{"title":"Sensing health: fault detection, isolation, and minimization of on-body sensors","authors":"B. Prabhakaran, A. Balasubramanian","doi":"10.1145/2185216.2185315","DOIUrl":"https://doi.org/10.1145/2185216.2185315","url":null,"abstract":"Monitoring activities of daily living of senior citizens especially those who live alone as well as those who have certain motion disorders such as Alzheimer's and Parkinson's is increasingly possible and very useful for healthcare purposes. This kind of pervasive and remote monitoring is possible due to availability of \"on-body\" sensors that combine sophisticated inertial sensing, wireless communication and signal processing technologies. The inertial sensors being electro-mechanical in nature are susceptible to errors and faults. In typical wireless sensor systems, such errors and faults are overcome by deploying large number of sensor nodes and taking a majority of the sensed values. However, in the case of on-body sensors, it may be highly inconvenient for an elderly person to wear a large number of sensors. Similar to on-body sensors, tiny electro-magnetic sensors are beginning to be used for tracking tongue movements during speaking. This breakthrough technology can give insights into how we as humans produce sound and these insights can help better train speech impairments. Considering the inconvenience in using such tongue sensors, it will be important to minimize the number of tongue sensors needed for a particular requirement. In this talk, we address the issue of identifying and isolating faulty sensors as well as minimize the number of needed sensors for remote monitoring of daily living activities and tongue movement tracking. We discuss issues such as: (i) faulty node identification when a small number of body sensors is deployed; (ii) identification of such a faulty node based on sensor node groups that share similar sensor signal patterns; and (iii) minimize the number of sensors needed for a particular application.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed framework for tele health monitoring system","authors":"B. Sarkar, S. Sanyal, N. Chaki","doi":"10.1145/2185216.2185318","DOIUrl":"https://doi.org/10.1145/2185216.2185318","url":null,"abstract":"In recent years, it has been a challenge to design and implement remote health care and monitoring services, with an objective to extend instant cost effective treatment and supply of life saving drugs. There are specialized disciplines in medical sciences for consultation, services, and surgery. Tele medicine is one such area of service through which the aged, rural residents and dwellers of remote hilly and highland areas can be benefited. Often, people in these areas suffer from disease like Obstructive Sleep Apnea (OSA), hypertension, cardiovascular problems, obesity, diabetes etc., or respiratory diseases like asthma, pulmonology related to lungs and so on with a high risk of mortality. In this paper, we propose a Petri Net based framework for analysis and integration of tele-health monitoring service systems over wireless and hybrid networks.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of communication and terrain characteristics on the accuracy of robot formation","authors":"Aarathi Muppalla, B. S. Manoj","doi":"10.1145/2185216.2185342","DOIUrl":"https://doi.org/10.1145/2185216.2185342","url":null,"abstract":"Robot formation is one of the significant research directions in humanitarian, tactical, as well as space missions. For a task that requires multiple autonomous robots to work together as a team, coordinating positions each with respect to the other is essential. Therefore, a proper communication mechanism that periodically or aperiodically sends the path information is very important. The communication channel characteristics may impair the accuracy of robot formation. Further, terrain characteristics offer another constraint to have a perfect synchronization of paths between robots of a formation. In this paper, we study path deviations of the follower robot with respect to a leader robot, in an environment that has unpredictable obstacles and communication delays by modeling and simulating the virtual environment. We identified the impact of packet loss and obstacles distribution on the formation accuracy. For accurate formation or reducing the mean path deviation, periodic messaging is preferred in comparison to aperiodic messaging between leader and followers. Our results are useful for designing future robot formations for humanitarian, tactical, and space related applications.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and quality provisioning in wireless networks","authors":"P. Mohapatra","doi":"10.1145/2185216.2185320","DOIUrl":"https://doi.org/10.1145/2185216.2185320","url":null,"abstract":"The ubiquitous presence and ease of connectivity for mobile devices are the driving force for the popularity of wireless networks. With the widespread usage, provisioning quality and securing wireless communication has become crucial necessities. However, the inherent characteristic of wireless networks, namely, unguided medium, variable link qualities, and interferences, create impositions to the quality and security concerns. In this talk, we will overview two of our recent efforts: quality provisioning for video services over wireless networks, and techniques for securing wireless communications by exploiting wireless physical layer characteristics. We will discuss quality metrics for video over wireless and recent works on bootstrapping secure association between nearby devices, generating shared secret-key from wireless channels, and detecting identity based attacks in wireless networks. Experimental implementations and evaluations will be presented to validate the proposed schemes. We will conclude the talk with an overview of our wireless experimental test-bed: QuRiNet.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Amateur radio in emergency communications advanced digital communication network","authors":"S. Suri","doi":"10.1145/2185216.2185233","DOIUrl":"https://doi.org/10.1145/2185216.2185233","url":null,"abstract":"Amateur radio has made significant contributions to science, industry, and the social services. The economic and social benefit derived from amateur radio research has founded new industries, built economies, empowered nations, and saved lives. Amateur radio represents a unique research and development (R&D) environment that cannot be duplicated in the labs or research parks of either industry or the government. Existing at the intersection of the social, economic, cultural and scientific spheres, amateur radio leverages this position to invent and innovate from a unique perspective. Many now-commonplace communication technologies have their genesis in amateur radio.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal specification and verification of vehicular handoff using π-calculus","authors":"Jayaraj Poroor, B. Jayaraman","doi":"10.1145/2185216.2185268","DOIUrl":"https://doi.org/10.1145/2185216.2185268","url":null,"abstract":"Vehicular networking is an important emerging area having immense applications, ranging from road-safety to emergency communications in disaster situations. As more applications begin to take advantage of vehicular networks, correctness of the underlying protocols must be subjected to rigorous analysis. The π-calculus is a formal language for specifying mobile systems and has been applied in wide range of settings, from specifying security protocols to modeling biomolecular systems. In this paper, we use π-calculus to construct a formal specification of a cross-layer dual-radio handoff algorithm for vehicular networks. The main challenge in this work was to use the minimal set of highly expressive and powerful constructs of π-calculus to model protocol agents at the right level of abstraction. To give two instances of our approach: (a) the two radios involved in handoff are modelled as concurrent sub-processes of the mobile node process; (b) route to the gateway is modelled as a channel that the access point supplies to both the gateway and the mobile node, both of which are modelled as concurrent processes. We formulate representative properties in a branching-time temporal logic and verify our protocol specification against these properties. Our study shows that π-calculus is a suitable formalism for modeling and verifying vehicular protocols.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach for detection of malicious node using fuzzy based trust levels in MANET","authors":"V. Manoj, N. Raghavendiran, M. Aaqib, R. Vijayan","doi":"10.1145/2185216.2185337","DOIUrl":"https://doi.org/10.1145/2185216.2185337","url":null,"abstract":"Wireless Communication is vital during natural calamities, disasters and military operation. In the past few decades, security in the military operations is exposed to vulnerabilities like sniffing the information and modifying the data causing havoc in military camps. Consequently military applications required a secure way to exchange the data and stay away from enemy intrusion. Recent trends in military operations need a portable way of communicating between the units, quality of service and security to be full-fledged. However, in MANET mobile entities are prone to various security attacks due to dynamic changing topology, open medium and inhibited by limited energy, bandwidth and computational power. The paper addresses the security issues by incorporating the concept of Trust and Certification Authority to combat the misbehaving entities. Certificate Authority employs Fuzzy based analyzer to distinguish between trusted and malicious behavior of nodes by distributing the certificates only to the trusted nodes and detecting the misbehaving node. The proposed scheme is more secure, reliable and aids to improve the security in military operations.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132644768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Talat Iqbal, T. V. Vaidyanath, R. Gunasekaran
{"title":"Guaranteeing secure transmission in time critical networks through dual sense multiple control channel protocol","authors":"Syed Talat Iqbal, T. V. Vaidyanath, R. Gunasekaran","doi":"10.1145/2185216.2185322","DOIUrl":"https://doi.org/10.1145/2185216.2185322","url":null,"abstract":"The emergence of proper reservation techniques to acquire the channel in Mobile Ad hoc Network is main concern when there is a random, unstipulated and insecure communication. The denial of proper channel causes the foe nodes to cause virtual jamming, thereby preventing the legitimate nodes to communicate especially in the real time scenario where the time factor is very critical. To avoid this, a proper architecture along with a specialized medium access method is necessary. The method employed here is to use a hierarchical-like network forming subworkgroups that define clusters of nodes formed randomly. These clusters propose their own way to allocate the channels for the specific nodes at both the intra-level and inter-level. Also a specialized MAC protocol, Dual Tone Multiple Control Channel [DSMCL] protocol has been formulated based on the busy tone protocol. This protocol also ensures the Quality of Service which reduces the overhead of the upper layers. The mobile nodes follow their own routing protocols for forwarding of packets within the domain and redistribute them for interoperability. While the inter-level channel acquisition is by means of allocation/relocation algorithms, at the intra level, they are carried out using the CTSP (Cell/Technology Selection Problem) pattern. This ensures that a genuine node ready to communicate is not trapped by the malicious node communicating with them forever.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"94 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Humanitarian relief applications of underwater acoustic sensor networks","authors":"T. Melodia","doi":"10.1145/2185216.2185251","DOIUrl":"https://doi.org/10.1145/2185216.2185251","url":null,"abstract":"The highly-exposed live feed of the oil spill from underwater cameras in the Gulf of Mexico, and Tsunami Warning Systems are only two of many examples showcasing the potential of underwater sensor networks in fields such as underwater surveillance, undersea exploration, video-assisted navigation and environmental monitoring. However, underwater networks require much higher data rates than currently available with acoustic technology and more flexible protocol design to accommodate heterogeneous traffic demands in terms of bandwidth, delay, and end-to-end reliability. In this talk, we outline our current research efforts to assess the potential of multiple-input-multiple- output (MIMO) transmission techniques on acoustic networking. In particular, we will illustrate the multiplexing and diversity tradeoffs of underwater MIMO links. We will consequently characterize how the fundamental MIMO tradeoff translates into a tradeoff between transmission rate and link error probability and identify how the capabilities of MIMO links impact the design of higher layer protocols. We will then present the design of a class of medium access control and crosslayer routing protocols that adapt their behavior by optimally jointly selecting the transmit power, MIMO transmission mode, code length, and routes to minimize energy consumption while complying with application requirements.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123616662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human detection and characterization through barriers","authors":"R. Narayanan","doi":"10.1145/2185216.2185303","DOIUrl":"https://doi.org/10.1145/2185216.2185303","url":null,"abstract":"This tutorial will review and summarise the current state of knowledge in the area of obscured target detection. The talk will address the phenomenology and characteristics of wave propagation through barriers, such as ground, walls, foliage, etc., as a function of frequency and material properties. Techniques for detecting such obscured targets using radar techniques will be discussed. Both conventional and emerging waveforms will be presented. Detection of humans trapped in earthquake debris will also be addressed. The tutorial will be subdivided into the following main sections.\u0000 Part I will describe different types of radar waveforms in general use, both conventional and emerging.\u0000 In Part II, we will discuss how specific waveforms are affected by the EM environment and review the limitations of current techniques.\u0000 In Part III, we will review emerging waveform designs for optimal target detection in enclosed structures behind barriers.\u0000 Part IV will conclude by providing directions for further research.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}