Body area networks : safety, security, and sustainability.
Explores issues involved in designing safe, secure and sustainable BANs from a cyber-physical systems perspective, for researchers and graduate students.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge :
Cambridge University Press,
2013.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Contents; Foreword; Preface; Acknowledgments; 1 Introduction; 1.1 Pervasive healthcare; 1.2 Monitoring technologies; 1.3 Overview of the book; 1.4 Questions; 2 Body area networks; 2.1 Architecture; 2.1.1 Hardware; 2.1.2 Network topology; 2.1.3 Communication technology; 2.1.4 Software; 2.1.5 Deployment; 2.1.6 The physical environment; 2.1.7 Energy source; 2.2 Applications; 2.2.1 Physiological monitoring; 2.2.2 The infusion-pump control system; 2.3 Middleware for a BAN-based pervasive health-monitoring system; 2.4 Questions; 3 BAN models and requirements; 3.1 Principal requirements.
- 3.1.1 Safety3.1.2 Security; 3.1.3 Sustainability; 3.2 The cyber-physical nature of BANs; 3.3 Regulatory issues; 3.3.1 Medical-device regulation in the USA; 3.3.2 Medical-device regulation in the EU; 3.3.3 Medical-device regulation in Asia; 4 Safety; 4.1 Safety approaches; 4.1.1 Perspectives of BAN safety; 4.1.2 Ensuring BAN safety; 4.2 Model-based engineering of BANs; 4.2.1 Safety-requirements analysis; 4.2.2 Model generation; 4.2.3 Analysis of safety; 4.3 Modeling cyber-physical systems; 4.4 Example: BAND-AiDe
- BAN Design and Analysis Tool; 4.4.1 The BAND-AiDe modeling framework.
- 4.4.2 The BAND-AiDe analyzer4.4.3 Implementation; 4.5 Demonstrating design and analysis with BAND-AiDe; 4.5.1 Safety verification of a single wearable medical device; 4.5.2 Safety verification of a network of devices; 4.6 Formal models for BAN safety; 4.7 Future research problems; 4.8 Questions; 5 Security; 5.1 The need for information security in BANs; 5.2 Securing a BAN as a cyber-physical system; 5.2.1 Securing BAN components; 5.2.2 Challenges for CPS-Sec solutions; 5.2.3 CPS-Sec solutions for BANs; 5.3 Traditional security solutions for BANs.
- 5.3.1 Application of traditional approaches to key distribution5.4 Physiological-signal-based key agreement (PSKA); 5.4.1 Physiological signals: issues and properties; 5.4.2 PSKA protocol execution; 5.4.3 Security of PSKA; 5.4.4 PSKA prototype implementation; 5.5 Summary and future research problems; 5.6 Questions; 6 Sustainability; 6.1 The energy perspective; 6.1.1 Energy storage; 6.1.2 Reducing the energy requirement; 6.1.3 Scavenging energy from different sources; 6.2 The equipment-recycling perspective; 6.3 Ensuring sustainability; 6.4 Sustainable BAN software-design methodology.
- 6.4.1 The physical plane6.4.2 BAN application; 6.4.3 The management plane; 6.5 Power profiling; 6.6 Architectural modeling; 6.7 Analysis and design for sustainability; 6.7.1 Sustainability analysis; 6.7.2 Case-study design; 6.8 Future research problems; 6.9 Questions; 7 Implementation of BANs; 7.1 Implementation; 7.1.1 The computation model of a sensor node; 7.1.2 The computation model of a base station; 7.2 Programming paradigms; 7.2.1 Programming a sensor; 7.2.2 Programming a base station; 7.3 Common implementation issues; 7.3.1 Avoid floating-point operations.