horizon is unknown [...] Read more.
Migraine is one of the most wide-spread neurological disorders, and its medical treatment represents a high percentage of the costs of health systems. In some patients, characteristic symptoms that precede the headache appear. However, they are nonspecific, and their prediction horizon is unknown and pretty variable; hence, these symptoms are almost useless for prediction, and they are not useful to advance the intake of drugs to be effective and neutralize the pain. To solve this problem, this paper sets up a realistic monitoring scenario where hemodynamic variables from real patients are monitored in ambulatory conditions with a wireless body sensor network (WBSN). The acquired data are used to evaluate the predictive capabilities and robustness against noise and failures in sensors of several modeling approaches. The obtained results encourage the development of per-patient models based on state-space models (N4SID) that are capable of providing average forecast windows of 47 min and a low rate of false positives. Full article
(This article belongs to the Special Issue Noninvasive Biomedical Sensors)
Show Figures


<p>Patient wearing the monitoring kit.</p>
Full article ">
<p>Modeling of subjective pain evolution curve.</p>
Full article ">
<p>Training and validation diagram. This stage provides a set of models with which to work.</p>
Full article ">
<p>Gaussian process machine learning (GPML) and data synchronization applied during a migraine episode.</p>
Full article ">
<p>Fit for 15 randomly-chosen migraines and the average after training them with the N4SID algorithm and 30 min of a future horizon.</p>
Full article ">
<p>Validation applying the average model, and training for triads of features for Patient A. (<b>a</b>) Average model with <span class="html-italic">M<sub>best</sub></span> models applied over the remaining 10 migraines; (<b>b</b>) Fitness comparison for N4SID and different three-features combinations in the training stage.</p>
Full article ">
<p><span class="html-italic">SDMS</span><sup>2</sup> design and usage in the real-time application. (<b>a</b>) Sensor-dependent model selection system (<span class="html-italic">SDMS</span><sup>2</sup>); (<b>b</b>) Implementation of the system for real-time applications.</p>
Full article ">
<p>Hierarchies of sets of models for Patient A and Patient B.</p>
Full article ">
<p>Test results for symptomatic and baselines periods for the trained patients. (<b>a</b>) Patient A, fit = 75.7%; (<b>b</b>) Patient A, fit = 55.0%; (<b>c</b>) Patient A → B, fit = 73.9% for TEMP-EDA-SpO2; (<b>d</b>) Patient B, fit = 88.9%; (<b>e</b>) Patient B, fit = 79.3%; (<b>f</b>) Patient B, fit = 81.1% for EDA-HR-SpO2; (<b>g</b>) Patient B → A, fit = 31.6%; (<b>h</b>) Basal Patient A; (<b>i</b>) Basal Patient A → B.</p>
Full article ">
634 KiB  
Review
Survey of WBSNs for Pre-Hospital Assistance: Trends to Maximize the Network Lifetime and Video Transmission Techniques
by Enrique Gonzalez, Raul Peña, Cesar Vargas-Rosales, Alfonso Avila and David Perez-Diaz De Cerio
Sensors 2015, 15(5), 11993-12021; https://doi.org/10.3390/s150511993 - 22 May 2015
Cited by 27 | Viewed by 17891
Abstract
This survey aims to encourage the multidisciplinary communities to join forces for innovation in the mobile health monitoring area. Specifically, multidisciplinary innovations in medical emergency scenarios can have a significant impact on the effectiveness and quality of the procedures and practices in the [...] Read more.
This survey aims to encourage the multidisciplinary communities to join forces for innovation in the mobile health monitoring area. Specifically, multidisciplinary innovations in medical emergency scenarios can have a significant impact on the effectiveness and quality of the procedures and practices in the delivery of medical care. Wireless body sensor networks (WBSNs) are a promising technology capable of improving the existing practices in condition assessment and care delivery for a patient in a medical emergency. This technology can also facilitate the early interventions of a specialist physician during the pre-hospital period. WBSNs make possible these early interventions by establishing remote communication links with video/audio support and by providing medical information such as vital signs, electrocardiograms, etc. in real time. This survey focuses on relevant issues needed to understand how to setup a WBSN for medical emergencies. These issues are: monitoring vital signs and video transmission, energy efficient protocols, scheduling, optimization and energy consumption on a WBSN. Full article
(This article belongs to the Special Issue Wireless Sensor Network for Pervasive Medical Care)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Main causes of death in Mexico, 2006–2011. Source: Death registry INEGI, 2011.</p>
Full article ">Figure 2
<p>Wireless body sensor network communicating through a mobile phone.</p>
Full article ">Figure 3
<p>Wireless Monitoring Platform for Emergency Situations. (<b>A</b>) Intra-WBSN communication; (<b>B</b>) Inter-WBSN communication; (<b>C</b>) Beyond-WBSN communication.</p>
Full article ">
Back to TopTop