A Framework of Developing Health Care Application Systems Using 6LoWPAN Based Wireless Sensor Networks

Author(s):  
Zhongwei Zhang ◽  
Jianxiong Wang ◽  
Xiaohua Hu
Author(s):  
Dante I. Tapia ◽  
Ricardo S. Alonso ◽  
Juan M. Corchado

This paper describes last improvements made on ALZ-MAS; an Ambient Intelligence based multi-agent system aimed at enhancing the assistance and health care for Alzheimer patients. The system makes use of several context-aware technologies that allow it to automatically obtain information from users and the environment in an evenly distributed way, focusing on the characteristics of ubiquity, awareness, intelligence, mobility, etc., all of which are concepts defined by Ambient Intelligence. Among these context-aware technologies we have Wireless Sensor Networks. In this sense, ALZ-MAS is currently being improved by the use of a new platform of ZigBee devices that provides the system with new telemonitoring and locating engines.


2020 ◽  
Author(s):  
Afsaneh Minaie ◽  
Ali Sanati-Mehrizy ◽  
Paymon Sanati-Mehrizy ◽  
Reza Sanati-Mehrizy

Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4481 ◽  
Author(s):  
Jihyeon Ryu ◽  
Hakjun Lee ◽  
Hyoungshick Kim ◽  
Dongho Won

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.


Sign in / Sign up

Export Citation Format

Share Document