Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2009;9(8):6273-97.
doi: 10.3390/s90806273. Epub 2009 Aug 11.

Design and implementation of a secure wireless mote-based medical sensor network

Affiliations

Design and implementation of a secure wireless mote-based medical sensor network

Kriangsiri Malasri et al. Sensors (Basel). 2009.

Abstract

A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.

Keywords: elliptic curve cryptography; medical sensor network; neural network; security.

PubMed Disclaimer

Figures

Figure 1.
Figure 1.
Wireless health monitoring architecture.
Figure 2.
Figure 2.
Three security mechanisms.
Figure 3.
Figure 3.
A generic three-layer feed-forward neural network.
Figure 4.
Figure 4.
A typical ECG signal for a single heartbeat.
Figure 5.
Figure 5.
The elliptic curve integrated encryption scheme (ECIES).
Figure 6.
Figure 6.
ECC-based key agreement protocol.
Figure 7.
Figure 7.
Experimental setup with two motes and a PC.
Figure 8.
Figure 8.
Throughput as a function of packet size and encryption.
Figure 9.
Figure 9.
Aggregate throughput at receiving mote and PC as a function of the number of senders (sending rate = 4 packets/sec).
Figure 10.
Figure 10.
Packet loss at receiving mote and PC as a function of the number of senders (sending rate = 4 packets/sec).
Figure 11.
Figure 11.
Aggregate throughput at receiving mote and PC as a function of the number of senders (maximum possible sending rate).
Figure 12.
Figure 12.
Packet loss at receiving mote and PC as a function of the number of senders (maximum possible sending rate).
Figure 13.
Figure 13.
Aggregate throughput at PC as a function of the number of senders and receivers (maximum possible sending rate).

References

    1. Morris M., Intille S.S., Beaudin J.S. Embedded assessment: Overcoming barriers to early detection with pervasive computing. In: Gellersen H.W., Want R., Schmidt A., editors. Proc. of PERVASIVE 2005. Springer-Verlag; Munich, Germany: May 8–13, 2005. pp. 333–346.
    1. Stern S., Tzivoni D. Early detection of silent ischaemic heart disease by 24-hour electrocardiographic monitoring of active subjects. Brit. Heart J. 1974;36:481–486. - PMC - PubMed
    1. Fischer R., Ohno-Machado L., Curtis D., Greenes R., Stair T., Guttag J. Smart Medical Technologies Summit (SMT) Houston, Texas, USA: Apr, 2004. SMART: Scalable medical alert response technology.
    1. Shnayder V., Chen B.-R., Lorincz K., Fulford-Jones T.R.F., Welsh M. Harvard University; Cambridge, Massachusetts, USA: Apr, 2005. Sensor networks for medical care. Technical Report TR-08-05,
    1. Park C., Chou P.H., Bai Y., Matthews R., Hibbs A. An Ultra-Wearable, Wireless, Low Power ECG Monitoring System. Proceedings of IEEE BioCAS; London, UK. November 2006.

LinkOut - more resources