You are on page 1of 28

SECURE AND EFFICIENT DATA

COMMUNICATION PROTOCOL
FOR WIRELESS BODY AREA
NETWORK

SEMINAR(CSE)-S7
E-mail:spsuryaprakash645516@gmail.com
Prepared By:
Surya Prakash

Outline:

Introduction
Existing System
Proposed System
3-tier Architecture
System & Security
Application
Advantage & Disadvantage
Future Scope
Conclusion

Introduction
WBAN is RF based wireless networking technology.
Integration of intelligent, miniaturized, low power

sensor node.
Classified into two:
-wearable WBAN(Digital watch).
-Implantable WBAN(pacemakers, cardiac
defibrillators).
Utilizes wireless sensor nodes.
Patients health condition can be monitored anytime
and anywhere.

C on t`n

Continously monitor the health conditions of

patients.
Prevention and early detection.
Sharing the information with care seekers and

physicians.
Provides greater mobility and flexibility to
patients

Alarming the person who wear it.


Auto medication in case of emergency.

WBAN?
Definition by IEEE.

A communication standard optimized for low


power devices for their operation on, in or
around the human body(but not limited to
humans) to server a variety of applications
including medical, consumer electronics or
personal entertainment and other.

Existing System:
Health Monitor.
Inefficient and Not User Friendly.
Lots of wires.
Soon to be wired.
Just 24 hr battery backup.

Proposed System:
Easily accessible
Saves a lot of time
Close-loop bio-feedbaack:
If high sugar level, a device triggers an insulin
pump to inject a dose of insulin.
Reduction in hospital stays.
Managing ILLNESS for managing WELLNESS

by focusing on prevention and early detection.

System Model
There are four major entities in the system:

1.Key Generation Centre.


Perform system initialization.
Generate public parameters, and design a secret key for
each consumer.
Data consumer prove that he is the owner of those
attributes and satisfy the access tree & encrypt the
message according to access tree.

2.Sensor(implanted

and wearable devices)


Monitors the important body parameter & body
movement.
Control the human body by providing life support,
visual/Audio feedback.

Cont`n
3.Data sink(BAN data controller or a mobile
device such as smart phone).
Store the patient`s data.
Anytime consumer retrieve the data as
long as possible.

4.Data Consumer.
Refers to the doctors or nurses.
Decryption of the message depends on the
satisfaction of the access tree specified by the
data source.

3-tier architecture:

Tier-1:WBAN Sensor
Consists of an intelligent node which is capable of:
Sensing
Sampling
Processing
Communicating

ECG sensor for monitoring heart activity


EMB sensor for monitoring muscle activity
Consists of a blood pressure sensor
A title for monitoring

Tire-2:Personal server
Interface the WBAN sensor through Radio or

Bluetooth
Connected with the medical sever through
mobile telephone networks or WLANs-Internet.
Functions:
Register type and number sensor node.
Manages the network channel sharing, time

synchronization, and processing data.


Send data to Main Server.

Tier-3:Medical Server
Functions include:
To authenticate users.
Save patient data into medical records.
Analyze that data.
Recognize serious health cases in order to
contact emergency care givers.
Forward new instruction to user.

System Flow For Home Monitoring

MAC protocols for WBAN


Low power consuming
Accurate
Less latency
Good performance on varying traffic load
Popular protocols for WBAN are:TMAC:
Duty-cycling protocol
Active time
Duty cycle changes according to the information
traffic load of the network
Handling varying load with low power consumption

Cont`n

SMAC
Similar to TMAC but with fixed duty cycle
Not efficient in handling continuously varying data

rates

ZigBee MAC
Two schemes:
CSMA/CA: Gives average performance
TDMA: Reduce the power consumption up to a great
extent
Baseline MAC
Uses CSMA/CA scheme
The performance is not average in the case of energy
Throughput is average.

System Requirements
Types of devices
Sensor node:
Gathers data on physical stimuli.
Personal Devide :
It gathers all the information acquired by the sensor nodes
and informs the users.
Monitoring Server:
Consists of database for data storage and processing and
analyze software.
Data rates:
Reliability depends on the data rate.

Energy:
Three domains: sensing, communication and data processing.

Security requirements:
Data storage security requirements:
Confidentiality
Integrity assurance
Dependability
Data access security requirements:
Access control
Accountability
Non-repudiation

Other security requirements:


Authentication
Availability

C on t`n

C on t`n

C on t`s

Decryp tion:

C on t`n

Applications
Medical Health Care
Sports and Fitness Monitoring
Wireless Audio
Personal Video Devices
Military
Security
Gaming and entertainment

Advantage and
Disadvantages
Advantages
Used for the detection of chronic disease
Used in military for security purpose
Assists the communication between individual and

machine

Disadvantages
Wired network-restriction between the body

movement
Interference of the multi devices that share the
channel.
Lack of integration-sensors

Conclusion:
Benefits to patients, medical personnel and

society
Continuous monitoring is possible
Early detection of possible problems.
Improving the quality of life
Collected the pulse rate, temperature and the
location of the patients

Reference:
[1] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy

attribute-based encryption, in Proc. IEEE Symp. Security Privacy,


2007, pp. 321334.
[2] C. Hu, F. Zhang, X. Cheng, X. Liao, and D. Chen, Securing
communications between external users and wireless body area
networks, in Proc. 2nd ACM Workshop Hot Topics Wireless Netw.
Security Privacy, 2013, pp. 3136.
[3] D. Panescu, Emerging technologies [wireless communication
systems for implantable medical devices], IEEE Eng. Med. Biol.
Mag., vol. 27, no. 2, pp. 96101, Mar.-Apr. 2008.
[4] X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang,
Exploiting prediction to enable secure and reliable routing in wireless
body area networks, in Proc. INFOCOM, 2012, pp. 388396.
[5] S. Ali, V. Sivaraman, and D. Ostry, Zero reconciliation secret key
generation for body-worn health monitoring devices, in Proc. 5th

Cont`n

[6] L. Shi, M. Li, S. Yu, and J. Yuan, Bana: Body area network

authentication exploiting channel characteristics, in Proc. ACM


Conf. Security Privacy Wireless Mobile Netw., 2012, pp. 2738.
[7] C. Poon, Y. Zhang, and S. Bao, A novel biometrics method to secure
wireless body area sensor networks for telemedicine and m-health,
IEEE Commun.Mag., vol. 44, no. 4, pp. 7381, Apr. 2006.
[8] K. Venkatasubramanian, A. Banerjee, and S. Gupta, PSKA:
Usable and secure key agreement scheme for body area
networks, IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 1, pp. 60
68, Jan. 2010.
[9] K. Venkatasubramanian, A. Banerjee, and S. Gupta, EKG-based
key agreement in body sensor networks, in Proc. INFOCOM
Workshops, 2008, pp. 16.
[10] S. Cherukuri, K. Venkatasubramanian, and S. Gupta, Biosec:
A biometric based approach for securing communication in wireless
networks of biosensors implanted in the human body, in
Proc. Int. Conf. Parallel Process. Workshops, 2003, pp. 432439.

You might also like