Advertisement

Context Aware Trust Management Scheme for Pervasive Healthcare

  • N. Karthik
  • V. S. Ananthanarayana
Article
  • 31 Downloads

Abstract

Medical sensor nodes are used in pervasive healthcare applications like remote patient monitoring, elderly care to collect patients vital signs for identifying medical emergency. These resource restricted sensor nodes are prone to various malicious attacks, data faults and data losses. Presence of faulty data, data loss in collected patient data may lead to incorrect analysis of patient condition, which decreases the reliability of pervasive healthcare system. The aim of this work is to alert the caregiver and raise the alarm only when the patient enters into medical emergency situation. The proposed scheme also reduces the false alarms and alerts caused by data fault and misbehaving sensor nodes. To achieve this, we introduce a context aware trust management scheme for data fault detection, data reconstruction and event detection in pervasive healthcare systems. It employs heuristic functions, data correlation and contextual information based algorithms to identify the data faults and events. It also reconstructs the data faults and data loss for identifying patient condition. Performance of this approach is evaluated with the help of real data samples collected by medical sensor network prototype of remote patient monitoring application. The experimental results show that the proposed trust scheme outperforms state-of-the-art techniques and achieves good detection accuracy in data fault detection and event detection.

Keywords

Medical sensor networks Pervasive healthcare Trust management scheme 

Notes

References

  1. 1.
    He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRefGoogle Scholar
  2. 2.
    Yu, H., Shen, Z., & Leung, C. (2010). Towards trust-aware health monitoring body area sensor networks. International Journal of Information Technology, 16(2), 1–20.Google Scholar
  3. 3.
    Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.CrossRefGoogle Scholar
  4. 4.
    Gao, Y., & Liu, W. (2015). A security routing model based on trust for medical sensor networks. In 2015 IEEE international conference on communication software and networks (ICCSN). IEEE.Google Scholar
  5. 5.
    Dondio, P., Manzo, E., & Barrett, S. (2007). Applied computational trust in utilities management: A case study on the town council of Cava deTirreni. In IFIP international conference on trust management. Boston, MA: Springer.Google Scholar
  6. 6.
    Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.CrossRefGoogle Scholar
  7. 7.
    Gwadera, R., Riahi, M., & Aberer, K. (2014). Pattern-wise trust assessment of sensor data. In 2014 IEEE 15th international conference on mobile data management (MDM) (Vol. 1). IEEE.Google Scholar
  8. 8.
    Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137–5170.CrossRefGoogle Scholar
  9. 9.
    Karthik, N., & Ananthanarayana, V. S. (2016). Data trustworthiness in wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/I SPA. IEEEGoogle Scholar
  10. 10.
    Karthik, N., Ananthanarayana, V. S. (2017). Data trust model for event detection in wireless sensor networks using data correlation techniques. In 2017 fourth international conference on signal processing, communication and networking (ICSCN) . IEEE.Google Scholar
  11. 11.
    Han, G., et al. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80.3, 602–617.CrossRefGoogle Scholar
  12. 12.
    Gilbert, E. P. K., et al. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.CrossRefGoogle Scholar
  13. 13.
    Chen, H., et al. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage, NAS’08, 2008. IEEE.Google Scholar
  14. 14.
    Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in event detection wireless sensor networks. IEEE Transactions on Network and Service Management, 12(3), 496–510.CrossRefGoogle Scholar
  15. 15.
    Salem, O., et al. (2013). Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In 2013 IEEE international conference on communications (ICC). IEEE.Google Scholar
  16. 16.
    Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.CrossRefGoogle Scholar
  17. 17.
    Zhang, L., Wu, X., & Luo, D. (2015). Improving activity recognition with context information. In 2015 IEEE international conference on mechatronics and automation (ICMA). IEEE.Google Scholar
  18. 18.
    Mannini, A., et al. (2013). Activity recognition using a single accelerometer placed at the wrist or ankle. Medicine and Science in Sports and Exercise, 45(11), 2193.CrossRefGoogle Scholar
  19. 19.
    Guestrin, C., Bodik, P., Thibaux, R., Paskin, M., & Madden, S. (2004). Distributed regression: An efficient framework for modeling sensor network data. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 1–10). IEEE.Google Scholar
  20. 20.
    Zhang, H., et al. (2016). A data reconstruction model addressing loss and faults in medical body sensor networks. In Global communications conference (GLOBECOM), 2016 IEEE. IEEE.Google Scholar
  21. 21.
    Sharma, A. B., Golubchik, L., & Govindan, R. (2010). Sensor faults: Detection methods and prevalence in real-world datasets. ACM Transactions on Sensor Networks (TOSN), 6(3), 23.CrossRefGoogle Scholar
  22. 22.
    Madden, S. (2003). Intel Berkeley research lab data. Web page, Intel. http://berkeley.intel-research.net/labdata.
  23. 23.
    Tolle, G., Polastre, J., Szewczyk, R., Culler, D., Turner, N., Tu, K., & Hong, W. (2005). A macroscope in the redwoods. In Proceedings of the 3rd international conference on embedded networked sensor systems (pp. 51–63). ACMGoogle Scholar
  24. 24.
    Li, W., & Zhu, X. (2014). Recommendation-based trust management in body area networks for mobile healthcare. In 2014 IEEE 11th international conference on mobile ad hoc and sensor systems (MASS). IEEE.Google Scholar
  25. 25.
    Bui, V. T. (2011). A trust management model for body sensor networks. In 2011 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM). IEEE.Google Scholar
  26. 26.
    Chitra, A., & Kanagachidambaresan, G. R. (2018). Fault aware trust determination algorithm for wireless body sensor network (WBSN). In Proceedings of first international conference on smart system, innovations and computing. Singapore: Springer.Google Scholar
  27. 27.
    Kanagachidambaresan, G. R. (2018). Trustworthy architecture for wireless body sensor network. In Information Resources Management Association. Wearable technologies: Concepts, methodologies, tools, and applications (pp. 333–362). Hershey, PA: IGI Global.  https://doi.org/10.4018/978-1-5225-5484-4.
  28. 28.
    Gao, Y., & Liu, W. (2014). BeTrust: A dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks. Journal of Sensors.  https://doi.org/10.1155/2014/649392.CrossRefGoogle Scholar
  29. 29.
    Wu, G. W., Liu, Z. S., & Pirozmand, P. (2014). A fuzzy trust model for public key distribution in body area networks. In Advanced materials research (Vol. 989, pp. 4837–4840). Trans Tech Publications.Google Scholar
  30. 30.
    Bui, V., et al. (2013). A trust evaluation framework for sensor readings in body area sensor networks. In Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).Google Scholar
  31. 31.
    Bui, V. T., Lukkien, J. J., Verhoeven, R. (2011). Toward a trust management model for a configurable body sensor platform. In Proceedings of the 6th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).Google Scholar
  32. 32.
    Ye, J., Stevenson, G., & Dobson, S. (2016). Detecting abnormal events on binary sensors in smart home environments. Pervasive and Mobile Computing, 33, 32–49.CrossRefGoogle Scholar
  33. 33.
    Paschalidis, I. C., & Chen, Y. (2010). Statistical anomaly detection with sensor networks. ACM Transactions on Sensor Networks, 7(2), 17.CrossRefGoogle Scholar
  34. 34.
    Dereszynski, E. W., & Dietterich, T. G. (2011). Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns. ACM Transactions on Sensor Networks, 8(1), 3:1–3:36.CrossRefGoogle Scholar
  35. 35.
    Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.CrossRefGoogle Scholar
  36. 36.
    Salem, O., et al. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE Journal of Biomedical and Health Informatics, 18(5), 1541–1551.CrossRefGoogle Scholar
  37. 37.
    Cover, T., & Hart, P. (1967). Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT, 13(1), 21–27.CrossRefGoogle Scholar
  38. 38.
    Rajasegarar, S., Leckie, C., Palaniswami, M., & Bezdek, J. C. (2006). Distributed anomaly detection in wireless sensor networks. In Proceedings of IEEE ICCS.Google Scholar
  39. 39.
    Kong, L., Xia, M., Liu, X.-Y., Wu, M.-Y., & Liu, X. (2013). Data loss and reconstruction in sensor networks. INFOCOM, 13, 1654–1662.Google Scholar
  40. 40.
    Nasridinov, A., et al. (2014). Event detection in wireless sensor networks: Survey and challenges. Mobile, ubiquitous, and intelligent computing (pp. 585–590). Berlin: Springer.Google Scholar
  41. 41.
    Wittenburg, G., Dziengel, N., Adler, S., Kasmi, Z., Ziegert, M., & Schiller, J. (2012). Cooperative event detection in wireless sensor networks. IEEE Communications Magazine, 50(12), 124–131.CrossRefGoogle Scholar
  42. 42.
    Duarte, M. F., & Hu, Y. H. (2004). Vehicle classification in distributed sensor networks. Journal of Parallel and Distributed Computing, 64(7), 826–838.CrossRefGoogle Scholar
  43. 43.
    Ghasemzadeh, H., Loseu, V., & Jafari, R. (2010). Collaborative signal processing for action recognition in body sensor networks: A distributed classification algorithm using motion transcripts. In Proceedings of the ninth ACM/IEEE international conference on information processing in sensor networks (IPSN 10), Stockholm, Sweden.Google Scholar
  44. 44.
    Walchli, M., Skoczylas, P., Meer, M., & Braun, T. (2007). Distributed event localization and tracking with wireless sensors. In Proceedings of the fifth international conference on wired/wireless internet communications (WWIC 07), Coimbra, Portugal.Google Scholar
  45. 45.
    Haron, N., Jaafar, J., Aziz, I. A., Hassan, M. H., & Shapiai, M. I. (2017). Data trustworthiness in internet of things: A taxonomy and future directions. In 2017 IEEE conference on big data and analytics (ICBDA) (pp. 25–30). Kuching.Google Scholar
  46. 46.
    Jadidoleslamy, H., Aref, M. R., & Bahramgiri, H. (2016). A fuzzy fully distributed trust management system in wireless sensor networks. AEU-International Journal of Electronics and Communications, 70(1), 40–49.CrossRefGoogle Scholar
  47. 47.
    Attal, F., et al. (2015). Physical human activity recognition using wearable sensors. Sensors, 15(12), 31314–31338.CrossRefGoogle Scholar
  48. 48.
    Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of third IEEE international conference on mobile ad-hoc and sensor systems (MASS 06) (pp. 437–446).Google Scholar
  49. 49.
    Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. M. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.CrossRefGoogle Scholar
  50. 50.
    Cho, J.-H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRefGoogle Scholar
  51. 51.
    Yu, T., et al. (2015). Temporal and spatial correlation based distributed fault detection in wireless sensor networks. In 2015 IEEE 28th Canadian conference on electrical and computer engineering (CCECE). IEEE.Google Scholar
  52. 52.
    Karthik, N., & Sarma Dhulipala, V. R. (2011). Trust calculation in wireless sensor networks. In 2011 3rd international conference on electronics computer technology (ICECT) (Vol. 4). IEEE.Google Scholar
  53. 53.
    Li, Z., Zhu, Y., Zhu, H., & Li, M. (2011). Compressive sensing approach to urban traffic sensing. In Proceedings of IEEE ICDCS, Minneapolis, MN, USA.Google Scholar
  54. 54.
    Zhu, H., Zhu, Y., Li, M., & Ni, L. (2009). Seer: Metropolitan-scale traffic perception based on lossy sensory data. In Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil.Google Scholar
  55. 55.
    Kong, L., et al. (2014). Data loss and reconstruction in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2818–2828.CrossRefGoogle Scholar
  56. 56.
    Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1228–1237.CrossRefGoogle Scholar
  57. 57.
    Ni, K., et al. (2009). Sensor network data fault types. ACM Transactions on Sensor Networks (TOSN), 5(3), 25.CrossRefGoogle Scholar
  58. 58.
    Kelly, G. (2006). Body temperature variability (part 1): A review of the history of body temperature and its variability due to site selection, biological rhythms, fitness, and aging. Alternative Medicine Review, 11(4), 278.MathSciNetGoogle Scholar
  59. 59.
    Berger, A., et al. (2016). Exercise systolic blood pressure variability is associated with increased risk for new-onset hypertension among normotensive adults. Journal of the American Society of Hypertension, 10(6), 527–535.CrossRefGoogle Scholar
  60. 60.
    Sunita, A. S. M., et al. (2013). Heart rate and blood pressure response to exercise and recovery in subclinical hypothyroid patients. International Journal of Applied and Basic Medical Research, 3(2), 106.CrossRefGoogle Scholar
  61. 61.
    Schnbrodt, F. D., & Perugini, M. (2013). At what sample size do correlations stabilize? Journal of Research in Personality, 47(5), 609–612.CrossRefGoogle Scholar
  62. 62.
    Oh, D.-J., Hong, H.-O., & Lee, B.-A. (2016). The effects of strenuous exercises on resting heart rate, blood pressure, and maximal oxygen uptake. Journal of Exercise Rehabilitation, 12(1), 42.CrossRefGoogle Scholar
  63. 63.
    Ravichandran, J., & Arulappan, A. I. (2013). Data validation algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 9(12), 634278.CrossRefGoogle Scholar
  64. 64.
    Burton, D. A., Stokes, K., & Hall, G. M. (2004). Physiological effects of exercise. Continuing Education in Anaesthesia Critical Care & Pain, 4(6), 185–188.CrossRefGoogle Scholar
  65. 65.
    Karthik, N., & Ananthanarayana, V. S. (2017). Sensor data modeling for data trustworthiness. In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE.Google Scholar
  66. 66.
    Zhang, Y., Cheng, H., Chen, D. (2016). Data reconstruction with spatial and temporal correlation in wireless sensor networks. In Proceedings of the 3rd ACM workshop on mobile sensing, computing and communication. ACM.Google Scholar
  67. 67.
    Zhang, H., Liu, J., & Pang, A.-C. (2018). A Bayesian network model for data losses and faults in medical body sensor networks. Computer Networks, 143, 166–175.CrossRefGoogle Scholar
  68. 68.
    Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in wireless sensor networks: A survey. ACM Computing Surveys (CSUR), 48(2), 24.CrossRefGoogle Scholar
  69. 69.
    Wang, M., Xue, A., & Xia, H. (2017). Abnormal event detection in wireless sensor networks based on multiattribute correlation. Journal of Electrical and Computer Engineering.  https://doi.org/10.1155/2017/2587948.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information TechnologyNational Institute of Technology KarnatakaMangaloreIndia

Personalised recommendations