March 2008 doc.:IEEE802.15-08-0153-00-0006 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Technical requirements of non-medical applications Date Submitted: November 20, 2007 Source: Ranjeet Kumar Patro, Kiran Bynam, Giriraj Goyal Contact: Ranjeet Kumar Patro Voice: +91- 80 - 4181 9999, E-Mail: rkp.atd@samsung.com, ranjeet.patro@gmail.com Re: Abstract: The document observes the key QoS requirement of non-medical applications and captures Body Area Network specific challenges and issues in attaining the Key QoS. It also mentions another class of applications called implant but non-medical and captures its requirements. Purpose: To capture and add new technical requirements to TR document of TG6 Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and maybe made publicly available by P802.15. Submission Slide 1 Ranjeet K. Patro
Non-medical applications March 2008 doc.:IEEE802.15-08-0153-00-0006 Non-medical applications Interactive Gaming Social network Body posture detection Video Glasses Tracking/Monitoring Application Headset E-charm Motion/Gesture capture Sports/Fitness Submission Slide 2 Ranjeet K. Patro
Implant But Non-medical March 2008 doc.:IEEE802.15-08-0153-00-0006 Implant But Non-medical Sub-dermal RF devices – VeriChipTM [1] Smartcard for clubs in Spain and Netherland Secondary ID for financial purposes Human-Tracking - Digital AngelTM [2] E-commerce security Rescue beacon for kidnapped beacon and missing persons Mexican official gets chipped [3] Human-Computer interaction - Professor Kevin Warwick’s experiment [4] Submission Slide 3 Ranjeet K. Patro
Services doc.:IEEE802.15-08-0153-00-0006 March 2008 Service Category Applications Key QoS Requirement Real-time Text Data Transfer Interactive Games Sports/Fitness Motion/Gesture capture Gaming Control Timeliness Real-time Audio Headphones Entertainment Applications Real-time Video Video Glasses Video Headset File or Text Data Transfer Data Storage Remote Display CE Control Reliability Implanted active tags for non-medical application Energy Efficiency Confidential or Private Data Smart Key Implanted passive RFID tag with personal and financial information Security or Privacy Submission Slide 4 Ranjeet K. Patro
Interactive Games et al. Real-time Audio Real-time Video March 2008 doc.:IEEE802.15-08-0153-00-0006 Timeliness [3] & [4] Measure Interactive Games et al. Real-time Audio Real-time Video Delay <250 ms <150 ms preferred <400 ms limit for conversational Audio < 1 sec for Audio Messaging < 10 sec for Audio Streaming <400 ms limit for conversational Video Relaxed for Video Messaging Video Streaming Delay Variation Less Sensitive < 1 ms Can be removed by means of buffering TBD Inter-media Skew N.A < 100 ms Submission Slide 5 Ranjeet K. Patro
Challenges: Overcoming delay variation requirement Timeliness Cont’d March 2008 doc.:IEEE802.15-08-0153-00-0006 Timeliness Cont’d Challenges: Overcoming delay variation requirement Submission Slide 6 Ranjeet K. Patro
Requirement: Challenges: March 2008 doc.:IEEE802.15-08-0153-00-0006 Reliability Requirement: Information loss should be as low as possible (towards zero) Challenges: Continuous change in channel conditions Interference from other networks Achieving high reliability with low power consumption is a design challenge Submission Slide 7 Ranjeet K. Patro
Requirement: Challenges: March 2008 doc.:IEEE802.15-08-0153-00-0006 Energy Efficiency Requirement: Processing + Reception + Transmission power should be minimum Challenges: Maintaining energy efficiency with medium/high data rate Design of single MAC for medical and non-medical applications Submission Slide 8 Ranjeet K. Patro
Strong security protocols for Confidentiality Authentication March 2008 doc.:IEEE802.15-08-0153-00-0006 Security and Privacy Requirement: Strong security protocols for Confidentiality Authentication Integrity and replay protection Challenges: Strong security protocols require High computation More communication: Extra roundtrips means more power consumption Submission Slide 9 Ranjeet K. Patro
ITU-T Recommendation G.114 “One-way transmission time”, 1996 March 2008 doc.:IEEE802.15-08-0153-00-0006 References http://www.verichipcorp.com/ http://www.digitalangel.com/ http://www.wired.com/science/discoveries/news/2004/07/64194 http://www.kevinwarwick.com/ ITU-T Recommendation G.114 “One-way transmission time”, 1996 “Human perception of jitter and media synchronisation”, R. Steinmetz, IEEE JSAC Vol 14, No. 1, Jan 1996 Submission Slide 10 Ranjeet K. Patro