A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Expanding LTE for Devices European Commission Information Society and Media The aim of EXATED is to realise the vision of a new scalable.
OMA TP Workshop on Home Environment Services Converged Personal Network Services (CPNS) 11 February 2011 Honolulu, USA Jeonghoon Lee, Chair OMA CPNS Working.
Blue Eye T E C H N O L G Y.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Multi-agents based wireless sensor telemedicine network for E-Health monitoring of HIV Aids Patients. By: Muturi Moses Kuria, SCI, University of Nairobi,
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Presented by Hasan SÖZER1 PUBLIC ACCESS MOBILITY LAN: EXTENDING THE WIRELESS INTERNET INTO THE LAN ENVIRONMENT JUN LI STEPHEN B.WEINSTEIN JUNBIAO ZHANG.
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
PROJECT PROPOSAL Lennie Giannone, Ryan Savino, Carrie Johnston, and Jessica Fernandes.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Private and Confidential – For Discussion Purposes Only OneWorldDr Medical Services Overview  OneWorldDr Medical Services (OWD) is a Mobile phone and.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
ProSense Research Infrastructure at ETF Belgrade Aleksandar Crnjin School of Electrical Engineering (ETF) Belgrade, Serbia.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
L ă cr ă mioara STOICU-TIVADAR, Vasile STOICU-TIVADAR, Dorin BERIAN “Politehnica” University Timisoara Department of Automation and Applied Informatics,
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Differentiated Access to Virtual Resources in Cloud Environments M. Fazio and A. Puliafito Euro-TM Workshop.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Module 11: Remote Access Fundamentals
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Submission doc.: IEEE /1112r1 Use Case of LRLP Operation for IoT September 2015 Chittabrata Ghosh, IntelSlide 1 Date: Authors:
Presenter: D. Jayasakthi Advisor: Dr. Kai-Wei ke.
Configuring Network Access Protection
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
Home Automation System 06T0007 Hiroshi OHSUGA. Outline About Home Automation System Related Works -Remote-controlled home automation system via Bluetooth.
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
A Study on Smart Gateway Based on Android 4.x Bluetooth HDP(Health Device Profile) Jae-Hwan Jeon l, Sung-In Kang 2, Gwan-Hyung Kim 3, Oh-Hyun Kwon 3, Sung-Wook.
Solutions for Multi Discipline Healthcare Practice.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Web Services Using Visual.NET By Kevin Tse. Agenda What are Web Services and Why are they Useful ? SOAP vs CORBA Goals of the Web Service Project Proposed.
Presentation Title 1 1/27/2016 Lucent Technologies - Proprietary Voice Interface On Wireless Applications Protocol A PDA Implementation Sherif Abdou Qiru.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Telemedicine Unit 5, Lesson 6 Explanation Presentation
Interconnecting Autonomous Medical Domains Gritzalis, S.Gritzalis, S. ; Belsis, P. ; Katsikas, S.K. ; Univ. of the Aegean, Samos Belsis, P.Katsikas, S.K.
Doc.: IEEE /0970r1 Submission July 2011 Guixia Kang, BUPTSlide 1 IEEE ah Healthcare Use Cases Date: Authors:
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Submission May 2016 H. H. LEESlide 1 IEEE Framework and Its Applicability to IMT-2020 Date: Authors:
1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.
JIT Medical Application Project IC System Design Matching Between IC Cards & IC System Zhoulan Zhang
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
Sensors Journal, IEEE, Issue Date: May 2013,
Providing Teleworker Services
Virtual Private Networks (VPN)
Outline Introduction Standards Project General Idea
Speaker: Hui-Hsiung Chung Date:
Providing Teleworker Services
Virtual Private Network
Providing Teleworker Services
Providing Teleworker Services
AAA: A Survey and a Policy- Based Architecture and Framework
Providing Teleworker Services
Presentation transcript:

A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1

Outline Introduction Provided services Architecture Conclusion Reference 2

Introduction They can facilitate the provision of high quality e-health services for elderly and patients when their health condition requires so. Our aim is to guarantee the provision of on site accurate and secure medical information to authorized personnel, enabling thus the provision of high quality e-health services. 3

Provided services Monitoring Patient’s Condition –Human: Temperature, blood pressure, heart-beats and blood-oxygen ratio. –Room: Temperature and humidity values. Location-Based Monitoring –Many cellular phones are equipped today with a GPS and 3G. –The patient goes in a rural area, the hospital’s service should inform the patient through SMS that in this area immediate medical assistance is not available. Remote Surveillance –Hospital’s employees should have the ability to monitor the patient at home using a remote camera, when critical alarms about its health are triggered. 4

Provided services Cont. Alarm-Triggered Actions –When one of the monitored values goes above or below a threshold, the hospital’s service is responsible of triggering an alarm. Help on Demand –The patient should have the ability to request for help either by pressing specific keys of his/her landline phone or by pressing a key combination of his/her mobile phone. Direct Communication –The patient can call the hospital directly or by pressing a key combination of his / her landline / mobile phone. 5

Architecture - Patient to Hospital Interaction Bluetooth uses the IP protocol, by which we can transmit messages from sensors to the hospital without changing their format. Indoor communication –The actor receive the sensor’s signals using Bluetooth, forward the signals to the broadband gateway through a wireless connection. –A VPN can be set up between the patient’s home and the hospital, in order the connection to be more secure and more reliable. Outdoor communication –When the patient moves outside his/her home, a mobile connection is necessary in order to transmit the information. –The wireless technology that best fits our needs is 3G. –A VPN setup from the hospital to the patient’s mobile phone. 6

Architecture - Patient to Hospital Interaction Cont. Handover description –The purpose of this handover is to deliver messages from sensors to the patient’s mobile phone (or opposite), instead of the actor. 7

Architecture - Patient to Hospital Interaction Cont. Actor message format –HL7 protocol: The aggregated message is then transmitted through TCP/IP on TCP port Information Confidentiality –A VPN setup so the communication is secure it self, since the VPN tunnel is encrypted through IPSec. Service Prioritization –Using DiffServ and IEEE e, we can map four service group into three traffic prioritization classes. –alarm actions > monitoring actions > remote surveillance 8 PATIENT ID DATE TIME21:23:23 PRESSURE PULSE77.6 TEMPERATURE36.9

Architecture - Hospital to Doctor Interaction Agent Based Architecture –ACL (Agent Communication Language): sender/recipient address, message type, ontological commitments, supported content languages and interaction protocols. Access Control Enforcement Modules –A validation of the doctor’s id. –Communications are encrypted end to end from the medical database to the doctor’s device using SSL. Security Modules –Policy Enforcement Point (PEP) –eXtensible Access Control Markup Language (XACML) –Policy Decision Point (PDP) 9

Conclusion We have presented a pervasive architecture, which allows the provision of remote medical treatment of patients. The presence of large number of users and mobile devices in this pervasive scenario has directed our security implementation choices towards a policy based approach resulting in an efficient and in an automated manner flexible management. 10

Reference D. Vassis, P. Belsis, C. Skourlas, G. Pantziou, A pervasive architectural framework for providing remote medical treatment, Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments 11