Mobile Body Sensor Networks for Health Applications Yuan Xue, Vanderbilt Posu Yan, UC Berkeley A collaborative work of Vanderbilt (Sztipanovits, Xue, Werner,

Slides:



Advertisements
Similar presentations
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advertisements

1. Telephony and web access application provide a powerful remote telehealth monitoring tool and remote case management through the use of the internet,
ZigBee & TinyOS TinyOS and ZigBee are not competitive
Security Issues In Mobile IP
Workflow automation and interoperability – Diagnostic Devices Heather Childs EMR Program Director Midmark Diagnostics Group.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Encrypting Wireless Data with VPN Techniques
19 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Developing Web Services.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Communicating over the Network
Overview Environment for Internet database connectivity
Introduction Lesson 1 Microsoft Office 2010 and the Internet
Configuration management
Software change management
© 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys.
Chapter 1: Introduction to Scaling Networks
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Discovering Computers Fundamentals, 2012 Edition
Application Server Based on SoftSwitch
INTRODUCTION TO SIMULATION WITH OMNET++ José Daniel García Sánchez ARCOS Group – University Carlos III of Madrid.
1 Confidential Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management MobileIron - Confidential1.
LOGO Mobile Cloud Computing Hossein Abdolghafar Advisor :Dr. H.Salimi Februray /25.
© 2005 AT&T, All Rights Reserved. 11 July 2005 AT&T Enhanced VPN Services Performance Reporting and Web Tools Presenter : Sam Levine x111.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
ICS 434 Advanced Database Systems
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Executional Architecture
Implementation Architecture
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
25 seconds left…...
What’s New in WatchGuard Dimension v1.2
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
THE CHALLENGE: CHRONIC DISEASE CARE AND THE PROMISE OF HIT Health Care Information Technology 2004: Improving Chronic Care in California San Francisco.
Database Administration
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
Lincor MEDIVista® Services Delivery Platform Company Confidential © Lincor Solutions 2012 Webinar: Improve Patient Outcomes & Reduce Cost with Point of.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Sensor Systems for Monitoring Congestive Heart Failure: Location- based Privacy Encodings Edmund Seto, Posu Yan, Ruzena Bajcsy University of California,
Instructor Dr. Elie Geisler, Unubold Chinzorig *Kendra Johnson* Carolyn Kos Hazel Michael * Nicole Valio IIT C.A.R.E.S.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
IBM Research © 2006 IBM Corporation HARMONI: Client Middleware for Long-Term, Continuous, Remote Health Monitoring Iqbal Mohomed, Maria Ebling, William.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Implementing Network Access Protection
DexterNet Katherine Gilani (UT Dallas) Philip Kuryloski (Cornell) Posu Yan (UC Berkeley) An Open Platform for Heterogeneous Body Sensor Networks and Its.
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
TRUST : Team for Research in Ubiquitous Secure Technology National Science Foundation Site Visit February 24-26, 2009 │Berkeley, California Health Infrastructures.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IntroOH-1 CSE 5810 Remote Health Care Monitoring by Wearable Sensors and Mobile Devices Kanchan Jha Computer Science & Engineering Department The University.
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
Outline Introduction Standards Project General Idea
Implementing Network Access Protection
Internet of Things (IoT)
Blockchain technology at Change Healthcare
Presentation transcript:

Mobile Body Sensor Networks for Health Applications Yuan Xue, Vanderbilt Posu Yan, UC Berkeley A collaborative work of Vanderbilt (Sztipanovits, Xue, Werner, Mathe, Jiang) Berkeley (Bajcsy, Sastrys group) Cornell (Wicker group)

2 Topics Introduction Monitoring congestive heart failure (CHF) patients – System overview – Security support – Experiments WAVE and Berkeley Fit

Introduction The cost of health care has become a national concern. – Medicare was 35 million for 2003 and 35.4 million for 2004 – Health care expenditures in the United States will project to rise to 15.9% of the GDP ($2.6 trillion) by Impact of Information Technology – Electronic Patient Records – Remote Patient Monitoring Integration of wireless communication, networking and information technology large amount of medical information can be collected to help determine the most effective strategies for treating chronic illness, reducing disability and secondary conditions improving health outcomes, and reducing the healthcare expenses by more efficient use of clinical resources. 3

4 Remote Patient Monitoring Needs to be part of the overall chronic disease management process. Requires fully integration of – IT Technologies wireless communication, sensor platform, networking, and database – Clinical enterprise practice Explicitly incorporates security and privacy policies to protect the end-to-end communication and access of sensitive medical information.

System Overview 5 Execution Engines BPEL Engine EMR EMR Services Monitor Services Service Oriented Architecture Protocol models Workflow models Monitor models Sensor network Patient management Decision SupportRemote Patient Management Computing and Network Infrastructure Clinical Information System Homecare System Execution Engines Clinical Foundation Technology Foundation End-to-end Security models

6 Monitoring CHF Patients Provide unobtrusive and persistent monitoring – Weight – Blood pressure – Heart rate – Energy expenditure Data analysis and feedback – Automated - based on thresholds (i.e. cannot allow rapid weight fluctuation, etc.) – Doctor intervention

7 System Architecture Bluetooth Medical Database Automated Evaluation Doctor Evaluation feedback /internet

8 System Components Hardware – Nokia N810 Internet Tablet External basestation – Motion sensor ( ) – Weight scale (Bluetooth) – Blood pressure monitor (Bluetooth) Software – SPINE (Signal Processing In Node Environment) – Bluetooth daemon – Apache Axis2 WSDL client Nokia N810 Motion sensor Weight scale Blood pressure monitor

Remote Monitoring Software Architecture 9 Data sampling Data analysis Sensor control Data analysis Sensor control Data aggregation Web service Buffer Management Secure Comm. Sensor Auth. Secure Communication Sensor Authentication Service Layer TinyOS Telos Mote TinyOS Telos Mote Comm Layer Media Access Control Media Access Ctr Maemo Linux Nokia N10 USB Data analysis Data aggregation Web service TinyOS Workstation OS/hardware platform Sensor Healthcare Gateway Clinical System SPINE

Integration With Clinical Information System 10

11 SPINE Open-source framework for managing wireless sensor networks – Discovery 1 motion sensor node – Configuration Energy expenditure 1 Hz – Data processing Calculate kilocalories per minute SPINEController – Main application which runs a SPINE server, communicates with Bluetooth daemon, runs networking thread (WSDL Client)

12 Bluetooth Daemon Communicates with weight scale and blood pressure monitor – SDP (Service Discovery Protocol) and SPP (Serial Port Profile) protocols – Hardware configured to send last measurement automatically after measurement is taken Communicates with SPINEController through text files

13 Apache Axis2 WSDL Client Runs in thread in SPINEController Queues data – Sends data in queue to medical database – Automatically retries to send data if unsuccessful (no wireless connectivity) Data log files – All data – Queued data

Security and Privacy Overview Security Requirements – Data confidentiality – Data integrity – Device authentication – User authentication and access control – Service availability 14

Vertical View Across Different Network Layers Network security – involves the security issues from link to transport layer security. – provides communication platform security service, including data confidentiality, integrity, source authentication, service availability (e.g., resilience to DoS/jamming attacks) – independent of application semantics Application security – Web security/ Web service security.(e.g., resilience to SQL injection, cross-site scripting) – User authentication and access control – Data access policy – Ensures the consistency between the privacy policy and workflow 15

Security Mechanisms Existing security mechanisms and solutions to leverage – Web security solutions – SSL – TinySec New security service to implement – Device authentication – Sensor-to-gateway secure communication – Resilience to jamming attack -- channel reallocation – Privacy policy enforcement All above security mechanisms need to be integrated in the system 16 Challenge: How to ensure the end-to-end system security

Network Security Architecture 17 Data sampling Data analysis Sensor control Data analysis Sensor control Data aggregation Web service Secure Comm. Sensor Auth. Secure Communication Sensor Authentication Service Layer TinyOS Telos Mote TinyOS Telos Mote Comm Layer Channel reallocation Maemo Linux Nokia N10 USB Data analysis Data aggregation Web service TinyOS Workstation OS/hardware platform Sensor Healthcare Gateway Clinical System SSL

Horizontal -- along the message communication path Stage 1: between sensors and mobile gateway – IEEE communication standard Pre-key distribution Sensor device authentication Encryption and MAC generation based on SkipJack in TinySec – Computation: 5.3 ms – Verification 1.3~1.4ms – Bluetooth Stage 2: between sensor fusion center and the Vanderbilt web server. – SSL Client device (or user) authentication Data encryption and integration protection Stage 3: Within Vanderbilt Clinical Information System – Integration of user authentication and access control policy with workflow model 18

Application-Layer Security Architecture Monitoring Screen Web Service Layer Alert Processing Workflow Data archive workflow Alert Validating Screen Detail Alert Sensor collection Policy Layer Policy Enforcement

20 Experiment on CHF Patient 5 hour experiment – Nokia N810 battery life approximately 4 hours – required battery change Energy expenditure every minute Weight, blood pressure, heart rate measurement at beginning and end of experiment Hardware malfunction at end of experiment – Failed CRC checks on incoming serial packets

21 Experimental Results Time (min) Energy Expenditure (kCal / min) raw data moving avg.

22 Experimental Results Time (min) raw data moving avg. car Energy Expenditure (kCal / min)

23 WAVE and Berkeley Fit Social networking in mobile BSNs for health applications WAVE – API for Android OS – Sensor setup through SPINE framework – Data processing Action recognition Energy expenditure estimation GPS functions Berkeley Fit – Showcase application for WAVE – Encourages exercise through social interaction

24 Social Interaction Compete to see who expends the most energy each day – Users will see leaderboard with rankings Exercise teams – Users exposed to both encouragement and competition Other features – 1 mile, 5 mile, etc. competition runs for time

25 Planned Experiments Study of 30 college students Monitor energy expenditure – Phase 1 Control group with no social feedback – Phase 2 Add social feedback – Change in energy expenditure with social feedback enabled?

26 Summary and Future Work Our system is consistent with the existing clinical enterprise practice, and thus have the capability to scale and become part of the overall patient management process. Future Work – Full migration to Android Current Android release has no support for Bluetooth – no external sensors – Android 2.0 will have Bluetooth API – Distributed action recognition – Experiments on obese children – Extension of security models to sensor networking system and integration with application-level security models