Security protocols &
platform
FOR WSN BASED MEDICAL APPLICATIONS
-AVIJIT MATHUR
SUPERVISOR: DR. THOMAS NEWE
Overview
WSN: Nodes collected and organized in some fashion in order to make a cooperative
network.
Usage: Monitoring of patients wirelessly. (Routine/emergency/mass causality) thereby
providing healthcare services.
As the population increases there is a need for continuous medical monitoring.
Patients monitored wirelessly has several advantages.
Traditional wired methods do not allow mobility with the added difficulty of time constraints.
Provide a secure, reliable and energy-efficient Wireless Sensor Network for medical devices.
In Home/hospital architecture
Base StationRepeater
Access point 1
Access point 2
Access point 3
GSM/3g/
4g
WiFi
WiMAX
ZIGBEE
BLE
Topologies
Star
Mesh:
Hierarchical tree
Clustered Hierarchical
Star Topology
Partial Mesh
Topology
Hierarchical Tree
Clustered HierarchicalCluster Head Central Hub/Switch
Gateway Nodes Sensor Nodes
Source: A Performance Comparison of Different Topologies for
Wireless Sensor Networks by Akhilesh Shrestha and Liudong Xing
ZIGBEE Bluetooth Low energy Wi-Fi 4G
Range 10-100 m >60m
(10m for Classic BT)
Depends on specification In Kilometers
Power Low Very Low
(High for classic BT and
medium for others)
High
(variable for WiFi Direct)
High
Entries 254
(>64000 per network)
 2 Billion
 (Classic: 7)
Depends on no. of IP
addresses
-
Latency Low 3 ms (compared to 100ms
in classic BT)
Variable -
Self healing Yes - Yes Yes
Topologies Mesh, Star and Cluster-
tree
Star Star, Point-to-Point Ring
Data transmission rate Up to 250Kbps 1Mbps (BT v4.0: 25Mbps) 11Mbps & 54Mbps
(250 Mbps: WiFi Direct)
100Mbps & 1Gbps(fixed
access)
Bandwidth 2.4GHz, 915MHz & 868
MHz
2.4 GHz only
(BT + HS: 6-9 GHz)
2.4, 3.6 & 5 GHz Similar to WiFi
Transmission technique DSSS DS/FA? Adaptive FHSS
(Classic BT: FHSS)
DSSS, CCK & OFDM OFDMA
IEEE 802.15.6
New standard specified for Wireless Body Area Networks (WBANs)
Extremely low power, good data rate and safety compliant.
Flexible frequencies => selecting the right physical layer very important
MICS and WMTS do not support high data rate while ISM band supports high data rate at the
cost of interference.
PHY layers
Security levels
Source :An Overview of IEEE 802.15.6 Standard (Invited Paper)
Kyung Sup Kwak, Sana Ullah, and Niamat Ullah; UWB-ITRC Center, Inha University;
253 Yonghyun-dong, Nam-gu, Incheon (402-751), South Korea
Table Source:Body Area Networks
Arif Onder ISIKMAN, Loris Cazalony, Feiquan Chenz, Peng Lix
Chalmers University of Technology, SE-412 96, Gothenburg, Sweden
IEEE 802.15.4 / ZigBee IEEE 802.15.6
Range 10-100m 2-5m
Data rate 20,40 & 250 Kbps Few Kbps – 10 Mbps
Power 25-35mW 0.01 mW (stand by),
40mW (active)
Entries 65535 devices 256 devices per network
Security & Reliability
Security services: Authentication, access control, data confidentiality,
integrity and Non-repudiation.
Reliability depends on two main factors: network connectivity and
sensing coverage.
Security is very important as the technology may be
vulnerable to attacks
Traditional security mechanisms
(PKI) cannot be used.
Semantic security
Secure routing & storage are most important
Source: Integrated Modeling for Wireless Sensor Networks by
Liudong Xing, Ph. D., University of Massachusetts, Dartmouth & Howard E. Michel, Ph.D., University of Massachusetts, Dartmouth
Security protocols
TinySec
MiniSec
SPINS: SNEP & uTesla
LiSP
MAC
SIA
Security Mechanism
Steganography: Channel is hidden under the Physical layer to provide covert data transmission
Cryptography: Encryption & authentication mechanisms
Key management: Global, pair-wise node, pair-wise group & individual
Localization: Geographically detect a malicious node
Trust management: Select route based on trustworthy nodes
Data Partitioning
6 6
6
6
7
7
7
6
Periodic key generation
Data: D
D1
D2
D3
D1
D1
D2
D3 D3
Source: Wireless Sensor Network Attacks and Security Mechanisms : A Short Survey David Martins and Hervé Guyennet
Computer Science Department, University of Franche-Comté, France
Energy management
Energy consuming layers
Use VCO based radio architecture since it is:
Robust to interference
Allows communication at different carrier frequencies
Better sleep synchronization
Uses Flash over SRAM memory
Efficient programming techniques
Collision avoidance
Idle listening periods must be reduced
Routing: with the usage of real-time protocols, reduce the size of routing tables
Clustering: Hierarchical clustering
Data gathering
Issues & Challenges
Privacy & security
Trust
Coverage
Communication delay
Need for reliable, fault tolerant, self-healing and organising cluster-scheme for key distribution
Choosing the right blend of encryption and authentication schemes
Movement of patient is challenging with regards to architecture, coverage and routing.
Decentralized security mechanism.
Findings
Research into network topologies and clustering algorithms.
Securing both the nodes and the communication network.
Group key distribution techniques.
WSNs require node scalability and mobile agent.
Sensors may capture confidential data.
Motes must authenticate the stored public key of Base station.
In the future it may be possible for patients to interpret their results on a PDA/desktop.
Findings
Key management schemes to be further researched.
Nodes should automatically decide on a routing strategy.
Medical environment may call for high reporting times from the nodes (emergency).
Reporting of failed nodes and healing of the network is important.
Connectivity: USB, Ethernet, RS232 + WiFi, ZigBee,
Bluetooth & cellular.
Machine learning algorithm can act as a mediator.
Image source: Medical Applications based on Wireless Sensor Networks by Stanković, Stanislava
Security protocols & platform for wsn based medical applications
Motes
Tmote Sky
Tmote sky: http://insense.cs.st-andrews.ac.uk/examples/
Micaz: http://www.cse.chalmers.se/~larandr/master.html
Shimmer: http://www.eecs.Harvard.edu/~mdw/proj/codeblue
Shimmer
Micaz
The End
THANK YOU

More Related Content

PPTX
Security Method in Data Acquisition Wireless Sensor Network
PPT
New sensor technologies mems wireless texas
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
DOCX
Wireless body area network
PPTX
Seminar on Body Area Networks
PDF
Requisite Trust Based Routing Protocol for WSN
PDF
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
Security Method in Data Acquisition Wireless Sensor Network
New sensor technologies mems wireless texas
International Journal of Computational Engineering Research(IJCER)
Wireless Body Area Network A Review on Issues, Routing Techniques and Various...
Wireless body area network
Seminar on Body Area Networks
Requisite Trust Based Routing Protocol for WSN
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK

What's hot (18)

PDF
IRJET- Enhanced Private and Secured Medical Data Transmission
PDF
wireless sensor networks using zigbee and wifi
PPTX
Secure and efficient data transmission for cluster based wireless sensor network
PDF
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
DOCX
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
PPTX
Basics of Wireless sensor networks
PDF
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
PDF
A Paired Key Mechanism for Wirelesslink Security for WSNS
PDF
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
PDF
Body sensor network a modern survey & performance study in medical perspect
PDF
Wireless sensor networks 2016-2017 titles
PDF
Wireless sensor networks software architecture
PPTX
Wban
PPT
Research on security of the wlan campus network
PDF
Wireless Sensor Network for Patient Health Monitoring System
PDF
Comsnets wban ppt
PPT
Sensor networks a survey
PPT
WIRELESS SENSOR NETWORK
IRJET- Enhanced Private and Secured Medical Data Transmission
wireless sensor networks using zigbee and wifi
Secure and efficient data transmission for cluster based wireless sensor network
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
Enhanced antsec framework with cluster based cooperative caching in mobile ad...
Basics of Wireless sensor networks
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A Paired Key Mechanism for Wirelesslink Security for WSNS
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
Body sensor network a modern survey & performance study in medical perspect
Wireless sensor networks 2016-2017 titles
Wireless sensor networks software architecture
Wban
Research on security of the wlan campus network
Wireless Sensor Network for Patient Health Monitoring System
Comsnets wban ppt
Sensor networks a survey
WIRELESS SENSOR NETWORK
Ad

Viewers also liked (20)

PPT
Security in WSN
PPTX
Wireless sensor network security issues
PPT
Security in wireless sensor networks
PDF
Ant Colony Optimization for Wireless Sensor Network: A Review
PDF
TinyOS Course 01: Basic Programming
PDF
Reliability analysis for wireless sensor networks
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
PDF
Reliability in wsn for security
DOC
Security Support in In-Network Processing & analysis of key management in WSN
PPTX
Network Mnagement for WSN
PPTX
Lifetime Power® Wireless Sensor System
PDF
TinyOS Course 00: Introduction to WSN
PPTX
wsn routing protocol
PPTX
WSN Routing Protocols
PPTX
Security in wireless sensor network
PPT
Routing protocol on wireless sensor network
PDF
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
PPTX
Routing Protocols in WSN
PPSX
Power Saving in Wireless Sensor Networks
Security in WSN
Wireless sensor network security issues
Security in wireless sensor networks
Ant Colony Optimization for Wireless Sensor Network: A Review
TinyOS Course 01: Basic Programming
Reliability analysis for wireless sensor networks
Enhancing the Security in WSN using Three Tier Security Architecture
Reliability in wsn for security
Security Support in In-Network Processing & analysis of key management in WSN
Network Mnagement for WSN
Lifetime Power® Wireless Sensor System
TinyOS Course 00: Introduction to WSN
wsn routing protocol
WSN Routing Protocols
Security in wireless sensor network
Routing protocol on wireless sensor network
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Routing Protocols in WSN
Power Saving in Wireless Sensor Networks
Ad

Similar to Security protocols & platform for wsn based medical applications (20)

PPTX
slideshow123456789tyufxfmnvczsdadsgvnbnvgchj
PPTX
Wireless-Sensor-Networks-WSNs-Architecture-and-Applications.pptx
PPTX
Wireless-Sensor-Networks-WSNs-Architecture-and-Applications.pptx
PPTX
Wireless-Sensor-Networks-WSNs-Architecture-and-Applications
PPTX
Security in Wireless Sensor Network
PPTX
Wireless-Sensor-Networks. has simple introduction
PPTX
Wireless-Sensor-Networks in advance wireless mobile network
PPTX
PPT
gcettb presentation on sensor network
PDF
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
PPTX
Wireless_Sensor_security
PPT
Introduction to wireless sensor networks
PPTX
Wsn security issues
PPTX
Wsn security issues
PDF
A Review of Physical, Data and Network Layer Specification and its Protocols ...
PDF
Gm3411871190
PDF
Research Issues on WSN
PPT
Wireless sensor networks
PPT
Wireless Sensor Networks
slideshow123456789tyufxfmnvczsdadsgvnbnvgchj
Wireless-Sensor-Networks-WSNs-Architecture-and-Applications.pptx
Wireless-Sensor-Networks-WSNs-Architecture-and-Applications.pptx
Wireless-Sensor-Networks-WSNs-Architecture-and-Applications
Security in Wireless Sensor Network
Wireless-Sensor-Networks. has simple introduction
Wireless-Sensor-Networks in advance wireless mobile network
gcettb presentation on sensor network
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Wireless_Sensor_security
Introduction to wireless sensor networks
Wsn security issues
Wsn security issues
A Review of Physical, Data and Network Layer Specification and its Protocols ...
Gm3411871190
Research Issues on WSN
Wireless sensor networks
Wireless Sensor Networks

Recently uploaded (20)

PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
communication and presentation skills 01
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Design Guidelines and solutions for Plastics parts
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
introduction to high performance computing
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
III.4.1.2_The_Space_Environment.p pdffdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
August -2025_Top10 Read_Articles_ijait.pdf
communication and presentation skills 01
Module 8- Technological and Communication Skills.pptx
Design Guidelines and solutions for Plastics parts
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Management Information system : MIS-e-Business Systems.pptx
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Fundamentals of safety and accident prevention -final (1).pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
CyberSecurity Mobile and Wireless Devices
introduction to high performance computing
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...

Security protocols & platform for wsn based medical applications

  • 1. Security protocols & platform FOR WSN BASED MEDICAL APPLICATIONS -AVIJIT MATHUR SUPERVISOR: DR. THOMAS NEWE
  • 2. Overview WSN: Nodes collected and organized in some fashion in order to make a cooperative network. Usage: Monitoring of patients wirelessly. (Routine/emergency/mass causality) thereby providing healthcare services. As the population increases there is a need for continuous medical monitoring. Patients monitored wirelessly has several advantages. Traditional wired methods do not allow mobility with the added difficulty of time constraints. Provide a secure, reliable and energy-efficient Wireless Sensor Network for medical devices.
  • 3. In Home/hospital architecture Base StationRepeater Access point 1 Access point 2 Access point 3 GSM/3g/ 4g WiFi WiMAX ZIGBEE BLE
  • 4. Topologies Star Mesh: Hierarchical tree Clustered Hierarchical Star Topology Partial Mesh Topology Hierarchical Tree Clustered HierarchicalCluster Head Central Hub/Switch Gateway Nodes Sensor Nodes Source: A Performance Comparison of Different Topologies for Wireless Sensor Networks by Akhilesh Shrestha and Liudong Xing
  • 5. ZIGBEE Bluetooth Low energy Wi-Fi 4G Range 10-100 m >60m (10m for Classic BT) Depends on specification In Kilometers Power Low Very Low (High for classic BT and medium for others) High (variable for WiFi Direct) High Entries 254 (>64000 per network)  2 Billion  (Classic: 7) Depends on no. of IP addresses - Latency Low 3 ms (compared to 100ms in classic BT) Variable - Self healing Yes - Yes Yes Topologies Mesh, Star and Cluster- tree Star Star, Point-to-Point Ring Data transmission rate Up to 250Kbps 1Mbps (BT v4.0: 25Mbps) 11Mbps & 54Mbps (250 Mbps: WiFi Direct) 100Mbps & 1Gbps(fixed access) Bandwidth 2.4GHz, 915MHz & 868 MHz 2.4 GHz only (BT + HS: 6-9 GHz) 2.4, 3.6 & 5 GHz Similar to WiFi Transmission technique DSSS DS/FA? Adaptive FHSS (Classic BT: FHSS) DSSS, CCK & OFDM OFDMA
  • 6. IEEE 802.15.6 New standard specified for Wireless Body Area Networks (WBANs) Extremely low power, good data rate and safety compliant. Flexible frequencies => selecting the right physical layer very important MICS and WMTS do not support high data rate while ISM band supports high data rate at the cost of interference. PHY layers Security levels Source :An Overview of IEEE 802.15.6 Standard (Invited Paper) Kyung Sup Kwak, Sana Ullah, and Niamat Ullah; UWB-ITRC Center, Inha University; 253 Yonghyun-dong, Nam-gu, Incheon (402-751), South Korea Table Source:Body Area Networks Arif Onder ISIKMAN, Loris Cazalony, Feiquan Chenz, Peng Lix Chalmers University of Technology, SE-412 96, Gothenburg, Sweden IEEE 802.15.4 / ZigBee IEEE 802.15.6 Range 10-100m 2-5m Data rate 20,40 & 250 Kbps Few Kbps – 10 Mbps Power 25-35mW 0.01 mW (stand by), 40mW (active) Entries 65535 devices 256 devices per network
  • 7. Security & Reliability Security services: Authentication, access control, data confidentiality, integrity and Non-repudiation. Reliability depends on two main factors: network connectivity and sensing coverage. Security is very important as the technology may be vulnerable to attacks Traditional security mechanisms (PKI) cannot be used. Semantic security Secure routing & storage are most important Source: Integrated Modeling for Wireless Sensor Networks by Liudong Xing, Ph. D., University of Massachusetts, Dartmouth & Howard E. Michel, Ph.D., University of Massachusetts, Dartmouth
  • 9. Security Mechanism Steganography: Channel is hidden under the Physical layer to provide covert data transmission Cryptography: Encryption & authentication mechanisms Key management: Global, pair-wise node, pair-wise group & individual Localization: Geographically detect a malicious node Trust management: Select route based on trustworthy nodes Data Partitioning 6 6 6 6 7 7 7 6 Periodic key generation Data: D D1 D2 D3 D1 D1 D2 D3 D3 Source: Wireless Sensor Network Attacks and Security Mechanisms : A Short Survey David Martins and Hervé Guyennet Computer Science Department, University of Franche-Comté, France
  • 10. Energy management Energy consuming layers Use VCO based radio architecture since it is: Robust to interference Allows communication at different carrier frequencies Better sleep synchronization Uses Flash over SRAM memory Efficient programming techniques Collision avoidance Idle listening periods must be reduced Routing: with the usage of real-time protocols, reduce the size of routing tables Clustering: Hierarchical clustering Data gathering
  • 11. Issues & Challenges Privacy & security Trust Coverage Communication delay Need for reliable, fault tolerant, self-healing and organising cluster-scheme for key distribution Choosing the right blend of encryption and authentication schemes Movement of patient is challenging with regards to architecture, coverage and routing. Decentralized security mechanism.
  • 12. Findings Research into network topologies and clustering algorithms. Securing both the nodes and the communication network. Group key distribution techniques. WSNs require node scalability and mobile agent. Sensors may capture confidential data. Motes must authenticate the stored public key of Base station. In the future it may be possible for patients to interpret their results on a PDA/desktop.
  • 13. Findings Key management schemes to be further researched. Nodes should automatically decide on a routing strategy. Medical environment may call for high reporting times from the nodes (emergency). Reporting of failed nodes and healing of the network is important. Connectivity: USB, Ethernet, RS232 + WiFi, ZigBee, Bluetooth & cellular. Machine learning algorithm can act as a mediator. Image source: Medical Applications based on Wireless Sensor Networks by Stanković, Stanislava
  • 15. Motes Tmote Sky Tmote sky: http://insense.cs.st-andrews.ac.uk/examples/ Micaz: http://www.cse.chalmers.se/~larandr/master.html Shimmer: http://www.eecs.Harvard.edu/~mdw/proj/codeblue Shimmer Micaz

Editor's Notes

  • #5: Simulations show that transmission energy is equivalent to receive energy when distance is short or/and radio electronics energy is high. Direct transmission is more efficient on global scale than minimum transmission energy (MTE) routing. Therefore we use star topology for BANs