Advertisement

Cluster-Based Health Monitoring Scheme in Wireless Sensor Networks

  • S. Selvakanmani
  • M. Shanmathi
  • N. S. Sandhya
Chapter
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)

Abstract

The prime intention of wireless medical sensor network is to monitor patient’s well-being parameters such as heart rate, blood pressure, etc. which can be gathered by wearable or implantable sensors that are executed at doctor’s facilities and updated to the database in the form of personal health information. Any entrant might drop messages by turning to the corresponding channel, modifying the information which leads to several security issues. In previous work, the database server had physical securities on specific strategies and adopted a flexible policy control while accessing the data. Cluster-based group send-receive model (GSRM) is proposed offering reliable, secure transmission among the sensor nodes in the networks. Blowfish algorithm, a cryptography standard, has been proposed incorporated with GSRM and provides greater security during message transmission. GSRM with blowfish technique eliminates the patient’s detail modification from eavesdropping and falsifying attacks.

Keywords

Wireless medical sensor networks Personal health information Sensor nodes Patient area network Electronic/mobile healthcare Group send-receive model 

References

  1. Akyildiz, I. F., Su, W., & Sankarasubramaniam, Y. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422.CrossRefGoogle Scholar
  2. Aminian, M., & Naji, H. R. (2013). A hospital healthcare monitoring system using wireless sensor networks. Journal of Health and Medical Informatics, 4, 121.  https://doi.org/10.4172/2157-7420.1000121.CrossRefGoogle Scholar
  3. Baig, M. M., Gholamhosseini, H., Mirza, F., Lindén, M., & Moqeem, A. (2017). A systematic review of wearable patient monitoring systems – Current challenges and opportunities for clinical adoption. Journal of Medical Systems, 41(115), 1–9.Google Scholar
  4. Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. IEEE Access, 5, 26521–26544.CrossRefGoogle Scholar
  5. Chao, Z. (2016). Remote medical monitoring system in wireless sensor networks. International Journal of Online Engineering, 12(11), 58–63.  https://doi.org/10.3991/ijoe.v12i11.6239.CrossRefGoogle Scholar
  6. Chinta, S. K. (2015, September 18). Blowfish. http://cs.indstate.edu/~schinta/blowfish.pdf
  7. Chowdhury, B., & Khosla, R. (2007). RFID-based hospital real-time patient management system. In Proceeding of 6th IEEE International Conference on Computer and Information Science (pp. 363–368). Melbourne, Australia.Google Scholar
  8. Hsieh, M. Y., Huang, Y. M., Chao, H. C., Hung, S. H., & Park, J. H. (2009). Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications, 27(4), 400–411.CrossRefGoogle Scholar
  9. Huang, H., Gong, T., Ye, N., Wang, R., & Dou, Y. (2017). Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Transactions on Industrial Informatics, 13(3), 1227–1237.CrossRefGoogle Scholar
  10. Hu, C., Li, H., Huo, Y., Xiang, T., & Liao, X. (2016). Secure and efficient data communication protocol for wireless body area networks. IEEE Transactions on Multi-Scale Computing Systems, 2(2), 94–107.CrossRefGoogle Scholar
  11. Ibaida, A., & Khalil, I. (2013). Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Transactions on Biomedical Engineering, 60(12), 3322–3330.CrossRefGoogle Scholar
  12. Kocabas, O., Soyata, T., Couderc, J.-P., Aktas, M. Xia, J., & Huang, M. (2013). Assessment of cloud-based health monitoring using homomorphic encryption. In Proceedings of the 31st IEEE International Conference on Computer Design (ICCD) (pp. 443–446). Ashville, VA, USAGoogle Scholar
  13. Lu, R. X., Lin, X. D., Sherman, M., & Shen, X. M. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for Mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.CrossRefGoogle Scholar
  14. Pandeeswaran, C., Surender, S., & Karthik, K. V. (2016). Remote patient monitoring system based coap in wireless sensor networks. International Journal of Sensor Network Data Communications, 5(3), 1–7.Google Scholar
  15. Railkar, R., Bodake, N., Kodgirwar, P., Deshmukh, N., & Chirame, K. (2015). PM‘DROID: Patient monitoring on android. International Journal of Computer Applications, 118, 34–38.CrossRefGoogle Scholar
  16. Sathya, D., & Pugalendhi, G. (2017). Secured remote health monitoring system. Healthcare Technology Letters, 4(6), 228–232.CrossRefGoogle Scholar
  17. Sawand, A., Djahel, S., Zhang, Z., & Naït-Abdesselam, F. (2015). Toward energy-efficient and trustworthy eHealth monitoring system. China Communications, 12(1), 46–65.CrossRefGoogle Scholar
  18. Selvakanmani. (2015). Android based health monitoring system for elderly people. International Journal of Trend in Research and Development, 2(4), 72–75.Google Scholar
  19. Selvakanmani, S., & Sumathi, M. (2014). An opportunistic routing protocol for mobile cognitive radio ad hoc networks. International Journal of Engineering and Technology, 6(2), 692–700.Google Scholar
  20. Simplicio, M. A., Iwaya, L. H., Barros, B. M., Carvalho, T. C. M. B., & Näslund, M. (2015). SecourHealth: A delay-tolerant security framework for mobile health data collection. IEEE Journal of Biomedical and Health Informatics, 19(2), 761–772.CrossRefGoogle Scholar
  21. Surendar, A., & Kavitha, M. (2017). Secure patient data transmission in sensor networks. Journal of Pharmaceutical Sciences and Research, 9(2), 230–232.Google Scholar
  22. Sundaram, P. (2013). Patient monitoring system using android technology. International Journal of Computer Science and Mobile Computing, 2(5), 191–201.Google Scholar
  23. Suriya Priya, T., Sharmila, G., & Saranya, V. P. (2018). An auction based health monitoring scheme using group management technique in WSN. International Journal of Advance Research and Innovative Ideas in Education, 4(2), 1261–1267.Google Scholar
  24. Thendral, V., & Madhuviswanatham. (2016). Visualization and Statistical Analysis of Multi Dimensional Data of Wireless Sensor Networks Using Self Organising Maps. International Journal of Engineering and Technology, 8, 391–395.Google Scholar
  25. Wang, C., Zhang, B., Ren, K., & Xu, Z. (2014). A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. In Proceedings of 33rd IEEE INFOCOM (pp. 2130–2138).Google Scholar
  26. Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., & Willemson, J. (2016). Privacy protection for wireless medical sensor data. IEEE Transactions on Dependable and Secure Computing, 13(3), 369–380.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • S. Selvakanmani
    • 1
  • M. Shanmathi
    • 1
  • N. S. Sandhya
    • 1
  1. 1.Department of Computer Science and EngineeringVelammal Institute of TechnologyChennaiIndia

Personalised recommendations