skip to main content
10.1145/1515747.1515763acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Ayushman: a secure, usable pervasive health monitoring system

Published:17 June 2008Publication History

ABSTRACT

Ayushman is a pervasive health monitoring system which has the ability to collect, process, store and display health data in a secure and easy to use manner. Recent years have seen considerable activity in this field. Most of these systems tend to treat health monitoring as an extension to generic sensor networks. and depend on a network of wearable and implanted, medical and ambient sensors (called a body area network) for data collection and transport. We contend that this paradigm is not suitable for medical monitoring given the low reliability of the sensors, and the mission critical nature of medical monitoring. Further, the existing systems mainly focus on patient monitoring and do not consider security at all, and those that do, treat it in an isolated manner. With Ayushman we present a system which addresses both these issues. It integrates sensors and highly capable entities in the back-end to provide robust health monitoring. It also considers security as an integral part of its design. Sensors in Ayushman utilize physiological values based security for securing their communication. Our design approach enables Ayushman to provide health monitoring in a secure and usable manner - a property that traditional systems lack.

References

  1. Intel Proactive Health. http://www.intel.com/research/prohealth/.Google ScholarGoogle Scholar
  2. S. Cherukuri, K. Venkatasubramanian, and S. K. S. Gupta. BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body. pages 432--439, October 2003. In Proc. of Wireless Security and Privacy Workshop.Google ScholarGoogle Scholar
  3. D. Halperin and T. S. Heydt-Benjamin and B. Ransford and S. S. Clark and B. Defend and W. Morgan and K. Fu and T. Kohno and W. H. Maisel. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. 2008. In Proc. of IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Eschenauer and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks. pages 41--47, November 2002. In Proc. of the 9th ACM conference on Computer and Communications Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen. A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. Journal of NeuroEngineering and Rehabilitation, 2(6), March 2005.Google ScholarGoogle Scholar
  6. K. V. Laerhoven and H. W. Gellersen. Spine versus Porcupine: A Study in Distributed Wearable Activity Recognition. pages 142--149, Oct 2004. In Proc. of 8th Int. Symposium on Wearable Computers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Lukowicz, U. Anliker, J. Ward, G. Tröster, E. Hirt, and C. Neufelt. AMON: A Wearable Medical Computer for High Risk Patients. pages 133--134, October 2002. In Proc. of IEEE 6th Int. Symposium on Wearable Computers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security Protocol for Sensor Networks. Wireless Networks, 8(5):521--534, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta. EKG-based Key Agreement in Body Sensor Networks. April 2008. In Proc. of the 2nd Workshop on Mission Critical Nets.Google ScholarGoogle Scholar
  10. K. Venkatasubramanian and et al. Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed. pages 406--407, June/July 2005. In Proc. of the IEEE Int. Conf. on Dist. Comp. in Sensor Sys. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Venkatasubramanian and S. K. S. Gupta. Security for Pervasive Health Monitoring Sensor Applications. pages 197--202, December 2006. In Proc. of the 4th Int. Conf. on Intell. Sensing and Infor. Processing (ICISIP, 2006).Google ScholarGoogle Scholar
  12. Victor Shnayder and Bor-rong Chen and Konrad Lorincz and Thaddeus R. F. Fulford-Jones, and Matt Welsh. Sensor Networks for Medical Care. April 2005. Harvard University Technical Report.Google ScholarGoogle Scholar
  13. G. Virone, A. Wood, L. Selavo, Q. Cao, L. Fang, T. Doan, Z. He, and J. Stankovic. An Assisted Living Oriented Information System Based on a Residential Wireless Sensor Network. April 2006. In Proc. of the Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare.Google ScholarGoogle Scholar
  14. A. Wang and A. Chandrakasan. A 180-mv subthreshold FFT processor using a minimum energy design methodology. IEEE Journal on Solid State Circuits, 40(1):310--319, January 2005.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Zhu, S. Setia, and S. Jajodia. LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 2(4):500--528, November 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ayushman: a secure, usable pervasive health monitoring system

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            HealthNet '08: Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
            June 2008
            78 pages
            ISBN:9781605581996
            DOI:10.1145/1515747

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 17 June 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Upcoming Conference

            MOBISYS '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader