Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Wireless

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 102

Full-Text Articles in Physical Sciences and Mathematics

Tracking People Across Ultra Populated Indoor Spaces By Matching Unreliable Wi-Fi Signals With Disconnected Video Feeds, Quang Hai Truong, Dheryta Jaisinghani, Shubham Jain, Arunesh Sinha, Jeong Gil Ko, Rajesh Krishna Balan Jan 2024

Tracking People Across Ultra Populated Indoor Spaces By Matching Unreliable Wi-Fi Signals With Disconnected Video Feeds, Quang Hai Truong, Dheryta Jaisinghani, Shubham Jain, Arunesh Sinha, Jeong Gil Ko, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

Tracking in dense indoor environments where several thousands of people move around is an extremely challenging problem. In this paper, we present a system — DenseTrack for tracking people in such environments. DenseTrack leverages data from the sensing modalities that are already present in these environments — Wi-Fi (from enterprise network deployments) and Video (from surveillance cameras). We combine Wi-Fi information with video data to overcome the individual errors induced by these modalities. More precisely, the locations derived from video are used to overcome the localization errors inherent in using Wi-Fi signals where precise Wi-Fi MAC IDs are used to …


A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong Dec 2023

A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong

Research Collection School Of Computing and Information Systems

Digital microfluidic, as an emerging and potential technology, diversifies the biochemical applications platform, such as protein dilution sewage detection. At present, a vast majority of universal cyberphysical digital microfluidic biochips (DMFBs) transmit data through wires via personal computers and microcontrollers (like Arduino), consequently, susceptible to various security threats and with the popularity of wireless devices, losing competitiveness gradually. On the premise that security be ensured first and foremost, calls for wireless portable, safe, and economical DMFBs are imperative to expand their application fields, engage more users, and cater to the trend of future wireless communication. To this end, a new …


Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer Oct 2023

Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer

Policy Briefs and Reports

The $45.45 billion Broadband, Equity, Access, and Deployment (BEAD) program’s primary objective is to extend broadband service to all unserved and underserved locations in the U.S. and its territories. Several industry studies predict that the BEAD program can meet its goal of providing universal access to broadband service if eligible entities execute their grant programs well. My review of the BEAD program indicates that policy makers can enhance the likelihood of program success by designing competitive grant programs that give applicants the incentive to undercut the subsidies proposed by their rivals and provide applicants the flexibility to design networks that …


Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz Jan 2022

Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz

Dartmouth Scholarship

Data about users is collected constantly by phones, cameras, Internet websites, and others. The advent of so-called ‘Smart Things' now enable ever-more sensitive data to be collected inside that most private of spaces: the home. The first step in helping users regain control of their information (inside their home) is to alert them to the presence of potentially unwanted electronics. In this paper, we present a system that could help homeowners (or home dwellers) find electronic devices in their living space. Specifically, we demonstrate the use of harmonic radars (sometimes called nonlinear junction detectors), which have also been used in …


Nb-Iot: Iot Përmes Sistemeve Celulare Brez-Ngushta, Besart Haziri Aug 2021

Nb-Iot: Iot Përmes Sistemeve Celulare Brez-Ngushta, Besart Haziri

Theses and Dissertations

Me rritjen e numrit të pajisjeve IoT në ditët e sotme, kërkesa për t’i mbështetur ato vetëm sa rritet, me rreth 7.6 miliardë pajisje IoT aktive në fund të vitit 2019, si dhe me një pritshmëri të rritjes deri në 24.1 miliardë pajisje IoT në vitin 2030. Me numër kaq të madh të pajisjeve që do të lidhen në Internet atëherë na duhet siguri dhe rrjet i besueshëm që i mbështet të gjitha këto pajisje. Mundësia më e mirë për këtë çështje është NB-IoT (Narrowband–Internet of Things).

NB-IoT mundëson konektimin e qindra-mijëra pajisjeve të vogla (sensorëve) në Internet përmes sistemeve …


Analiza E Efekteve Shëndetsore Gjatë Përdorimit Të Rrjetave Pa Tela Në Kushtet E Jetës Reale, Hashim Sahiti Dec 2020

Analiza E Efekteve Shëndetsore Gjatë Përdorimit Të Rrjetave Pa Tela Në Kushtet E Jetës Reale, Hashim Sahiti

Theses and Dissertations

Teknologjia Wireless u ideua në 1880 nga Alexander Graham Bell dhe Sumner Tainted kur u zbulua telefoni fotografik. Në ditët e sotme, ka shumë lloje të pajisjeve pa tela që përdoren për të komunikuar. Telefoni celular dhe Rrjeti Wireless janë pjesa e jetës sonë të përditshme në të gjithë botën. Pajisja Wi-Fi lejon shkëmbimin (marrjen dhe dërgimin) e të dhënave përmes pajisjeve pa tela dhe Wi-Fi lëshojnë valë radio. Pajisjet që përdorin Wi-Fi janë kompjuterët, tabletat, celularët, audio player, aparatet fotografikë digjital si dhe pajisjet përcjellëse te kompjuterit si printerët, tastiera, miu e etj. Pajisjet pa tela janë të bazuara …


The Limits Of Location Privacy In Mobile Devices, Keen Yuun Sung Jul 2020

The Limits Of Location Privacy In Mobile Devices, Keen Yuun Sung

Doctoral Dissertations

Mobile phones are widely adopted by users across the world today. However, the privacy implications of persistent connectivity are not well understood. This dissertation focuses on one important concern of mobile phone users: location privacy. I approach this problem from the perspective of three adversaries that users are exposed to via smartphone apps: the mobile advertiser, the app developer, and the cellular service provider. First, I quantify the proportion of mobile users who use location permissive apps and are able to be tracked through their advertising identifier, and demonstrate a mark and recapture attack that allows continued tracking of users …


Energy Efficiency In Cmos Power Amplifier Designs For Ultralow Power Mobile Wireless Communication Systems, Selvakumar Mariappan, Jagadheswaran Rajendran, Norlaili Mohd Noh, Harikrishnan Ramiah, Asrulnizam Abd Manaf Jan 2020

Energy Efficiency In Cmos Power Amplifier Designs For Ultralow Power Mobile Wireless Communication Systems, Selvakumar Mariappan, Jagadheswaran Rajendran, Norlaili Mohd Noh, Harikrishnan Ramiah, Asrulnizam Abd Manaf

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless communication standards keep evolving so that the requirement for high data rate operation can be fulfilled. This leads to the efforts in designing high linearity and low power consumption radio frequency power amplifier (RFPA) to support high data rate signal transmission and preserving battery life. The percentage of the DC power of the transceiver utilized by the power amplifier (PA) depends on the efficiency of the PA, user data rate, propagation conditions, signal modulations, and communication protocols. For example, the PA of a WLAN transceiver consumes 49 % of the overall efficiency from the transmitter. Hence, operating the PA …


Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani Feb 2019

Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani

International Journal of Business and Technology

The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a …


Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori Jan 2019

Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori

Theses and Dissertations--Computer Science

Rapid urbanization burdens city infrastructure and creates the need for local governments to maximize the usage of resources to serve its citizens. Smart city projects aim to alleviate the urbanization problem by deploying a vast amount of Internet-of-things (IoT) devices to monitor and manage environmental conditions and infrastructure. However, smart city projects can be extremely expensive to deploy and manage partly due to the cost of providing Internet connectivity via 5G or WiFi to IoT devices. This thesis proposes the use of delay tolerant networks (DTNs) as a backbone for smart city communication; enabling developing communities to become smart cities …


Optical Wireless Data Center Networks, Abdelbaset S. Hamza Oct 2018

Optical Wireless Data Center Networks, Abdelbaset S. Hamza

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance, heat …


Wireless Security (Ksu), Meng Han, Lei Li, Zhigang Li, Svetana Peltsverger, Ming Yang, Guangzhi Zheng Oct 2018

Wireless Security (Ksu), Meng Han, Lei Li, Zhigang Li, Svetana Peltsverger, Ming Yang, Guangzhi Zheng

Computer Science and Information Technology Grants Collections

This Grants Collection for Wireless Security was created under a Round Ten ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum Apr 2018

Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum

Computer Science and Information Technology Grants Collections

This Grants Collection for Wireless Security was created under a Round Eight ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Spice: Secure Proximity-Based Infrastructure For Close Encounters, Aarathi Prasad, Xiaohui Liang, David Kotz Nov 2017

Spice: Secure Proximity-Based Infrastructure For Close Encounters, Aarathi Prasad, Xiaohui Liang, David Kotz

Dartmouth Scholarship

We present a crowdsourcing system that extends the capabilities of location-based applications and allows users to connect and exchange information with users in spatial and temporal proximity. We define this incident of spatio-temporal proximity as a \em close encounter. Typically, location-based application users store their information on a server, and trust the server to provide access only to authorized users, not misuse the data or disclose their location history. Our system, called SPICE, addresses these privacy issues by leveraging Wi-Fi access points to connect users and encrypt their information before it is exchanged, so only users in close encounters have …


An Extremely Wideband Radome-Enclosed Cylindrical Dipole Antenna For Wireless Communication, Tariq Rahim, Jiadong Xu Jan 2017

An Extremely Wideband Radome-Enclosed Cylindrical Dipole Antenna For Wireless Communication, Tariq Rahim, Jiadong Xu

Turkish Journal of Electrical Engineering and Computer Sciences

A radome-enclosed extremely wideband cylindrical dipole antenna for wireless communications applications was proposed with a simple structure. The antenna is fed at the center with the help of a coaxial cable through the lower hollow metallic pole. The feed area is composed of cones at both sides in order to obtain wideband impedance matching. The proposed antenna can cover 1.8 GHz to 28 GHz with S11 of less than -10 dB and excellent stable omnidirectional radiation characteristics. However, at high frequencies, some ripples are introduced in the radiation pattern. The frequency band of the cylindrical dipole antenna can be controllable …


A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet Jan 2017

A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet

Australian Digital Forensics Conference

Spontaneous ad hoc networks are distinguished by rapid deployment for a specific purpose, with no forward planning or pre-design in their topology. Often these networks will spring up through necessity whenever a network is required urgently but briefly. This may be in a disaster recovery setting, military uses where often the network is unplanned but the devices are pre-installed with security settings, educational networks or networks created as a one-off for a meeting such as in a business organisation. Generally, wireless networks pose problems for forensic investigators because of the open nature of the medium, but if logging procedures and …


Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani Oct 2016

Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani

UBT International Conference

The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a …


Towards Aggregating Time-Discounted Information In Sensor Networks, Xianping Wang Jul 2016

Towards Aggregating Time-Discounted Information In Sensor Networks, Xianping Wang

Computer Science Theses & Dissertations

Sensor networks are deployed to monitor a seemingly endless list of events in a multitude of application domains. Through data collection and aggregation enhanced with data mining and machine learning techniques, many static and dynamic patterns can be found by sensor networks. The aggregation problem is complicated by the fact that the perceived value of the data collected by the sensors is affected by many factors such as time, location and user valuation. In addition, the value of information deteriorates often dramatically over time. Through our research, we already achieved some results:

A formal algebraic analysis of information discounting, especially …


Demo: Wanda, Securely Introducing Mobile Devices, Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, David Kotz Jun 2016

Demo: Wanda, Securely Introducing Mobile Devices, Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, David Kotz

Dartmouth Scholarship

Nearly every setting is increasingly populated with wireless and mobile devices – whether appliances in a home, medical devices in a health clinic, sensors in an industrial setting, or devices in an office or school. There are three fundamental operations when bringing a new device into any of these settings: (1) to configure the device to join the wireless local-area network, (2) to partner the device with other nearby devices so they can work together, and (3) to configure the device so it connects to the relevant individual or organizational account in the cloud. The challenge is to accomplish all …


Development Of A Wireless Mobile Computing Platform For Fall Risk Prediction, Akm Jahangir Alam Majumder Apr 2016

Development Of A Wireless Mobile Computing Platform For Fall Risk Prediction, Akm Jahangir Alam Majumder

Dissertations (1934 -)

Falls are a major health risk with which the elderly and disabled must contend. Scientific research on smartphone-based gait detection systems using the Internet of Things (IoT) has recently become an important component in monitoring injuries due to these falls. Analysis of human gait for detecting falls is the subject of many research projects. Progress in these systems, the capabilities of smartphones, and the IoT are enabling the advancement of sophisticated mobile computing applications that detect falls after they have occurred. This detection has been the focus of most fall-related research; however, ensuring preventive measures that predict a fall is …


Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki Dec 2015

Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki

Emmanuel O. Agu

End-hosts on wireless ad hoc networks typically use TCP as their transport layer protocol. Being designed for wired networks, TCP can perform poorly over wireless networks. Work that has proposed ways to improve TCP performance over wireless networks has concentrated primarily on improving TCP throughput only. Emerging applications, such as interactive multimedia and network games, require reduced delay at least as much as increased throughput. In this paper, we propose LDM1, an IP layer queue marking mechanism that estimates the number of hops and flows at each wireless node to computes the optimal marking probability. We present simulation results and …


Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki Dec 2015

Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki

Emmanuel O. Agu

The TCP-Friendly Rate Control (TFRC) is used as a streaming media transport protocol. Using the TCP congestion response function and current network conditions, TFRC adjusts its transmission rate to yield the maximum TCP-Friendly throughput when sharing capacity with TCP flows. Since TFRC was designed for wired networks, it does not achieve the maximum TCP-Friendly throughput in multihop ad hoc wireless networks. The reduced wireless spatial channel reuse due to hidden terminals in multihop wireless networks induces TFRC throughput reductions. Specifically, TFRC is unaware of MAC layer transmission delays due to collisions, retransmissions and MAC layer congestion. This paper illustrates that …


Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz Jun 2015

Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz

Dartmouth Scholarship

Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street or users' mobile phones to locate (Bluetooth-enabled) objects in their vicinity. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk: even if identifying information has been removed from a report, the accompanying time and location can reveal sufficient information to de-anonymize the user whose device sent the report. We propose and evaluate a novel spatiotemporal …


Data Citation Practices In The Crawdad Wireless Network Data Archive, Tristan Henderson, David Kotz Feb 2015

Data Citation Practices In The Crawdad Wireless Network Data Archive, Tristan Henderson, David Kotz

Dartmouth Scholarship

CRAWDAD (Community Resource for Archiving Wireless Data At Dartmouth) is a popular research data archive for wireless network data, archiving over 100 datasets used by over 6,500 users. In this paper we examine citation behaviour amongst 1,281 papers that use CRAWDAD datasets. We find that (in general) paper authors cite datasets in a manner that is sufficient for providing credit to dataset authors and also provides access to the datasets that were used. Only 11.5% of papers did not do so; common problems included (1) citing the canonical papers rather than the dataset, (2) describing the dataset using unclear identifiers, …


Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme Jan 2015

Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme

Clinton Carpene

An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was examined. The aim of the research was to determine what vulnerabilities were inherent in this deployment, and what other consideration issues may have led to further vulnerability in the system. It was determined that there were numerous vulnerabilities embedded in both hardware and software and that configuration issues further compounded these vulnerabilities. The cyber threat against critical infrastructure has been public knowledge for several years, and with increasing awareness, attention and resource being devoted to protecting critical in the structure, it is …


Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley Jan 2015

Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley

The Hilltop Review

In Wi-Fi location determination literature, little attention is paid to locations that do not have numeric, geometric coordinates, though many users prefer the convenience of non-coordinate locations (consider the ease of giving a street address as opposed to giving latitude and longitude). It is not often easy to tell from the title or abstract of a Wi-Fi location determination article whether or not it has applicability to semantic locations such as room-level names. This article surveys the literature through 2011 on Wi-Fi localization for symbolic locations.


The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet Jan 2015

The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet

Australian Information Security Management Conference

Mobile Ad Hoc Networks (MANETS) promise much in the ability to rapidly deploy a wireless network in a fashion where no prior planning is needed and the network can be running efficiently and with high security within minutes. Natural disaster response, military, education and business provide areas where MANETS can offer significant advantages in communication where infrastructure networks may take days to set up or may be impossible to implement. This research reviews a selection of MANET protocols to show the progression of the research and the issues that are yet to be addressed. It discusses the challenges to researchers …


Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward Jan 2015

Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward

Research outputs 2014 to 2021

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …


Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw Dec 2014

Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw

Australian eHealth Informatics and Security Conference

Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …