Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Dartmouth College

Sensors

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

The Feasibility And Utility Of Harnessing Digital Health To Understand Clinical Trajectories In Medication Treatment For Opioid Use Disorder: D-Tect Study Design And Methodological Considerations, Lisa A. Marsch, Ching-Hua Chen, Sara R. Adams, Asma Asyyed, Monique B. Does, Saeed Hassanpour, Emily Hichborn, Melanie Jackson-Morris, Nicholas C. Jacobson, Heather K. Jones, David Kotz, Chantal A. Lambert-Harris, Zhiguo Li, Bethany Mcleman, Varun Mishra, Catherine Stanger, Geetha Subramaniam, Weiyi Wu, Cynthia I. Campbell Apr 2022

The Feasibility And Utility Of Harnessing Digital Health To Understand Clinical Trajectories In Medication Treatment For Opioid Use Disorder: D-Tect Study Design And Methodological Considerations, Lisa A. Marsch, Ching-Hua Chen, Sara R. Adams, Asma Asyyed, Monique B. Does, Saeed Hassanpour, Emily Hichborn, Melanie Jackson-Morris, Nicholas C. Jacobson, Heather K. Jones, David Kotz, Chantal A. Lambert-Harris, Zhiguo Li, Bethany Mcleman, Varun Mishra, Catherine Stanger, Geetha Subramaniam, Weiyi Wu, Cynthia I. Campbell

Dartmouth Scholarship

Introduction: Across the U.S., the prevalence of opioid use disorder (OUD) and the rates of opioid overdoses have risen precipitously in recent years. Several effective medications for OUD (MOUD) exist and have been shown to be life-saving. A large volume of research has identified a confluence of factors that predict attrition and continued substance use during substance use disorder treatment. However, much of this literature has examined a small set of potential moderators or mediators of outcomes in MOUD treatment and may lead to over-simplified accounts of treatment non-adherence. Digital health methodologies offer great promise for capturing intensive, longitudinal ecologically-valid …


Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz Jan 2022

Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz

Dartmouth Scholarship

Data about users is collected constantly by phones, cameras, Internet websites, and others. The advent of so-called ‘Smart Things' now enable ever-more sensitive data to be collected inside that most private of spaces: the home. The first step in helping users regain control of their information (inside their home) is to alert them to the presence of potentially unwanted electronics. In this paper, we present a system that could help homeowners (or home dwellers) find electronic devices in their living space. Specifically, we demonstrate the use of harmonic radars (sometimes called nonlinear junction detectors), which have also been used in …


Using Natural Language Processing And Sentiment Analysis To Augment Traditional User-Centered Design: Development And Usability Study, Curtis L. Petersen, Ryan Halter, David Kotz, Lorie Loeb, Summer B. Cook, Dawna M. Pidgeon, Brock Christensen, John A. Batsis Aug 2020

Using Natural Language Processing And Sentiment Analysis To Augment Traditional User-Centered Design: Development And Usability Study, Curtis L. Petersen, Ryan Halter, David Kotz, Lorie Loeb, Summer B. Cook, Dawna M. Pidgeon, Brock Christensen, John A. Batsis

Dartmouth Scholarship

Background: Sarcopenia, defined as the age-associated loss of muscle mass and strength, can be effectively mitigated through resistance-based physical activity. With compliance at approximately 40% for home-based exercise prescriptions, implementing a remote sensing system would help patients and clinicians to better understand treatment progress and increase compliance. The inclusion of end users in the development of mobile apps for remote-sensing systems can ensure that they are both user friendly and facilitate compliance. With advancements in natural language processing (NLP), there is potential for these methods to be used with data collected through the user-centered design process.

Objective: This study aims …


Using Vibrations From A Smartring As An Out-Of-Band Channel For Sharing Secret Keys, Sougata Sen, Varun Mishra, David Kotz Sep 2019

Using Vibrations From A Smartring As An Out-Of-Band Channel For Sharing Secret Keys, Sougata Sen, Varun Mishra, David Kotz

Dartmouth Scholarship

With the rapid growth in the number of Internet of Things (IoT) devices with wireless communication capabilities, and sensitive information collection capabilities, it is becoming increasingly necessary to ensure that these devices communicate securely with only authorized devices. A major requirement of this secure communication is to ensure that both the devices share a secret, which can be used for secure pairing and encrypted communication. Manually imparting this secret to these devices becomes an unnecessary overhead, especially when the device interaction is transient. In this work, we empirically investigate the possibility of using an out-of-band communication channel – vibration, generated …


Technology For Behavioral Change In Rural Older Adults With Obesity, John A. Batsis, John A. Naslund, Alexandra B. Zagaria, David Kotz, Rachel Dokko, Stephen J. Bartels, Elizabeth Carpenter-Song Apr 2019

Technology For Behavioral Change In Rural Older Adults With Obesity, John A. Batsis, John A. Naslund, Alexandra B. Zagaria, David Kotz, Rachel Dokko, Stephen J. Bartels, Elizabeth Carpenter-Song

Dartmouth Scholarship

Background: Mobile health (mHealth) technologies comprise a multidisciplinary treatment strategy providing potential solutions for overcoming challenges of successfully delivering health promotion interventions in rural areas. We evaluated the potential of using technology in a high-risk population.

Methods: We conducted a convergent, parallel mixed-methods study using semi-structured interviews, focus groups, and self-reported questionnaires, using purposive sampling of 29 older adults, 4 community leaders and 7 clinicians in a rural setting. We developed codes informed by thematic analysis and assessed the quantitative data using descriptive statistics.

Results: All groups expressed that mHealth could improve health behaviors. Older adults were optimistic that mHealth …


Continuous Smartphone Authentication Using Wristbands, Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, David Kotz Feb 2019

Continuous Smartphone Authentication Using Wristbands, Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, David Kotz

Dartmouth Scholarship

Many users find current smartphone authentication methods (PINs, swipe patterns) to be burdensome, leading them to weaken or disable the authentication. Although some phones support methods to ease the burden (such as fingerprint readers), these methods require active participation by the user and do not verify the user’s identity after the phone is unlocked. We propose CSAW, a continuous smartphone authentication method that leverages wristbands to verify that the phone is in the hands of its owner. In CSAW, users wear a wristband (a smartwatch or a fitness band) with built-in motion sensors, and by comparing the wristband’s motion with …


Detection And Monitoring Of Repetitions Using An Mhealth-Enabled Resistance Band, Curtis L. Peterson, Emily V. Wechsler, Ryan J. Halter, George G. Boateng, Patrick O. Proctor, David F. Kotz, Summer B. Cook, John A. Batsis Sep 2018

Detection And Monitoring Of Repetitions Using An Mhealth-Enabled Resistance Band, Curtis L. Peterson, Emily V. Wechsler, Ryan J. Halter, George G. Boateng, Patrick O. Proctor, David F. Kotz, Summer B. Cook, John A. Batsis

Dartmouth Scholarship

Sarcopenia is defined as an age-related loss of muscle mass and strength which impairs physical function leading to disability and frailty. Resistance exercises are effective treatments for sarcopenia and are critical in mitigating weight-loss induced sarcopenia in older adults attempting to lose weight. Yet, adherence to home-based regimens, which is a cornerstone to lifestyle therapies, is poor and cannot be ascertained by clinicians as no objective methods exist to determine patient compliance outside of a supervised setting. Our group developed a Bluetooth connected resistance band that tests the ability to detect exercise repetitions. We recruited 6 patients aged 65 years …


Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz Jun 2015

Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz

Dartmouth Scholarship

Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street or users' mobile phones to locate (Bluetooth-enabled) objects in their vicinity. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk: even if identifying information has been removed from a report, the accompanying time and location can reveal sufficient information to de-anonymize the user whose device sent the report. We propose and evaluate a novel spatiotemporal …


Zebra: Zero-Effort Bilateral Recurring Authentication, Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, David Kotz May 2014

Zebra: Zero-Effort Bilateral Recurring Authentication, Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, David Kotz

Dartmouth Scholarship

Common authentication methods based on passwords, tokens, or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. Users often do not log out, however, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals. One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Several solutions are based on user proximity, but these are not sufficient: they only confirm whether the user is nearby but …


Who Wears Me? Bioimpedance As A Passive Biometric, Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, David Kotz Aug 2012

Who Wears Me? Bioimpedance As A Passive Biometric, Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, David Kotz

Dartmouth Scholarship

Mobile and wearable systems for monitoring health are becoming common. If such an mHealth system knows the identity of its wearer, the system can properly label and store data collected by the system. Existing recognition schemes for such mobile applications and pervasive devices are not particularly usable – they require ıt active engagement with the person (e.g., the input of passwords), or they are too easy to fool (e.g., they depend on the presence of a device that is easily stolen or lost). \par We present a wearable sensor to passively recognize people. Our sensor uses the unique electrical properties …


Anonysense: A System For Anonymous Opportunistic Sensing, Minho Shin, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos Feb 2011

Anonysense: A System For Anonymous Opportunistic Sensing, Minho Shin, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos

Dartmouth Scholarship

We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows applications to submit sensing \emphtasks\/ to be distributed across participating mobile devices, later receiving verified, yet anonymized, sensor data \emphreports\/ back from the field, thus providing the first secure implementation of this participatory sensing model. We describe our security goals, threat model, and the architecture and protocols of AnonySense. We also describe how AnonySense can support extended security features that can be useful for different applications. We evaluate the security and feasibility of AnonySense through security analysis and prototype …


Is Bluetooth The Right Technology For Mhealth?, Shrirang Mare, David Kotz Aug 2010

Is Bluetooth The Right Technology For Mhealth?, Shrirang Mare, David Kotz

Dartmouth Scholarship

Many people believe mobile healthcare (mHealth) would help alleviate the rising cost of healthcare and improve the quality of service. Bluetooth, which is the most popular wireless technology for personal medical devices, is used for most of the mHealth sensing applications. In this paper we raise the question – Is Bluetooth the right technology for mHealth? To instigate the discussion we discuss some shortcomings of Bluetooth and also point out an alternative solution.


On Usable Authentication For Wireless Body Area Networks, Cory Cornelius, David Kotz Aug 2010

On Usable Authentication For Wireless Body Area Networks, Cory Cornelius, David Kotz

Dartmouth Scholarship

We examine a specific security problem in wireless body area networks (WBANs), what we call the ıt one body authentication problem. That is, how can we ensure that the wireless sensors in a WBAN are collecting data about one individual and not several individuals. We explore existing solutions to this problem and provide some analysis why these solutions are inadequate. Finally, we provide some direction towards a promising solution to the problem and how it can be used to create a usably secure WBAN.


A Privacy Framework For Mobile Health And Home-Care Systems, David Kotz, Sasikanth Avancha, Amit Baxi Nov 2009

A Privacy Framework For Mobile Health And Home-Care Systems, David Kotz, Sasikanth Avancha, Amit Baxi

Dartmouth Scholarship

In this paper, we consider the challenge of preserving patient privacy in the context of mobile healthcare and home-care systems, that is, the use of mobile computing and communications technologies in the delivery of healthcare or the provision of at-home medical care and assisted living. This paper makes three primary contributions. First, we compare existing privacy frameworks, identifying key differences and shortcomings. Second, we identify a privacy framework for mobile healthcare and home-care systems. Third, we extract a set of privacy properties intended for use by those who design systems and applications for mobile healthcare and home-care systems, linking them …


Activity-Aware Ecg-Based Patient Authentication For Remote Health Monitoring, Janani Sriram, Minho Shin, Tanzeem Choudhury, David Kotz Nov 2009

Activity-Aware Ecg-Based Patient Authentication For Remote Health Monitoring, Janani Sriram, Minho Shin, Tanzeem Choudhury, David Kotz

Dartmouth Scholarship

Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients' health outside the hospital. Patient authentication is a necessary security requirement in remote health monitoring scenarios. The monitoring system needs to make sure that the data is coming from the right person before any medical or financial decisions are made based on the data. Credential-based authentication methods (e.g., passwords, certificates) are not well-suited for remote healthcare as patients could hand over credentials to someone else. Furthermore, one-time authentication using credentials or trait-based biometrics (e.g., face, fingerprints, iris) do not cover the entire monitoring period and …


Activity-Aware Ecg-Based Patient Authentication For Remote Health Monitoring, Janani Sriram, Minho Shin, Tanzeem Choudhury, David Kotz Nov 2009

Activity-Aware Ecg-Based Patient Authentication For Remote Health Monitoring, Janani Sriram, Minho Shin, Tanzeem Choudhury, David Kotz

Dartmouth Scholarship

Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients' health outside the hospital. Patient authentication is a necessary security requirement in remote health monitoring scenarios. The monitoring system needs to make sure that the data is coming from the right person before any medical or financial decisions are made based on the data. Credential-based authentication methods (e.g., passwords, certificates) are not well-suited for remote healthcare as patients could hand over credentials to someone else. Furthermore, one-time authentication using credentials or trait-based biometrics (e.g., face, fingerprints, iris) do not cover the entire monitoring period and …


Deamon: Energy-Efficient Sensor Monitoring, Minho Shin, Patrick Tsang, David Kotz, Cory Cornelius Jun 2009

Deamon: Energy-Efficient Sensor Monitoring, Minho Shin, Patrick Tsang, David Kotz, Cory Cornelius

Dartmouth Scholarship

In people-centric opportunistic sensing, people offer their mobile nodes (such as smart phones) as platforms for collecting sensor data. A sensing application distributes sensing `tasks,' which specify what sensor data to collect and under what conditions to report the data back to the application. To perform a task, mobile nodes may use on-board sensors, a body-area network of personal sensors, or sensors from neighboring nodes that volunteer to contribute their sensing resources. In all three cases, continuous sensor monitoring can drain a node's battery. \par We propose DEAMON (Distributed Energy-Aware MONitoring), an energy-efficient distributed algorithm for long-term sensor monitoring. Our …


Opportunistic Sensing: Security Challenges For The New Paradigm, Apu Kapadia, David Kotz, Nikos Triandopoulos Jan 2009

Opportunistic Sensing: Security Challenges For The New Paradigm, Apu Kapadia, David Kotz, Nikos Triandopoulos

Dartmouth Scholarship

We study the security challenges that arise in Opportunistic people-centric sensing, a new sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor-network research has focused on collecting and processing environmental data using a static topology and an application-aware infrastructure, whereas opportunistic sensing involves collecting, storing, processing and fusing large volumes of data related to everyday human activities. This highly dynamic and mobile setting, where humans are the central focus, presents new challenges for information security, because data originates from sensors carried by people— not tiny sensors thrown in the forest or attached to animals. In this …


Poster Abstract: Reliable People-Centric Sensing With Unreliable Voluntary Carriers, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, Patrick Tsang Jun 2008

Poster Abstract: Reliable People-Centric Sensing With Unreliable Voluntary Carriers, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, Patrick Tsang

Dartmouth Scholarship

As sensor technology becomes increasingly easy to integrate into personal devices such as mobile phones, clothing, and athletic equipment, there will be new applications involving opportunistic, people-centric sensing. These applications, which gather information about human activities and personal social context, raise many security and privacy challenges. In particular, data integrity is important for many applications, whether using traffic data for city planning or medical data for diagnosis. Although our AnonySense system (presented at MobiSys) addresses privacy in people-centric sensing, protecting data integrity in people-centric sensing still remains a challenge. Some mechanisms to protect privacy provide anonymity, and thus provide limited …


Anonysense: Opportunistic And Privacy-Preserving Context Collection, Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Dan Peebles, David Kotz May 2008

Anonysense: Opportunistic And Privacy-Preserving Context Collection, Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Dan Peebles, David Kotz

Dartmouth Scholarship

Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street, or users' mobile phones to locate (Bluetooth-enabled) objects in their neighborhood. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk—even if a report has been anonymized, the accompanying time and location can reveal sufficient information to deanonymize the user whose device sent the report. \par We propose AnonySense, a general-purpose architecture for leveraging users' mobile …


A Sensor-Fusion Approach For Meeting Detection, Jue Wang, Guanling Chen, David Kotz Jun 2004

A Sensor-Fusion Approach For Meeting Detection, Jue Wang, Guanling Chen, David Kotz

Dartmouth Scholarship

In this paper we present a context-sensing component that recognizes meetings in a typical office environment. Our prototype detects the meeting start and end by combining outputs from pressure and motion sensors installed on the chairs. We developed a telephone controller application that transfers incoming calls to voice-mail when the user is in a meeting. Our experiments show that it is feasible to detect high-level context changes with “good enough” accuracy, using low-cost, off-the-shelf hardware, and simple algorithms without complex training. We also note the need for better metrics to measure context detection performance, other than just accuracy. We propose …


A Sensor Fusion Approach For Meeting Detection, Jue Wang, Guanling Chen, David Kotz Jun 2004

A Sensor Fusion Approach For Meeting Detection, Jue Wang, Guanling Chen, David Kotz

Dartmouth Scholarship

In this paper we present a context-sensing component that recognizes meetings in a typical office environment. Our prototype detects the meeting start and end by combining outputs from pressure and motion sensors installed on the chairs. We developed a telephone controller application that transfers incoming calls to voice-mail when the user is in a meeting. Our experiments show that it is feasible to detect high-level context changes with ``good enough'' accuracy, using low-cost, off-the-shelf hardware, and simple algorithms without complex training. We also note the need for better metrics to measure context detection performance, other than just accuracy. We propose …