Have a personal or library account? Click to login

Security of Wireless Sensor Networks for Health Monitoring Helmets with Anomaly Detection using Power Analysis and Probabilistic Model

Open Access
|Mar 2015

References

  1. News, V. (2013). NFL agrees to deal in concussion lawsuit. Lanham: Federal Information & News Dispatch, Inc. Retrieved from http://search.proquest.com/docview/1428838809?accountid=14584
  2. Lomberg, J. (2013, January 29). Sensor pad analyzes impacts in football helmets. Electronic Component News. Retrieved October 22, 2013, from http://www.ecnmag.com/articles/2013/01/sensor-pad-analyzes-impacts-football-helmets
  3. Sen, J. (2010). A survey on wireless sensor network security. arXiv preprint arXiv:1011.1529.
  4. Oh, S., Kumar, P.S., Kwon, H., Rai, P., Ramasamy, M., Varadan, V.K. (2013, April 9) Wireless health monitoring helmet for football players to diagnose concussion and track fatigue. Proc. SPIE 8691, Nanosensors, Biosensors, and Info-Tech Sensors and Systems, 869106 (April 9, 2013); doi:10.1117/12.2009719.10.1117/12.2009719
  5. Giannetsos, T., & Dimitriou, T. (2013, April). Spy-Sense: spyware tool for executing stealthy exploits against sensor networks. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy (pp. 7-12). ACM.10.1145/2463183.2463186
  6. Clark, S. S., Ransford, B., Rahmati, A., Guineau, S., Sorber, J., Fu, K., Xu, W. (2013) WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. Proceedings of USENIX Workshop on Health Information Technologies.
  7. Wang, Y. T., & Bagrodia, R. (2012, August). ComSen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks. In SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies (pp. 148-156).
  8. Hahnsang Kim, Joshua Smith, and Kang G. Shin. (2008). Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th international conference on Mobile systems, applications, and services (MobiSys ‘08). ACM, New York, NY, USA, 239-252. DOI=10.1145/1378600.1378627 http://doi.acm.org/10.1145/1378600.137862710.1145/1378600.1378627
  9. Fix, E., Hodges, J. L. (1951) Discriminatory analysis, nonparametric discrimination: Consistency properties US Air Force School of Aviation Medicine, Vol. Technical Report 4, No. 3.10.1037/e471672008-001
  10. Dudani, S. A. (1976). The distance-weighted k-nearest-neighbor rule. Systems, Man and Cybernetics, IEEE Transactions on, (4), 325-327.10.1109/TSMC.1976.5408784
  11. Engels, D., Fan, X., Gong, G., Hu, H., & Smith, E. M. (2010). Hummingbird: ultralightweight cryptography for resource-constrained devices. In Financial Cryptography and Data Security (pp. 3-18). Springer Berlin Heidelberg.10.1007/978-3-642-14992-4_2
  12. A. Bogdanov et al. (2007). PRESENT: An Ultra-Lightweight Block Cipher. Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES 07), LNCS 4727, Springer, pp. 450-466.10.1007/978-3-540-74735-2_31
  13. Hu, L., & Evans, D. (2004, February). Using Directional Antennas to Prevent Wormhole Attacks. In NDSS.
  14. Banerjee, S., & Majumder, K. (2012). A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 372-384). Springer Berlin Heidelberg.10.1007/978-3-642-34135-9_37
  15. Wood, A.D., & Stankovic, J.A. (2002). Denial of Service in Sensor Networks. IEEE Computer,Vol. 35, No. 10, pp. 54-62, 2002.10.1109/MC.2002.1039518
  16. Lee, Y., Kim, J., Son, M., & Lee, J. H. (2007, August). Implementation of accelerometer sensor module and fall detection monitoring system based on wireless sensor network. In Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE (pp. 2315-2318). IEEE.10.1109/IEMBS.2007.435278918002455
  17. Algredo-Badillo, I., Feregrino-Uribe, C., Cumplido, R., & Morales-Sandoval, M. (2010). Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard. Computers & Electrical Engineering, 36(3), 565-577.10.1016/j.compeleceng.2009.12.011
  18. Heron, S. (2009). Advanced encryption standard (AES). Network Security, 2009(12), 812. doi:10.1016/S1353-4858(10)70006-410.1016/S1353-4858(10)70006-4
  19. Crisco, J. J., Wilcox, B. J., Beckwith, J. G., Chu, J. J., Duhaime, A., Rowson, S., . . . Greenwald, R. M. (2011). Head impact exposure in collegiate football players. Journal of Biomechanics, 44(15), 2673-2678. doi:10.1016/j.jbiomech.2011.08.00310.1016/j.jbiomech.2011.08.003318929621872862
  20. Ibrahim S. I. Abuhaiba, & Hubboub, H. B. (2012). Swarm flooding attack against directed diffusion in wireless sensor networks. International Journal of Computer Network and Information Security, 4(12), 18-30.10.5815/ijcnis.2012.12.02
  21. Casson, I. R., Pellman, E. J., & Viano, D. C. (2008). Concussion in the national football league: An overview for neurologists. Neurologic Clinics, 26(1), 217-241. doi:10.1016/j.ncl.2007.11.00510.1016/j.ncl.2007.11.00518295092
  22. Shen, Yanfeng, and Victor Giurgiutiu. “Predictive modeling of nonlinear wave propagation for structural health monitoring with piezoelectric wafer active sensors.” Journal of Intelligent Material Systems and Structures 25.4 (2014): 506-52010.1177/1045389X13500572
Language: English
Page range: 561 - 580
Submitted on: Sep 23, 2014
Accepted on: Jan 26, 2015
Published on: Mar 1, 2015
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2015 Biswajit Panja, Zachary Scott, Priyanka Meharia, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.