Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2554850.2554950acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Secure monitoring for dementia patients

Published: 24 March 2014 Publication History

Abstract

There are several challenges for monitoring the patients with specific requirements such as people with dementia. For example, vascular dementia which is caused generally after stroke could result in serious conditions and change of behaviour such as wandering, loss of vision and speech. Although the nursing staff make sincere effort for taking care and monitoring of the patients, it is rare that a nursing staff is allocated to each patient. Hence even a minor lack of attention can lead to havoc situation if any of the patient is found to be missing. This results in high stress for the nursing staff and the hospital management. The aim of this work is to develop techniques for secure monitoring of dementia patients in hospital environments. Our model tracks the patients in real time and can generate alarms if the location of the patients is found to be suspicious. Furthermore, our model makes use of the existing infrastructures to minimize the cost of deployment.

References

[1]
http://www.alz.org/what-is-dementia.asp
[2]
P. Dawson, D. W. Reid, "Behavioral dimensions of patients at risk of wandering," Gerontologist, 1987; 27: 104--107
[3]
C. K. Y. Lai, D. G. Arthur, "Wandering behavior in people with dementia," J Adv Nurs, 2003; 44(2): 173--182.
[4]
D. L. Algase, E. R. A. Beattie, B. Therrien, "Impact of cognitive impairment on wandering behavior," Western J Nurs Res, 2001; 23(3): 283--295
[5]
K. Makimoto, M. Yamakawa, N. Ashida, Y. Kang, K. R. Shin, "Japan-Korea joint project on monitoring people with dementia," 11th World Congress on the Internet and Medicine, 2006.
[6]
P. Ferguson and D. Senie, "Network Ingress Filtering: defeating denial of service attacks which employ IP source address spoofing", RFC 2267, January 1998.
[7]
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, "SAVE: source address validity enforcement protocol," Proceedings of IEEE INFOCOM, 2004.
[8]
Z. Duan, X. Yuan, and J. Chandrasekar, "Constructing inter-domain packet filters to control IP Spoofing based on BGP updates," Proceedings of IEEE INFOCOM, pp. 1--12, 2006.
[9]
H. Wang, C. Jin, and K. G. Shin, "Defense against spoofed IP traffic using hop-count filtering", IEEE/ACM Transcations on Networking, 15(1), pp. 40--53, Feb. 2007.
[10]
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for IP traceback", ACM/IEEE Transaction on Networking, vol. 9, no. 3, pp. 226--237, June 2001.
[11]
Udaya Kiran Tupakula, Vijay Varadharajan, "A practical method to counteract denial of service attacks," In proceedings of the twenty -fifth Australasian computer science conference ACSC 2003, Australia, Feb 2003.
[12]
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxon, and S. Shenker, "Controlling high bandwidth aggregates in the network", ACM CCR, vol. 32, no. 3, pp. 62--73, Jul. 2002.
[13]
Robert Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods", Proceedings of 9th Usenix Security Symposium, August 2000.
[14]
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer, "Single-packet IP traceback", ACM/IEEE Transactions on Networking, vol 10, no. 6, pp. 721--734, Dec. 2002.
[15]
Yoohwan Kim; Wing Cheong Lau; Mooi Choo Chuah; H. J. Chao, "PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks", IEEE Transactions on Dependable and Secure Computing, 3(2), pp. 141--155, Apr. 2006.
[16]
Refik Molva, Eric Rutsche, "Application access control at network Level", Proceedings of the ACM CCS 2004.
[17]
U. K. Tupakula, V. Varadharajan, S. K. Vuppala, "SBAC: Service Based Access Control", Proceedings of 14<sup>th</sup> IEEE ICECCS, June 2009.
[18]
Khan et al, "DoS attacks and challenges in broadband wireless networks", International Journal of computer science and network security, Vol 8, No. 7, July 2008.
[19]
John Bellardo and Stefan Savage, "802.11 denial-of-service attacks: real vulnerabilities and practical solutions", Proceedings of USENIX Security Symposium, 2003.
[20]
C. He, J. C. Mitchell, "Security Analysis and Improvements for IEEE 802.11i", Proceedings of NDSS, San Diego, Feb 2005.
[21]
R. H. Rahman, N. N. Nowsheen, M. A. Khan and V. H. Khan, "Wireless Lan Security: An In-Depth Study of the Threat and Vulnerabilities," Asian Journal of Information Technology, vol. 6(4), pp. 441--446, 2007
[22]
Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Prof. Seema Shrawne, "Vulnerabilities of Wireless Security Protocols", International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 2, April 2012.
[23]
Chibiao Liu, and James Yu, "A Solution to WLAN Authentication and Association DoS Attacks", IAENG International Journal of Computer Science, 2007.
[24]
Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, Brian Zill, "Enhancing the Security of Corporate Wi-Fi Networks Using DAIR", Proceedings of ACM MobiSys 2006.
[25]
Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, Sanglu Lu, "A Timing-Based Scheme for Rogue AP Detection", IEEE Transactions on parallel and distributed Systems, November 2011, vol. 22 no. 11, pp. 1912--1925
[26]
Rongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter Ungsunan, "A Novel Cookie-based DDoS Protection Scheme and its Performance Analysis", Proc. of IEEE AINA, 2009.
[27]
Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang, "Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service", Proceedings of ACM WiSe'04, Oct 2004.
[28]
Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta, "Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks" IEEE/ACM Transactions on Networking, 17(1), Feb. 2009.
[29]
V Balakrishnan, V Varadharajan, U Tupakula "Fellowship: Defense against Flooding and Packet Drop Attacks in MANET", Proceedings of the 10th IEEE/IFIP Network Operations and Management Symposium (NOMS 2006), vancouver, Canada.
[30]
Xianjun Geng, Yun Huang and Andrew B. Whinston, "Defending Wireless Infrastructure against the challenge of DDoS Attacks", Mobile Networks and Applications 7(3): 213--223, 2002.
[31]
P. Enge, P. Misra, "Special issue on GPS: The global positioning system", Proceedings of the IEEE, 1999.
[32]
P. Bhal, V. N. Padmanabhan, "RADAR: An in-building RF based user location tracking system", Proceedings of IEEE Infocom 2000.
[33]
Xiang, Zhe, "A wireless LAN-based indoor positioning technology", IBM Journal of Research and Development, 48(5.6), Sept. 2004
[34]
Ankur Agiwal, Parakram Khandpur, Huzur Saran, "LOCATOR: location estimation system For wireless LANs", Proceedings of the 2<sup>nd</sup> ACM international workshop on Wireless mobile applications and services on WLAN hotspots, WMASH 2004.
[35]
Bev Jordan, "Emergency services find lost dementia sufferer", Available at: http://www.greatfete.com.au/media/NewsLocal-HillsShireTimes-13Aug2013-Page3.pdf.

Cited By

View all
  • (2018)Secure Monitoring of Patients With Wandering Behavior in Hospital EnvironmentsIEEE Access10.1109/ACCESS.2017.27736476(11523-11533)Online publication date: 2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied Computing
March 2014
1890 pages
ISBN:9781450324694
DOI:10.1145/2554850
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 March 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. patient monitoring and denial of service attacks
  2. physical security

Qualifiers

  • Research-article

Conference

SAC 2014
Sponsor:
SAC 2014: Symposium on Applied Computing
March 24 - 28, 2014
Gyeongju, Republic of Korea

Acceptance Rates

SAC '14 Paper Acceptance Rate 218 of 939 submissions, 23%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Secure Monitoring of Patients With Wandering Behavior in Hospital EnvironmentsIEEE Access10.1109/ACCESS.2017.27736476(11523-11533)Online publication date: 2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media