Autonomous and Intelligent Healthcare System (SYSIASS) Activity 2 Progress June 2011 Part-financed by the European Regional Development Fund.

Slides:



Advertisements
Similar presentations
IMA 2.5: Software Architecture and Development Environment Roberto Olivares M.S. Electrical Engineering Vanderbilt University, Spring 2003.
Advertisements

Key Management Nick Feamster CS 6262 Spring 2009.
Animal Tracking Component Private and State Animal Tracking Databases (ATD) Animal Trace Processing System (ATPS) National Animal Identification System.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
UNSW Strategic Educational Development Grants
AIDS 2012 Mobile tech in PMTCT programme evaluation.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Key Word Challenge This is when a computer uses services provided by another organisation’s computer systems. A computer hardware system which acts as.
SCONUL ACCESS GROUP JUNE , MMU Northern Collaboration.
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers Short Position Paper for IEEE POLICY 2009 Carl A. Gunter University.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
CORE 1: PROJECT MANAGEMENT Understanding the Problem.
1 Unified Communications Survey Summary Results Market Connections, Inc. June 2007.
Annemarie Kokosy and Matthew Pepper ISEN / EKHUFT April 24 th, 2012 University of Essex 1 Part-financed by the European Regional Development Fund Definition.
Bob can sign a message using a digital signature generation algorithm
ICMetrics Experimental Platform Daniel Newman University of Kent 27 January 2012 Ecole Centrale of Lille 1 Part-financed by the European Regional Development.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
ICMetrics Experimental Platform Jenya Kovalchuk University of Essex 27 January 2012 Ecole Centrale of Lille 1 Part-financed by the European Regional Development.
Activity 2 Progress Gareth Howells University of Kent June 2012 ISEN Lille 1 Part-financed by the European Regional Development Fund.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Wireless and Security CSCI 5857: Encoding and Encryption.
CHIPP Workshop on Detector R&D June - University of Geneva Common R&D for astroparticle physics: Activities of ApPEC and ASPERA Bernard Revaz and.
All on board, the journey to retaining new joiners starts here
1 A Local and Remote Radio Frequency Identification Learning Environment Andrew Shields & David Butcher Wireless and Mobility Research Group, Institute.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
An Answer to the EC Expert Group on CLOUD Computing Keith G Jeffery Scientific Coordinator.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
MHealth & The Healthy Caribbean Coalition Shivonne Johnson mHealth Coordinator.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Health Datasets in Spatial Analyses: The General Overview Lukáš MAREK Department of Geoinformatics, Faculty.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Chapter 4 Realtime Widely Distributed Instrumention System.
1 Enviromatics Environmental sampling Environmental sampling Вонр. проф. д-р Александар Маркоски Технички факултет – Битола 2008 год.
1 The COG “Cookbook” Course Lesson 4 - Run Large Rollouts Planning Considerations for State and Regional DMIS Adoption.
Embedding Constraint Satisfaction using Parallel Soft-Core Processors on FPGAs Prasad Subramanian, Brandon Eames, Department of Electrical Engineering,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
A wireless sensor network (WSN) essentially ad hoc networks consists of spatially distributed autonomous sensors to monitor physical or environmental conditions,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography and Network Security (CS435) Part One (Introduction)
 Knowledge management is managing the organization’s knowledge by means of systematic and organized processes.  For acquiring, organizing, sustaining,
Google’s Deep-Web Crawl By Jayant Madhavan, David Ko, Lucja Kot, Vignesh Ganapathy, Alex Rasmussen, and Alon Halevy August 30, 2008 Speaker : Sahana Chiwane.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Design and Implementation of Geometric and Texture-Based Flow Visualization Techniques Robert S. Laramee Markus Hadwiger Helwig Hauser.
Work meeting Interreg SYSIASS project 24 th June 2011 ISEN 1 Part-financed by the European Regional Development Fund.
UNIT I. EMBEDDED SYSTEM It is an electrical/electro-mechanical system designed to perform a specific function. It is a combination of hardware and software.
Name Of The College & Dept
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator.
7. Grid Computing Systems and Resource Management
Background Real-time environmental monitoring is a field garnering an ever-increasing amount of attention. The ability for sensors to make and publish.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Tank Contents Measurement & Control Providing tank contents measurement solutions since 1945.
1 Data.gov Initiative Implementation Acceleration Discussion Architecture and Infrastructure Committee Meeting March 19, 2009 Mike Carleton and Sonny Bhagowalia.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Chapter 2 Principles of Programming and Software Engineering.
IS3220 Information Technology Infrastructure Security
The International Ocean Colour Coordinating Group International Network for Sensor Inter- comparison and Uncertainty assessment for Ocean Color Radiometry.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Autonomous and Intelligent Healthcare System (SYSIASS) Activity 2 Progress April 2011 Part-financed by the European Regional Development Fund.
BIS 221 MENTOR Lessons in Excellence- -bis221mentor.com.
BIS 221 RANK Education for Service-- bis221rank.com.
Security in SDR & cognitive radio
Presentation transcript:

Autonomous and Intelligent Healthcare System (SYSIASS) Activity 2 Progress June 2011 Part-financed by the European Regional Development Fund

Reminder of Activity 2 priorities Technology to address issues preventing remote healthcare Two major strands  FSS: Utilise wireless communications technology via Frequency Selective Surfaces  ICmetrics: Secure data via encryption based directly on system properties

Sub actions

Current Progress Sub-action 1 commenced. ICmetrics Collaborative visit Essex-Kent-ISEN 13/6/11 Paper submitted to EST 2011:Security Infrastructure for Autonomous and Intelligent Healthcare System FSS General principles established One invited publication to date

ICmetric Encryption Encryption message cipher Key Conventional encryption system Encryption message cipher Key Key Generator ICmetric ICmetric encryption system

Advantages No reference/template storage “No back door” : Another ICmetric sample required or break cipher System compromise does not compromise associated systems Circuit or software tampering (e.g. malware) implicitly prevented as ICmetric modified No encryption key storage

Goals for this action Student Welfare Presentation – Department of ElectronicsPage 7 Development of hardware and software instrumentation for feature collection Building an experimental platform for identification of candidate features Analysis of measured feature data Encryption key generation from normalised feature data Developing evaluation and calibration platform

Calibration Phase (applied once only per application domain) For each sample circuit: record a set of desired measurements associated with the circuit known generically as features. Generate feature distributions for each feature tabulating the frequency of each occurrence of each discrete value within the given value scale for each sample circuit. Normalise the feature distributions generating normalisation maps for each feature.

Operation Phase (applied each time an encryption key is desired for a given circuit) Measure features for the given circuit for which an encryption key is desired. Apply the normalisation maps to generate values suitable for key generation. Apply the key generation algorithm.

Unseen Devices Assumptions:-  Distribution clusters identified in calibration sets  Behaviours of unseen circuits combinations of behaviours of seen circuits Analogy:  Can read someone’s handwriting if unseen previously but not if they write using different letter set such as Greek or Arabic

Multi-Cluster Distributions present

Unseen Devices No of SamplesPercentage Accuracy 555.6% 1058% 3062% % 7074% % % 30081% % % 60087% % 80091% %

Summary Ability to employ ICmetrics in medical environments has potential  Need to employ on unseen circuits essential  The ability to offer secure communications with no template or key storage Offering  Generalised use of wireless technology  Up-to-minute medical data at point of use  Addressing security concerns