Pervasive m-Healthcare Framework for Diabetes
Vision of pervasive computing includes wireless communication and information processing anywhere, anytime using mobile sensor devices connected seamlessly. Pervasive environment characterized by highly dynamic, open and diverse infrastructure where resource-restricted dissimilar mobile objects have the ability of Ad-hoc network set-up, self-organization and cooperation for information exchange and distributed operation unknown by the user. In such open computing environments, traditional security schemes and encryption algorithms cannot be always applied to address the security assurance challenges. Therefore, concepts of trust and reputation evaluation emerged by researchers. In addition to that in human-centric healthcare applications, reliability and trustworthiness between communicating nodes, quality of information assessment cannot be effectively ensured through hard security concerns. Thus soft security analysis becomes an important aspect for enhancing the security assurance and degree of trust in ICT enabled application and services where information is ubiquitous. In our proposed research work, we explore existing pervasive security and trust methods to assess the challenging gap. We put forward need of soft security and proposed a trust metric for trust based security assessment with classical clustering technique for energy-efficient resource restricted trusted and secure communication. Major security attacks and impact of signal strength on security for unnoticed pervasive services also evaluated. In winding up, we present pervasive healthcare application framework especially focused to awareness and quality remote care for diabetes, to realize and validate the conceptual model with case study.
Acampora, G., Cook, D. J., Rashidi, P., & Vasilakos, A. V. (2013). A survey on ambient intelligence in healthcare. Proceedings of the IEEE, 101(12), 2470-2494.
Alemdar, H.,& Ersoy, C. (2010). Wireless Sensor Networks for Healthcare: A Survey”. In Proceedings of Computer Networks, 54(15), 2688–2710.
Ali, H., Shahzad, W., & Khan, F. A. (2012). Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Applied Soft Computing, 12(7), 1913-1928.
Almenárez, F., Marín, A., Campo, C., & Garcia, C. (2004, August). PTM: A pervasive trust management model for dynamic open environments. In First Workshop on Pervasive Security, Privacy and Trust PSPT (Vol. 4, pp. 1-8).
Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2011). Hierarchical trust management for wireless sensor networks and its application to trust-based routing. In Proceedings of the 2011 ACM Symposium on Applied Computing, 9(2), (pp. 1732-1738).
ACM.Bao, F., Chen, R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169-183
.Bu, S., Yu, F. R., Liu, X. P., Mason, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 60(3), 1025-1036.
Chang, E., Hussain, F., & Dillon, T. (2006). Trust and reputation for service-oriented environments: technologies for building business intelligence and consumer confidence. John Wiley & Sons.
Cho, J. H., Swami, A., & Chen,R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562-583.
Cisco. (2010-2015). Cisco visual networking index: global mobile data traffic forecast, www.cisco.comEl-Haleem,
A. M. A., & Ali, I. A. (2011). TRIUMF: Trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack. International Journal of Computer Science, 8(4), 99-110.
Gaur, M. S., & Pant, B. (2014). A Bio-inspired trusted clustering for mobile pervasive environment. In Proceedings of the Third International Conference on Soft Computing for Problem Solving 259:(pp. 553-564). Springer India.
Gaur, M. S., & Pant, B. (2014). Trust metric based soft security in mobile pervasive environment. International Journal of Computer Network and Information Security, 6(10), 64-71.
Gaur, M. S., & Pant, B. (2015). Impact of signal-strength on trusted and secure clustering in mobile pervasive environment. Procedia Computer Science, 57, 178-188.
Gaur, M. S., & Pant, B. (2015). Trusted and secure clustering in mobile pervasive environment. Human-Centric Computing and Information Sciences, 5(32), 1-17.
Ghorbel, M., Khatib, M., Mhamed, A., & Mokhtari, M. (2009). Secured and trusted service provision in pervasive environment. In 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications,(pp. 400-405), IEEE.
Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications, 30(11), 2385-2400.
I. D. F.(2013), International Diabeted Federation Diabetes Atlas, 6th edition.International diabetes federation, (2014). Key findings update, IDF diabetes Atlas. 6/e.
Liang, X., Li, X., Barua, M., Chen, L., Lu, R., Shen, X., & Luo, H. (2012). Enable pervasive healthcare through continuous remote health monitoring. IEEE Wireless Communications, 19(6), 10-18.
Liu, J., Yu, F. R., Lung, C. H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 806-815.
Nwin, N., Whiting, D., Gariguata, L., Ghyoot, G., & Ganeds, D. (2011). Diabetes atlas, international diabetes federation,Brussels, Belgium,5/e.
Sridhar, V., & Hämmäinen, H. (2011).Mobile Internet: Indian telecom leading the way, Data Quest.
T. C. G.(2010). TCG MPWG mobile trusted module specification, version 1.0, Revision 7.02 29.
T. C. G.(2009). Mobile Phone Work Group, Selected use case analyses-v 1.0.
Velloso, P. B., Laufer, R. P., Cunha, D. D. O., Duarte, O. C. M., & Pujolle, G. (2010). Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Transactions on Network and Service Management, 7(3), 172-185.
Weiser, M. (1991). The computer for the 21st century-scientific American special issue on communications. Computers, and Networks (September 1991), 94-104.
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications, 11(1), 38-47.
Zhang, K., Wang, C., & Wang, C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing,(pp. 1-5), IEEE.