Body Area Networks Smart IoT and Big Data For Intelligent Health
Body Area Networks Smart IoT and Big Data For Intelligent Health
Matti Hämäläinen
Lorenzo Mucchi
Imran Khan Niazi
Yannick Le Moullec (Eds.)
330
123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 330
123
Editors
Muhammad Mahtab Alam Matti Hämäläinen
U02B-212 Centre for Wireless Communications
Tallinn University of Technology University of Oulu
Tallinn, Estonia Oulu, Finland
Lorenzo Mucchi Imran Khan Niazi
University of Florence New Zealand College of Chiropractic
Florence, Italy Auckland, New Zealand
Yannick Le Moullec
Tallinn University of Technology
Tallinn, Estonia
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
We are delighted to preface this book which constitutes the refereed post-conference
proceedings of the 15th EAI International Conference on Body Area Networks (EAI
BODYNETS 2020). The theme for 2020 was “Smart IoT and Big Data for Intelligent
Health Management.”
Initially planned to take place in Tallinn, Estonia, the outbreak of the COVID-19
pandemic meant that the conference (like many others), took place as an online event
on October 21, 2020.
We received 30 submissions; after a rigorous double-blind review process,
15 papers were selected for the final program. The main topics covered during the
conference included connectivity and radio propagation, secure communication net-
works for smart-health, and connected wearables sensors for healthcare applications.
In addition to the high-quality technical paper presentations, the conference also
featured two keynote speeches. Prof. Mohsen Guizani, a Professor at the Computer
Science and Engineering Department at Qatar University, Qatar, gave a keynote speech
titled “IoT Security Schemes for Healthcare Systems.” Helena Gapeyeva (MD, PhD), a
Physician of Physical and Medical Rehabilitation at the Clinic of Medical Rehabilitation
in East Tallinn Central Hospital, Estonia, gave a keynote speech titled “Movement
analysis in Physical and Rehabilitation Medicine: Data monitoring.”
Organizing the conference would not have been possible without the support of the
Steering Committee: the chair Imrich Chlamtac and members Jun Suzuki, Giancarlo
Fortino, Matti Hämäläinen, and Lorenzo Mucchi. We warmly thank them for their
support and guidance. We also extend our deep appreciation to the Organizing Com-
mittee team for their hard work, and to the technical Program Committee members for
carefully reviewing and selecting the papers.
We hope you will enjoy reading and studying the proceedings of BODYNETS
2020, and we look forward to seeing you at the next edition of the conference.
Steering Committee
Imrich Chlamtac (Chair) University of Trento, Italy
Jun Suzuki (Member) University of Massachusetts Boston, USA
Giancarlo Fortino (Member) University of Calabria, Italy
Matti Hämäläinen University of Oulu, Finland
(Member)
Lorenzo Mucchi (Member) University of Florence, Italy
Organizing Committee
General Chair
Muhammad Mahtab Alam Tallinn University of Technology, Estonia
General Co-chair
Giancarlo Fortino University of Calabria, Italy
Local Chair
Mart Min Tallinn University of Technology, Estonia
Workshops Chair
Muhammad Ali lmran The University of Glasgow, UK
Publications Chair
Yannick Le Moullec Tallinn University of Technology, Estonia
viii Organization
Web Chair
Haris Pervaiz Lancaster University, UK
Exhibition/Demos Chair
Qammer H. Abbassi The University of Glasgow, UK
Conference Manager
Kristina Petrovicova EAI
Abstract. Radio and acoustic waves have been conventionally used for transmit-
ting information through biological tissues. However, some radio-based commu-
nications often suffer from several drawbacks like security, safety, privacy, and
interference. In this paper, we demonstrate that optical wireless communications
can be practically used for communications through biological tissues, particularly
to transmit information to and from implanted devices. In the experiment, ex vivo
samples of pork meat were used as the optical channel. Initial results show that
information can be optically transmitted through biological tissues to distances
of several centimeters, a range of practical interest as many implants today are
placed within this extent. Optical links are inherently secure, and interference to
and from other equipment is not an issue. With numerous potential benefits, opti-
cal wireless communication can be considered as a complementary approach to
the existing radio frequency (RF) communications. In this paper, a comparison
between the measurement results of ultra-wideband (UWB) and optical commu-
nications through the biological tissues is presented. Both experiments have been
taken place in a similar environment, with the same meat samples. We have also
explored the effect of tissue temperature on successful communications through
biological tissues. These initial results are very promising and indicate various
potential benefits for in-body communication in the future.
1 Introduction
Improving the quality of life is one of the ultimate goals of technology, and in this respect,
wireless and mobile communications play a key role. In particular, remote health moni-
toring is a cost-effective approach to the prevention of diseases as well as the provision
of health care. The aging population, chronic diseases, and the desire to live a healthy
lifestyle are present-day healthcare challenges that can be addressed by wireless tech-
nology. The concept of wireless body area networks (WBAN) is a well-known example
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 3–17, 2020.
https://doi.org/10.1007/978-3-030-64991-3_1
4 S. Halder et al.
of this technology, where a network of nodes (e.g., sensors) inside, outside, and on the
patient’s body collects, processes, and transmits physiological data. Last decades have
witnessed a remarkable development in electronic body implant technology. Today, we
rely on a great variety of these implants, such as heart pacemakers, cardioverter defib-
rillators, medicine dispensers, and brain stimulation implants, for example. In addition,
in-body sensors and smart pills have been developed to monitor physiological parame-
ters, imaging, drug delivery, etc. Furthermore, there is currently an increasing interest in
brain implants beyond conventional brain stimulation and deep brain stimulation. These
include monitoring and recording brain activity and ultimately interfacing neural sys-
tems with computer systems (e.g., brain-computer interfaces). Recently, the idea of the
internet of things (IoT) has been extended to consider in-body, on-body, and out-body
nodes networked to provide medical care. New concepts such as the internet of medical
things (IoMT) and the internet of the human body (IHB) have been lately proposed.
One of the key enablers in the above-mentioned systems is human centric commu-
nications (HCC), a field that has been and continues to be widely investigated. HCC
defines wireless communications taking place inside the human body, communication
between internal and external nodes as well as communication across nodes on the
body. Figure 1 depicts the possible wireless links in HCC, where three types of nodes
are shown, a) in-body nodes (IBN), b) on-body (OBN) nodes, and c) out-body or external
nodes (EN). In this paper, the focus is on in-body communications, where wireless links
are established between IBNs or between IBNs and OBNs. Typical nodes include elec-
tronic implants as well as ingestible or implanted sensors, for instance. Radio has been
the dominant technology for in-body wireless communications, exploiting narrowband,
wideband, and ultra-wideband concepts. Acoustic communication is also an interesting
approach to communicating through biological tissue. Human tissue is a challenging
medium for the propagation of radio waves. Radio frequency attenuation is typically
high, due to the high conductivity and dielectric constant of the biological tissues. These
characteristics strongly depend on the frequency used for communications. Moreover,
the medium could be very complex, as the signal may need to propagate through many
layers of different tissues, each with different characteristics. In-body communication
must be highly secure and private, and this is a challenge for radio systems. Several
cases have emerged in recent years, showing the vulnerability of commercial implants
to hacks, leading even to a massive recall of implantable devices. Besides, the radio is
prone to be affected by non-intentional interference. Ultrasound-based communication
systems do not face these challenges, though they might be limited by low data support
and considerably high-power consumption. In this paper, we propose the use of optical
communications for establishing in-body wireless links. Previous work has shown that
optical communication is viable for very short optical links of a few millimeters, particu-
larly for reaching electronic devices placed under the skin. This is the case of superficial
communications, indicated with “a” in Fig. 1. However, our initial experiments have
shown that considerably longer ranges can be easily achieved using optical links based
on near-infrared (NIR) light. This case, depicted with “b” in Fig. 1, provides connectivity
to in-body electronic nodes (IBNs). Moreover, connecting in-body and out-body nodes
(e.g., EN) is also possible using optical links. The prospect of using light for wireless
Providing Connectivity to Implanted Electronics Devices 5
communications inside the human body is highly relevant. Optical wireless commu-
nications have unique advantages such as high security, privacy, safety as well as low
complexity and power consumption. Furthermore, light sources are used for a variety
of novel purposes inside the human body, such as for diagnosis and therapy. Control
of cellular activity (e.g., in neurons) by means of light to activate, inhibit, or monitor
certain functions is another highly relevant application of light. The vision of having key
health functionalities such as wireless communication, diagnosis, treatment, and moni-
toring working with under the same light-based infrastructure is truly appealing. In this
paper, we report the design, implementation, and testing of an optical communication
system, with a testbed using realistic ex vivo samples as the optical channel. The optical
system is compared to an ultra-wideband communication system working in a similar
scenario. The impact of the temperature on the optical and radio communication links
is also investigated. There are several studies presenting the impact of the temperature
on the dielectric properties of the animal tissues in different frequency ranges [1, 2].
However, up to the authors’ knowledge, there is a lack of studies presenting the impact
of the temperature on the radio channel characteristics. In ref. [3], authors have presented
results on the impact of the temperature on the antenna and channel characteristics. Fre-
quency domain channel results are repeated in this paper to ease the comparison with
the measurement results obtained with the optical technique at the same temperature.
to the main technologies NB and UWB, WBAN covers also human body communica-
tions (HBC) technology, which is based on galvanic coupling or capacitive coupling.
From these techniques, UWB is chosen to be compared with the optical communication
technique.
UWB technology has been recognized as a promising candidate for implant commu-
nication systems. It provides several advantages: high data rates, low power consumption,
high security, simple transceivers, etc. [6]. The main drawback of the UWB is the higher
propagation loss within the tissues. However, the propagation loss can be dealt with the
use of a lower UWB band (3–5 GHz) in the applications where the signal is required to
propagate deep inside the body tissues and with properly directive antennas. UWB has
been used in several medical monitoring applications, such as capsule endoscopy, tumor
detection, heart and breath rate monitoring, glucose level monitoring, etc.
3.2 Acoustic
Mechanical movements of particles in a substance form the ultrasounds (US) wave
[8]. Ultrasonic waves are generally defined by the following parameters: frequency,
pressure, amplitude, propagation speed, and intensity [9]. US is an extensively popular
technology in healthcare due to its various applications in imaging. Ultrasound consists
of all the acoustic waves having a frequency above 20 kHz, which is non-audible for
humans [10]. Apart from the numerous imaging applications, US has been considered to
have great potential for in-body communications. Acoustic waves, typically generated
through piezoelectric materials are preferred to be used for underwater communications,
as they propagate better in media mostly made up of water when compared to RF. Up
to 60% of the human adult body consists of water [11] and blood is a fluid that provides
cells with different resources. This makes ultrasound an eligible technology to support
in-body communications.
3.3 Optical
Over the years, there has been a growing interest in utilizing optical communications for
the betterment of healthcare technologies. Light has been widely used in both therapeu-
tic and diagnostic medical applications. Light-based communications typically require
line-of-sight (LOS) configuration [12]. However, non-line-of-sight (NLOS) configura-
tion is also possible, though the signal strength could be greatly affected in that scenario.
In recent years, visible light communications (VLC), a case of OWC, has become an
extremely popular research topic. In the electromagnetic spectrum, the visible spectrum
expands over a wavelength of 400 nm to 700 nm [13]. In VLC, light-emitting diodes
(LEDs) are employed due to their advantages of simultaneously providing illumina-
tion and transmitting of data. Optical communications possess numerous advantages
like safety, large and unregulated spectrum, data security, less interference, zero-radio-
exposure as well as cost and energy effectiveness. These advantages could lead these
light-based communications a suitable choice for future medical applications. The uti-
lization of optical communications in implants is very safe and secure for patients,
a fundamental advantage of this technology. For OWC, IEEE published the standard
802.15.7 in 2011 which mainly aimed at visible light spectrum. Development work has
8 S. Halder et al.
been going on to achieve further standards so that the ultraviolet, visible light and infrared
areas can also be included.
Some key characteristics of UWB, acoustic, and optical communications system are
presented in Table 1.
Table 1. General comparison of UWB, acoustic and optical communications for short-range
medical applications.
4 Experimental Results
In this section, we present some measurement results carried out with individual exper-
imental testbeds for both optical and UWB. Results, though initial, show the potential
of optical wireless communications for in-body applications.
been created with the help of GNU radio software. For the optical communication link
through biological tissues, a Gaussian minimum-shift keying (GMSK) modulation was
used. The GMSK modulation scheme has been used due to its constant envelope prop-
erty. It is difficult for the LED to be able to respond to the prompt phase changes of some
other modulation schemes (e.g., quadrature phase-shift keying (QPSK)). Thus, GMSK
modulation is considered as a convenient choice for the optical communications as the
phase changes occur steadily in GMSK [14, 18].
Here, we have used a 3 cm thick fresh pork meat sample with the skin on. The
meat sample consists of both muscle and fat (approximately 0.5 cm of fat and 2.5 cm
of flesh). The temperature of the sample was 12 °C. The LED input current has been
varied and we have measured the corresponding optical power employed on the meat
sample. The optical powers were well in accordance with the standard of laser safety
ANSI.Z136.1-2007 [19]. Successful optical communication was established through
the ex vivo sample. Moreover, an image file of 14 MB has been transmitted through the
sample and we were able to achieve a data rate of 22 Kbps. The meat sample has been
illuminated on the skin surface and the detector has been placed on the flesh side. The
experimental setup for optical communications through biological tissues is presented
in Fig. 3.
To understand the effect of tissue temperature on optical communication, the same
meat sample has been heated to 37 °C. For this heating purpose, we have placed the
sample inside a heating box made of acrylic material. A temperature controller was
used to set the desired temperature of the sample. Table 2 presents the transmitted and
received optical power for both cold and warm meat along with the power losses. Both
the transmitted and received optical powers are measured with the help of PM100D
power meter from Thorlabs [20].
10 S. Halder et al.
Table 2. Transmitted optical power, received optical power and power losses of cold and warm
meat.
Transmitted Received optical Power loss (dB) Received optical Power loss (dB)
optical power power (µW) (Cold meat) power (µW) (Warm meat)
(mW/cm2 ) (Cold meat) (Warm meat)
50.94 98.3 −27.14 128.3 −25.98
101.11 204.2 −26.94 234.2 −26.35
146.26 301.8 −26.85 341.8 −26.31
190.53 389.9 −26.89 419.9 −26.57
231.38 469.2 −26.92 520.2 −26.48
A comparison of the received optical power in both cases (cold and warm meat
samples) shows a minor difference between the measured values. The received optical
power for both cold and warm meat samples are presented in Fig. 4. The optical properties
of the meat sample change with the temperature and this affects the amount of received
power. Moreover, as our sample consisted of both flesh and fat, the fat portion has become
more transparent due to the rise in the temperature. This transparency also leads to better
light propagation through the tissues, as seen in Fig. 4.
Providing Connectivity to Implanted Electronics Devices 11
Cold meat
500 Warm meat
450
350
300
250
200
150
100
50
100 200 300 400 500
For a fair comparison, the UWB testbed used the very same meat sample used for the
case of optical communication. UWB measurements were conducted using the Agilent
8720ES Vector Network Analyzer (VNA). Two different UWB-antennas were connected
to the VNA’s ports with coaxial cables. Antennas were placed on the top and below the
biological tissue. The block diagram of the UWB measurement set up is presented in
Fig. 5.
The UWB measurement results are analyzed in more detail in [3] presenting a study
on the UWB in-body measurements using pork meat. Ref. [3] evaluates also the impact
of the meat’s fat and muscle composition as well as the impact of meat’s temperature on
the UWB antenna and channel characteristics and compares the UWB channel charac-
teristics on humans and pork tissues by simulations. One of the channel results of [3] is
represented in this paper to ease the comparison with the results obtained using optical
communication.
Figure 6 presents the meat used in the measurements. The size of the meat is 22 cm ×
20 cm, which is much larger than that used in the optical measurements due to antenna
sizes and the necessity to avoid propagation flow from the meat sides. The thickness of the
meat is 3 cm as in optical measurements. The frequency-domain channel characteristics
are evaluated for the UWB range of 0.5–5 GHz. Two different UWB antenna prototypes
are used in the measurements: 1) a cavity-backed antenna, which is used as an on-body
antenna and is located above the skin layer and 2) a loop antenna, which resembles as an
in-body antenna. The cavity-backed antenna is a directive on-body antenna designed for
implant communications at the frequency band 3.75–4.25 GHz, which is the frequency
range of interest in this UWB measurement study. A detailed description of the antenna
can be found in [21]. The loop antenna is an omnidirectional antenna designed to work
for the whole UWB band 3.1–10.6 GHz. Details of the loop antenna can be found in
[22].
The meat piece was set inside a cube form area made by absorber pieces. The loop
antenna was set below the meat muscle and fat tissue side. The cavity-backed antenna
was set to the top of the tissues on the skin side. Figure 7 presents the measurement
setup, which is explained in detail in [3]. Ref. [3] also analyses in more detail the
frequency and time domain channel characteristics as well as antenna characteristics
with different pork meat pieces. This section summarizes the channel results for the
pork meat sample which was also used in optical measurements to ease the comparison
with optical measurements. The measurements were taken as the meat was cold (12 °C)
and warm (37 °C), as in the optical measurements.
Frequency domain channel characteristics, i.e., S21 parameters, are presented in
Fig. 8 for the pork meat with cold and warm temperatures. It can be seen, power loss on
the frequency range of interest, i.e., 3.75–4.25 GHz, varies from −48 dB to −58 dB with
the cold meat. The power loss difference at the 3.75 GHz and 4.25 GHz is noteworthy.
The higher the frequency, the larger is the power loss due to changes in the dielectric
Providing Connectivity to Implanted Electronics Devices 13
Fig. 7. UWB measurement setup inside the cube made from absorber pieces [3].
properties [23]. Nevertheless, the power loss is at a reasonable level for successful data
communications in this case. For the warm meat, the power loss is approximately 6 dB
smaller compared to the cold meat. The variation within the frequency range of interest
is −42 to −52 dB. These results show clearly, how the temperature has a clear impact
on the channel characteristics since the dielectric properties of the tissues change with
the temperature.
Fig. 8. The S21 parameter obtained in UWB measurements with the meat at the temperature of
12°C and 37°C [3]
14 S. Halder et al.
It can be concluded that the power loss for 3 cm thick meat remains at a reasonable
level for a data communication link. With lower UWB frequencies and directive antennas,
data communications might be possible even with double meat thickness in the realistic
scenario of 37 °C meat temperature.
The measurements have been taken with a meat piece having interlaced muscle and
fat layers. Fat is known to be among the easiest tissues for radio propagations [24, 25]
and thus the “fat tunnels” within the muscle layers help to achieve reasonable power loss
level. With meat pieces having separate muscle and fat layers, the power loss is worse
[3].
With the UWB technique, better propagation depth is obtained. The best propagation
depth is achieved with directive on-body antennas. However, such antennas usually
require relatively large cavity structures which might be clumsy for wearable devices.
5 Discussion
This study investigates the potential of transmitting information through biological tis-
sues by utilizing optical communications. Results show that optical communications
through biological tissues are possible, in a range of practical interest. A comparison of
the optical communications through biological tissues with the UWB communication
is also presented in this paper. Here, we have used the same piece of meat sample with
3 cm thickness as the medium for both UWB and optical measurements. Individual
experimental testbeds have been used to carry out the measurements. Light propaga-
tion through biological tissue is an extremely complex process, where phenomena like
absorption, scattering, and reflectance take place during the propagation. The meat sam-
ple we have used here contains both fat and muscle. The optical power applied to the
sample during the optical communications is well below the regulated safety limits. First,
we have demonstrated that optical communications through biological tissues are fea-
sible through ranges that are of practical interest, e.g., wireless connectivity to different
implanted devices can be provided. In fact, in the future, very secure and safe com-
munications could be provided to several possible implanted electronic devices such as
pacemakers, defibrillators, insulin pumps, and others. The simple optical communica-
tions system was not matched to the optical channel, and thus, the supported data rate
was relatively low, of the order of several tens of Kbps. Nevertheless, in most of the
cases involving implanted devices, the required data throughput is relatively small, as
typical applications require the sporadic transmission of sensor information, changing
device settings, etc. High-order modulation schemes as well as multiple optical beams
can be used to increase the data rate.
An initial comparison between optical and UWB communications through biological
tissues has been presented here. The comparison here focuses only on the attenuation
of the two systems for a similar piece of sample. It was found that power loss with the
optical system is minor than with UWB. However, also with UWB the loss is moderate
and still far from the UWB receiver’s sensitivity limits. Besides, the comparison is not
straightforward since in the UWB measurement setup, only a pure sinusoid signal is
inserted directly to the transmitter antenna without any modulation.
Optical and UWB measurements on the meat sample were carried out at 12 °C and
37 °C to observe the effect of tissue temperature during the communications. We have
Providing Connectivity to Implanted Electronics Devices 15
found that the received optical power of the heated meat sample is higher than that of
the cold meat sample. Moreover, the power loss for the heated meat has been found
to be smaller than the cold meat during UWB measurements. On the other hand, we
have noticed minor differences in the power losses for the cold and warm meat during
the optical measurements. So, it can be considered that optical communication is less
sensitive to the tissue temperature compared to UWB communications. The measured
power losses for both cold and warm samples are such that the signal can be decoded at
the receiver.
Various individual advantages of optical and radio communications can be exploited
together to implement a flexible hybrid optical-radio wireless network. In this hybrid
optical-radio wireless network, both the optical and radio communications complement
each other. An optical-radio hybrid network has several advantages, including increased
link connection reliability, security, and support of higher data rates. Instead, the radio
enables implant communication in the cases where the implant is deeper inside the
tissues. The hybrid optical-radio network can be considered as a suitable approach for
future medical applications due to these potential benefits.
6 Conclusion
References
1. Ley, S., Schilling, S., Fiser, O., Vrba, J., Sachs, J., Helbig, M.: Ultra-wideband temperature
dependent dielectric spectroscopy of porcine tissue and blood in the microwave frequency
range. Sensors 19(7), 1707 (2019)
2. Gabriel, C., Gabriel, S., Corthout, Y.E.: The dielectric properties of biological tissues: I.
Literature survey. Phys. Med. Biol. 41(11), 2231 (1996)
3. Särestöniemi, M., Pomalaza-Raez, C., Kissi, C., Iinatti, J.: On the UWB in-body propagation
measurements with a pork meat. Submitted to BodyNets2020
4. International Commission on Non-Ionizing Radiation Protection: ICNIRP statement on light-
emitting diodes (LEDs) and laser diodes: implications for hazard assessment. Health Phys.
78(6), 744–752 (2000)
5. Teshome, A.K., Kibret, B., Lai, D.T.: A review of implant communication technology in
WBAN: progress and challenges. IEEE Rev. Biomed. Eng. 12, 88–99 (2018)
6. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area
networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1658–1686 (2014)
7. IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area
Networks. IEEE Std 802.15.6-2012, pp. 1–271 (2012)
8. Davilis, Y., Kalis, A., Ifantis, A.: On the use of ultrasonic waves as a communications medium
in biosensor networks. IEEE Trans. Inf Technol. Biomed. 14(3), 650–656 (2010)
9. Galluccio, L., Melodia, T., Palazzo, S., Santagati, G.E.: Challenges and implications of using
ultrasonic communications in intra-body area networks. In: 2012 9th Annual Conference on
Wireless On-Demand Network Systems and Services (WONS), pp. 182–189. IEEE (2012)
10. Carovac, A., Smajlovic, F., Junuzovic, D.: Application of ultrasound in medicine. Acta
Informatica Medica 19(3), 168 (2011)
11. Jéquier, E., Constant, F.: Water as an essential nutrient: the physiological basis of hydration.
Eur. J. Clin. Nutr. 64(2), 115–123 (2010)
12. Cevik, T., Yilmaz, S.: An overview of visible light communication systems. arXiv preprint
arXiv:1512.03568
13. Zwinkels, J.C., Canada, C.: Encyclopedia of Color Science and Technology, pp.1–8 (2019)
14. Ahmed, I., Bykov, A., Popov, A., Meglinski, I., Katz, M.: Optical wireless data transfer
through biotissues: practical evidence and initial results. In: Mucchi, L., Hämäläinen, M.,
Jayousi, S., Morosi, S. (eds.) BODYNETS 2019. LNICST, vol. 297, pp. 191–205. Springer,
Cham (2019). https://doi.org/10.1007/978-3-030-34833-5_16
15. Thorlabs DC2200 LED Driver. https://www.thorlabs.com/thorproduct.cfm?partnumber=
DC2200
16. Thorlabs Mounted LEDs. https://www.thorlabs.com/newgrouppage9.cfm?objectgroup_ID=
2692
17. Thorlabs APD120A/M - Si Avalanche Photodetector, 400–1000 nm, M4 Taps. https://www.
thorlabs.com/thorproduct.cfm?partnumber=APD120A/M
18. Saud, M.S., Ahmed, I., Kumpuniemi, T., Katz, M.: Reconfigurable optical-radio wireless
networks: meeting the most stringent requirements of future communication systems. Trans.
Emerg. Telecommun. Technol. 30(2), 1–15 (2019)
19. American National Standard for Safe Use of Lasers. https://bit.ly/2VUXsXr
20. PM100D - Compact Power and Energy Meter Console, Digital 4” LCD. https://www.tho
rlabs.com/thorproduct.cfm?partnumber=PM100D
21. Kissi, C., Särestöniemi, M., Pomalaza-Raez, C., Sonkki, M., Srifi, M.N.: Low-UWB directive
antenna for wireless capsule endoscopy localization. In: Sugimoto, C., Farhadi, H., Hämäläi-
nen, M. (eds.) BODYNETS 2018. EICC, pp. 431–442. Springer, Cham (2020). https://doi.
org/10.1007/978-3-030-29897-5_38
Providing Connectivity to Implanted Electronics Devices 17
22. Tuovinen, T., Yazdandoost, K.Y., Iinatti, J.: Comparison of the performance of the two dif-
ferent UWB antennas for the use in WBAN on-body communication. In: 2012 6th European
Conference on Antennas and Propagation (EUCAP), pp. 2271–3374. IEEE (2012)
23. Dielectric Properties. https://www.itis.ethz.ch/virtual-population/tissue-properties/database
24. Asan, N.B., et al.: Characterization of the fat channel for intra-body communication at R-band
frequencies. Sensors 18(9), 2752 (2018)
25. Särestöniemi, M., et al.: Fat in the abdomen area as a propagation medium in WBAN appli-
cations. In: Mucchi, L., Hämäläinen, M., Jayousi, S., Morosi, S. (eds.) BODYNETS 2019.
LNICST, vol. 297, pp. 175–187. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-
34833-5_15
On the UWB in-Body Propagation
Measurements Using Pork Meat
Abstract. This paper presents a study on the in-body propagation using pork
meat at the lower ultrawideband (UWB) frequency band 3.74-4.25 GHz of the
wireless body area network (WBAN) standard 802.15.6. Pork meat in terms of
the dielectric properties is one of the most similar to human tissues and thus is
commonly used in in-body propagation studies. Nevertheless, there are differences
in the dielectric properties, creating some differences also in the radio propagation.
The first objective of this paper is to investigate by simulations the propagation
differences between human and pork tissue layer models. The simulations results
show clear differences between the channel characteristics obtained using a human
tissues and pork tissues: within the frequency range of interest, the path loss with
pork meat can be up to 5 dB less than with the human meat. The second objective of
this paper is to study, by measurements, the in-body channel characteristics using
different types of pork meat piece having different fat and muscle compositions.
It was found that path loss is clearly higher with the pork meat having separate
skin, fat, and muscle layers compared to the pork meat having interlaced fat and
muscle layers. Furthermore, the third objective of this paper is to study the impact
of the meat temperature on the measured channel characteristics by comparing the
channels obtained with the meat at the temperatures of 12 °C and at 37 °C. Also, in
this case clear differences were observed in path loss: within the frequency range
of interest, the path loss was maximum 5 dB lower with meat at 37 °C than with
a colder meat. The results presented in this paper provide useful information and
relevant aspects for the in-body propagation studies conducted with pork meat.
1 Introduction
Wireless medical monitoring has increased interest in recent years due to the several
benefits it may provide for the healthcare of human beings [1–3]. Capsule endoscope is
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 18–33, 2020.
https://doi.org/10.1007/978-3-030-64991-3_2
On the UWB in-Body Propagation Measurements Using Pork Meat 19
one example of the implant monitoring systems which has become popular method of
investigating the gastrointestinal (GI) tract [4, 5].
Smooth design of monitoring devices requires deep knowledge of radio channel
characteristics. Channel characteristics can be studied with electromagnetic simulations,
which are based on solving Maxwell’s equations in their differential or integral forms,
or measurements using phantom models, anaesthetized living animals, or tissues of the
animals [5–8].
Measurements with the anaesthetized animals provide the most realistic results of
the measurements since dielectric properties of the tissues start to change immediately
after the death of the animal [9]. However, measurements are challenging with anaes-
thetized animals since such measurements require hospital environment [10, 11]. Instead,
measurements with meat pieces are more feasible. Since some of the tissue dielectric
properties of adult pig is known to be close to the those off human beings, pig meat is
commonly used in the on-body/in-body antenna studies as well as in in-body propagation
studies [12–14].
However, the use of meat pieces has some shortcomings and restrictions which
should be considered. For instance, dielectric properties of animals can be different
compared to those of human beings though dielectric properties of adult pork tissues are
found to be close to those of humans [15–17]. Besides, dielectric properties of tissues
change with the age of the animal [18] or as the time passes from the death of the animal
[9]. Moreover, temperature impacts the dielectric properties of the tissues [16], which
obviously has clear impact on the in-body channel characteristics. Finally, composition
of fat and muscle layers in the meat piece is assumed to have strong impact on the results
since fat is known to be a good propagation channel [19, 20].
Up to the author’s knowledge, there is no studies presented on comparing channel
characteristics evaluated with meat pieces having different fat and muscle composition
with realistic antennas. Furthermore, up to the author’s knowledge there are no studies
presenting impact of the meat temperature on the channel characteristics.
The aim of this paper is to address the aforementioned aspects. First, channel char-
acteristics obtained using human tissues and pork tissues in the layer simulation models
are compared. Secondly, the channel characteristics are evaluated using two different
meat pieces: the first one having interlaced muscle and fat layers, the second one having
separate muscle and fat layers. Finally, the impact of the meat’s temperature is evaluated
on the antenna performance and channel characteristics.
The paper is organized as follows: Sect. 2 presents study case including description
of the simulations, antennas, and measurements. Section 3 presents simulation-based
antenna verification. Section 4 compares channel characteristics obtained using human
tissues and pork tissues in the layer simulation model. Measurement results for meat
pieces with different fat and muscle composition are evaluated in Sect. 4. Furthermore,
the impact of the temperature on the antenna and channel characteristics are studied in
Sect. 4. Finally, Conclusions with future work perspectives are discussed in Sect. 5.
20 M. Särestöniemi et al.
2 Study Case
2.1 Simulations
Simulations were conducted with a 3D electromagnetic simulation tool CST Studio Suite
software [21], which uses the finite integration technique. A planar layer tissue model,
which is presented in Fig. 1, was used in the simulations. The thicknesses of the tissue
layers are selected according to the thicknesses of tissue layers of the meat piece 1 used
in the measurements. These thicknesses are presented in Table 1 in Subsect. 2.2
In this study, we use two types of antennas. The first one is a directional cavity backed
UWB on-body antenna, shown in Fig. 2a, which was introduced in [22]. It is designed
for on-in body communications for the frequency band 3.75–4.25 GHz which meets
the IEEE 802.15.6 standards requirements [23]. Its dimensions with the cavity are x =
83 mm, y = 49.5 mm, and z = 19.62 mm, where x and y are width and length, respectively
and z is towards the body. The size of the antenna itself is x = 47.5 mm, y = 47.5 mm.
The second antenna is a loop antenna, shown in Fig. 2b, which is introduced in [24].
The loop antenna is omni-directional antenna UWB antenna, having large bandwidth
3.1–10.6 GHz and it is originally designed for on-body communications. The size of the
antenna is 43 mm x 46 mm. In this initial study, the loop antenna is used to resemble
the in-body antenna, since in the simulations, it was noticed to achieve similar path loss
On the UWB in-Body Propagation Measurements Using Pork Meat 21
Fig. 2. Antennas used in this study: a) cavity backed low-UWB on-body antenna, b) loop antenna.
values as the implant (capsule endoscope) antenna [25], for which a prototype was not
available.
2.2 Measurements
Measurements were conducted using two different types of porcine pieces which are
presented in Figs. 3a–b. Both pieces had skin, outer fat, muscle and inner fat layers. In
Fig. 3. a) Meat 1 with interlaced fat and muscle layers, b) Meat 2 with distinct muscle and fat
layers.
22 M. Särestöniemi et al.
the first meat piece, which is referred to as Meat1, the fat and muscle layers are interlaced
so that there are “fat tunnels” going through the muscle layer. Meat2 has distinct fat and
muscle layers. Both meat pieces have thickness of 3 cm. The thickness of the tissues
layers for Meat1 and Meat2 below the antennas are presented in Table 1.
The measurements were conducted with a Vector Network Analyzer (VNA) 8720ES
in measurement laboratory premises at the University of Oulu, Finland. The meat pieces
were set individually inside a cube form area made by absorber pieces to avoid signal
interference from the surrounding environment as well as minimize the propagation
overflow from the sides of meat pieces. Meat piece was set inside a thin plastic bag to
protect the antennas and the absorbers. The picture of the measurement setup is presented
in Fig. 4.
Fig. 4. a) Measurement setup before closing the back and front walls, b) on-body antenna with
meat piece
The aim of this section is to verify usability of the loop antenna on the measurement based
in-body propagation studies. This verification is conducted by comparing simulated
channel characteristics obtained using an implant antenna [25] and a loop antenna [24]
as the in-body antenna. The simulations are conducted using the planar tissue layer model
since the pork meat piece also resembles planar layer model. The aim of this comparison
is to show that loop antenna can be considered as an alternative in the measurements
when using layer meat pieces. Figure 5 presents comparison between the frequency
and time domain channel characteristics obtained using a capsule antenna and the loop
antenna in the simulations. Figure 5a presents the S21 for the whole simulated frequency
range and Fig. 5b the zoomed version of Fig. 5a for the frequency band of interest 3.75–
4.25 GHz. Figure 5c presents channel impulse responses obtained applying inverse fast
On the UWB in-Body Propagation Measurements Using Pork Meat 23
Fourier transform (IFFT) for the simulated band. As one can note from Figs. 5a-b, the
path loss difference is minor between the results obtained using the capsule antenna and
the loop antenna within frequency range of interest. However, outside the frequency
range of interest the differences are larger.
In time domain, the main peaks of the IRs are at the same level, though the main
peak is clearly wider with the loop antenna. From the results it can be concluded that
loop antenna can be used as in-body propagation studies in the measurements.
Fig. 5. Simulation based comparison of channel characteristics obtained using a loop antenna
and a capsule endoscope implant antenna [25]: a) S21s for the whole simulated bandwidth, b) S21
for the frequency range of interest, and c) impulse responses.
On the UWB in-Body Propagation Measurements Using Pork Meat 25
Fig. 6. S11 parameters with a) on-body antenna, b) loop antenna (in-body antenna) obtained with
simulation model having dielectric properties of human tissues and pork tissues.
The frequency and time domain channel characteristics are presented in Figs. 7a–
b, respectively. As it is noted, difference in the dielectric properties of human and pork
tissues have clear impact on the channel characteristics: within the simulated bandwidth,
the path loss is up to 8 dB higher with pork tissues until 3.25 GHz than with the human
tissues. Instead, from 3.5 GHz onwards, i.e. also within the frequency range of interest
3.75–4. 25 GHz, the path loss is higher with human tissues.
26 M. Särestöniemi et al.
Fig. 7. Comparison between the differences of human and pork tissues: a) S21 parameters, b)
IRs obtained by performing IFFT for whole the frequency bandwidth, and c) IRs obtained by
performing IFFT for whole the frequency band of interest 3.75–4.25 GHz.
On the UWB in-Body Propagation Measurements Using Pork Meat 27
In time domain, as the IFFT is performed for the whole simulated bandwidth, the
difference can be seen mainly in within the time range of 1–2 ns, where the level of the
channel taps is higher with the human tissues than with the pork tissues. However, as it
was pointed out that S21 is higher with pork tissues at the frequency range of interest,
it is important to study impulse response also with the filtered S21. The IR obtained by
performing IFFT only for the frequency range 3.75–4.25 GHz, is presented in Fig. 7c. In
this case, it can be clearly seen that the IR peaks are 1–3 dB stronger with pork tissues.
Even the difference in the main peaks in almost 3 dB.
5 Measurement Results
5.1 Channel Comparison with Different Meat Pieces
In this section, the frequency and time domain channel characteristics are evaluated and
compared using Meat1 and Meat2, which both have thickness of 3 cm. The aim is to
Fig. 8. Reflection coefficient for a) on-body antenna, b) the loop antenna within the tissues with
Meat1 and Meat2.
28 M. Särestöniemi et al.
observe how the meat constitution, i.e. whether the fat and muscle layers are interlaced
or separated, have impact on the channel characteristics.
Firstly, the antenna reflection coefficients are on-body and the loop antenna are
studied when located on or below the pork pieces Meat1 and Meat2. The reflection
coefficients for the on-body antenna is presented in Fig. 8a and for the loop antenna in
Fig. 8b. Antenna reflection coefficients for the on-body antenna are very similar with
both meat pieces, since the skin thickness and outer fat thickness are same with both
meats. Instead, one can note differences in the reflection coefficients of the loop antenna,
which is located below the meat pieces. This is due to the different tissue constitution of
these different pork meats: there is more fat on the inner surface of Meat1 whereas more
muscle tissues on the inner surface of Meat2. The differences in the antenna matching
are noteworthy only at 1.5 GHz and 2.5 GHz, which however, are out of the frequency
range of interest. The antenna matching at 3.75–4.25 GHz is relatively same with both
meat pieces.
Next, the channel characteristics are studied. Frequency domain channel character-
istics, i.e. S21 parameters, and time domain channel characteristics, i.e. channel impulse
responses, are presented in Figs. 9a–b. As one can note, there is a clear level difference in
the frequency and time domain channel characteristics obtained using Meat 1 and Meat
2 in the measurements. In frequency domain, the level difference is clearest at 1.5 GHz
and 3 GHz which, however, are out of the frequency range of interest. At the on-body
antenna’s operational frequency range, 3.75–4.25 GHz, the level difference is at highest
10 dB, except at 3.75 GHz there is a large notch with Meat1. In time domain, the main
difference is observed in the level and width of the main peak. The difference is also in
this case at highest 10 dB.
The differences in the channel characteristics obtained using Meat1 and Meat2 are
partly explained by differences in the antenna matching. However, the main difference
comes from the different propagation paths due to different tissue composition. Fat
is known to be one of the “easiest” tissue for UWB signal propagation in terms of
propagation time and power loss [19, 20], hence, Meat1 having “fat tunnels” through
the muscle layer appear to be clearly easier meat piece to propagate through.
Fig. 9. a) Frequency domain and b) time domain comparison of channel characteristics obtained
using Meat1 and Meat2.
30 M. Särestöniemi et al.
Fig. 10. Comparison between the antenna and channel characteristics at 12 °C and 37 °C temper-
ature: a) S11 parameters for on-body antenna, b) S21 parameters, and c) IRs obtained performing
IFFT for the whole frequency bandwidth.
On the UWB in-Body Propagation Measurements Using Pork Meat 31
7 Conclusions
Acknowledgement. This work is supported in part by the projects WBAN Communications in the
Congested Environments (MeCCE), the Academy of Finland 6Genesis Flagship (grant 318927)
and the European Union’s Horizon 2020 programme under the Marie Sklodowska-Curie grant
agreement No. 872752. Dr. Marko Sonkki is acknowledged for his participation on the on-body
antenna design.
32 M. Särestöniemi et al.
References
1. Pathinarupothi, R.K., Durga, P., Rangan, E.S.: IoT based smart edge for global health: remote
monitoring with severity detection and alerts transmission. IEEE Internet of Things J. 6,
2449–2462 (2019). Eraly Access
2. Schires, E., Georgiou, P., Lande, T.S.: Vital sign monitoring through back using an uwb
impulse radar with body coupled antennas. IEEE Trans. Biomed. Circuits Syst. 12, 292–302
(2018)
3. Leelatien, P., Ito, K., Saito, K., Sharma, M., Alomainy, A.: Channel characteristics and wire-
less telemetry performance of transplanmted organ monitoring system using ultrawideband
communication. IEEE J. Electromagn. RF Microw. Med. Biol. 2, 94–101 (2018)
4. Ciuti, G., Menciassi, A., Dario, P.: Capsule endoscopy: from current achievements to open
challenges. IEEE Rev. Biomed. Eng. 4, 59–72 (2011)
5. Bchir, O., ben Ismail, M.M., AlZahrani, N.: Multiple bleeding detection in wireless capsule
endoscopy. Signal Image Video Process. 13(1), 121–126 (2018)
6. Demir, A.F.: Anatomical region-specific in vivo wireless communication channel character-
ization. IEEE J. Biomed. Health Inform. 21(5), 1254–1262 (2017)
7. Garcia-Pardo, C., et al.: Experimental ultra wideband path loss models for implant communi-
cations. In: 2016 IEEE 27th Annual International Symposium on Personal Indoor and Mobile
Radio Communications (PIMRC), pp. 1–6 (2016)
8. Andreu, C., Castelló-Palacios, S., Garcia-Pardo, C., Fornes-Leal, A., Vallés-Lluch, A., Car-
dona, N.: Spatial in-body channel characterization using an accurate UWB phantom. IEEE
Trans. Microw. Theory Tech. 64(11), 3995–4002 (2016)
9. Surowiec, A., Stuchly, S., Swarup, A.: Radiofrequency dielectric properties of animal tissues
as a function of time following death. Phys. Med. Biol. 30(10), 1131–1141 (1985)
10. Karacolak, T., Cooper, R., Unlu, E.S., Topsakal, E.: Dielectric properties of porcine skin tissue
and in vivo testing of implantable antennas using pigs as model animals. IEEE Antennas Wirel.
Propag. Lett. 11, 1686–1689 (2012)
11. Shimizu, Y., Anzai, D., Chavez-Santiago, R., Floor, P.A., Balasingham, I., Wang, J.: Perfor-
mance evaluation of an ultra-wideband transmit diversity in a living animal experiment. IEEE
Trans. Microw. Theory Tech. 65(7), 2596–2606 (2017)
12. Floor, P.A., et al.: In-body to on-body ultrawideband propagation model derived from mea-
surements in living animals. IEEE J. Biomed. Health Inform. 19(3), 938–948 (2015). https://
doi.org/10.1109/JBHI.2015.2417805
13. Thotahewa, K.M.S., Redoutè, J., Yuce, M.R.: Propagation, power absorption, and tempera-
ture analysis of UWB wireless capsule endoscopy devices operating in the human body. IEEE
Trans. Microw. Theory Tech. 63(11), 3823–3833 (2015). https://doi.org/10.1109/TMTT.
2015.2482492
14. Novak, O., Brown, R.B.: An empirical model of UWB large-scale signal fading in neocor-
tical research. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS),
Montreal, QC, pp. 2439–2442 (2016). https://doi.org/10.1109/ISCAS.2016.7539085
15. Gabriel, C., Gabriel, S., Corthout, E.: The dielectric properties of biological tissues: I.
Literature survey. Phys. Med. Biol. 41, 2231–2249 (1996)
16. Ley, S., Schilling, S., Fiser, O., Vrba, J., Sachs, J., Helbig, M.: Ultra-wideband temperature
dependent dielectric spectroscopy of Porcine tissue and blood in the microwave frequency.
MDPI Sensors 19(7), 1–21 (2019). Special Issue on Microwave Sensors for Biomedical
Applications
17. Peyman, A., Gabriel, C.: Cole-cole parameters for dielectric properties of porcine tissues as
a function of age at microwave frequencies. Phys. Med. Biol. 55, N413 (2010)
On the UWB in-Body Propagation Measurements Using Pork Meat 33
18. Ngadi, M., Dev, S., Raghavan, V.G.S., Kazemi, S.: Dielectric properties of pork muscle. Int.
J. Food Prop. 18, 12–20 (2015)
19. Särestöniemi, M., et al.: Fat in the abdomen area as a propagation medium in WBAN appli-
cations. In: Mucchi, L., Hämäläinen, M., Jayousi, S., Morosi, S. (eds.) BODYNETS 2019.
LNICST, vol. 297, pp. 175–187. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-
34833-5_15
20. Asan, N.B., Hassan, E., Shah, J., Noreland, D., Blokhuis, T., Augustine, R.: Characterization
of the fat channel for intra-body communication at R-band frequencies. Sensors 18(9), 2752
(2018)
21. CST Microwave Studio. http://www.cst.com
22. Kissi, C., Särestöniemi, M., Pomalaza-Raez, C., Sonkki, M., Srifi, M.N.: Low-UWB directive
antenna for wireless capsule endoscopy localization. In: Sugimoto, C., Farhadi, H., Hämäläi-
nen, M. (eds.) BODYNETS 2018. EICC, pp. 431–442. Springer, Cham (2020). https://doi.
org/10.1007/978-3-030-29897-5_38
23. IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area
Networks. IEEE Std 802.15.6-2012, pp. 1–271 (2012)
24. Tuovinen, T., Yazdandoost, K.Y., Iinatti, J.: Comparison of the performance of two different
UWB antennas for the use in WBAN on-body coimmunications. In: European Conference
on Antennas and Propagation (EUCAP2012) (2012)
25. Särestöniemi, M., Pomalaza-Raez, C., Berg, M., Kissi, C., Hämäläinen, M., Iinatti, J.: In-
body power distribution for abdominal monitoring and implant communications systems. In:
ISWCS, September 2019 (2019)
26. https://www.itis.ethz.ch/virtual-population/tissue-properties/database/dielectric-properties
Detection of Brain Hemorrhage in White Matter
Using Analysis of Radio Channel Characteristics
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 34–45, 2020.
https://doi.org/10.1007/978-3-030-64991-3_3
Detection of Brain Hemorrhage in White Matter Using Analysis 35
1 Introduction
Brain hemorrhage/stroke is a fatal physical condition, which may cause severe disability
or even death, and thus it is essential to be diagnosed in its early phase. Current method
for detecting hemorrhage and stroke in the brain is practically limited to computing
tomography (CT) and magnetic resonance imaging (MRI). They are expensive and
complex techniques and can be used only in central hospitals. Consequently, there is
a strong need for a wearable and easy to use technique for fast detection of hemorrhage
and stroke already outside hospital. In the literature, there are microwave-based studies
presenting hemorrhage detection [1–12]. Most of them are based on detecting changes
in the antenna return loss, which has restrictions. For instance, hemorrhage located
deep inside the brain white matter cannot be detected reliably with return loss analysis.
Besides, several evaluations in the literature are conducted with the large antennas,
which are not suitable for practical portable applications. The idea of helmet type brain
hemorrhage detection device was originally presented in [13] which would measure
channel parameters between the antennas located in different sides of the head. However,
Ref. [13] presents only the idea, not any measurement or simulation results.
Most of the simulation-based studies in the literature are conducted using simplified
head models. There is a lack of studies presenting radio channel characteristics-base brain
hemorrhage detection, which would have been conducted using a realistic voxel model
and directive antennas. Besides, there is lack of studies presenting brain hemorrhage
detection in the white matter.
This study focuses detecting brain hemorrhage in the white matter in the middle part
of the brain, since it is considered the most challenging part for hemorrhage detection.
The paper involves propagation studies in the head area aiming at detection of hem-
orrhage and stroke using radio channel characteristics analysis. Hemorrhage detection
could be done by using a simple, portable helmet type of monitoring device in which
several transmitter and receiver antennas are located inside the helmet. The diagnosis
could be done by setting the helmet in the patient’s head, measuring and analysing the
radio channel characteristics, and hence the diagnosis could be done outside the hospital
in ambulance or even in patient’s home which is important for rural area health care.
Hence, the medical treatment could be started immediately, and prospects of cure could
be significantly improved.
The physical phenomenon behind the proposed technique is that blood have different
dielectric properties than the brain matter (grey and white), as shown in Table 1 [14].
Especially the relative permittivity of the blood is significantly higher than that of the
brain matters. Thus, blood area inside brain change propagation and channel charac-
teristics between the transmitter and receiver antennas, which are located in different
sides of the head. Since the propagation losses in the tissues are relatively high, strongly
directive antennas should be used so that the received signal is on the level in which the
changes caused by hemorrhage can be still detected.
The objective of this paper is to present electromagnetic simulations-based study on
the detection of brain hemorrhage in white matter using radio channel characteristics
analysis. CST Simulia Studio Suite [15], which is based on finite integration technique,
is used in the simulations. CST’s anatomical voxel model Hugo is chosen for these
evaluations since it has detailed brain structure with separate grey and white matters.
36 M. Särestöniemi et al.
The aim is to show how brain hemorrhage with different sizes and different locations can
be detected using a directive on-body antenna designed for in-body communications.
Even hemorrhages in the middle of the white matter can be detected with this method.
2D power flow illustration and power values at different locations inside the brain of the
voxel show how the blood areas change the propagation. Besides, power loss calculations
are presented to show the difference between the hemorrhage and reference cases.
The paper is organized as follows: Sect. 2 presents Study case by describing the
antenna and simulation model used in this study. Power flow presentation are illustrated
in Sect. 3. Channel evaluations are presented in Sect. 4, and Conclusions are given in
Sect. 5.
2 Study Case
Fig. 2. Reflection coefficient S11 of the mini horn antenna as located on the skin.
The simulations were carried out using the CST studio suite, which is based on the
finite integration technique. Two different simulation models were used in this study:
a spherical tissue layer model and CST’s anatomical Hugo voxel model, which are
presented in Figs. 3a–b, respectively. The spherical layer model is a full sphere, which
consists of several different nested tissue spheres, each layer having realistic thicknesses.
The thicknesses are presented in Table 2. The anatomical voxel model Hugo has the
detailed brain model with separate grey and white matters having realistic shapes. The
resolution of the Hugo voxel is 1 mm × 1 mm × 1 mm.
Antennas are located on the skin in the middle of the head, as shown in Fig. 4. For this
study case, we chose the widest part in the head where the muscle layer is thickest since it
can be seen as to the most challenging location in terms of radio signal propagation. The
diameter of the voxel model’s head is 16 cm in this location and thus also the diameter
of the spherical model is set 16 cm.
38 M. Särestöniemi et al.
Fig. 3. a) Spherical layer model and b) Hugo voxel model with horn-antennas placed on the skin.
Bio-matched mini-horn antennas are designed to work so that they are completely
attached to the skin [16]. Although the resolution of Hugo voxel is small, pixelization
may have strong impact on the antenna and channel characteristics, as explained in [17].
Thus, the non-smoothness of the voxel skin surface is compensated by inserting thin
skin layer in front of the antenna so that it overlaps with the voxel’s non-smooth skin
surface.
The possibility to detect brain hemorrhage is studied by inserting blood pieces of
different sizes in the voxel model’s brain white matter. The sizes with the corresponding
dimensions are summarized in Table 2. The blood pieces and their locations are presented
in Fig. 4 for the spherical layer model and in Fig. 5 for the voxel model. The spherical
model is evaluated with the large piece in two different locations, whereas the voxel
model is evaluated with large, medium, and small pieces, which are located in the middle
of the brain.
Fig. 5. Different sizes of brain hemorrhages in the cross-cut of the voxel model.
In this section, the power flow from the transmitter antenna to the receiver antenna is
presented to understand how the hemorrhage change the propagation inside the brain
tissues. Power flow representation at 1.7 GHz with and without the hemorrhage are
presented in Figs. 6a–b, respectively. The dB range for the power flow presentation is
0–−65 dB, where the reference 0 dB level is set to the antenna. Power flow on the skin
is −26 dB.
From Figs. 6a–b one can note clear differences between the cases with and without
the hemorrhage. In the presence of hemorrhage, the power flow is narrower. Within the
plotted dB range, the Rx antennas is achieved easily in the reference case, whereas in
the case of hemorrhage, the Rx antenna is hardly achieved. The differences in the power
flows are due to the differences between the dielectric properties between the blood and
40 M. Särestöniemi et al.
Fig. 6. Power flows at 1.7 GHz a) in the reference case, b) in the hemorrhage case, c) points A-E
where power is measured.
brain tissues. Blood has clearly higher permittivity than the brain matters (grey/white)
and thus, the power loss is larger in the presence of hemorrhage.
Table 3 presents the comparison between the power loss values obtained with the
reference model and the hemorrhage model in the locations depicted in Figs. 6c. In
the location A, which is close to the Rx antenna, the instant power flow value for the
reference model at the selected cross-cut is 2 dB higher than that of the hemorrhage
model. In point B, the power loss with the hemorrhage model is 6.5 dB higher than with
the reference model. Interestingly, at point C, the reference model has higher power loss
although the power inside the blood area is expected to be smaller. However, at point
D, there is no difference between the hemorrhage and reference cases. Instead, at the
point E, the difference is the power loss being higher with the hemorrhage model. It is
interesting to note that the blood properties affect the power inside the hemorrhage, and
this requires further studies.
Detection of Brain Hemorrhage in White Matter Using Analysis 41
As a comparison, power loss is calculated with Matlab based on planar model prop-
agation. The calculation utilises an extension of the algorithm that includes lossy media
proposed by Orfanides [16]. The tissue thicknesses as well as calculated power loss
values in the presence of large size hemorrhage are presented in Table 4. As one can
note, the power loss difference is significant between the hemorrhage and the reference
case: in the presence of the hemorrhage having a large size, the loss is 9 dB higher
at 1.7 GHz. However, in the power flow evaluations presented above, the difference is
milder. The difference is due to the more complex structure of the voxel model, which
enables alternative propagation paths than just a direct path through the tissues, which
are on the direct line between the transmitter and the receiver antennas. However, power
loss values obtained using Matlab provides good reference showing clearly the impact
of the blood on the channel characteristics.
First, the channel characteristics are evaluated with the spherical model in the presence
and absence of blood. Channel parameters S21 s obtained using the reference model and
the hemorrhage model are presented in Fig. 7. Hemorrhage location middle and left
are included. As it can be seen, blood in both brain areas cause clear differences in
the channel characteristics, especially in the frequency range 2.5–4 GHz. However, at
lower frequencies 1.3–2 GHz one can note differences in the channel responses as well
though the differences are milder, approximately 1.5 dB in this case. The closer the
modelled hemorrhage area is to the antenna, the clearer is the difference. Interestingly,
S21 obtained with the reference model is at clearly higher level than S21 of the models
with blood pieces only in the frequencies 2.5 GHz onwards. At lower frequencies it is
vice versa at certain frequencies. When comparing the dielectric properties of the blood,
grey and white matter, one can note that within the simulated frequency range, the
relativity permittivity of the blood is clearly higher than those of brain matters. Instead,
the conductivity values are higher for the blood area.
Fig. 7. S21 comparison with the spherical layer model as the hemorrhage is in the middle of the
brain and in the left part of the brain.
Next, the S21 s obtained using the voxel model in the reference case and hemorrhage
case are compared. The results are presented in Fig. 8. As it can be seen, the S21 of the
reference model is at higher level than the S21 of the hemorrhage model at most of the
frequencies, as expected from the power loss calculations. However, at e.g. 2.6 GHz,
the S21 of the reference case is at lower level and the case of largest hemorrhage is at
highest level. Obviously, the difference on dielectric properties of blood and brain matters
have variation depending on the frequency. Thus, it is important to select carefully the
frequency range used for this technique.
Detection of Brain Hemorrhage in White Matter Using Analysis 43
Fig. 8. S21 channel parameters obtained using the voxel model with different sizes of hemorrhage.
The zoomed version of the S21 results at lower frequencies are presented in Fig. 9.
As one can note, even at lower frequencies the difference is 1–5 dB, which is clearly
detectable in the practical solutions.
5 Conclusions
Detection of the brain hemorrhage in its early face is essential for the better prospects of
cure. This paper presented a simulation -based study of detecting brain hemorrhage in
the white matter using radio channel characteristics analysis, which could be realized in
a portable and compact helmet type of structure with several small mini-horn antennas
inside. The study is conducted by using the electromagnetic simulation software CST and
two different simulation models: a spherical tissue layer model and an anatomical voxel
model. The bio-matched mini-horn antennas designed for implant communications were
used in this study.
44 M. Särestöniemi et al.
The idea of this technique was to utilize the fact that blood has different dielectric
properties than brain’s white and grey matters and, thus, additional blood areas inside
the brain change the radio channel characteristics between the transmitter and receiver
antennas located on opposite sides of the head. This initial study showed how even small
sizes of hemorrhage can change the radio channel characteristics even when hemorrhage
is located in the middle of the brain, in the white matter. The path loss difference was
0.5–15 dB between the reference and hemorrhage cases depending on the frequency.
Power flow studies at 1.7 GHz revealed interesting phenomenon: although the power
loss is expected to be larger in the presence of blood, the power inside the certain
part of the hemorrhage area was noted to be higher than in the respective location
without the blood. This is one of the future topics we are aiming to solve. Besides, other
future work objectives include more detail studies on the impact of the hemorrhage in
different frequencies and with several antennas to maximize visibility of the difference.
Optimal antenna locations will be determined as well. Furthermore, different sizes of
the head models will be used in the studies. Moreover, radio channel measurements will
be conducted using a real human skull filled with phantom liquids [17] for brain matter
and blood and prototypes of the bio-matched mini-horn antenna.
A practical solution of this hemorrhage detection technique could be a helmet type
of structure having several small sized antennas around the internal part of the helmet.
The brain hemorrhage could be detected analyzing channel characteristics of different
antenna combinations. The benefit of helmet type of brain hemorrhage detector would
be its easy use e.g. in ambulance. This would enable the early detection of hemorrhage
in its early phase and hence, improve prospects of the cure significantly even for the
patients living in rural areas far away from the hospitals.
The side effects and risks related to the radio channel analysis-based hemorrhage
detection techniques are minor since the measurement itself is very fast and thus, the
exposure for radiation is minor. Besides, input power can be kept low to meet the Specific
Absorption Requirements (SAR) for the antennas.
Acknowledgement. This research has been financially supported by the project WBAN Com-
munications in the Congested Environments and in part by Academy of Finland 6Genesis Flag-
ship (grant 318927) and Academy of Finland grant 318347. This project has received funding
from the European Union’s Horizon 2020 research and innovation program under the Marie
Sklodowska-Curie grant agreement No. 872752
Bio-matched mini-horn antenna was re-modeled by Mikko Parkkila and Uzman Ali from
Radientum, which is greatly acknowledged.
References
1. Wang, D.-D., Chen, D.-Y., Luan, H.-S., Peng, H.-L.: A new method for transcranial vortex
microwave beam imaging. In: 2018 International Conference on Microwave and Millimeter
Wave Technology (ICMMT), pp. 1–3 (2018)
2. Abbosh, A.: Microwave systems for head imaging: challenges and recent developments. In:
2013 IEEE MTT-S International Microwave Workshop Series on RF and Wireless Technolo-
gies for Biomedical and Healthcare Applications (IMWS-BIO), Singapore, pp. 1–3 (2013).
https://doi.org/10.1109/IMWS-BIO.2013.6756184
Detection of Brain Hemorrhage in White Matter Using Analysis 45
3. Zamani, A., Abbosh, A.M., Mobashsher, A.T.: Fast frequency-based multistatic microwave
imaging algorithm with application to brain injury detection. IEEE Trans. Microw. Theory
Tech. 64(2), 653–662 (2016). https://doi.org/10.1109/TMTT.2015.2513398
4. Mobashsher, A.T., Mahmoud, A., Abbosh, A.M.: Portable wideband microwave imaging
system for intracranial hemorrhage detection using improved back-projection algorithm with
model of effective head permittivity. Sci. Rep. 6(20459), 1–17 (2016)
5. Li, J., Peng, H.L., Zong, B.Q., Yu, Z.: A dual-polarized impulse radiation antenna for cerebral
hemorrhage detection applications. In: 2014 IEEE MTT-S International Microwave Workshop
Series on RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-
Bio2014), London, pp. 1–3 (2014)
6. Huang, D., Peng, H.L., Li, X., Jin, W., Mao, J.: A near-field spherical layered human head
model for stroke detections. In: Asia-Pacific Microwave Conference (APMC), Nanjing, pp. 1–
3 (2015)
7. Fear, E.C., Li, X., Hagness, S.C., Stuchly, M.A.: Confocal microwave imaging for breast
cancer detection: localization of tumors in three dimensions. IEEE Trans. Biomed. Eng.
49(8), 812–822 (2002)
8. Ireland, D., Bialkowski, M.: Microwave head imaging for stroke detection. Prog. Electromagn.
Res. 21, 163–175 (2011)
9. Tang, Z., Peng, H.L., Zhong, Y., Mao, J.F.: A novel antenna array for stroke enhanced
detection. In: 2015 Asia-Pacific Microwave Conference (APMC), Nanjing, pp. 1–3 (2015)
10. Mesri, H.Y.: Localization of hemorrhage site in stroke patients using multichannel microwave
measurements. In: 2012 Annual International Conference of the IEEE Engineering in
Medicine and Biology Society, San Diego, CA, pp. 5927–5930 (2012). https://doi.org/10.
1109/embc.2012.6347343
11. Stancombe, A.E., Bialkowski, K.S., Abbosh, A.M.: Portable microwave head imaging system
using software-defined radio and switching network. IEEE J. Electromagn. RF Microw. Med.
Biol. 3(4), 284–291 (2019). https://doi.org/10.1109/JERM.2019.2901360
12. Mobashsher, A.T., Abbosh, A.M., Wang, Y.: Microwave system to detect traumatic brain
injuries using compact unidirectional antenna and wideband transceiver with verification on
realistic head phantom. IEEE Trans. Microw. Theory Tech. 62(9), 1826–1836 (2014). https://
doi.org/10.1109/TMTT.2014.2342669
13. Fhager, A., Persson, M.: Stroke detection and diagnosis with a microwave helmet. In: 2012
6th European Conference on Antennas and Propagation (EUCAP), Prague, pp. 1796–1798
(2012). https://doi.org/10.1109/eucap.2012.6206715
14. https://www.itis.ethz.ch/virtual-population/tissue-properties/database/dielectric-properties
15. Blauert, J., Kiourti, A.: Bio-matched horn: a novel 1–9 GHz on-body antenna for low-los
biomedical telemetry with implants. IEEE Trans. Antennas Propag. 67(8), 5054–5062 (2019)
16. Orfanidis, J.: Electromagnetic Waves and Antennas (2002). Revised 2016. http://www.ece.
rutgers.edu/~orfanidi/ewa/
17. Hakala, J., Kilpijärvi, J., Särestöniemi, M., Hämäläinen, M., Myllymäki, S., Myllylä, T.:
Microwave sensing of brain water - a simulation and experimental study using human brain
models. IEEE Access 8, 111303–111315 (2020)
UWB Microwave Imaging for Inclusions
Detection: Methodology for Comparing Artefact
Removal Algorithms
1 Introduction
In recent years, there has been considerable interest into research in the field of medi-
cal imaging. Current imaging techniques are advanced and can produce images of high
clarity within a variety of tissue mediums. Medical professionals can draw on a range of
technologies to assist with diagnosis depending on the suspected inclusion to be detected
or the body part being imaged. Each technology has its own advantages and disadvan-
tages. There are several techniques currently used for diagnosis purposes. Ultrasound
scanners are cost-effective and successful in the medical diagnosis of areas of high con-
trast in soft tissues, hence their use in prenatal imaging and detection of various cancers.
However, ultrasound is not a reliable technique for imaging air spaces, hard tissue such
as bone/skull and providing definition in similar contrasting tissues. Computed Tomog-
raphy (CT) is very good at imaging hard tissues but requires a substantial dose of ionising
radiation. Magnetic Resonance Imaging (MRI) does not expose the patient to ionising
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 46–58, 2020.
https://doi.org/10.1007/978-3-030-64991-3_4
UWB Microwave Imaging for Inclusions Detection 47
radiation but does require them to stay still inside a claustrophobic space for a long time
(up to hours). MRI and CT Scan devices are also expensive and not portable (owing to
the pertinent dimensions of the devices), nor are they usable at rural medical centres, or
carried by First Response Services (FRS) which are seen as essential for saving a person
experiencing stroke. There is therefore an opportunity for research into a non-ionising,
non-invasive, portable and cost-effective alternative.
Ultra-Wideband (UWB) technology has already proved successful in a number of
areas related to health monitoring. The non-invasive nature of the signals and the suc-
cess at detecting changes quickly in the wireless medium has proven effective in health
monitoring through movement detection [1]. Recent research has also shown the suc-
cessful detection of lesions which have different dielectric properties to the surrounding
medium using UWB Microwave imaging [2]. This holds the potential for detections of
cancer and stroke [3–5].
Current UWB microwave imaging methods rely on algorithms to process the electric
field measured at various points around the perimeter of an object. With all the algorithms
used there is the risk of inaccurate results due to reflections of the transmitting signal and
unwanted reflections of signals from the surrounding tissues. These unwanted signals
are known as ‘artefacts’ [6]. For the successful application of any imaging apparatus, a
reliable artefact-removal algorithm is necessary.
This study will explore a methodology for analysing and comparing a variety of
methods for removing artefacts, using several imaging and signal processing metrics to
provide a weighted Image Quality Index.
2 Theoretical Framework
Previous study focussing on breast cancer imaging [7] has identified that microwaves
respond differently if they hit tissues which have different dielectric properties. By
using UWB across microwave frequencies, it is possible to produce images with enough
resolution to show inclusions. The same principle has been used to determine the contrast
between blood and brain matter to identify stroke in head-mimicking phantoms [8].
This study uses a technique explained in [9] which uses Huygens’ Principle (HP) to
forward propagate the waves [10]. This avoids having to solve complex inverse problems.
A simulated waveform is constructed using the principles laid out by Parrikar et al. [11],
which is transmitted from a line source external to the cylinder and received at a point on
the radius, external or at the edge of the cylinder. The electric field E can be calculated
by summing the known Electric Field Eknown at NPT points np on the perimeter using
Eq. (1). HP indicates the Huygens’ Principle method used and G refers to the use of
Green’s function.
NPT
EHP (r, φ; θ ; txm ; f ) = s known
Enp,tx m
G k1 rnp − r (1)
np=1
where (r, φ, θ ) ≡ r is the observation point, k1 represents the wave number of the
media constituting the cylinder, s is the spatial sampling, and txm is the transmitting
line source operating at frequency f .
48 J. Puttock et al.
An image is obtained by summing the solutions and mapping the intensity values.
With Nf frequencies fi , the intensity of the final image I can be obtained using Eq. (2).
1 Nf
I (r, φ, θ ; txm ) = f |EHP (r, θ, φ; txm ; f )|2 (2)
B i=1
the image obtained through Eq. (2) will show the inclusion.
For the purposes of real scenario medical imaging, Eq. (3) cannot be used. In [6], it
has been shown that this problem can be solved by producing a matrix of average values
of the electric field obtained when the inclusion is present. Measurements are taken from
multiple transmission sources and a mean value generated, which is subtracted from the
single transmitter data. This is explained mathematically in Eq. (4).
NPT
EHP (r, φ, θ ; txm ; f ) = s known
Enp,tx m
− avg M E known
np,txm × G k1 rnp − r (4)
np=1
The Average subtraction method represents just one method of obtaining an image
of the inclusion. Several methods have been proposed which replace the average matrix
with an alternative, such as the measurements from a neighbouring transmitter in the
case of Rotation Subtraction [6, 12], or by using a differential method of obtaining the
resulting image, as is the case in [2, 13, 14]. Variations on these techniques will be
simulated and compared in this study.
3 Methodology
For the simulations, an external cylinder was simulated with radius 7cm, relative dielec-
tric constant ∈ r = 10 and conductivity σ = 0.2 S/m. An internal cylindrical inclusion
was constructed with radius 0.5cm, relative dielectric constant ∈ r = 60, conductivity
σ = 2 S/m and located 2 cm from the centre of the external cylinder with an eccentricity
angle of − π4 radians. A simulation was run to construct the electric field at the perimeter
of the external cylinder. This field was simulated using MATLAB and generated a value
for the electric field at 80 points around the circumference for 1101 discrete frequencies
between 1 and 6.5 GHz. The normalised microwave image of such cylinder with an
inclusion can be seen in Fig. 1 (a). x and y values are in metres.
As can be seen in Fig. 1 (a), the electric field displays the reflection of the transmitter
signal on the right of the cylinder. The transmitting signal has been set as a line source
external to the cylinder at x = −0.2, y = 0. No evidence of the inclusion can be seen
in this image. This is because the reflected transmitter signal is greater by a significant
order of magnitude than the reflections from the inclusion.
UWB Microwave Imaging for Inclusions Detection 49
Fig. 1. (. a) Image of cylinder with an inclusion, and (b) without inclusion. (c) Ideal image
(constructed after employing Eq. (3)).
Figure 1(b) shows instead the image of the cylinder without the inclusion. Figure 1
(a) looks very similar to Fig. 1 (b). To detect the inclusion, Eq. (3) should be used before
performing imaging: such an image is given in Fig. 1 (c) and is used as an ‘Ideal Image’
for reference and comparisons.
This process is repeated with an inclusion at an eccentricity angle of π radians and the
images used as reference images for comparing subsequent experiments using different
pre-processing algorithms.
Average Subtraction (AS). The average subtraction method works by taking the results
from multi-transmitting sources (3 in this case) positioned slightly apart from each other
(4.5° in this case) on the perimeter of the cylinder, with the first transmitter x1 positioned
at x = −0.07, y = 0. When tabulating the (known) Electric Field at np points on the
perimeter, the data from transmission point x1 are placed into matrix A1 which has
dimensions made up by the number of frequencies × number of observation points. For
this series of experiments, 1101 discrete frequencies f are used at 80 observation points,
here denoted with φ, giving matrix A1 in Eq. (5).
⎡ ⎤
f1 φ1 · · · f1 φ80
⎢ ⎥
A1 = ⎣ ... ..
.
..
. ⎦ (5)
f1101 φ1 · · · f1101 φ80
The results from transmission points x2 and x3 are placed into matrices A2 and A3
respectively in a similar fashion. Next, the mean of each point is calculated, i.e. Aavg .
The resulting average matrix Aavg is then subtracted from the matrix of the first
transmitter A1 before performing imaging:
Rotation Subtraction (RS). The simulation is set up to replicate a signal from 2 trans-
mitters, placed 4.5° apart on the perimeter of the cylinder. The receivers, frequencies
and other input parameters remain the same as for the previous experiments. The image
is then constructed using matrix ERS , given as the following:
ERS = A1 − A2 (7)
where A1 and A2 are the results matrix from transmitter 1 and 2, respectively.
Na
for φ = 1 to with φ − 1 = Na for φ = 1
2
Na
for φ = + 1 to Na with φ + 1 = 1 for φ = Na
2
where Na is the number of receiving antennas, n is the transmitter index and A is the
original results matrix. This results in a Differential (Neighbouring Receiver Type) matrix
S. To such a matrix is then applied the Average Subtraction or Rotation Subtraction
methods.
Na
for φ = 1 to Na with Na + 1 = + 1 for φ = 1 and
2
Na Na
+ 1 = 1 for φ = + 1.
2 2
This results in a Differential (Symmetric Receiver Type) matrix S. To such a matrix
is then applied the Average Subtraction or Rotation Subtraction methods.
UWB Microwave Imaging for Inclusions Detection 51
Na
R(f , φ; n) = A(f , φ; n) − A f , + 2 − φ; n (11)
2
Na
for φ = 1 to +1
2
Na 3Na Na
with +2−φ = + 1 for φ = +1
2 4 4
3Na
R(f , φ; n) = A(f , φ; n) − A f , + 2 − φ; n (12)
2
Na
for φ = + 2 to Na
2
3Na Na 3Na
with +2−φ = + 1 for φ = +1
2 4 4
where Na is the number of receiving antennas, n is the transmitter index and A is the
original results matrix. The combined matrix C is then constructed by summing matrices
S and R.
C(i, j; n) = S(i, j; n) + R(i, j; n) (13)
This results in a Differential (Summed Symmetric Receiver Type) matrix. To such a
matrix is then applied the Average Subtraction or Rotation Subtraction methods.
Error Image. An Error image MErr is constructed by subtracting the ideal image XIdeal ,
from the image to be tested YTest .
Mean Square Error (MSE). The mean square error is the mean of all the squared
values of the errors in the error matrix. Squaring the values means that any negative
values become positive, so the absolute value is important. The average gives a single
value which is an indication of the error across the whole matrix.
1 N
MSE = MErr 2i (15)
N i=1
where N is the number of elements in the Error matrix MErr . The mean square error can
be calculated using MATLAB’s imaging toolbox and the command immse [15].
Polyshape Construction. To evaluate the shape of the inclusion, we set 0.75 as a thresh-
old on the normalised image, assigning every value above 0.75 to 1, and all others to
0. The resulting shape can then be obtained using MATLAB’s polyboundary and
polyshape functions [15].
Area Difference (ArD). This metric is related to the comparison between the size of
the target area for an ‘Ideal’ image and the size of the target area in the test image.
Centroid Difference (CD). To test the accuracy of the image at locating an inclusion,
the above Polyshape method was combined with MATLAB’s centroid function.
Comparison of accuracy can be made by assessing the Euclidean difference between the
centroid of an ideal image polyshape and the test image. This will assess how accurate
the location of the inclusion in the test image is. This is done using the MATLAB pdist
function [15].
Structural Similarity Index Metric (SSIM). The SSIM is an image quality metric
which gives a value between 0 and 1 which indicates the similarity between two images
(with 1 meaning the images are identical) [16]. This is calculated using the following
equation.
UWB Microwave Imaging for Inclusions Detection 53
(2 × x̄ × ȳ + C1) 2 × σxy + C2
SSIM = (17)
σx2 + σy2 + C2 x̄2 + ȳ2 + C1
where x is the reference image, y is the test image, x̄ and ȳ represent the corresponding
mean, σx and σy represent the corresponding variance, σxy is the covariance of the
reference and test image and C1 and C2 are small constants. MATLAB can calculate
the SSIM based on two input images using the ssim function [15]. This will output both
a value and a monochrome mapping which is a useful visual assessment of the quality
of the image. An example is shown in Fig. 2(e).
Average Difference (AvD). The average difference is a measure of the mean difference
in value between the Ideal Image and the test image. It is calculated by summing the
elements of the Error Matrix and dividing by the number of elements.
Image Quality Index (IQI). The above metrics provide several ways of quantifying the
precision, accuracy, and quality of the images to be constructed. Whilst these metrics are
useful, to aid in comparing the methods an overall quality index will be calculated. This
will be constructed by giving each of the metrics a score between 1 and 0 (with 1 being
a perfect image or match with the Ideal image). For many of these values, as they are
already being based on normalised results which will be between 0 and 1, it is relatively
simple to produce an appropriate score. For SNR, instead a comparison is made with
the Ideal Image. The value will approach 1 as it approaches the SNR value of the Ideal
image. The full metric Indexes I are shown in Eq. (18–23) with R representing the test
result value.
SNRR
ISNR = (19)
SNRIdeal
CDR
ICD = 1 − (22)
External Cylinder Radius
ArDR
IArD = 1 − (23)
External Cylinder Area
The overall Image Quality Index is then calculated by taking a weighted average of all
the indexes. The most useful metrics for our study will be ones that measure the accuracy,
precision, and quality of the image. Therefore, Area Difference Index IArD , Centroid
Difference ICD and Signal-to-Noise Ratio ISNR are each given a weighting of 0.25. The
SSIM value ISSIM provides a very useful measure of the contrast differences between
54 J. Puttock et al.
the test image and ideal image. This has been given a weighting of 0.15. The Average
Difference IAvD and Mean Square Error IMSE provide useful additional information
but are considered a less reliable assessment of quality as error value can easily be
influenced by the power of received signals without necessarily affecting the ability to
detect inclusions. These have therefore been given a weighting of 0.05 each. These values
have been chosen arbitrarily based on the measurement requirements of this project.
Fig. 2. Average Subtraction Results Images (a) Results Image, (b) Error Image, (c) Ideal Image,
(d) Results Polyshape, (e) SSIM Image and (f) Ideal Polyshape.
4 Results
The simulation was run using each of the 5 Artefact removal methods, with the differ-
ential methods being calculated using an Average Subtraction or Rotation subtraction
sub-method on the differential matrix. The results are presented for an inclusion at π
radians (Table 1) and for an inclusion at − π4 radians (Table 2). The experiment names
and metrics are expressed in abbreviated form. The Ideal SNR value was calculated
following the construction of the Ideal Images and had a value of approximately 7.4 dB.
The results images for an inclusion at − π4 radians are shown in Fig. 3. A subset of the
results images for Average Subtraction (AS) methods on an inclusion at π radians are
shown in Fig. 4.
UWB Microwave Imaging for Inclusions Detection 55
Fig. 3. Results Images for an Inclusion at − π4 radians. Top Row: Average Subtraction – (a) AS,
(b) DNR, (c) DSR, (d) SSR. Bottom Row: Rotation Subtraction – (e) RS, (f) DNR, (g) DSR, (h)
SSR.
56 J. Puttock et al.
Fig. 4. Average Subtraction results for an inclusion at π radians: (a) AS, (b) DNR, (c) DSR, (d)
SSR.
Summed Symmetric Differential method had the best Image Quality Index. The Signal-
to-Noise Ratio was the highest for this method in both positions and the contrast similarity
meant that this method also had a high SSIM in comparison to the other methods.
For an inclusion at π radians the Average Subtraction, Rotation Subtraction and Dif-
ferential (Symmetric Receiver Type) methods all scored highly in the Centroid Distance
metric. When the inclusion was at − π4 radians, the Summed Symmetric method had the
best Centroid Distance score.
The results show that the position of the inclusion can vastly influence the resulting
image, with every artefact removal method exhibiting differences in image quality when
the inclusion was moved. When the inclusion is at π radians, all images show a symmetric
split inclusion image. This is likely due to the inclusion being directly in front of the
transmitting source. As the image is split perfectly either side of the inclusion position,
the centroid distance (and to a lesser extent the Area Difference) remain accurate. The
SSIM is greatly affected though due to the difference in inclusion shape between the
test image and ideal image. In simulation, the source signal will hit the inclusion and
the highest peaks are observed as the signal reflections are ‘split’ by the inclusion. With
Average Subtraction and Summed Symmetric Differential methods, there is far greater
definition of the inclusion position. To avoid the inclusion position having an impact on
the result, multiple transmitter groups could be used. If five transmitter triplets are used,
such as in [4] with each transmitter within a triplet placed 4.5° apart and the triplets
placed equally around the perimeter of the cylinder to be imaged, the inclusion will
only ever be opposite a maximum of one transmitter triplet. If the results for each triplet
are summed, or a mean value taken, and then imaged the resulting image should have
improved the definition of the inclusion image, reflected artefacts will be minimised
and the dependency on inclusion position will be removed. However, as the Summed
Symmetric Differential methods had reflected artefacts which were separate from the
inclusion image, the effect of summing the results from multiple transmitters could
increase the quantity of artefacts seen for this method. Concerning computational time,
we found no significant difference among the algorithms used.
Whilst the Summed Symmetric method scored highly in this study, the experiments
were performed using simulated cylinders with significantly contrasting electrical prop-
erties. This was performed to prove the algorithms as a proof of concept against con-
trasting mediums. In a realistic scenario, such as brain stroke detection, the contrast will
UWB Microwave Imaging for Inclusions Detection 57
be less significant, thus artifacts could be more prominent, lowering SNR values. Future
studies should aim to use simulated data which equates the electrical properties closer to
that of human tissues. Further study using measured data and head-mimicking phantoms
would be an obvious progression from this study to assess the value in these methods.
It is also important to note that this study has also focused only on cylindrical
inclusions inside a cylinder. Further studies could explore the effect of changing the
shape and size of the inclusion.
The Image Quality Index provides a good metric for quantifying the quality of
images. By visually comparing the results images and the IQI, the score seems repre-
sentative of the quality of the image. For a more rigorous assessment of the IQI method,
future study could incorporate a comparison with subjective scoring by a sample of
medical professionals.
Acknowledgments. This project leading to this application has received funding from the Euro-
pean Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-
Curie grant agreement No. 793449.
This project has received funding from the European Union’s Horizon 2020 research and
innovation programme under the Marie Sklodowska-Curie grant agreement No. 872752.
References
1. Taylor, W., Shah, S.A., Dashtipour, K., Zahid, A., Abbasi, Q.H., Imran, M.A.: An intelligent
non-invasive real-time human activity recognition system for next-generation healthcare.
Sensors 20(9), 2653 (2020)
2. Klemm, M., Leendertz, A., Gibbins, D., Craddock, I.J., Preece, A., Benjamin, R.: Microwave
radar-based differential breast cancer imaging: imaging in homogenous breast phantoms and
low contrast scenarios. IEEE Trans. Antennas Propag. 58(7), 2337–2344 (2010)
3. Ghavami, M., et al.: UWB Device for Microwave Imaging: Validation through Phantoms. In:
13th European Conference on Antennas and Propagation, Krakow, Poland (2019)
4. Vispa, A., et al.: UWB device for breast microwave imaging: phantom and clinical validations.
Measurement 146, 582–589 (2019)
5. Sohani, B., et al.: Detection of haemorrhagic stroke in simulation and realistic 3-D human
head phantom using microwave imaging. Biomed. Signal Process. Control 61, 102001 (2020).
https://doi.org/10.1016/j.bspc.2020.102001
6. Elahi, M.A., Glavin, M., Jones, E., O’Halloran, M.: Artifact removal algorithms for microwave
imaging of the breast. Prog. Electromagnetics Res. 141, 185–200 (2013)
7. Lazebnik, M., et al.: A large-scale study of the ultrawideband microwave dielectric properties
of normal, benign and malignant breast tissues obtained from cancer surgeries. Phys. Med.
Biol. 52(20), 6093–6115 (2007)
8. Sohani, B., Tiberi, G., Ghavami, N., Ghavami, M., Dudley, S., Rahmani, A.: Microwave
imaging for stroke detection: validation on head-mimicking phantom. In: PIERS (Photonics
and Electromagnetics Research Symposium), Rome, Italy (2019)
9. Ghavami, N., Tiberi, G., Edwards, D.J., Monorchio, A.: UWB microwave imaging of objects
with canonical shape. IEEE Trans. Antennas Propag. 60(1), 231–239 (2012)
10. Enders, P.: Huygens’ principle as universal model of propagation. Latin American J.Phys.
Educ. 3(1), 19–32 (2009)
58 J. Puttock et al.
11. Parrikar, R.P., Kishk, A.A., Elsherbeni, A.Z.: Scattering from an impedance cylinder embed-
ded in a nonconcentric dielectric cylinder. IEEE Proc. H: Microwaves, Antennas Propag.
138(2), 169–175 (1991)
12. Klemm, M., Craddock, I.J., Leendertz, A., Preece, A., Benjamin, R.: Improved delay-and-
sum beamforming algorithm for breast cancer detection. Int. J. Antennas Propag. 2008, 9
(2008). Article ID 761402
13. Mustafa, S., Mohammed, B., Abbosh, A.: Novel preprocessing techniques for accurate
microwave imaging of human brain. IEEE Antennas Wirel. Propag. Lett. 12, 460–463 (2013)
14. Zamani, A., Abbosh, A.M.: Clutter rejection techniques for microwave head imaging. In: 2015
International Symposium on Antennas and Propagation (ISAP), Hobart, Australia (2015)
15. MATLAB Documentation Centre. https://uk.mathworks.com/help/documentation-center.
html Accessed 15 May 2020
16. Zhou, W., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error
visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
BSNCloud: Cloud-Centered Wireless Body
Sensor Data Collection, Streaming,
and Analytics System
Abstract. Cloud-assisted body area networks have been the focus of researchers
in past years as a response to the development of robust wireless body area net-
works (WBANs). While software such as Signal Processing in Node Environment
(SPINE) provide Application Programming Interfaces (APIs) to manage hetero-
geneous biomedical sensor networks, others have focused on developing tools
that address the issue of sensor connection/control, data receiving, and visualiza-
tion. However, existing software tools lack sufficient flexibility, scalability, and
support for complicated biomedical systems. In this paper, BSNCloud, a cloud-
centered heterogeneous and comprehensive wireless body sensor data collection,
streaming, and analytics framework is proposed. The system combines the sensor
control and data aggregator event detection, real-time data analysis, visualization,
and streaming into one Android App and incorporated four key components in
the cloud server: data repository, algorithm repository, machine learning engine,
and web portal. A prototype has been implemented with preliminary performance
evaluation. Results show that the system is promising in its full utilization of the
high performance computing power as well as the large volume storage capacity.
1 Introduction
Wearable computing has gained increasing research and development, especially in
biomedical applications. For example, several software tools from Shimmer Sensing
[1], Qualcomm [2], Intel [3] and Samsung [4] attempted to address the issue of sensor
connection/control, data receiving, and visualization. However, these tools are largely
limited in flexibility, scalability, and support for complicated biomedical systems. On
the other hand, systems have been recently proposed to enable cloud assisted wireless
body area networks. Specifically, BodyCloud [5] provides a general-purpose software
that covers a wide range of sensors and provides APIs for the creation of new biomedical
applications.
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 59–73, 2020.
https://doi.org/10.1007/978-3-030-64991-3_5
60 M. Li et al.
Despite of existing research advances, two key issues have not been addressed:
(i) medical doctors and practitioners need user-friendly, multiple sensor supported, real-
time, and powerful analytics support for high quality patient health monitoring activities.
For this purpose, body sensor data should be collected, streamed, processed, analyzed
(real-time and on-demand), and archived in cloud server. (ii) biomedical researchers face
significant challenges of high cost and overhead performing data analytics. To resolve
this issue, both body sensor data repository and data analytics algorithm repository
should be created in the cloud server so that researchers can complete the task of large
volume data analysis at minimum cost without the overhead of purchasing computing
facility, recruiting algorithm developers, as well as obtaining results within a few days
instead of months.
We propose BSNCloud, a heterogeneous and comprehensive wireless body sensor
data collection, streaming, and analytics framework. BSNCloud is unique in the sense
that it provides both real-time Android App based analysis as well as on-demand web por-
tal based data analysis with the potential of supporting a large set of body sensor data and
analytics algorithms. The system operates across a set of wireless body sensors, Android
phone/tablets, PC desktops/laptops, and a cloud cluster. For implementation, we adopted
the widely used Shimmer3 IMU motes that is able to sample multiple signals such as
accelerometer. Then, the basic MultiShimmer Template for Android was repackaged to
include additional key features such as signal statistics, event detection, real-time data
analysis, and multi-signal streaming (using WebSocket [6]). The cloud server is setup
with OpenStack operating system, a PHP web server, and MySQL database. Users can
perform data analysis using existing data sets and algorithms, upload live data through
the Android App, upload their own data on the Web Portal, upload their own algorithms,
or modify contributed algorithms for validation and performance evaluation.
Experimental results show that the proposed BSNCloud is very promising. Specifically,
it achieves several desirable features:
• Usability: given the reasonable cost of Shimmer motes and user friendly web portal,
medical researchers and doctors can easily collect data and archive them securely in
the cloud server without worrying about storage management.
• Flexibility: users have the option of using existing shared data and contributed algo-
rithms as well as experimenting with their own collected data and algorithms, making
performance evaluation a fairly easy task. The Android App supports multiple users
and multiple signal streaming and therefore fits well for both hospital and home
rehabilitation setting.
• Efficiency: both real-time and on-demand web portal data analysis are performed in
the high performance cluster server, it is possible to run large data volume without
significant delay.
• Scalability: BSNCloud can be extended to include other Bluetooth enabled sensors.
Development of iOS App is also feasible so that data from iPhone sensors can be
collected too. The proposed algorithm repository has the potential to grow as more
researchers contribute new algorithms.
This paper is organized as follows. Section 2 reviews related works. Section 3 intro-
duces and describes the proposed BSNCloud architecture. Section 4 describes the data
BSNCloud: Cloud-Centered Wireless Body Sensor Data Collection 61
aggregator side design and implementation with an Android App. Section 5 describes
the cloud server, which includes a web server, machine learning engine, and MySQL
database. Section 6 presents design decisions, implementation details and performance
evaluation. Finally, Sect. 7 summarizes the work with future works.
2 Related Works
Among many potential communication technologies, Zigbee [7] and Bluetooth are most
widely deployed. Zigbee is a very low power, collision avoidance protocol optimized for
lower power sensors. It has developed a health care specific protocol and is compliant
with all IEEE 11073 devices as well as most other IEEE 802.15.4 wireless devices.
Bluetooth supports high-bandwidth and many existing devices with a health care com-
pliant version defined. However, it has very high power requirements and uptime for the
radios. Bluetooth Low Energy [8] is a new proposed system from Bluetooth for lower
energy requirements, while being interoperable with Bluetooth Classic.
SPINE [9], a TinyOS based platform, has enabled the implementation of a heteroge-
neous body sensor network by abstracting the hardware level of multiple sensors such
as TelosB and MicaZ and creating an easy to use software. Furthermore, SPINE con-
tains APIs for general-purpose processing functions such as average, median and RMS.
Separately, Shimmer Research [10] delivers two sets of software tools: development
drivers for LabView, MATLAB, Android and C#; standalone software such as Shimmer
Connect, Shimmer Log and Shimmer Plot for easy connection, storage and visualization
of sensor data. While these drivers and software provide a good combination of tools for
easy direct use or further API developments, the research community needs a scalable,
robust instrument to meet their fast research and development needs.
One WBAN architecture that incorporates SPINE is DexterNet [11]. The system
takes a real-time approach and seeks to provide an open-source platform that allows
indoor and outdoor persistent human monitoring. The Body Sensor Layer, Personal
Network Layer and Global Network Layer provide a three-tier architecture to address
the different API needs from the sensors, data aggregator and server. This system is both
scalable and reconfigurable in real-time due to the versatility of the layered approach.
CodeBlue [12], proposed by Fulford-Jones and Malan, presents an ad hoc infrastruc-
ture for emergent medical care. In this project, several types of body sensors (e.g.,
pulse oximeter, ECG/EKG sensor) are individually connected to Zigbee enabled radio
transmitters. Due to the ad hoc architecture and the capability of self-organizing, Code-
Blue yields scalability for network expanding and flexibility to connect various wireless
devices. Jiang and Cao proposed CareNet [13], an integrated wireless environment used
for remote health care systems. CareNet offers features such as high reliability and
performance, scalability, security and integration with web based portal systems.
Combining Cloud Computing and Wireless Sensor Networks (CC-WSN) [14] and
Open Sensor Web Architecture (OSWA) [15] propose architectures that integrate wire-
less sensor networks (WSN) with the cloud. CC-WSN has base services including sensor
data management run on Google AppEngine and Microsoft Azure, filter chain and filter
management and user services including visualization and notification. OSWA provides
an architecture for integrating sensor networks with various distributed computing plat-
forms like SOA and Grid-Computing. BodyCloud [5] proposes a SaaS approach that
62 M. Li et al.
supports cloud-assisted BSN applications. The purpose of the software is to allow fast
prototyping of cloud-assisted BSN applications and flexibility among architectural com-
ponents utilizing web standards-based procedures and scalability aided by the Google
App Engine PaaS infrastructure. Their paper discusses the issues of providing body-side
and cloud-side context-aware sensing and adaptation, an issue our proposed architecture
will address.
A survey of the architectures presented above reveals that several issues still need to
be explored [16]. One such issue is providing an efficient collection of body senor data
and implementing an adaptive sensing mechanism. The data transmission throughout
the network, including sensor to aggregator and aggregator to cloud, still has potential
for further optimization. Contextual adaptation is another area of concern, relating to
dynamic adaptation in an array of services depending on the current network and sensing
context. Finally, a general software that assists programmers for developing specific
healthcare related apps is worth further investigation.
To address data reliability between sensor and data aggregator, an analysis driven
adaptive framework [17] was proposed. In this framework, a group data importance
based scheme was designed to mitigate the effect of data loss on analysis algorithms.
Then, a hybrid transmission protocol was developed to meet analysis needs. Furthermore,
a multi-level importance ranking was introduced to allow a fast organization of sensor
data into priority and non-priority packets. These packets are transmitted progressively in
response to data reliability demands and network constraints. Finally, the concatenation
of small data frames from sensors with low sample rates like ECG/EKG, along with
an adaptive transmission scheme can provide loss resilience among the sensor network
[18].
3 System Architecture
As shown in Fig. 1, our proposed system consists of three basic parts: the sensors, the data
aggregator and the cloud server. In a typical scenario, a patient may wear a number of
wireless sensors from blood pressure to accelerometer for continuous health monitoring.
Depending on the kind of illness and the purpose (rehabilitation vs simple monitoring),
some patients may also get scheduled for periodical measurement of specific signals at
various frequency in doctor’s office. During such scheduled measurement, real-time data
analysis is often desired so that more than just visualized signal is displayed. While sam-
ples are being collected, a phone/tablet/PC, or the “data aggregator”, should be connected
with sensors wirelessly (via short range communication such as Zigbee, Bluetooth, or
even the newly proposed standard WBAN) so that data can be processed, analyzed, and
then streamed to a cloud server for backup. In this case, a software tool (ideally, a tablet
App) plays a key role by connecting the sensors and the cloud server. The App should
be able to control the data sampling, visualization, analysis, and streaming such that the
system can work autonomously and continuously without human intervention.
Different from existing “cloud-assisted” body area network architectures, our pro-
posed BSNCloud system is “cloud-centered”, i.e., it fully utilizes the processing power
and storage capacity for optimal efficiency and minimum cost. In our design, the cloud
server consists of three key components: (i) a web server that keeps receiving data
BSNCloud: Cloud-Centered Wireless Body Sensor Data Collection 63
streaming and analysis requests from the data aggregator; (ii) a machine learning engine
that automatically performs real-time or on-demand analysis as requested and responds
with the results; and (iii) a MySQL database that stores various body sensor data sets,
specific data analysis algorithms, as well as information about all data analysis sessions.
Essentially, BSNCloud aims at improving sensor-based event monitoring for remote
patient care to a new level. Its scalable biomedical body area network computing plat-
form has the potential of eliminating distance barriers and providing health care remotely.
Another key aspect of the system is its open source, user friendly, and scalable cloud com-
puting platform for sensor data storage, indexing, and analysis. It also allow researchers
to upload, update, and contribute algorithms to the repository and conduct comparative
study with the availability of a large number of high volume data sets.
• Sensor Control that includes turning sensors on/off for sampling as well as manually
(through configuration) or automatically (through algorithm) manipulation of the fre-
quency of data sampling. This allows the system to find the appropriate sampling rate
for a specific application dynamically and sensors to be emulated for experimental
purposes.
• Data Presentation that includes data visualization and signal statistics (e.g. min, max,
average, standard deviation, time between peaks, binned distribution, etc.), which
allows users to directly view the time series sensor data as well as key measures.
• Event Detection that handles lightweight analysis of data samples (e.g. threshold-
based detection algorithms) to detect emergent events. It can be for both general
and application specific functions. General functions will detect abnormal sample
values based on configuration of sensors. Application specific functions will focus on
identifying certain simple patterns indicating the occurrence of specific events. In the
case when a critical event occurs, an alarm message is triggered for emergency and
further real-time data analysis may be automatically initiated for diagnosis.
• Data Analysis that perform real-time on-demand analysis from users. It can also
be triggered automatically when certain abnormal events are detected. In any case, a
request is sent to the cloud server so that reasonably sophisticated, capable, and trained
algorithms can be executed to analyze the N number of most recent or upcoming
samples. This allows the data aggregator to utilize the processing power of the cloud
server to run some complex machine learning algorithms for activity classification
such as Fall Detection. A list of algorithms specific to each body sensor data can be
available to the App user for selection. This makes the App scalable and eliminates
the overhead of implementing a large set of analytics algorithms locally on the App.
• Data Communication that includes both sample streaming and real-time data analy-
sis requests. For sensors with multiple signals (e.g., accelerometer), multiple socket
threads should be used to transmit different signals of the same samples (e.g., X, Y, Z)
simultaneously. Streaming can also be adapted based on battery power and network
connectivity (i.e. offline or online with WiFi/3G/4G).
BSNCloud: Cloud-Centered Wireless Body Sensor Data Collection 65
Compared with traditional socket implementation that requires a server program stays
running and waits for requests, WebSocket has several desirable features: (i) it’s full-
duplexed and enables streaming on top of TCP, which ensures the reliability of data
streaming; (ii) it is supported by all browsers as well as programming languages such
as Java, Javascript, and Python; (iii) its secure version is supported by Firefox 6, Safari
6, Google Chrome 14, Opera 12.10, and Internet Explorer 10. Essentially, WebSocket
protocol offers a standard and universal implementation for interaction between a web
browser (or client applications such as Android Apps) and a web server with lower
overheads, facilitating real-time data transfer from and to the server.
In BSNCloud, a XAMPP Apache based PHP web server is setup and configured to
receive requests from both Android App side real-time analysis and also Web Portal side
on-demand analysis request. Whenever a user decides to stream and select the specific
sensor data, a Java WebSocket connection is created for each signal (3 connections for
accelerometers). Collected samples are temporarily stored locally in the data aggregator
before delivered to the server. If the data aggregator goes offline, samples that have
not been streamed yet will stay in local storage and will be streamed once Internet
connection is restored. Each data streaming is uniquely indexed by, a stream_id, and
then a sensor_id for each sensor, as well as the name of the specific signals (e.g., X/Y/Z
for accelerometers).
Real-time analysis is a key feature of data aggregator. A user may follow a predefined
schedule or decide based on certain observation. It is also possible that abnormality
is identified by the event detector and therefore an analysis request is automatically
initiated. In either case, a message is sent to the web server and then wait for the response.
Frequent requests may make a separate WebSocket connection a necessity. Otherwise,
existing WebSocket for data streaming can be used. Upon the receipt of the result, a
message box is displayed in the App showing the result.
Due to its time sensitivity, real-time data analysis does not use a large data set and
instead focus on either some most recent samples or upcoming samples. In addition, the
size of such samples may affect the response time. While most recent samples can be
analyzed immediately at the server side, upcoming samples will need time to accumulate
and then get started.
• Data Repository that stores, indexes, and manages body sensor data storage. MySQL
is used to manage all data, which consists of both data sets and data analysis sessions.
All raw data are stored as files locally in the hard drive with file location stored in
the database tables. Data are classified as “Healthy”, “Patient”, and “Synthesis” to
indicate their source. Data sets can be streamed from the Android App, uploaded data
from lab/hospital or online repositories [21].
• Algorithm Repository that includes both contributed and user uploaded algorithms.
These algorithms can be public and therefore open to all users or private and only for
the owner to modify and update. Private algorithms can be contributed and become
public once tested and approved. Sample algorithms include distributed clustering
algorithms (e.g. K-means algorithm), parallel EM algorithms, parallel SVM algo-
rithms, distributed random forest algorithms and distributed deep learning algorithms
(e.g. Deep Convolutional Network, Auto Encoders, Restricted Boltzmann Machines).
Based on the specific application, there may be multiple algorithms corresponding
to the same body sensor data. To facilitate the contribution of algorithms, an online
domain specific language (DSL) based template can be designed for uploading algo-
rithm modules and test of algorithms. A biomedical DSL with uniform language inter-
face [22] will support multiple data sources such as time series data from accelerome-
ters, image data from vision sensor networks, as well as different types of biomedical
body sensors.
• Machine Learning Engine that is able to execute various algorithms over selected data
in the repository. The machine learning engine works closely with data repository and
algorithm repository. It pre-processes raw data so that it fits specific input requirements
by data analysis algorithm. For example, when a request is sent to analyze accelerom-
eter data, the machine learning engine combines the raw data of the three signals X, Y,
and Z and combine it to a CSV file, before feeding it to a specific algorithm. It should
also incorporate major implementation environments such as Python, Java, C ++, and
Matlab. Integration with existing frameworks such as TensorFlow is another possibil-
ity. The engine may also draw from MPI [23] for computational-intensive algorithms
and the MapReduce model [24] for data-intensive algorithms.
• Web Portal that offers account management, data management, data analysis, and algo-
rithm development. The web portal provides a software as a service (SAAS) level of
user experience so that minimum overhead is achieved. Through the web portal, a user
can view data sets by sensor types or algorithms, manage data analysis sessions, upload
data sets, upload/contribute analysis algorithms, and perform new analysis.
The modules presented in Fig. 3 provide the basis for the cloud server’s flexible and
scalable design. Data received from the data aggregator will be formatted and stored
on the server. Through the web portal, a user can request real-time analysis as data
is being received, triggering result messages as desired. Furthermore, users will have
the opportunity to upload algorithms or select algorithms from the expansive existing
libraries and make analysis requests. The results will then be displayed in the web portal
and the user can retrieve the data in a standard format. In addition, a user can request
raw data from the cloud server. This provides an opportunity not only for researchers to
analyze multiple data sets at once, but also for professionals to make real-time judgements
based on patient data.
BSNCloud: Cloud-Centered Wireless Body Sensor Data Collection 67
Results
Algorithm Real-Time
Repository Analysis
Database
User Requested
Analysis
Figure 5 illustrates the sensor configuration and data visualization that is provided
by the MultiShimmer Template. However, MultiShimmer does not provide functions
other than sensor control, data collection, and visualization. We have repackaged the
app to include many additional functions, especially on streaming multiple body sensor
signals to the cloud server side.
Figure 6 illustrates the real-time data analysis. A user may selects one sensor signal,
sends a request to the server, and then wait for the response. Please be noted that for
accelerometers, choose one signal X also requests Y, Z signals for analysis together.
Figure 7 shows the dashboard page of the web portal. A user enters the system and select
data and algorithms for data analysis. First, a specific sensor is chosen, then followed by a
specific algorithm, and finally one data set. Each step of selection helps filter non-related
algorithms or data sets. Algorithms are labeled by both method and application (e.g.,
fall detection). Before an analysis is initiated, a summary is presented for verification.
The analysis results are displayed in the textbox at the bottom.
70 M. Li et al.
We have also conducted experiments to evaluate some key performance measure for the
system. Figure 8 shows the measured throughput of a 8 Hz sampling rate accelerometer
data streaming with 3 parallel WebSocket connections by varying the number of samples.
It can be seen that the throughput is quite consistent over time for different sample sizes.
It should be note that this throughput is not equivalent to the network capacity since it
takes time to collect samples.
BSNCloud: Cloud-Centered Wireless Body Sensor Data Collection 71
4
Throughput (Kbps)
0
0 200 400 600 800 1000 1200
Fig. 8. Data streaming throughput vs sample sizes
4000
2000
0
0 500 1000 1500
Figure 9 shows the real-time analysis response time in ms. It can be seen the results
are sent back from the cloud server within a very short period of time. We then increases
the sampling rate from 8 Hz to 16 Hz and 51.2 Hz, results show that the response
time increases to over one min. Further analysis reveals that since the real-time analysis
request is actually sent over an existing streaming WebSocket, which is already in near
saturation status under high sampling rates. We will experiment with a separate Web-
Socket connection for real-time analysis and/or prioritize the message so that it is sent
before queued sample packets.
Figure 10 shows the web portal data analysis response time for accelerometer samples
collected for 1, 5, 10, 20, 30, and 60 min, respectively. It can be seen that results come
back within 1–2 min. For reference, the data size of 60 min correspond to 2.6 Mbytes.
Therefore, the high performance of the cloud server is clearly validated.
72 M. Li et al.
Fig. 10. Web portal data analysis response time for accelerometer samples.
7 Summary
In this paper, we have presented the design, implementation, and performance evaluation
of BSNCloud, a cloud centered system for biomedical body sensor data collection,
analysis, streaming, and storage. Key design decisions were made to maximize usability,
efficiency, and scalability. The system helps facilitate the data analysis research and
significantly reduces the cost and overhead by researchers. It is expected to grow with
active use and contribution from the research community. In the future, we will address
the issue of reducing the real-time data analysis response time under high sapling rate.
We will also include more analysis algorithms with the proposed DSL based algorithm
contribution template.
Acknowledgments. This work was supported by the National Science Foundation, CNS division
(Award No. 1626586). We also would like to thank Rittika Shamsuddin and Barbara Mukami
Maweu at University of Texas at Dallas for providing the Naïve Bayes fall detection algorithm.
References
1. Shimmer Enabling Softwares, Available http://www.shimmersensing.com/research-and-edu
cation/applications/data-aquisition-software-sensor-systems/
2. Qualcomm Wearables, Available https://www.qualcomm.com/products/wearables/
3. Intel IoT Developer Kit, Available https://software.intel.com/en-us/iot/devkit
4. Samsung Architecture for Multmodal Interactons: An open data platorm for innovaton,
Available http://www.samsung.com/us/globalinnovation/innovation_areas/#digital-health
5. Fortino, G., et al.: BodyCloud: a SaaS approach for community body sensor networks. Future
Gener. Comput. Syst. 35, 62–79 (2014)
6. WebSocket. Available http://www.websocket.org/
BSNCloud: Cloud-Centered Wireless Body Sensor Data Collection 73
7. Baronti, P., et al.: Wireless sensor networks: a survey on the state of the art and the 802.15. 4
and ZigBee standards. Comput. Commun. 30(7), 1655–1695 (2007)
8. Bluetooth Low Energy Core Specification Version 4.0. Available http://www.bluetooth.com/
English/Technology/Works/Pages/Bluetooth_low_energy_technology.aspx
9. SPINE Project. Available http://spine.deis.unical.it/
10. Shimmer Sensing. Available http://www.shimmersensing.com/ (2013)
11. Kuryloski, P., et al.: DexterNet: an open platform for heterogeneous body sensor networks
and its applications. In: 2009 Sixth International Workshop on Wearable and Implantable
Body Sensor Networks (2009)
12. Fulford-Jones, T., et al.: CodeBlue: an ad hoc sensor network infrastructure for emergency
medical care. In: Proceedings of International Workshop on Body Sensor Networks (2004)
13. Jiang, S., et al.: CareNet: an integrated wireless sensor networking environment for remote
healthcare. In: Proceedings of the ICST 3rd international conference on Body area networks,
ICST, Tempe, Arizona (2008)
14. Kurschl, W., Beer, W.: Combining cloud computing and wireless sensor networks. In: Pro-
ceedings of the 11th International Conference on Information Integration and Web-based
Applications & Services, p. 512–518. ACM, Kuala Lumpur, Malaysia (2009)
15. Chu, X., Buyya, R.: Service Oriented Sensor Web, in Sensor Networks and Configuration:
Fundamentals, Standards, Platforms, and Applications, N.P. Mahalik, Editor. 2007, Springer
Berlin Heidelberg: Berlin, Heidelberg. p. 51–74
16. Fortino, G., Di Fatta, G., Pathan, M., Vasilakos, A.V.: Cloud-assisted body area networks:
state-of-the-art and future challenges. Wirel. Networks 20(7), 1925–1938 (2014). https://doi.
org/10.1007/s11276-014-0714-1
17. Li, M., Cao, Y., Prabhakaran, B.: Multi-level sample importance ranking based progressive
transmission strategy for time series body sensor data. In: 2015 IEEE 16th International
Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2015)
18. Read, N., et al.: Loss resilient strategy in body sensor networks. In: Proceedigs of 2011
ACM/IEEE International Conference on Body Area Networks (BodyNets 2011, accepted),
Beijing, China (2011)
19. Levis, P., et al.: TinyOS: an operating system for sensor networks. In: Weber, W., Rabaey,
J.M., Aarts, E. (eds.) Ambient Intelligence, pp. 115–148. Springer, Berlin, Heidelberg (2005).
https://doi.org/10.1007/3-540-27139-2_7
20. TelosB sensor data sheet. DOI=http://www.willow.co.uk/TelosB_Datasheet.pdf
21. Repository, UC Irvine Machine Learning Laboratory. Available https://archive.ics.uci.edu/ml
22. Huang, X., Zhao, T., Cao, Y.: PIR: a domain specific language for multimedia retrieval.
In: Proceedings of IEEE International Symposium on Multimedia (ISM 2013), Anaheim,
California, USA (2013)
23. Forum, M.P.I.: MPI: A Message-Passing Interface Standard - Version 2.2 - Sep.4. 2009,
Message Passing Interface Forum (2009)
24. Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. In: Proceed-
ings of the 6th conference on Symposium on Opearting Systems Design & Implementation,
San Francisco, California, USA (2004)
Secure Communication Networks
for Smart-Health
Model-Based Analysis of Secure
and Patient-Dependent Pacemaker
Monitoring System
1 Introduction
The embrace of sensors and advances in communication and cloud technology has
enabled us to develop effective monitoring applications in different areas includ-
ing the health sector. Implantable medical devices such as cardiac implanted
electronic devices (CIEDs), insulin pumps and gastric stimulators can contin-
uously track a patient and transfer the data to the medical institution regard-
less of the location. CIEDs, namely permanent pacemakers (PPM), implantable
cardioverter-defibrillators (ICDs) and cardiac resynchronization therapy (CRT)
devices exceed 500 units per million inhabitants worldwide [21] and their num-
ber is increasing in correlation with the expected lifetime and national wealth. In
well-developed countries the average prevalence is over 1000 implants today and
reaches 10000 devices per 1M elderly people (ibid). For such remarkable deploy-
ment rate the reliability and operational lifetime of devices is an important ques-
tion to prevent fatalities. According to patient support organizations the complete
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 77–91, 2020.
https://doi.org/10.1007/978-3-030-64991-3_6
78 L. Tsiopoulos et al.
failure of a modern pacemaker is rare [11] and most frequently devices need just
timely reprogramming for proper operation [1]. Acquiring timely information of
patient condition changes and the discovery of possible mismatch of device set-
tings requires periodic device operation analysis to discover irregularities in the
heart behavior. Regardless the maintenance related usability concerns it is impor-
tant to underline that remote monitoring of pacemakers and other CIEDs has
improved the patient survival rate [25] and not only. The accurate predicting of
device maintenance dates not only prevents malfunctioning in conditions when the
monitoring is urgently needed but also improves the user trust and convenience
of wearing the devices without compromising patient’s life quality.
Permanent pacemaker communication is required for device adjustments
according to patient’s physical condition and its deviations over the time. Due
to technological limitations, mainly because of the high energy consumption of
legacy wireless communication, frequent data transmissions of pacemakers were
not possible till recent times. Inductive link coupling used for legacy pacemakers
made data exchange - device programming and event report offloading possible
only at hospital environments. Therefore, not much attention has been paid to
pacemaker communication security and energy efficiency measures. Bluetooth
connectivity for PPMs was proposed already in 2002 by Hsu and Avudaiappan
[14]. However, Bluetooth Classic technology available at this time was not suit-
able for long duration battery operation. The energy efficient Bluetooth Low
Energy (BLE) connected pacemakers were actually introduced to the market in
2016 and are considered simple to use and helpful for both sides, patients and
cardiologists [24]. Today, there is a selection of modern PPM and ICD devices
from companies Medtronic and Abbott that provide BLE connectivity with an
acceptable reduction of the device operation lifetime. However, the impact of
wireless communication to device energy consumption is still remarkable; an
active modern Bluetooth transmitter consumes around one milliamper current
while modern microcontrollers in pacemakers can operate with few microamps
per pacing in average. Therefore it is important to optimize wireless commu-
nication frequency and data amount to be transmitted heavily depending on
patient’s clinical needs. It is also essential to pay attention to personal data pro-
tection and protection against external operational vulnerabilities to CIEDs as
life supporting medical devices.
Deployment of advanced wireless communication made possible periodic
transmission of heart data to cardiologist which significantly improved the
patient monitoring quality but it also added security risks and reduced device
battery lifetime. As argued in [20] wireless interfaces of such devices are vulnera-
ble to cyber attacks with even life-threatening impact. Various passive and active
attacks targeting the communication medium are possible [17]. The upgrade
mechanisms of the PPMs and the vulnerabilities of the cloud server could be
also used for compromising the devices remotely [2]. Moreover, pacemakers of
St. Jude Medical were found to have insufficient cyberprotection measures that
made possible battery drain, firmware downgrade and malfunctioning attacks
over the wireless interface [16]. As various nodes such as home routers, mobile
Analysis of Secure and Patient-Dependent Pacemaker Monitoring 79
phones, enterprise gateways, would take part in the communication, the range of
security threats gets very wide. Therefore, it is essential to establish end-to-end
security that covers the whole communication medium encompassing the device,
cloud system, and all intermediate nodes. On the other side, the security coun-
termeasures create an additional burden to resource-constrained devices with the
additional energy consumption affecting significantly the device lifetime. From
the clinical point of view, requirements to communication frequency and payload
depend on patient’s profile (health condition, daily activities, environment etc.)
that in combination with the security countermeasures on the communication
can result in largely varying expectations to device lifetime.
To reduce threats and possibly infeasible design decisions (that ignore the
factors coming from different use cases) a model-based formal analysis can be
used to justify design and runtime configuration decisions. The formal analysis
in this paper is targeted to taking into account the effects of pacemaker remote
monitoring and secured dynamic episode alerting to the device lifetime, depend-
ing on different patient profiles and security countermeasures adjusted to daily
living environment. We apply probabilistic modeling, simulation experiments
and model-checking with UPPAAL Timed Automata to estimate the impact of
various factors to pacemaker expected lifetime. In particular, we focus on factors
such as averaged patient-dependent condition episode alerting frequency and the
cost of secure communication (in terms of energy consumption) in three possible
patient environments during a day. The impact of listed factors is characterized
with numerical data extracted from model experiment that justifies the need
for refined model-based analysis of pacemaker operational lifetime. The choice
of UPPAAL Timed Automata as the formalism for our work is justified by the
facts that the checking of behavioral, stochastic and real-time aspects of systems
is efficient and the UPPAAL tool family includes several extensions of the stan-
dard modeling and verification tool which will allow us in the future to address
different development aspects of pacemakers.
2 Related Work
In the context of wireless Body Area Sensor Networks (BASN) extensive research
has been done with application of formal methods. Ahmed et al. [6] used higher-
order-logic theorem proving to formally analyse energy consumption of BASNs
by verifying the mathematical relations for energy, delay and distortion of a given
BASN. The results of this analysis can then be used to determine the parameters
of optimal energy consumption of BASN algorithms. In a closely related work,
Dai et al. [12] proposed synthesizing power management strategies for wireless
sensor network nodes with UPPAAL STRATEGO by taking into account the
various power states of a node device during the runtime in order to achieve a
tradeoff between power consumption and performance.
Regarding verification of wireless body area network protocols, several works
exist in the literature. For example, timed automata have been used in [8] to
verify a recently proposed Medium Access Control protocol called STDMA (Sta-
tistical frame based TDMA protocol). Taking also security into accout, Chen
80 L. Tsiopoulos et al.
et al. [10] proposed a formal modeling and verification method using the PAT
model-checker for wireless BASN-specific authentication security protocols.
However quite few results are available on the verification of pacemaker oper-
ation correctness using model-checking tools. An operational model verification
with UPPAAL tool is conducted by Pajic et al. [19]. As stated in the Intro-
duction, pacemakers were found to have insufficient cyberprotection measures
[2,16]. This triggered research work to present solutions for protection against
cyber attacks under the assumption the communication has been already com-
promised. For example, Rao et al. [22] presented a model for a multi-modal
design approach for risk assessment of pacemaker devices and they propose an
adaptive remediation scheme to mitigate security threats. The approach is inte-
grated into the hardware-software development with a middleware for dynamic
switching between the modes based on risk values assigned to the different func-
tions each mode has.
The analysis of the recent related work, with some of the example papers dis-
cussed above, shows the lack of satisfying solution in the pacemaker literature
and motivates the authors for the work presented in this paper. To the best of
authors’ knowledge, a formal model-based analysis on the effects of pacemaker
remote monitoring and secured dynamic episode alerting to the device lifetime,
taking into account different patient profiles regarding heart condition and secu-
rity measures adjusted to daily living environment, has not been presented yet.
3 Pacemaker Background
3.1 Pacing
Dual chamber and single chamber pacing modes address different cardiac con-
ditions. Dual chamber pacing restores AV synchrony by sensing and stimulating
two chambers of the heart, the right atrium and right ventricle. Single cham-
ber pacing supports patients with infrequent asystole or patients with chronic
AT/AF and for whom dual chamber pacing is not justified [4]. For some of the
dual chamber pacing modes pacing occurs at the programmed lower rate and
for some modes the pacing is occuring at the sensor rate. Rate-responsive pac-
ing adapts the pacing rate to changes in patients’ physical activity due to some
patients exhibiting heart rates that do not adapt to changes in their physical
activity. The device uses an activity sensor to measure the patient’s movement
and to determine the appropriate pacing rate.
Analysis of Secure and Patient-Dependent Pacemaker Monitoring 81
Data collected by the pacemaker is encrypted and sent to the CareLink network
through the MyCareLink Heart mobile app [3], providing clinicians with alerts
on clinically-relevant patient events. The app also makes selected pacemaker
data, such as transmission success history, pacemaker battery information and
updates on physical activity, easily accessible to patients. If a clinical or system
performance event occurs and Medtronic CareAlert Monitoring is programmed
to respond with an alert, the device automatically attempts to establish wireless
communication with the mobile phone. After communication is established, the
mobile phone receives the alert data from the device, and then transmits the alert
data to the CareLink Network wherefrom the data is accessible to clinicians.
Examples of clinically-relevant alerts are “Average Ventricular Rate During
AT/AF larger than Threshold ” indicating that the average ventricular rate dur-
ing a selectable duration of AT/AF exceeds the programmed threshold, and
“Monitored VT Episode Detected ” indicating that one or more monitored VT
episodes were detected.
The clinician may also configure the device to send periodic reports with the
frequency depending on the patient. The information included in such reports
is, e.g., “episode data and EGM storage”, providing an arrhythmia episode
log that enables to view the summary and detailed diagnostic data, includ-
ing stored EGM, for the selected arrhythmia episode, and “rate drop response
episodes data” displaying beat-to-beat data that is useful in analyzing Rate Drop
Response episodes and the events leading up to these episodes.
In most cases, these gateways do not have resource restrictions like sensors
have but may be subject to different threats or security controls. In station-
ary locations, a patient can use the existing network infrastructures, thus, a
pacemaker can benefit from hospital gateway or home router. Hospital gateways
could be more trustable as they could be secured by IT staff of the hospitals,
and we can assume that more physical security is guaranteed. This can elimi-
nate the cyber threats requiring physical proximity to the target. On the other
side, an ordinary user generally relies on the default configuration of the home
routers and ignores the security hardening. Thus, it is reasonable to delegate
some cryptographic tasks to the hospital gateways but not to home routers.
A mobile phone could be a perfect fit as a gateway while the patient visits
non-stationary places. However, it is not trustable for sensitive tasks as mobile
malware poses an important threat to the secure communication passing over the
mobile phone. These devices are prone to physical loss or theft. Most of the public
places may enable the attackers to come close to the target and conduct man-in-
the-middle (MitM) or denial of service (DoS) attacks. Comparing with the home
environment, despite the existence of similar threats in home environment, the
likelihood of threats could be considered higher for communication over the
mobile phone in public places. Therefore, we assume that a stronger security
configuration should be enabled in this option and any compromise in end-to-
end security is not tolerable.
In resource-constraint scenarios such as our pacemaker remote monitoring
case, security mechanisms are required to be use-case adaptable and lightweight,
meaning that they should operate with less storage, computing, and energy
resources. The current study does not follow proprietary BlueSync implementa-
tion that, according to our knowledge, supports a single security model for the
pacemaker data communications. The strength of lightweight security mecha-
nisms is that they can be deployed according to the patient environments with
varying threat profiles. As we assume in this study the patient profile is deter-
mined by being in different locations such as hospital, home, and other places
during a day, we selected a distinct security configuration setting for each loca-
tion. Hospital and home are more stationary ones whereas the third option covers
all other places a user can visit or stay at (e.g., shops, public transport, etc.).
We assume that the pacemaker application uses Datagram Transport Layer
Security (DTLS) which can be considered a UDP-based alternative of transport
layer security (TLS) protocol [23]. A DTLS session starts with a handshake for
authenticating the parties and exchanging the session keys. The parties use the
agreed session key to perform secure communication. However, in the case of using
a certificate, large messages should be fragmented into various packets exchanged
between parties, ending up with huge energy consumption for the handshaking
phase. Therefore, delegation schemes in which gateways conduct handshake oper-
ation on behalf of sensors are proposed in the literature [13,15,18].
We consider the security configuration options given in the benchmarked
study, [18], as the main baseline. The results in this study are very rele-
vant for our cases as it provides a detailed performance analysis of a health-
Analysis of Secure and Patient-Dependent Pacemaker Monitoring 83
care IoT system and proposes a solution that uses delegation idea (i.e.,
namely DTLS session resumption) which is compared with other configura-
tion options. We assume that in a hospital setting, DTLS session resump-
tion using elliptic curve operations for certificates and transferring hand-
shake responsibility to the gateway is enabled. In home environment, sym-
metric key-based DTLS (DTLS_PSK_WITH_AES_128_CCM_8) is uti-
lized. The pacemaker is assumed to initiate a certificate-based handshake
using Elliptic Curve Digital Signature Algorithm in non-stationary places
(i.e., security option is DTLS_ECDH_ECDSA_WITH_AES_128_CCM_
SHA_256) which has a higher cost but provides more assurance about the
authentication of the pacemaker. We omit the details about the key generation
algorithms for simplicity.
In our model, as the frequency of the data transmission is so low, we consider
that a handshake happens for each transmission of monitoring data or alert.
As the data sizes are also low, one or two messages are enough after agreeing
on the session key, considering the available payload sizes after excluding all
headers. Therefore, we assume that energy consumption is heavily determined
by handshake operation and the sensor side energy consumption values given in
[18] are considered as the baseline for the calculation and correlation of energy
costs of each security configuration for the model (i.e., DTLS session resumption
costs 1/6 less than Symmetric key-based DTLS and certificate-based DTLS costs
32 times more than Symmetric key-based DTLS).
For the objective of this paper the model concerns only the continuous monitor-
ing and possible episode alerting from the pacemaker in a probabilistic manner
depending on three different patient profiles listed as Type 0, Type 1 and Type 2.
The “best” case patient profile (Type 0) is away from home (traveling to work
and back, being at work and any possible shopping) 10 h per day. Hence, he is at
home 14 h per day. He visits the hospital once per year and this visit is 2 h long.
Regarding dynamic alerts, he has 1 alert per year in any of the three possible
environments.
The “medium” case patient profile (Type 1) is away from home 6 h per day. He
visits the hospital 2 times per year and each visit is 4 h long. Regarding dynamic
alerts, he has 4 alerts per year in any of the three possible environments.
The “worst” case patient profile (Type 2) is away from home 1 h per day. He
visits the hospital 4 times per year and each visit is 2 d (48 h) long. Regarding
dynamic alerts, he has 10 alerts per day in any of the three possible environments.
The device battery characteristics are as follows. The mean usable capacity is
1.2 Ah. Depending on the device setting/programming per patient needs, the
lifetime of the device varies from 7.4 to 15.8 years (see Tables 4, 5, 8 in technical
manual [5]). For our model let us choose the value 13.7 years/5000 d for the
lifetime of the device regardless the patient profile. Note that all numbers for
the model can be changed accordingly to different patient profiles and concrete
living scenarios. One of the main assumptions is that daily reporting is active
for all patients. This reduces lifetime of the device battery by 14.4% which
translates to 564 d less lifetime. After applying simple calculations in order to
have reasonable numbers for the model parameters to work on a day basis for
the lifetime reduction, we know that 189 daily reporting sessions are needed to
reduce battery lifetime by 1 day.
Analysis of Secure and Patient-Dependent Pacemaker Monitoring 85
The dynamic alerts have a different cost in terms of battery lifetime depend-
ing on the environment the patient is in when the alert is triggered. This is due
to different security protocols applied for communication in different environ-
ments. An additional assumption is that the alert triggered when at home costs
the same as sending the daily report meaning that the security countermeasure
cost is the same for both. Then, we assume that the cost of sending an alert from
hospital is 1/6 less than the cost of an alert from home and the cost of the alert
while traveling is 32 times higher than the cost of the alert from home, taking
into account recommendations in Sect. 3.3. Thus, 220 hospital alerting sessions
and 6 travel alerting sessions are needed in order to reduce battery lifetime by
1 day, respectively.
Figure 1 shows the model parameters, variables and constants. P is the
patient type index with domain {0, 1, 2}. N is the number of patient profile
types, 0 for “best”, 1 for “medium” and 2 for “worst”. M is the normalization
to 1000 of the probability weight in order to accommodate all model probabil-
ity weights into approximating integer scale from 0 to 1000. On this scale P h
denotes the probability weight of being at home during any hour around the
clock. Similarly P t is the probability weight of traveling and P v is the probabil-
ity weight of visiting the hospital during any hour around the clock. P r is the
probability weight of daily reporting and it is the same for all patients. P a is
the probability weight of alerting at any hour. Alerting may occur in any of the
three different environments. Variable env is for the environment the patient is
currently located in and it can be assigned symbolic values home, travel and
hospital for the environment options.
Variable lif etime expresses the battery lifetime estimate in days which is
calculated iteratively in every hour (model time) depending on different envi-
ronment and communication events that can occur with probability weights
86 L. Tsiopoulos et al.
specified as described above. The initial value of battery lifetime estimate (with-
out any battery use) is 5000 d. deltaLT N is a constant showing the decrease
of battery lifetime by 1 day after 189 daily reporting sessions. deltaLT H is a
constant for the decrease of battery lifetime by 1 day after 189 home dynamic
alerting sessions. deltaLT T is a constant for the decrease of battery lifetime by
1 day after 6 dynamic alerting sessions during travel. deltaLT O is a constant
for the decrease of battery lifetime by 1 day after 220 hospital dynamic alerting
sessions. crD is a variable for counting sessions of daily reporting. This counter
is reset after reaching constant value cD which, in turn, triggers the subtraction
operation lif etime − deltaLT N . Similarly reaching values crO, crT and crH
with corresponding constants cO, cT and cH trigger resets of variables crO,
crT and crH, respectively. Letters O, T and H stand for hospital, traveling and
home, respectively.
in which the model time is not progressing, i.e., all state updates of transitions
from Committed locations are instantaneous (in model time).
constant the critical threshold will be reached by 4250 d (15% of 5000 d is 750 d).
Also we use an auxiliary clock variable GCl in the query to refer to the time
instances in the interval from 0 to EXLT , which stands for the expected lifetime
until reaching the critical threshold value. The TCTL formula (1) expresses the
property that in all states of all possible scenarios within closed time interval
[0,EXLT ] the calculated battery level never gets less than the Critical value
(750 d of remaining lifetime).
6 Conclusions
In this paper we have presented a model-based quantitative analysis of pace-
maker lifetime that takes into account patient specific factors, including general
health condition, acting environment, remote dynamic reporting of vital patient
data and alternative security protection measures for these data communica-
tions. The study did not follow proprietary pacemaker BlueSync implementation
that, according to our knowledge, supports a single security model. Instead, we
proposed a multi-level security model that, depending on the security context,
allows to select different security levels. Moreover, due to the fact that current
patient safety regulations do not foresee remote modifications of the pacemaker
firmware, our proposed cryptographic implementation should be applicable for
the secure implantable device firmware upgrade as well in the further.
The analysis of the recent related work on development of BANs and specif-
ically on implantable pacemakers motivated us for the work presented in this
paper. We performed probabilistic modeling and model analysis with UPPAAL
Timed Automata on a fully parameterizable model regarding some of typical
patient profiles. For that we took into account averaged patient-dependent data
for episode alerting frequency which is additionally assigned different security
costs based on three possible patient environments during a day. The focus
of our work was on pacemaker operational lifetime prediction with UPPAAL
model-checking tool with different remote observation needs according to car-
diovascular disease severity and location-dependent security requirements. The
proposed approach to fine-grained battery lifetime analysis using probabilistic
timed models is flexible in the sense that it can be easily adjusted by incorpo-
rating in the model only the factors that have impact to device endurance and
reliable maintenance planning.
Acknowledgement. This work has been supported by the ERDF funded centre of
excellence project EXCITE (2014–2020.4.01.15-0018), the Estonian Ministry of Edu-
cation and Research institutional research grant no. IUT33-13 and supported in part
by the Estonian Research Council grant PRG 424.
90 L. Tsiopoulos et al.
References
1. https://www.fairview.org/patient-education/116363EN, Accessed 15 August 2020
2. https://www.wired.com/story/pacemaker-hack-malware-black-hat/
3. https://www.medtronic.com/us-en/healthcare-professionals/products/cardiac-
rhythm/managing-patients/improved-outcomes/remote-monitoring-options.html
4. Medtronic Azure MRI Surescan Pacemaker Reference Manual, https://
www.medtronic.com/us-en/healthcare-professionals/products/cardiac-rhythm/
pacemakers/azure.html
5. Medtronic Azure MRI Surescan Pacemaker Technical Manual. https://www.
medtronic.com/us-en/healthcare-professionals/products/cardiac-rhythm/
pacemakers/azure.html
6. Ahmed, A., Hasan, O., Tahar, S., Mohamed, A.: Formal verification of energy
consumption for an eeg monitoring wireless body area sensor network. In: 2016
International Conference on Open Source Systems Technologies (ICOSST), pp.
18–22. IEEE (2016)
7. Behrmann, Gerd., David, Alexandre, Larsen, Kim G.: A tutorial on Uppaal. In:
Bernardo, Marco, Corradini, Flavio (eds.) SFM-RT 2004. LNCS, vol. 3185, pp.
200–236. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30080-
9_7
8. Ben Hamouda, R., Ben Hafaiedh, I.: Formal modeling and verification of a wire-
less body area network (WBAN) protocol: S-tdma protocol. In: 2017 International
Conference on Internet of Things, Embedded Systems and Communications (IIN-
TEC), pp. 72–77. IEEE (2017)
9. Bulychev, P.E., et al.: UPPAAL-SMC: statistical model checking for priced timed
automata. In: Wiklicky, H., Massink, M. (eds.) Proceedings 10th Workshop on
Quantitative Aspects of Programming Languages and Systems (2012)
10. Chen, T., Yu, Z., Li, S., Chen, B.: From wireless sensor networks to wireless body
area networks: formal modeling and verification on security using pat. J. Sens.
2016, 1–11 (2016). https://doi.org/10.1155/2016/8797568
11. Cronin, B., Maus, T.M., Khoche, S., Rozner, M.A.: Chapter 4 - cardio-
vascular implantable electronic device management in noncardiac surgery.
In: Kaplan, J.A., Cronin, B., Maus, T.M. (eds.) Essentials of Cardiac
Anesthesia for Noncardiac Surgery, pp. 70–99. Elsevier, New York (2019).
https://doi.org/10.1016/B978-0-323-56716-9.00004-7, http://www.sciencedirect.
com/science/article/pii/B9780323567169000047
12. Dai, S., Hong, M., Guo, B.: Synthesizing power management strategies for wireless
sensor networks with UPPAAL-STRATEGO. Int. J. Distrib. Sens. Networks 13(4)
(2017). https://doi.org/10.1177/1550147717700900
13. Granjal, J., Monteiro, E., Silva, J.S.: End-to-end transport-layer security for
internet-integrated sensing applications with mutual and delegated ECC public-key
authentication. In: 2013 IFIP Networking Conference, pp. 1–9. IEEE (2013)
14. Hsu, C.L., Avudaiappan, R.: Bluetooth technology. Academia Sinica Computing
Centre 18, (2002)
15. Hummen, R., Shafagh, H., Raza, S., Voig, T., Wehrle, K.: Delegation-based authen-
tication and authorization for the IP-based internet of things. In: 2014 Eleventh
Annual IEEE International Conference on Sensing, Communication, and Network-
ing (SECON), pp. 284–292 (2014)
16. Kramer, D.B., Fu, K.: Cybersecurity concerns and medical devices: lessons from a
pacemaker advisory. JAMA 318(21), 2077–2078 (2017). https://doi.org/10.1001/
jama.2017.15692
Analysis of Secure and Patient-Dependent Pacemaker Monitoring 91
17. Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: security attacks
and defenses for a diabetes therapy system. In: 2011 IEEE 13th International
Conference on e-Health Networking, Applications and Services, pp. 150–156. IEEE
(2011)
18. Moosavi, S.R., Nigussie, E., Levorato, M., Virtanen, S., Isoaho, J.: Performance
analysis of end-to-end security schemes in healthcare IoT. Procedia Comput. Sci.
130, 432–439 (2018)
19. Pajic, M., Jiang, Z., Lee, I., Sokolsky, O., Mangharam, R.: From verification to
implementation: a model translation tool and a pacemaker case study. In: 2012
IEEE 18th Real Time and Embedded Technology and Applications Symposium,
pp. 173–184. IEEE (2012)
20. Pycroft, L., Aziz, T.Z.: Security of implantable medical devices with wireless con-
nections: the dangers of cyber-attacks. Expert Rev. Med. Devices 15(6), 403–406
(2018). https://doi.org/10.1080/17434440.2018.1483235
21. Raatikainen, M.P., et al.: Statistics on the use of cardiac electronic devices and
electrophysiological procedures in the European Society of Cardiology countries:
2014 report from the european heart rhythm association. EP Europace 17(suppl-
1), i1–i75 (2015). https://doi.org/10.1093/europace/euu300
22. Rao, A., Rozenblit, J., Lysecky, R., Sametinger, J.: Composite risk modeling for
automated threat mitigation in medical devices. In: Proceedings of the Sympo-
sium on Modeling and Simulation in Medicine, MSM 2017, pp. 1–10. Society for
Computer Simulation International, San Diego, CA, USA (2017)
23. Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2. RFC
6347, 1–32 (2012)
24. Tarakji, K., et al.: P577 Early experience with the first pacemakers to directly con-
nect with smart devices for remote monitoring. Eur. Heart J. 40(Supplement_1)
(2019). https://doi.org/10.1093/eurheartj/ehz747.0188, ehz747.0188
25. Varma, N., et al.: The relationship between level of adherence to automatic wireless
remote monitoring and survival in pacemaker and defibrillator patients. J. Am.
Coll. Cardiol. 65(24), 2601–2610 (2015). https://doi.org/10.1016/j.jacc.2015.04.
033
Amplitude Modulation in a Molecular
Communication Testbed
with Superparamagnetic Iron Oxide
Nanoparticles and a Micropump
1 Introduction
The aim of molecular communication is to achieve data transmission using mol-
ecules or other particles in the nanoscale. So far, setups to experimentally inves-
tigate molecular communication with various transmission methods, such as air-
based transmission with alcohol [3,8,18] or encoding information as change of
pH-value [4,6,9] have been proposed. In [16] a different setup that uses super-
paramagnetic iron oxide nanoparticles (SPIONs) as information carriers in a fluid
transmission channel is presented. [1,2] provide some induction-based receiver
concepts for such SPION-based testbeds.
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 92–105, 2020.
https://doi.org/10.1007/978-3-030-64991-3_7
AM in a Molecular Communication Testbed with SPIONs and a Micropump 93
2 Testbed
The testbed can be separated into the four hardware components informa-
tion carriers, transmitter, channel and receiver. The principle setup was first
described in [16].
94 M. Bartunik et al.
2.3 Transmitter
5
4
@I
1 2 3
(a) The pump consists of a steel base plate (1), passive inlet (2) and outlet (3) valves, an
actuator diaphragm (4) and the piezoelectric actuator (5). Here the initial state, when
no voltage is applied to the actuator, is shown. The mounting process leads to a pre-bent
piezo actuator and actuator diaphragm.
(b) Applying a negative voltage of −80 V to the actuator causes the diaphragm to bend
upwards and the pump chamber is filled.
(c) With a positive voltage in the range of 80 V to 300 V the diaphragm is bent down-
wards and the liquid in the pump chamber is ejected through the outlet valve.
Fig. 1. Schematic cross-section of the used steel micropump shown for the three dif-
ferent actuation states.
The amount of SPIONs that are introduced into the background channel
in each symbol interval is varied to achieve different amplitude levels. As the
micropump is operated at a significantly higher rate (40 Hz) than the symbol
frequency (maximally 3.5 Hz), multiple pump strokes are observed as an indi-
vidual injection with higher volume. Furthermore, the injected volume per pump
stroke can be controlled. We therefore chose six different amplitude levels with
steps of a half stroke (approx. 6 µl) ranging from no injection (0 µl) to two and
a half strokes (approx. 28 µl) per injection.
96 M. Bartunik et al.
Fig. 2. Pictures of the steel micropump showing the top with the piezoelectric actuator
(left) and the steel base plate (right). The pump has a diameter of 20 mm.
2.4 Receiver
The transmission channel is passed through a custom made coil at the receiver.
Due to the magnetic properties of the SPIONs the coil inductance changes as the
nanoparticles pass through it. In a parallel circuit this change of inductance can
be observed as a shift of resonance frequency that is measured using the LDC1612
from Texas Instruments. The receiver setup and capabilities were presented in
[2]. The change in resonance frequency depends on the amount of SPIONs inside
the detection coil, allowing for differentiation of various amplitude levels.
3 Data Transmission
3.1 Encoding
Each transmitted symbol has six possible amplitude levels (0 to 5). Words are
constructed of two symbols with one amplitude level each. Binary data is rep-
resented by encoding five bits to one word. When encoding all possible 32 com-
binations of five bits to two symbol words (36 possible combinations), 4 unused
AM in a Molecular Communication Testbed with SPIONs and a Micropump 97
Table 1. Encoding table for the representation of 5 bits using words consisting of two
symbols (S0 and S1 ). To reduce bit errors for similar amplitude levels neighbouring
words have only a single bit change. The four remaining words in blue are not used for
transmission. A neighbouring bit sequence was arbitrarily chosen for decoding.
S0 S1
0 1 2 3 4 5
0 00000 00001 00011 01011 01001 01000
1 00100 00001 00010 01010 01001 01100
2 00101 00111 00110 01110 01111 01101
3 10101 10111 10110 11110 11111 11101
4 10100 10001 10010 11010 11001 11100
5 10000 10001 10011 11011 11001 11000
3.2 Decoding
The recorded signal is decoded using machine learning in a Matlab (The Math-
Works, Inc.) script. First, a moving averaging filter with a length of two samples
is applied to reduce noise and the amount of data points is increased to 100 Sa s−1
with cubic spline interpolation. Next, a zero baseline is determined as the mean
value of two symbol intervals before injection of SPIONs. The initial synchro-
nisation peak is set to the first local maximum after a threshold at half of the
maximal signal amplitude is exceeded. This peak is used to determine the fixed
symbol intervals with a known duration. To accommodate for transmission tim-
ing inaccuracies, the symbol intervals are resynchronised at the highest available
peaks that are at least five symbol intervals apart and exceed the initial detection
threshold.
For each symbol interval three signal parameters, which were determined by a
feature selection algorithm, are calculated. First, local maxima inside the symbol
interval are searched. For the peak with the largest amplitude the height of the
rising and falling edges are calculated by determining the minimal amplitude
within one symbol interval before and after the peak. In addition, the absolute
amplitude value is also recorded. If no local maximum is found, the symbol
98 M. Bartunik et al.
amplitude is set to the minimal amplitude inside the symbol interval. Figure 3
shows a section with eight symbols of a sample transmission, demonstrating
detection of the prediction parameters. As inter-symbol interference causes a
changed baseline for each symbol interval, the application of fixed threshold
values to differentiate between multiple amplitude levels is not possible.
0.4
Resonance Shift (kHz)
0.3
0.2
0.1
2 2 0 1 2 5 0 1
Fig. 3. Sample transmission sequence section with eight symbols. The symbol intervals
are shown with dashed lines and are annotated with the transmitted amplitude level.
Peaks are detected and the parameters peak amplitude (purple), rising edge height
(green) and falling edge height (red) determined for each symbol interval. The param-
eter detection is shown exemplary for two symbols.
The rising and falling edge heights are normalised to the values of the initial
synchronisation peak and then passed to a classification predictor together with
the amplitude levels. A discriminant analysis model fitted to a training sample
sequence with a total of 204 symbols is used for classification. An individual
model was trained for each symbol rate (2 Hz to 3.5 Hz) with the ‘fit discriminant
analysis classifier’ algorithm in Matlab. Figure 4 shows the spread of the three
prediction parameters in the training sequence for a symbol rate of 2 Hz. The
high deviation of the predictor parameters with overlapping areas does not allow
for simple threshold detection. By using the combined information of all three
parameters in a machine learning model a good prediction of the transmitted
symbol can be made.
AM in a Molecular Communication Testbed with SPIONs and a Micropump 99
1
Rising Edge Height
(Normalised)
0.5
0
0 1 2 3 4 5
Transmitted Symbol
1
Falling Edge Height
(Normalised)
0.5
0
0 1 2 3 4 5
Transmitted Symbol
Resonance Shift (kHz)
Peak Amplitude of
0.4
0.2
0 1 2 3 4 5
Transmitted Symbol
Fig. 4. Distribution of the three predictor parameters rising edge height, falling edge
height and peak amplitude for a training set of 204 symbols. Although the mean values
marked in red show a clear tendency, definite detection thresholds cannot be set due
to the high deviations.
100 M. Bartunik et al.
4 Results
4.1 Injection Volume Correlation
In a first step, the correlation between injected volume of SPIONs and detected
shift in resonance frequency is of interest. To determine this relation a series of
injections were performed with the micropump ranging in volume from one to
five pump strokes. Between each injection a pause, sufficient to ensure a return
to zero, was made. Figure 5 shows the detected resonance shift, normalised to
the maximal value, in relation to the normalised injection volume. As expected,
a linear relation between the detection signal and the injection volume can be
observed. Therefore, detection of different amplitude levels is possible.
1
Resonance Shift (Normalised)
0.8
0.6
0.4
0.2
Fig. 5. Resonance shift at the receiver in relation to injection volume for 24 individual
injection bursts. Each burst consists of one to five pump strokes. A linear relation
between the received signal and the transmitted volume of SPIONs can be observed.
0.4
Resonance Shift (kHz)
0.3
0.2
0.1
2 1 0 1 2 5 0 1
0 0 1 1 1 0 0 0 0 1 0 1 1 0 1 0 0 0 0 1
Fig. 6. Sample transmission sequence section with eight symbols. The detected symbol
values for each interval and the decoded words are shown. The second transmitted
symbol value (2) was incorrectly detected as 1. However, as neighbouring words differ
only by a one bit the selected coding restricts the decoded binary word to a single bit
error.
In Fig. 7 the average symbol and bit error probabilities are shown for the four
different symbol interval durations. No significant correlation between reduced
symbol intervals and an increase of decoding errors can be observed. As can be
seen in Fig. 8, symbol detection errors are restricted to a single value offset in
most cases. Due to the choice of coding, only a single bit error occurs for such
a single value detection offset. The result is a significantly lower bit error rate
(20% for a single word with a typical symbol error) than symbol error rate (50%
for a single word with one detection error).
From an information theory perspective our transmission from encoding to
decoding can be regarded as a binary symmetric channel, implying equal prob-
abilities for bit errors independent of bit value. The capacity of such a channel
with a given error probability f is
1 1
C(f ) = 1 − f log2 + (1 − f ) log2 . (1)
f 1−f
0.35
Symbol Errors
Bit Errors
0.3
Error Probability
0.25
0.2
0.15
0.1
0.28 0.3 0.32 0.34 0.36 0.38 0.4 0.42 0.44 0.46 0.48 0.5 0.52
Symbol Interval (s)
Fig. 7. Probabilities for bit and symbol errors using amplitude modulation and the
provided coding scheme. Due to the use of grey code, the average probability for a bit
error (10.3%) is significantly lower than the symbol error probability (24%).
0.5 s
0.8 0.4 s
0.33 s
Probability of Occurrence
0.29 s
0.6
0.4
0.2
0
0 1 2 3 4 5
Offset from transmitted symbol value
Fig. 8. Probabilities for various receive symbol errors. A detection error with an offset
larger than 1 amplitude level occurs in only very few cases, resulting in the coding gain
achieved by the use of grey code.
AM in a Molecular Communication Testbed with SPIONs and a Micropump 103
where R is the code rate. Using (2) we can calculate the possible effective data
rates for both the transmission scenario using AM and previous results with
OOK presented in [2].
Figure 9 shows the calculated values for the various symbol intervals and mul-
tiple tolerable BER scenarios. Although different symbol intervals were investi-
gated in [2], the possible effective data rates can be compared to the results
presented here. For a symbol interval of 0.4 s and a tolerable BER of 1% an
effective data rate of 3.9 bit s−1 is achievable using AM. With the same param-
eters the data rate was restricted to 2.3 bit s−1 using OOK. Of the investigated
intervals, the maximal data rate using AM is reached at a symbol interval of
0.29 s and is 4.5 bit s−1 for a remaining BER of 1%. This is close to double the
value achievable with OOK in [2].
5 AM with 5 % BER
AM with 1 % BER
AM with 0.1 % BER
OOK with 5 % BER
Effective Data Rate (bit s−1 )
Fig. 9. Achievable effective data rate according to the noisy-channel coding theorem.
Comparable values for OOK were taken from [2]. With a tolerable BER of 1% an
effective data rate of 4.5 bit s−1 can be reached using the proposed AM scheme. The
maximal value for OOK is 2.3 bit s−1 .
5 Conclusion
A micropump was successfully used as a transmitter in the provided molecular
communication testbed. Due to the pumps capabilities, six different amplitude
104 M. Bartunik et al.
References
1. Bartunik, M., et al.: Novel receiver for superparamagnetic iron oxide nanoparti-
cles in a molecular communication setting. In: Proceedings of the Sixth Annual
ACM International Conference on Nanoscale Computing and Communication -
NANOCOM 2019. ACM Press (2019). https://doi.org/10.1145/3345312.3345483
2. Bartunik, M., et al.: Comparative evaluation of a new sensor for superparamag-
netic iron oxide nanoparticles in a molecular communication setting. In: Chen,
Y., Nakano, T., Lin, L., Mahfuz, M.U., Guo, W. (eds.) BICT 2020. LNICST,
vol. 329, pp. 303–316. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-
57115-3 27
3. Farsad, N., Guo, W., Eckford, A.W.: Tabletop molecular communication: text
messages through chemical signals. PLoS ONE 8(12), 1–13 (2013). https://doi.
org/10.1371/journal.pone.0082935
4. Farsad, N., Pan, D., Goldsmith, A.: A novel experimental platform for in-vessel
multi-chemical molecular communications. In: Proceedings of the IEEE Global
Communications Conference, GLOBECOM 2017. IEEE (2017). https://doi.org/
10.1109/glocom.2017.8255058
5. Ginsberg, B.H.: Patch pumps for insulin. J. Diab. Sci. Technol. 13(1), 27–33 (2019).
https://doi.org/10.1177/1932296818786513
6. Grebenstein, L., et al.: Biological optical-to-chemical signal conversion interface:
a small-scale modulator for molecular communications. IEEE Trans. NanoBiosci.
18(1), 31–42 (2019). https://doi.org/10.1109/tnb.2018.2870910
AM in a Molecular Communication Testbed with SPIONs and a Micropump 105
7. Herz, M., Richter, M., Wackerle, M.: Method for manufacturing a bending trans-
ducer, a micro pump and a micro valve, micro pump and micro valve (2016).
https://patents.google.com/patent/US9410641B2/en
8. Koo, B.H., Lee, C., Yilmaz, H.B., Farsad, N., Eckford, A., Chae, C.B.: Molecular
MIMO: from theory to prototype. IEEE J. Sel. Areas Commun. 34(3), 600–614
(2016). https://doi.org/10.1109/jsac.2016.2525538
9. Krishnaswamy, B., et al.: Time-elapse communication: bacterial communication on
a microfluidic chip. IEEE Trans. Commun. 61(12), 5139–5151 (2013). https://doi.
org/10.1109/tcomm.2013.111013.130314
10. Kuran, M.S., Yilmaz, H.B., Tugcu, T., Akyildiz, I.F.: Modulation techniques for
communication via diffusion in nanonetworks. In: Proceedings of the IEEE Inter-
national Conference on Communications (ICC 2011), pp. 1–5 (2011)
11. MacKay, D.J.C.: Information Theory, Inference and Learning Algorithms. Cam-
bridge University Press, Cambridge (2003)
12. Müller, G., Friedberger, A., Kreisl, P., Ahlers, S., Schulz, O., Becker, T.: A mems
toolkit for metal-oxide-based gas sensing systems. Thin Solid Films 436(1), 34–45
(2003). https://doi.org/10.1016/S0040-6090(03)00523-6
13. Pabst, O., Perelaer, J., Beckert, E., Schubert, U.S., Eberhardt, R., Tünnermann,
A.: All inkjet-printed piezoelectric polymer actuators: characterization and appli-
cations for micropumps in lab-on-a-chip systems. Org. Electron. 14(12), 3423–3429
(2013). https://doi.org/10.1016/j.orgel.2013.09.009
14. Singhal, A., Mallik, R.K., Lall, B.: Performance analysis of amplitude modula-
tion schemes for diffusion-based molecular communication. IEEE Trans. Wireless
Commun. 14(10), 5681–5691 (2015). https://doi.org/10.1109/TWC.2015.2441067
15. Tsai, N.C., Sue, C.Y.: Review of mems-based drug delivery and dosing systems.
Sens. Actuators, A 134(2), 555–564 (2007). https://doi.org/10.1016/j.sna.2006.06.
014
16. Unterweger, H., et al.: Experimental molecular communication testbed based on
magnetic nanoparticles in duct flow. In: Proceedings of the IEEE 19th International
Workshop on Signal Processing Advances in Wireless Communications (SPAWC
2018), pp. 1–5 (2018). https://doi.org/10.1109/SPAWC.2018.8446011
17. Wald, C., Richter, M.: Low-Cost Edelstahl-Mikropumpe zur Probenzufuhr
eines miniaturisierten Gassensorsystems zur Brandfrüherkennung. In: MikroSys-
temTechnik Kongress Proceedings. Mikroelemente & Systeme 2015, pp. 448–451
(2015)
18. Wang, L., Farsad, N., Guo, W., Magierowski, S., Eckford, A.W.: Molecular bar-
codes: information transmission via persistent chemical tags. In: Proceedings of
the IEEE International Conference on Communications (ICC 2015). IEEE (2015).
https://doi.org/10.1109/icc.2015.7248469
19. Wang, Y.N., Fu, L.M.: Micropumps and biomedical applications - a review. Micro-
electron. Eng. 195, 121–138 (2018). https://doi.org/10.1016/j.mee.2018.04.008
An Enhanced DNA Sequence Table
for Improved Security and Reduced
Computational Complexity of DNA
Cryptography
Maria Imdad, Sofia Najwa Ramli(B) , Hairulnizam Mahdin, Boppana Udaya Mouni,
and Shakira Sahar
Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn
Malaysia, 86400 Batu Pahat, Malaysia
[email protected], {sofianajwa,hairuln}@uthm.edu.my,
[email protected], [email protected]
1 Introduction
Novel encryption techniques tend to ensure system security more than traditional cryp-
tographic methods either by combining two or more traditional techniques or by taking
the advantage of biological characteristic of DNA encryption [1, 2]. With advancements
in technology, more efforts are to ensure system security from attacker’s perspective. A
recent study sheds light on the fact that traditional cryptographic solutions either sym-
metric or asymmetric encryption are not secure any longer and cannot be used directly
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 106–120, 2020.
https://doi.org/10.1007/978-3-030-64991-3_8
An Enhanced DNA Sequence Table for Improved Security 107
as a standalone solution [3]. One of the presented solution is using DNA Cryptography
only or in combination with traditional cryptography, where DNA computing, encoding,
decoding, and biological simulation processes yield better security [4]. Recent advance-
ments in DNA cryptography present the solutions based on symmetric and asymmet-
ric cryptographic systems, which when deployed showed improved usability [5]. These
advancements are primarily because of DNA computing being fast and secure than exist-
ing technique and indicating that in near future DNA chips will replace silicon chips
in computer systems for highly fast processing. A single gram of DNA has 1021 bases
which are equal to 108 of data, due to the compactness in the double-helical structure
of DNA [6].
DNA computing was started by L. Adleman in 1994 to solve complex computational
problems primarily [7]. Recent development shows that it uses DNA cryptography to
ensure system security for the next generations. Specifically, proposed encryption algo-
rithms apply DNA cryptography with a DNA table that serves as a foundation for encod-
ing and decoding the ASCII characters using DNA bases. DNA has four bases which
are known as Adenine (A), Guanine (G), Cytosine (C) and Thymine (T) for encoding.
Initially, researchers in [8] have designed a base table using those bases and most tech-
niques use the table either with or without iterations currently. This means that in one
iteration code, “TTTT” sequence is representing A in the plaintext characters but in
other iterations, this code may be used to represent Y. Only the code positions against
characters changes but the sequence remains the same, and this is done to ensure that
same plain text is retrieved at the other end after passing through this table. However,
the analysis of the DNA encryption technique shows that frequency analysis reveals
information about the key [9]. Thus, this paper proposes an enhanced DNA encoding
table that is designed keeping in view the frequency count, randomness in codes and
entropy of the table. Later, the proposed table is compared with the table in [8], followed
by a complete encryption-decryption process and performance analysis.
The rest of the paper is organized as follows: Sect. 2 has a review of the work
done so far. Section 3 gives a detailed insight into the proposed table. Section 4 has an
experimental analysis, statistics followed by conditional entropy and its calculation and
lastly Sect. 5 concludes this paper.
2 Related Work
DNA cryptography is an umbrella having technologies that are inspired by genetic entity
DNA, ranging from Polymerize Chain Reaction (PCR) of DNA synthesis to digital cod-
ing using the same bonding and stimulation patterns as defined in DNA by nature [9].
This paper focuses on the study of techniques where DNA coding has been used to
improve system security. DNA coding has four basic nitrogenous bases A,T,C,G and
their representation using binary bases 0 and 1. Several DNA based cryptographic tech-
niques have been proposed where DNA bases are used in combination with one-time
pad (OTP) [10–12]. The technique in [10] uses microdots to save ciphertext while PCR
is used at the decryption end. Whereas researchers in [11] use basic mathematical oper-
ations like DNA addition, DNA subtraction combined in a Feistel structure for system
security. Meanwhile, the technique in [13] uses a lookup table to rearrange DNA bases,
108 M. Imdad et al.
where a dynamic table for 256 ASCII characters is created. Then, it applies iterations
to change the positions of characters which followed by a mathematical series before it
uses asymmetric encryption for the encryption-decryption process. The combination of
the output from the asymmetric encryption process with chunks of dynamically encoded
text produces the ciphertext.
Later, researchers in [14] introduce a dynamic ASCII table where random ASCII
characters are assigned to DNA bases initially. The dynamic ASCII table brings a new
insight into DNA cryptography that random table results in different ciphertexts with the
same plaintext making it challenging for an attacker to get access to the table along with
iteration. A mathematical series is used for iteration purposes in which every iteration
changes the position of the characters dynamically. For example, plaintext “A” may be
encoded as “AAAA” in one iteration but in the next iteration, it may be “ACCT” to
provide the randomness to the ciphertext. The same plaintext is encoded over different
iteration to yield different ciphertexts. This encoded text is modified using OTP and
is followed by genomic conversion. The final ciphertext is a compressed form of the
genomic conversion into an amino acid table.
A biological simulation-based technique is proposed in [15] whereby a unique DNA
based encoding table has been introduced. In this technique, a random encoding table is
introduced after every session resulting in session-based output. The approach encodes
the same plaintext that has different outputs in every different session. On the other hand,
authors in [16] remove limitations of OTP ciphertext using DNA and amino acid coding,
followed by randomness evaluation using NIST tests. A biotic-DNA oriented secret
key mechanism is introduced in [17] and they use genetic information gathered from
biological systems. The technique in [18] is a combination of digital coding, traditional
cryptography as well as PCR amplification. Digital coding and traditional encryption are
used to encode the plaintext followed by PCR for key generation. The technique in [19]
has the underlying foundation of the signature method and asymmetric encryption with
DNA. Initially the plain text is converted into ASCII codes followed by binary code, and
is transformed into a matrix. This data is transmitted physically as a biological molecule
in DNA.
DNA cryptography is not limited to text encryption but is equally applicable in
image encryption as well [20]. A technique proposed by Zhang et al. [21] is image-
based encryption comprised of map lattices of linear, as well as non-linear coupled with
spatiotemporal chaos. A technique proposed in [22] is a combination of the hyperchaotic
system along with a genetic recombinant, for image encryption where the system proved
good security for image encryption. Zhang et al. proposed an image encryption system
[23] based on permutation algorithms. Mix chaotic mapping in addition to Josephus
traversing is used in [24] for image encryption. A combination of the chaotic system
has been proposed in [25] which gave good encryption results than the previous tech-
niques. DNA cryptography has been implemented in cloud computing to improve system
security by enabling socket programming [26, 27]. In [28] an architectural framework
has been proposed where digital signatures have been used in combination with DNA.
Robust DNA codes based on DNA sequence has been proposed in [29, 30].
A technique proposed in [31] has used the same base table as in [8] and it uses DNA
computing for intrusion detection. In this technique, DNA encoding is used to convert
An Enhanced DNA Sequence Table for Improved Security 109
the network traffic data into DNA sequences. The idea behind selecting DNA computing
is that it follows the same mechanism to detect diseases as an intrusion detection system
does. The results of the technique show that DNA can be used for intrusion detection
and can give better results using a better encoding method.
Analyzing the existing work proves that all these techniques use the same base
table as in [8] with or without iterations. This base table has a unique code for all ASCII
printable characters, alphabets, capital, small, numbers and special characters. This table
has 96 codes for 96 different characters which are 26 capital, 26 small, 10 numbers and
34 special characters. The bases contain binary coding, A = 00, T = 01, G = 10, C = 11.
Each character is coded using DNA bases such as “y” is coded as “AAAA”. These codes
are unique, indicating no two characters can have the same code. Where primarily this
table is used to introduce randomness in cipher text. This table being randomly generated
can yield more or less randomness across iterations, so by carefully examining this fact
a new table has been created, which will always yield better randomness. New table is
static in nature but can improve security as it has more random encoding as compare to
base table. Frequently occurring characters have high random codes than less frequently
occurring. Where a detail description is provided in Sect. 3. Keeping these facts into
consideration, a new encoding table has been designed and these two tables will be
compared based on different parameters.
The proposed table has unique codes for all 48 * 2 = 96 matrix as of base table as in
Table 1. These codes are not assigned randomly but have the underlying foundation as
follows:
Rank Character Frequency DNA code Rank Character Frequency DNA code
1 e 7,741,972 ATCG 49 H 123,634 CGTC
2 t 5,507,785 ACTG 50 x 123,585 CTGC
3 a 5,263,861 ACGT 51 7 120,193 AGAC
4 o 4,729,276 ATGC 52 W 107,223 ACAG
5 n 4,535,686 AGTC 53 L 106,998 ATAG
6 i 4,527,428 AGCT 54 O 105,776 AGAT
7 s 4,186,244 GCTA 55 F 100,951 ACAT
8 r 4,137,989 TACG 56 Y 94,312 ATAC
9 h 2,955,955 TCAG 57 G 93,618 TATC
10 l 2,553,528 TGCA 58 J 78,794 TCCA
11 d 2,369,920 TGAC 59 z 66,509 TGTA
12 c 1,960,612 TAGC 60 j 65,894 TATG
13 u 1,613,333 TCGA 61 U 57,512 TCTG
14 m 1,467,476 GATC 62 q 54,288 TGTC
15 f 1,296,945 GCAT 63 : 54,102 GACC
16 p 1,255,599 GTCA 64 ) 53,753 GCGA
17 g 1,206,847 GTAC 65 ( 53,472 GTGA
18 y 1,062,140 AGCG 66 $ 51,586 GAGT
19 w 1,015,755 GACT 67 K 46,612 GCGT
20 , 985,065 CATG 68 ; 36,839 GTGC
21 . 946,186 CTGA 69 V 31,104 CGCA
22 b 866,356 CTAG 70 * 20,772 CACG
23 v 653,397 CAGT 71 ? 12,481 CTCG
24 0 546,333 CGTA 72 Q 11,872 CGCT
25 1 461,006 CGAT 73 / 8,198 CTCA
26 k 460,798 CATC 74 X 7,682 CACT
27 5 374,503 ACGC 75 & 6,539 AGAG
28 2 333,599 ATCA 76 Z 5,672 ACAC
29 T 325,562 ACTA 77 ! 2,201 ATAT
30 S 304,999 AGTA 78 % 2,005 TGTG
31 “ 284,771 ATGA 79 + 324 TATA
32 9 282,397 AGCA 80 > 89 TCTC
(continued)
An Enhanced DNA Sequence Table for Improved Security 111
Table 1. (continued)
Rank Character Frequency DNA code Rank Character Frequency DNA code
33 A 280,987 ACGA 81 < 84 TCGC
34 M 259,574 TCGT 82 = 24 GAGA
35 – 252,382 TGCT 83 # 12 GTGT
36 C 229,383 TAGT 84 @ 3 CACA
37 I 223,370 TGAT 85 { 2 CCCG
38 N 205,465 TCAT 86 } 2 CGCC
39 ‘ 204,593 TACT 87 [ 2 TGGT
40 4 192,545 GATG 88 ] 2 GTTG
41 3 187,640 GTAG 89 ˆ 2 GAAG
42 8 182,681 GTCC 90 _ 2 GTTG
43 B 169,490 GCTG 91 | 1 TAAT
44 6 153,881 GACG 92 ~ 1 TCCT
45 R 146,455 GCAG 93 \ 1 CAAT
46 P 144,300 CTAC 94 ‘ 1 GAAT
47 E 138,459 CGAC 95 e 1 CGGT
48 D 129,645 CAGC 96 £ 1 GTAA
The subsequent section gives a detailed insight into how this entropy is calculated
and what is the ideal value for this entropy.
3.1 Entropy
Entropy is the measure of uncertainty in bits and this concept was introduced by Shannon
in 1948 [32, 33]. The uncertainty of the cipher is the number of plaintext bits that must be
recovered from scrambled ciphertext to get the message back, and this is measured via
entropy. The entropy of a variable is the weighted average of optimal bit representation
size such as the average size of an optically encoded message. Mathematically, entropy
can be defined as in (1) [9, 34].
H (X ) = − Pr[X ]log2 (Pr[X ]) (1)
x∈X
Meaning, higher the probability of an event less the uncertainty. Here we are calcu-
lating the entropy of X with four bases as X = {A, C, T , G}. Now, the probability of
each DNA base multiplied by log of its probability as modified for four values as in (2):
H (X ) = − P(A)log2 (P(A)) + P(C)log2 (P(C)) + P(G)log2 (P(G)) + P(T )log2 (P(T )) (2)
The highest uncertainty is only achieved when the values are equally distributed.
Figure 1 explains that the probability of an event that ranges from 0 to 1 and the entropy
112 M. Imdad et al.
can range from 0 to 1. This graph gives an insight into the entropy of an event where
two outcomes are considered:
• The value of entropy is 0 for both the least and highest probability, which proves that
if the probability of occurrence is 0, an event entropy will be 0, indicating that event
will never happen. Similarly if the probability of an event is 1 means this event will
always happen against the entropy is 0 because, in this scenario, there is no uncertainty
about the information.
• The entropy of the system is maximum “1” when the probability is “1/2 = 0.5”.
This clearly indicates that all events have the same chance to occur. If the probability
increases from “0.5” then entropy decreases and similarly if the probability decreases
the entropy also decreases, because in a former event is less likely to occur whereas
in later the event is more likely to occur.
• For a system where number of events increases, for example, it has four possible
outcomes and the probability range from 0 to 1, its distribution differs. Each event
has equal probability 1/4 = 0.25 only then maximum entropy will be achieved. Here
the entropy reaches a maximum value which is 2.
This section calculates the entropy of the base table that originally described in [8] and
followed by the entropy of the proposed table.
H (X ) = 1.9164
An Enhanced DNA Sequence Table for Improved Security 113
Hence the minimum number of bits needed to encode all possible meaning of the
table or number of bits of information per character is 1.92.
H (X ) = 2
The minimum number of bits needed to encode all possible meaning in the proposed
table or number of bits of information per character is 2. Higher entropy makes con-
ducting frequency analysis harder in DNA cryptography. The DNA table with higher
entropy introduces more uncertainty about the ciphertext when an attacker does not
have any information about the plaintext. Meanwhile, a lack of good entropy can leave
a cryptosystem vulnerable and unable to encrypt data securely. Later, Sect. 4 discusses
the experimental result of the entropy for the proposed DNA table.
4 Experimental Results
To compare the performance of both DNA tables, this section describes the encryption
algorithm [14] of DNA cryptography as follows..
length, m becomes m * 4 in the encoded text. Given below are the graphs, indicating the
frequency count of the input string of 3000 characters and 6000 characters as in Fig. 2
and Fig. 3 respectively. An input string of 3000 characters yields an encoded string
3000 * 4 = 12000 DNA bases. Figure 2 gives the insight of DNA bases frequencies.
From Subsect. 3.2 with the calculation of the proposed table entropy, the encoded count
of all DNA bases should be equally distributed, thus making a string of 12000 bases
has 12000/4 = 3000 frequency per base. Figure 2 proves that the frequency count of the
base table is not uniformly distributed, ranging from 1938–4830 when compared to the
proposed DNA table with the range in between 2933 to 3036.
6000 12000
9779
4830 10000
5000
4000 8000
6031 6007 6061 5901
3013 3018 3036 5580
2762 2933 6000 4660
3000 2470
1938 3981
2000 4000
1000 2000
0 0
A C G T A C G T
Base Proposed Base Proposed
Fig. 2. Frequency count input 3000 characters Fig. 3. Frequency count input 6000
characters
Figure 3 shows the frequency count using another input of 6000 characters that
creates 6000 * 4 = 24000 DNA bases. Ideally, the frequency of each base should be
6000 or nearly equal to it, but the frequency count of the DNA base table ranges from
3981–9779 while the proposed DNA table creates the value near to 6000, ranging from
5901–6061.
Figure 4 illustrates a time comparison to substitute the same plaintext of equal length
using both DNA tables. The graph proves that time difference is negligible in case of
small plaintext, but as the size of plaintext increases, the time required to encrypt the
plaintext using the proposed DNA table has a significant difference as compared to the
base table. Based on the graph, for an input of 50 characters, the time taken by the base
table is 0.0539 ms while the proposed table is 0.0522 ms with the time difference is
0.0017 ms. But, as the size of plaintext increases to 1750 characters, the time difference
is 0.0646 ms, and for 2500 characters, the time difference has increased to 0.9931 ms.
This difference is mainly because of the frequency analysis performed prior to table
creation, as most occurring characters are at the start so the loop does not iterate through
the whole table. Instead, it immediately encodes the character and exits but in the base
table, the characters are randomly placed so the time increases with the size of the input.
An Enhanced DNA Sequence Table for Improved Security 115
50
40
Time in miliseconds
30
20
10
Fig. 4. Time comparison of encoding process using the DNA base and proposed table
70
60
50
40
30
20
10
0
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Proposed 29 19 14 13 18 4 36 15 8 0 13 20 15 9 18 22 1 33 18 20 10 37 12 8 0 8
Base 50 4 6 4 7 2 31 21 11 2 3 21 0 10 3 66 15 50 19 33 2 18 0 12 1 9
Proposed Base
500
450
400
350
300
250
200
150
100
50
0
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Proposed 255102100 76 101 27 308 98 73 11 90 170155 74 114219100246196157158221 82 38 19 50
Base 399 43 91 41 56 19 249142 72 11 50 158 32 64 21 451130403160262 66 137 13 95 17 58
Proposed Base
0.35
0.3
0.25
Time in seconds
0.2
0.15
0.1
0.05
0
300 600 900 1200 2400
Input size as number of characters
Proposed Base
4.3484 4.3531
4.4 4.2874 4.2674
4.3 4.2403
4.164
4.2 4.0965
4.1 4.0653 4.0307
H(C)
4 3.9146
3.9
3.8
3.7
3.6
300 600 900 1200 2400
Input size as number of characters
Proposed Base
Key equivocation is a process in cryptanalysis where the attacker has only access
to ciphertext and he tries to infer some information about the key. It is also known
as a ciphertext-only attack. Given below is the calculation of conditional entropy in
118 M. Imdad et al.
both scenarios whereby the encryption uses the base and the proposed table. Key and
plaintext are the same for both cases with the number of input characters of 1200. Using
the equation in (3) to calculate the conditional entropy for base table, H (K/C N ) =
0.9994 + 4.7615 − 4.164 = 1.5969 and the conditional entropy for the proposed table,
H (K/C N ) = 0.9994 + 4.47615 − 4.3484 = 1.1272.
This conditional entropy is the information being leaked or it can be stated as the
amount of information of the key with the given cipher. The result shows that the pro-
posed technique reveals less information about the key than the base technique. Hence,
the proposed table technique can serve as a good substitute for the base technique for
improvements in terms of frequency analysis, computational time, and entropy.
5 Conclusion
Acknowledgement. The authors would like to thank all reviewers for their helpful comments.
The authors would also like to thank the Ministry of Higher Education Malaysia for supporting the
research under Fundamental Research Grant Scheme Vot No. FRGS/1/2019/ICT03/UTHM/03/1
and partially sponsored by Universiti Tun Hussein Onn Malayisa.
References
1. Lu, M.X., et al.: Symmetric-key cryptosystem with DNA technology. Sci. China Ser. F: Inf.
Sci. 50(3), 324–333 (2007)
2. Anam, B., Sakib, K., Hossain, M.A., Dahal, K.: Review on the advancements of DNA
cryptography. arXiv preprint arXiv:1010.0186 (2010)
3. Kabir, K.S., Chakraborty, T., Alim Al Islam, A.B.M.: SuperCrypt: a technique for quantum
cryptography through simultaneously improving both security level and data rate. In: Pro-
ceedings of the 2016 International Conference on Networking System and Security, pp. 25–33
(2016)
An Enhanced DNA Sequence Table for Improved Security 119
4. Pelletier, O., Weimerskirch, A.: Algorithmic self-assembly of DNA tiles and its application
to cryptanalysis. arXiv preprint arXiv:cs/0110009 (2001)
5. Galbraith, S.D.: Mathematics of Public Key Cryptography. Cambridge University Press, New
York (2012)
6. Zhang, Y., He, L., Fu, B.: Research on DNA cryptography. In: Applied Cryptography and
Network Security. InTech, Rijeka (2012)
7. Adleman, L.M.: To combinatorial problems. Science 266(5187), 1021–1024 (1994).
https://doi.org/10.1126/science.7973651. Bibcode: 1994Sci…266.1021A. CiteSeerX
10.1.1.54.2565
8. Noorul Hussain, U., Chithralekha, T.: Inventors; assignee. A novel DNA encoding technique
and system for DNA cryptography. India Patent 5107, CHE, 2012, 7 December 2012
9. Othman, H., Hassoun, Y., Owayjan, M.: Entropy model for symmetric key cryptography
algorithms based on numerical methods (2015). https://doi.org/10.1109/arcse.2015.7338142
10. Borda, M., Tornea, O.: DNA secret writing techniques. In: Proceedings of the 8th International
Conference on Communications (COMM), pp. 451–456 (2010)
11. Zhang, X., Zhou, Z., Niu, Y.: An image encryption method based on the feistel network and
dynamic DNA encoding. IEEE Photonics J. 10(4), 3901014 (2018)
12. Zhang, Y., Liu, X., Sun, M.: DNA based random key generation and management for OTP
encryption. Biosystems 159, 51–63 (2017)
13. Biswas, R., Alam, K.M.R.: A technique for DNA cryptography based on dynamic mecha-
nisms. J. Inf. Secur. Appl. 48, 102363 (2019)
14. Hossain, E.M.S., Alam, K.M.R., Biswas, M.R.: A DNA cryptographic technique based on
dynamic DNA sequence table. In: Proceedings of the 19th International Conference on Com-
puter and Information Technology, 18–20 December 2016, North South University, Dhaka,
Bangladesh. IEEE (2016)
15. Hussain, N., Rahman, U., Balamurugan, C., Mariappan, R.: A novel DNA computing based
encryption and decryption algorithm. In: International Conference on Information and Com-
munication Technologies (ICICT 2014), Procedia Computer Science, vol. 46 pp. 463–475
(2015)
16. Ibrahim, F.E., Moussa, M.I., Abdalkader, H.M.: A symmetric encryption algorithm based on
DNA computing. Int. J. Comput. Appl. 97(16), 41–45 (2014)
17. Babu, E.S., Raju, C.N., Prasad, M.H.M.K.: Inspired pseudo biotic DNA based cryptographic
mechanism against adaptive cryptographic attacks. Int. J. Netw. Secur. 18(2), 291–303 (2016)
18. Cui, G., Qin, L., Wang, Y., Zhang, X.: An encryption scheme using DNA technology. In:
Proceedings of the 3rd International Conference on Bio-Inspired Computing: Theories and
Applications, USA, pp. 37–42. IEEE (2008)
19. Lai, X., Lu, M., Qin, L., Han, J., Fang, X.: Asymmetric encryption and signature method with
DNA technology. Sci. China Inf. Sci. 53(3), 506–514 (2010)
20. Kulsoom, A., Xiao, D., Aqeel-ur-Rehman, Abbas, S.A.: An efficient and noise resistive selec-
tive image encryption scheme for gray images based on chaotic maps and DNA comple-
mentary rules. Multimed. Tools Appl. 75, 1–23 (2016). https://doi.org/10.1007/s11042-014-
2221-x
21. Zhang, Y.Q., Wang, X.Y.: A symmetric image encryption algorithm based on mixed linear-
nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)
22. Wang, X.Y., Zhang, H.L.: A novel image encryption algorithm based on genetic recombination
and hyper-chaotic systems. Nonlinear Dyn. 83, 333–346 (2016)
23. Zhang, W., Yu, H., Zhao, Y.L., Zhu, Z.L.: Image encryption based on three-dimensional bit
matrix permutation. Signal Process. 118, 36–50 (2016)
24. Wang, X.Y., Zhu, X.Q., Zhang, Y.Q.: An image encryption algorithm based on Josephus
traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)
120 M. Imdad et al.
25. Parvaz, R., Zarebnia, M.: A combination chaotic system and application in color image
encryption. Opt. Laser Technol. 101, 30–41 (2018)
26. Prajapati Ashishkumar, B., Barkha, P.: Implementation of DNA cryptography in cloud
computing and using socket programming. IEEE (2016)
27. Hammami, H., Brahmi, H., Yahia, S.B.: Secured outsourcing towards a cloud computing
environment based on DNA cryptography, pp. 31–36. IEEE (2018)
28. Chouhan, D.S., Mahajan, R.P.: An architectural framework for encryption & generation of
digital signature using DNA cryptography, pp. 743–748. IEEE (2014)
29. Keerthana Priya, S.V., Saritha, S.J.: A robust technique to generate unique code DNA
sequence, pp. 3815–3820. IEEE (2017)
30. Sadeg, S., Gougache, M., Mansouri, N., Drias, H.: An encryption algorithm inspired from
DNA. In: Proceedings of the International Conference on Machine and Web Intelligence,
pp. 344–349. IEEE (2010)
31. Rashid, O.F., Othman, Z.A., Zainudin, S.: A novel DNA sequence approach for network
intrusion detection system based on cryptography encoding method. Int. J. Adv. Sci. Eng.
Inf. Technol. 7(1), 183–189 (2017)
32. Jones, M.N., Mewhort, D.J.K.: Case-sensitive letter and bigram frequency counts from large-
scale English corpora. Behav. Res. Methods Instrum. Comput. 36, 388 (2004). https://doi.
org/10.3758/BF03195586
33. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423
(1948). https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
34. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(4), 623–656
(1948). https://doi.org/10.1002/j.1538-7305.1948.tb00917.x
35. Mohan, M., Kavitha Devi, M.K., Jeevan Prakash, V.: Security analysis and modification of
classical encryption scheme. Indian J. Sci. Technol. 8(S8), 542–548 (2015). ISSN (Print):
0974-6846 ISSN (Online): 0974-564
Solving Generic Decision Problems
by in-Message Computation in
DNA-Based Molecular Nanonetworks
1 Introduction
After the concept of nanonetworks and their use in, e.g., medical applications
have been adequately described in recent years, research groups worldwide are
now looking into the question of how such nanonetworks can actually be con-
structed. A promising approach is the paradigm of self-assembly: components
of nanonetworks such as sensors, actuators and even the messages exchanged
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 121–136, 2020.
https://doi.org/10.1007/978-3-030-64991-3_9
122 F.-L. A. Lau et al.
between them can grow like crystals [7] instead of being manually engineered by
humans – a process hardly imaginable on the nanoscale [4].
Crystal formation is a natural instance of the principle of self-assembly. It
is based on tiny and often simple components assembling themselves into larger
and more complex structures according to local rules. In order to make this
process usable in the context of building nanonetworks, the resulting complex
structures should be nanodevices, nanosensors, message molecules, fully func-
tional nanonetworks or even computers [2]. However, it is hardly possible to
influence the process. A very fortunate exception are certain building blocks
made from DNA. These also follow the paradigm of self-assembly and can be
treated like crystals [16].
The basic entities we are looking at are DNA strands. It is possible to create
arbitrary DNA strands in the laboratory [13]. One can actually create DNA
building blocks out of DNA strands that behave like puzzle pieces [17]. These
puzzle pieces of DNA are also called tiles or DNA-tiles. Tiles can be designed in
such a way that they bind with other tiles only in a specific and predetermined
way. It has been shown that this characteristic can be used to create almost any
structure at the nanoscale [8]. Additionally, tiles can also perform computations
through conditional binding processes [9,17]. All these building processes execute
– after an initial tile set has been provided – without the need for any further
human intervention [7]. Also, all the materials required for this approach can be
produced in a laboratory, so that the first rudimentary nanonetworks can really
be built and operated in-vitro.
DNA-based nanonetworks, in their most primitive form, are unfortunately
not programmable once the devices have self-assembled. Further, implementing
conventional algorithms with just a small set of tiles is much less well researched
than conventional programming languages. As a consequence, the purpose of
a nanonetwork has to be known before its self-assembly, and the tiles have to
be created and selected accordingly. While a proof of concept for this approach
has already been presented in [7], it is still mostly unknown how nanonetworks
for specific mathematical problems can be created, i.e., given a specific problem
formulation, how many different tiles are needed and how they look like.
This paper presents a novel approach on how to create the necessary building
blocks for specific, but arbitrary problems, namely those that can be modeled as
a boolean formula. Previous findings that tile-based self-assembly systems are
Turing-complete [17] are of mere theoretical interest, as the proof gives no algo-
rithm on how to compute in a feasible manner [14]. This paper bridges the gap
by offering a solution for the complexity classes AC0 and NC1 . AC0 and NC1
are classes of problems that describe strongly restricted circuits of limited size,
among other [3,15]. Important problems of these classes are basic arithmetic
functions like addition and multiplication, as well as logical operations and the
computation of thresholds. These form the basic necessary operations to cre-
ate more complex communication protocols. Looking at possible applications,
nanonetworks can be created that react, upon measuring environmental param-
Solving Generic Decision Problems by in-Message Computation 123
eters, once a predefined threshold has been reached, thus increasing reliability. A
logical AND can be used to establish a distributed consensus among nanodevices,
as demonstrated in [7].
The remainder of the paper is structured as follows: Sect. 2 presents the nec-
essary definitions to understand the mathematical models and the process of self-
assembly in general. Section 3 introduces the definitions and general ideas behind
DNA-based nanonetworks. Section 4 suggest an algorithms that creates mes-
sage molecules for problems that can be modeled as boolean formulas. Section 5
explains a generic nanonetwork architecture. Section 6 summarizes by present-
ing a list of problems that can be solved by DNA-based nanonetworks via the
developed procedure.
Examples of DNA-tiles are shown in Fig. 1(c, d). The open strands with the
displayed bases adenine (A), thymin (T), cytosin (C) and guanin (G) can only
bind with a matching complementary sequence.
A tile can have no or exactly one neighbor on each side. Tiles t and t only
interact with each other when they are neighbors. The interaction rules are
determined by the glues.
If glues are not explicitly shown or mentioned, the empty glue Lg = ∅ with
the label void and the strength 0 is assumed.
A tile t, with a glue strength 0 or no glue at a side can’t interact with other
tiles t at that side.
Two tiles are of the same tiletype, iff they have identical glue color, glue
strength and markers.
The temperature τ of a self-assembly system describes the minimum glue
strength s that is required for a tile to form a stable bond with other tiles.
Two tiles bind with each other if they are neighbors and have glues of a
suitable color and if the binding strength with all neighbors is at least equal to
the temperature. Meaning that two tiles can only bind at temperature 2 if they
share a glue with the same color and 2 black boxes.
Solving Generic Decision Problems by in-Message Computation 125
c
c c c c a
c r
r c
b σ b b
(a)
α0 α1 α2 α3
c
c a c a c c c c a
r r c r
→ → →
r r c r c r
b σ b σ b b b σ b b b σ
(b)
Fig. 2. (a) Example for a tileset of a 2D-self-assembly systems. (b) The corresponding
assembly sequence of the tileset from (a). The seed-tile is called σ and the temperature
is 2. S = α0 , . . . , α3 shows the three steps until the assembly is terminal. [7]
3 DNA-Based Nanonetworks
In the following sections different components are defined, which are necessary
for the creation of DNA-based nanonetworks. The idea of using DNA-tiles as
construction material for nanonetworks, their computations and communication
mechanisms goes back to [7]. For a detailed description of DNA-based nanonet-
works see [7].
First, a communication mechanism based on tiles is described. This is fol-
lowed by an explanation of how receptors and ligands can be realized using
DNA. The individual components are then combined and formally defined as
DNA-based nanonetworks.
Solving Generic Decision Problems by in-Message Computation 127
Since self-assembly systems can also be used as computational models, the pre-
sented approach has the advantage that computations can be integrated into the
assembly process of a message molecule.
A message molecule can be designed in such a way that specific tiles are
necessary to achieve a fully assembled message molecule. By making sure that
these tiles are only distributed under certain conditions – e.g. in case of an event
– they can be interpreted as input for a computation. Other tiles, also required
for the computation, can be kept in the medium as required [7].
This method ensures that, for example, a ligand necessary for a binding
reaction is only formed on a message molecule once a computation has been
finalized. A ligand is the part of a molecule that can form a bond with a receptor.
Tiles and assemblies are subject to Brownian motion. Brownian motion can
be used as a distribution mechanism to transport tiles to the required positions.
The process is largely random, which is why a large number of message molecules
is required.
Any decision problem [14] can be solved by a self-assembly system at temper-
atur 2 [17]. However, it is unclear whether nanobots will perform computations
in the same way as macroscopic computers and whether there is enough space
for complex computations at the nanoscale [6]. Further, it is mostly unknown
how to create a space efficient self-assembly system that solves a given decision
problem using message molecules. In the following sections a generalized method
that creates message molecules for many decision problems is explained.
Since self-assembly systems solve a large number of challenges at once, while
they can already be created in the laboratory, it is compelling to use this previ-
ously proven technology.
The ligands are binding sites on message molecules, which enable a correct bind-
ing with nanobots. These are modeled by the glues of tiles.
The variable size and shape of message molecules require additional tiletypes
to always provide a uniform starting point for the composition of a ligand. Fur-
thermore, it should only form if a computation has been successfully completed.
128 F.-L. A. Lau et al.
R t t 0 k k 0 o
tr
tr
M a a 0 0 0 C 0 ... σ
br f c
br f c
R g g
0 l l 0 p
Fig. 3. Generic ligand of a message molecule at temperature 2. The tiles with marker
“R” can only attach to the assembly if tile C has a right neighbor. The white tiles
represent an adjacent message molecule that has to be finalized before the ligand can
form. [7]
Receptors are the parts of nanobots that can bind message molecules. They
are modeled by tiles with appropriate glues. These can be generated by simple
assemblies. Unlike ligands, they are not tied to the successful computation of a
formula Φ.
Receptors can be of any shape as long as they bind their corresponding ligand
without overlapping. In this case the temperature restriction must be observed.
Furthermore, the externally available glues of a receptor must be at least one
tile apart from each other to prevent premature binding of parts of the ligand
to the receptor.
Figure 4 shows an example of a possible receptor for a message molecule.
The gray squares represent any part of a ligand message. The black squares
represent individual glues of strength 1. The labels of the receptor’s glues encode
the binding condition. If the receptor is correctly designed, it can “recognize”
the outermost three tiles of the message molecule at once.
Solving Generic Decision Problems by in-Message Computation 129
y
Fig. 4. Generic receptor, which can stably bind message molecules at temperature 2.
The grey tiles represent the ligand of a message molecule with unbound glues x and x
that are spaced one tile apart from each other. The white tiles are part of a nanobot
with unbound glues x and y that allow message molecules to bind. [7]
A B A∧B
1 1 1
1 0 0
0 1 0
0 0 0
For each line of the truth table that contains “1” in the last column a clause
is created. A clause is a formula phi that only contains literals, negative literals
and the logical ∧. The process is repeated for every row of the truth table. All
resulting formulas are then combined with the logical ∨ operator. The result
is a canonical formula that performs an equivalent computation as the original
boolean formula Φ. The produced formula is called the disjunctive normal form
of a formula Φ. The size of the result can be further reduced by procedures like
McCluskey or Karnaugh maps [10].
For every formula in disjunctive normal form a tileset can be generated as
follows:
For every sub formula a message molecule is created. The number of rows of
each message molecule is equal to the number of literals times 3. Figure 5 shows
an example for the formula from Table 1.
u o
B1 l 1 1 l Y R p p
M o o R X
u o u o q
u o q
u o B2 n n 1 n n T2
u o qn
B2 2 n 1 n
u o u o q1
B1 1 1 1 1 1 T1
u o q0
u o q0
B0 t t M0 z z σ
Fig. 5. Example tilesets for the DNF formula from truth Table 1. For every row i of
the truth table that evaluates to “1”, two tiletypes for each literal are created (left).
These assemble into the message molecule (right).
The truth value of each literal is represented by the label of the corresponding
tile as well as by its glues. Only if all literals are part of the message molecule
a ligand is formed. Each ascending row of the message molecule can only form
once the previous row assembled fully.
Solving Generic Decision Problems by in-Message Computation 131
Since there is a message molecule for each sub formula and all the sub for-
mulas are combined by a logical ∨, the completion of a single message molecule
is sufficient to communicate a successful computation.
qi1 u o
1i T1 B1 1 1 Ai1 1i Y R p p
M o o R X
qi0 u o u o q
u o q
qi2 u o Bn n n Ain ni ni Tn
u o qin
2i T2 B2 2 2 Ai2 2i
qi1 u o
..
.
..
.
u o qi1
B1 Ai1 T1
q u o
1 1 1i 1i
ni Tn Bn n n Ain ni
u o qi0
qin u o
u o qi0
B ti ti M zi zi σ
Fig. 6. Tileset (left) and fully assembled message molecules (right) for a boolean for-
mula Φ. The tileset to the left contains three tiletypes for every literal in line i of the
corresponding truth table and only contains tiles that are used more than once. To the
right, the message molecules for the clauses of the disjunctive normal form (DNF) of
the formula Φ are displayed.
Figure 6 shows an example for the general architecture with n input bits. i
represents the index of the row of a truth Table 2 that evaluates to “1”. The
truth table represents an arbitrary boolean formula Φ. The disjunctive normal
form of the formula Φ can directly be derived from the table.
The assembly process of the message molecules starts with the seed-tile σ at
the bottom right. Since the temperature is 2, The bottom row of M and B can
form, as well as the right stack of tiles T1 . . . Tn . The remaining assembly process
can only proceed if the red tiles Ain , that represent the literals of each clause, are
present. Once all required tiles Ain are bound to the assembly the tiles B1 . . . Bn
can attach, followed by the left tile R, which completes the ligand.
132 F.-L. A. Lau et al.
Table 2. Generic truth table for a boolean formula Φ. The columns represent all occurring
sub formulas. Each row i that evaluates to “1” represents a truth assignment that satisfies
the formula Φ and serves as input for a message molecule. The red line shows an example.
φ1 φ2 . . . Φ
1 1 1
1 0 1
.
.
.
0 1 0
0 0 1
Table 3. List of problems sorted by complexity classes. The class NC1 includes the class
AC0 and the problems in AC0 are therefore considered easier. Both AC0 and NC1 describe
problems that require very little space to be computed. Table adapted from [6].
However, the size of a truth table grows exponentially with the number of
different literals in the boolean formula that serves as an input. Therefore it
isn’t always possible to find a small set of message molecules that solves a given
problem. However, for many of the presented scenarios our methodology suffices.
Tile-based self-assembly systems are indeed Turing-complete and a univer-
sal Turing-machine can be created from tiles. However, the number of required
tiletypes for a tileset that encodes a Turing-machine is huge and often infeasi-
ble. The presented methodology provides a feasible approach for many common
input-sizes.
For mathematical systems, more efficient solutions can often be constructed
for specific problems. It is possible and likely that smaller message molecules
exist for individual operations. The general approach presented in this paper
works for all boolean formulas, specific, fixed operations however, can often be
solved in a more efficient manner.
The next logical step is the construction of tilesets for the most important
problems from Table 3. The problems Add, Mult and Thres are of particu-
lar interest as they are among the most commonly used operations in modern
programming. Space-efficient message molecules for those operations could be
combined to encode the behavior of primitive communication protocols.
Furthermore, the feasibility of the presented approach could be tested in a
wet-lab experiment. Successfully simulating the assembly process of the message
molecules would illustrate the practical usefulness and generality of tile-based
nanonetworks, as the presented procedure is capable of solving numerous prob-
lems.
Solving Generic Decision Problems by in-Message Computation 135
References
1. Bende, P., Lau, F., Fischer, S.: Error-resistant scaling of three-dimensional
nanoscale shapes on the basis of DNA-tiles. In: Proceedings of the 6th ACM
International Conference on Nanoscale Computing and Communication (ACM
NanoCom 2019), Dublin, Ireland (2019)
2. Büther, F., Lau, F.-L., Stelzner, M., Ebers, S.: A formal definition for nanorobots
and nanonetworks. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy,
Y. (eds.) NEW2AN/ruSMART/NsCC -2017. LNCS, vol. 10531, pp. 214–226.
Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67380-6 20
3. Clote, P., Kranakis, E.: Boolean Functions and Computation Models. Texts in
Theoretical Computer Science. An EATCS Series, 1st edn. Springer, Heidelberg
(2002)
4. Kallenbach, N., Ma, R.I., Seeman, N.C.: An immobile nucleic acid junction con-
structed from oligonucleotides. Nature 305(5937), 829 (1983)
5. Lathrop, J.I., Lutz, J.H., Summers, S.M.: Strict self-assembly of discrete Sier-
pinski triangles. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. LNCS,
vol. 4497, pp. 455–464. Springer, Heidelberg (2007). https://doi.org/10.1007/978-
3-540-73001-9 47
6. Lau, F., Büther, F., Gerlach, B.: Computational requirements for nano-machines:
there is limited space at the bottom. In: Proceedings of the 4th ACM International
Conference on Nanoscale Computing and Communication, ACM NanoCom 2017,
Washington DC, USA (2017)
7. Lau, F., Büther, F., Geyer, R., Fischer, S.: Computation of decision problems
within messages in DNA-tile-based molecular nanonetworks. Nano Commun. Netw.
21, 100245 (2019). https://doi.org/10.1016/j.nancom.2019.05.002
8. Lau, F., Stahl, K., Fischer, S.: Techniques for the generation of arbitrary three-
dimensional shapes in tile-based self-assembly systems. Open J. Internet of Things
4(1), 126–134 (2018). https://www.ronpub.com/ojiot/OJIOT 2018v4i1n10 Lau.
html. Special Issue: Proceedings of the International Workshop on Very Large
Internet of Things (VLIoT 2018) in Conjunction with the VLDB 2018 Conference
in Rio de Janeiro, Brazil
9. Lee, J.Y., Shin, S.Y., Park, T.H., Zhang, B.T.: Solving traveling salesman problems
with DNA molecules encoding numerical values. Biosystems 78(1), 39–47 (2004).
https://doi.org/10.1016/j.biosystems.2004.06.00. http://www.sciencedirect.com/
science/article/pii/S0303264704001157
10. McCluskey Jr., E.: Minimization of Boolean functions. Bell Syst. Tech. J. 35(6),
1417–1444 (1956)
11. Patitz, M.J.: An introduction to tile-based self-assembly and a survey of recent
results. Natural Computing 13(2), 195–224 (2013). https://doi.org/10.1007/
s11047-013-9379-4
12. Quine, W.: The problem of simplifying truth functions. Am. Math. Monthly 59(8),
521–531 (1952)
13. Rothemund, P.W.K.: Folding DNA to create nanoscale shapes and patterns. Nature
440(7082), 297–302 (2006). https://doi.org/10.1038/nature04586
14. Turing, A.M.: On computable numbers, with an application to the entschei-
dungsproblem. Proc. London Math. Soc. 2(1), 230–265 (1937)
15. Vollmer, H.: The NC hierarch. In: Introduction to Circuit Complexity. Texts in
Theoretical Computer Science An EATCS Series, pp. 107–171. Springer, Heidel-
berg (1999). https://doi.org/10.1007/978-3-662-03927-4 5
136 F.-L. A. Lau et al.
16. Watson, J.D., Crick, F.H.: A structure for deoxyribose nucleic acid. Nature 171,
737–738 (1953). http://www.nature.com/nature/dna50/watsoncrick.pdf
17. Winfree, E., Liu, F., Wenzler, L., Seeman, N.C.: Design and self-assembly of two-
dimensional DNA crystals. Nature 394(6693), 539–544 (1998)
A Model for Electro-Chemical Neural
Communication
1 Introduction
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 137–150, 2020.
https://doi.org/10.1007/978-3-030-64991-3_10
138 M. Hosseini et al.
Fig. 1. Structure of a neuron in the central nervous system representing its main func-
tional parts.
Fig. 2. Two successive neurons which are connected by chemical synaptic clefts; the
nervous signal passes from presynaptic neuron to the postsynaptic neuron via multiple
synapses.
A presynaptic neuron as a transmitter should pass the nervous signal through the
axon and then, releases neurotransmitter into synapses. The nervous signal, as the
A Model for Electro-Chemical Neural Communication 141
where δ(t) expresses the delta function, and ti is the time duration in which the
i-th spike occurs. The achieved signal at the axon terminal is obtained as
where n(t) implies the axonal noise that is assumed to have Gaussian distribution
over a bandwidth BWn with the variance σn2 . The power-spectral-density of n(t)
is [3] 2
σn
2BWn , −BWn ≤ f ≤ BWn
Sn (f ) = (3)
0 ,o.w.
therefore, the axon signal to noise ratio (SNR) can be obtained as follows:
∞
1 2BWn ∞ 2
SN Rax = x2 (t)dt = x (t)dt. (4)
Sn (f ) 0 σn2 0
The axon SNR depends on the characteristics of the axon. Therefore, the
higher value of SNR implies the enhancement of the axon health and leads
to the more smoothing pathway of the nervous signal transmission throughout
the axon. The main reason for some nervous system diseases such as multiple
sclerosis (MS) [9] is the weak passing of signals through the axon. Therefore,
the value of axon SNR in these nervous diseases is small. It is expected that
142 M. Hosseini et al.
where pChe expresses the error probability of synaptic channel and is defined as
follows:
pChe = pC0 pr {R = 0} + pC1 pr {R = 1} . (6)
in the soma of the postsynaptic neuron. Synapses that open cation channels
on the postsynaptic neuron and cause to increase of membrane potential are
called cooperative synapses. Also, the operation which leads to the aggregation
of cooperative synapses impacts is called spatial summation [6]. The process of
spatial summation between two neurons i and j can be modeled as a stochastic
binary Z-channel with the crossover probability pSij . Considering the physiol-
ogy background presented in Sect. 2, this probability increases by an increase
in the number of cooperative synapses between two neurons [11], and it will be
decreased by increasing of firing threshold of the postsynaptic neuron. We can
model the spatial summation as
−1
1 1
pSij = + exp(−Nij plChij ) , (7)
| Vthj − Vrestj | | Vthj − Vrestj |
where Nij is the number of cooperative synapses between presynaptic neuron
i and postsynaptic neuron j. Vrestj and Vthj state the resting potential and
firing threshold of the postsynaptic neuron. Also, plChij represents the operation
probability of the l-th synapse between two neurons i and j, which is obtained
by Eq. (5).
The output signal of the binary spatial summation Z-channel is S(t), which
in a short time slot is indicated by the binary variable S. Therefore, S = 1
implies a spike firing that means cooperative synapses successfully excite the
postsynaptic neuron. Besides, S = 0 express that excitation of the postsynaptic
neuron is failed and no spike is generated. Also, the binary input variable of
this channel is C = 1, equivalent to the opening of cation channels and entering
positive ions into the postsynaptic neuron or C = 0 which means cation channels
are not opened. Notice that indices i and j can be removed because a general
neuron link has been considered in this model.
On the other side, after a neurotransmitter release, the membrane potential
changing of the postsynaptic neuron lasts about 15 ms. Therefore, another neu-
rotransmitter that opens the same channel still could increase the membrane
potential, and thereby, the excitation rate increases. Thus, the results of succes-
sive releases of neurotransmitters aggregate together. This process that states
the postsynaptic neuron response to the successive releases is called temporal
summation [6] and can be modeled as q.h(t). In this modeling, h(t) corresponds
to the EPSP waveform and deals to the postsynaptic neuron response to a single
neurotransmitter release, and q deals to the variable amplitude of the tempo-
ral summation. The value of q changes with the number of neurotransmitters
releases. Also, h(t) is modeled as an alpha function as follows [1]:
hp t
h(t) = exp 1 − u(t), (8)
tp tp
where hp and tp are the peak EPSP magnitude and the corresponding time,
respectively, and u(t) indicates the unit step function whose value is one for
t > 0, and zero otherwise. Also, the probability density function (PDF) of q can
be represented as the k-th order Gamma-distribution [12]
144 M. Hosseini et al.
βk
p(q) = q (k−1) exp(−β), (9)
(k − 1)!
both β and k determine the distribution spread. The parameter k modify the
variability of q therefore, the case with k = 1 refers to an exponential distribution
with the highest variability and k = ∞ refers to a delta-function is independent
to the variability in q.
Thus, the following rules (Y0 , Y1 ) relates the output signal to its binary equiv-
alent:
Y0 ; Y = 0 −→ y(t) = 0,
(12)
Y1 ; Y = 1 −→ y(t) = S.q.h(t).
Considering initial probabilities as p0 = pr {X = 0} and p1 = 1 − p0 =
pr {X = 1}, we can formulate the likelihood ratio for the model as follows [2]:
f {Y |X = 1}
Lx (y) = , (13)
f {Y |X = 0}
6 Numerical Results
In this section, the bit error rate (BER) of a neuro-spike communication link
based on the developed model is investigated. Simulations are carried out in the
environment of MATLAB [21]. According to [1], we set the predefined parameters
as hp = 2 mV and Tp = 1 ms for the EPSP waveform. The variable amplitude
of EPSP waveform, q, is considered as a Gamma distribution with parameters
β = 1 and k = 1. We also considered 107 transmitted spikes and computed
A Model for Electro-Chemical Neural Communication 147
Fig. 4. The average probability of error versus the axon SNR in a neuro-spike commu-
nication link with pR = 0.8, pC0 = 0.01, pC1 = 0.01, pS = 0.4.
Fig. 5. The bit error probability curves versus the relase probability for different param-
eters of the synaptic channel in a neuro-spike communication link with pC0 = 0.009,
pS = 0.6, SN Rax = 15 dB.
148 M. Hosseini et al.
0.45
0.4
Bit Error Rate (BER)
0.35
0.3
0.25
0.2
Fig. 6. The bit error rate versus the spatial summation probability in a neuro-spike
communication link with pR = 0.8, pC0 = 0.01, pC1 = 0.09, SN Rax = 15 dB.
the average performance. In the following, the results of the error probability
analysis versus stochastic parameters are depicted.
Figure 4 shows the error probability of spike detection in the postsynaptic
neuron versus the axon SNR changes. It is observed that by an increase in
SN Rax , the spike transmission in the neuron facilitates and as a result, the error
probability improves. In cases of axonal diseases such as MS who suffer from weak
passing of signal in the axon, SN Rax is low and thus, as we can observe in Fig. 4,
the correct spike detection in the receiver with a high probability will be failed.
In Fig. 5, the average error probability versus the releases probability of neu-
rotransmitters pR for different cases of pC1 = 0.05, 0.1, and 0.8 is depicted. It
can be seen that with an increase of pR , the error probability of spike detection
decreases. Also, it is observed that for the worst case of pC1 = 0.8 increasing pR
could not change the error probability. The reason is that in such a case, the
synaptic channel is approximately disrupted and thus, the error probability is
not sensitive to other parameters.
In Fig. 6, the average error probability versus the spatial summation proba-
bility is shown. With an increase of pS , the average error probability decreases.
The reason is that spatial summation probability directly is dependent on the
number of cooperative synapses between two neurons. Therefore, more synapses
cooperate to excite the postsynaptic neuron the detection of the signal will be
more successful.
A Model for Electro-Chemical Neural Communication 149
7 Conclusion
In this paper, the performance of a neuro-spike communication link has been
studied. First, we developed a model of neuro-spike communication which con-
sists of two successive neurons that are connected via multiple synapse cleft.
Next, we evaluated the error probability of signal detection in this system using
the proposed model. The simulation results reveal the strong dependence of sig-
nal detection to the disruption factors such as axonal noise, release probability of
neurotransmitters, synaptic channel parameters, and spatial and temporal sum-
mation. We also have studied the impact of different nervous system medicines
on these stochastic parameters. As part of our future work, we model the coop-
eration of synapses as a biological concept of synaptic plasticity and develop the
neuro-spike communication model by considering the medicine effect.
References
1. Manwani, A., Koch, C.: Detecting and estimating signals over noisy and unreliable
synapses: information-theoretic analysis. Neural Comput. 13(1), 1–33 (2001)
2. Maham, B.: A communication theoretic analysis of synaptic channels under axonal
noise. IEEE Commun. Lett. 19(11), 1901–1904 (2015)
3. Aghababaiyan, K., Shah-Mansouri, V., Maham, B.: Joint optimization of input
spike rate and receiver decision threshold to maximize achievable bit rate of neuro-
spike communication channel. IEEE Trans. Nanobiosci. 18(2), 117–127 (2018)
4. Maham, B.: Spike detection in axonal-synaptic channels with multiple synapses.
In: ICASSP 2019–2019 IEEE International Conference on Acoustics, Speech and
Signal Processing (ICASSP), pp. 1130–1134. IEEE (2019)
5. Galluccio, L., Palazzo, S., Santagati, G.E.: Characterization of signal propagation
in neuronal systems for nanomachine-to-neurons communications. In: 2011 IEEE
Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.
437–442. IEEE (2011)
6. Hall, J.E.: Guyton and Hall Textbook of Medical Physiology e-Book. Elsevier
Health Sciences, Amsterdam (2010)
7. Ramezani, H., Akan, O.B.: Impacts of spike shape variations on synaptic commu-
nication. IEEE Trans. Nanobiosci. 17(3), 260–271 (2018)
8. Lai, K.-O., Ip, N.Y.: Central synapse and neuromuscular junction: same players,
different roles. Trends Genet. 19(7), 395–402 (2003)
9. Pagnini, F., Bosma, C.M., Phillips, D., Langer, E.: Symptom changes in multiple
sclerosis following psychological interventions: a systematic review. BMC Neurol.
14(1), 222 (2014)
10. Knight, D., Cunnane, T.C., Lavidis, N.A.: Effect of chronic clonidine treatment
on transmitter release from sympathetic varicosities of the guinea-pig vas deferens.
Br. J. Pharmacol. 134(7), 1480–1486 (2001)
11. Fares, T., Stepanyants, A.: Cooperative synapse formation in the neocortex. Proc.
Natl. Acad. Sci. 106(38), 16:463–16:468 (2009)
12. Bekkers, J.M., Clements, J.D.: Quantal amplitude and quantal variance of
strontium-induced asynchronous EPSCs in rat dentate granule neurons. J. Physiol.
516(1), 227–248 (1999)
150 M. Hosseini et al.
13. Maham, B., Kizilirmak, C.: Neuro-spike communications with multiple synapses
under inter-neuron interference. IEEE Access 6, 962–968 (2018)
14. Shi, J., Wu, X., Chen, Y.: Study on dalfampridine in the treatment of multiple
sclerosis mobility disability: a meta-analysis. PloS ONE 14(9) (2019)
15. Fragoso, Y.D., Adoni, T., Alves-Leon, S.V., Apostolos-Pereira, S.L., Barreira, A.A.,
Brooks, J.B.B., Claudino, R., Correa, E.C., Ferreira, M.L.B., Finkelsztejn, A.,
et al.: Real-life experience with fampridine (fampyra)R for patients with multiple
sclerosis and gait disorders. Neuro Rehabil. 39(2), 301–304 (2016)
16. Gao, R., Penzes, P.: Common mechanisms of excitatory and inhibitory imbalance
in schizophrenia and autism spectrum disorders. Curr. Mol. Med. 15(2), 146–167
(2015)
17. Osimo, E.F., Beck, K., Marques, T.R., Howes, O.D.: Synaptic loss in schizophrenia:
a meta-analysis and systematic review of synaptic protein and MRNA measures.
Mol. Psychiatry 24(4), 549–561 (2019)
18. Picconi, B., Piccoli, G., Calabresi, P.: Synaptic dysfunction in Parkinson’s disease.
In: Kreutz, M., Sala, C. (eds.) Synaptic Plasticity, vol. 970, pp. 553–572. Springer,
Vienna (2012). https://doi.org/10.1007/978-3-7091-0932-8 24
19. Laurén, J., Gimbel, D.A., Nygaard, H.B., Gilbert, J.W., Strittmatter, S.M.:
Cellular prion protein mediates impairment of synaptic plasticity by amyloid-β
oligomers. Nature 457(7233), 1128–1132 (2009)
20. Harvey, J., Solovyova, N., Irving, A.: Leptin and its role in hippocampal synaptic
plasticity. Prog. Lipid Res. 45(5), 369–378 (2006)
21. Release, M.: The mathworks, Inc., Natick, Massachusetts, United States, vol. 488
(2013)
Connected Wearables Sensors
for Healthcare Applications
Activity Monitoring Using Smart Glasses:
Exploring the Feasibility of Pedometry on Head
Mounted Displays
Zhiquan You1 , Farnaz Mohammadi2 , Emily Pascua1 , Daniel Kale1 , Abraham Vega1 ,
Gian Tolentino1 , Pedro Angeles1 , and Navid Amini1(B)
1 California State University, Los Angeles, Los Angeles, CA 90032, USA
[email protected]
2 University of California, Los Angeles, Los Angeles, CA 90095, USA
Abstract. Fitness tracking, fall detection, indoor navigation, and visual aid appli-
cations for smart glasses are rapidly emerging. The performance of these applica-
tions heavily relies on the accuracy of step detection, which has rarely been studied
for smart glasses. In this paper, we develop an accelerometer-based algorithm for
step calculation on smart glasses. Designed based on a salience-analysis app-
roach, the algorithm provides a highly accurate step calculation. An activity mon-
itoring application for a commercial Android-based smart glasses (Vuzix M100)
is designed and realized for algorithm evaluation. Experimental results from 10
participants wearing the smart glasses running our application achieved average
step detection error of 2.6% demonstrating the feasibility of our salience-based
algorithm for performing pedometry on smart glasses.
1 Introduction
In recent years, interest in smart glasses has been substantially growing, as has the
number of influential companies, such as Amazon and Facebook, that are announcing
their entry into the smart glasses market. It is expected that the combined market size
for smart glasses will grow at an exponential rate of 76% annually and will reach $16B
by 2025 [1]. The use of commercial smart glasses for fitness tracking [2, 3], indoor
navigation [4, 5], fall detection [6, 7], vision enhancement in the visually impaired [8–
10] has already gained momentum and it is expected that such applications will comprise
a considerable sector of the smart glasses market. The performance of these applications
as well as many other emerging services is dependent on the accuracy of pedometry
(step detection and counting) on smart glasses.
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 153–167, 2020.
https://doi.org/10.1007/978-3-030-64991-3_11
154 Z. You et al.
Based on the above experiment, in this paper, we propose a step detection algorithm
for smart glasses, which can identify steps accurately and in real-time. The algorithm is
composed of a signal preprocessing phase, axes combination phase, salience calculation
and analysis phase, and a peak detection phase. The proposed algorithm utilizes only the
accelerometer data for step calculation since smart glasses are commonly designed with
an accelerometer, while other sensors such as the GPS and gyroscope are not always
available. Furthermore, the proposed algorithm requires a low level of computing power
from smart glasses.
The contributions of this paper are threefold. First, we propose an algorithm for
step detection and calculation on smart glasses based on accelerometer data. Second,
Activity Monitoring Using Smart Glasses 155
2 Related Work
There are numerous algorithms and research studies conducted on step detection based
on smartphones and waist-mounted devices, with high accuracies [20]. Some algorithms
explore other ways to detect steps beyond the basic peak-valley relationship, such as the
method proposed by Kumar et al., [21] discussing the use of the linear relationship
between the amplitude of acceleration and the frequency of steps, effectively detecting
steps through their pilot trials. Most of the research in the field of step detection focuses
on 5 body parts to mount the censor: wrist, pocket (waist level), thigh, ankle, and foot.
The most reliable step count algorithms come from insole pressure sensors that have the
ability to detect the pressure applied to the sensor once a subject takes a step [22, 23].
The impulse (force) generated from each foot striking the ground in walking is more
pronounced in those areas. In general, lower parts of the body such as the ankle and foot
absorb most of the impact of stepping and therefore, devices placed on these body parts
leads to the most accurate results [24].
Smartwatches and smartphones are among the electronic equipment that is capa-
ble of recording and analyzing motion signals [25–27]. However, smartphones are not
necessarily always taken in the same or relative location. In addition, these devices are
extremely sensitive to non-ambulatory activities [28]. Moreover, hand and arm move-
ments when the device is being carried, do not necessarily correlate with stepping and
may create artifacts on the signal. On the other hand, smartwatches provide a tremendous
amount of information by continuously monitoring of the user and measurement of their
physiological parameters. Although, the data acquired from smartwatches are under the
question of reliability, due to subtle and often wrist movements, compared with other
parts of the body where the sensors are usually placed [26]. One inevitable shortcoming
of data based on wearable devices is that they are not generalizable and unstable across
different brands [29], which is the case in smartphones as well.
The most popular step detection algorithm uses peak-valley extraction to detect steps
from the accelerometer data. The three-axis accelerometer data is combined into a single
acceleration vector, which is then graphed where each peak is considered to be a step [30,
31]. A more advanced algorithm would be a filtering system which places thresholds for
each peak to be considered a step, as there will be multiple peaks from the accelerometer
that is not considerable enough to be detected as a peak.
Most step counting algorithms are created for devices inside the pocket [32]. For
instance, Brajdic and Harle [20] provided evaluations considering various algorithms
for step detection on smartphones. They evaluated several algorithms such as windowed
156 Z. You et al.
peak detection (WPD), hidden Markov model, and continuous wavelet transform, which
were the most promising approaches. They found that the simplest algorithm with the
best accuracy is the windowed peak detection algorithm.
A number of studies have employed a modified version of the peak-to-peak algorithm
to detect steps from an accelerometer signal. For instance, the peak detection algorithm
proposed in [33] produces a refined method that enables the algorithm to detect peaks
in periodic and quasi-periodic signals. This method is noted to have high efficiency in
peak detection within high and low-frequency signals. Another innovation based on step
detection for head-mounted sensors is being used for detecting user movements when
using virtual reality systems. The idea of these virtual reality systems is to immerse the
user into a virtual world in which their movement in real life is synchronized to their
virtual avatar [34].
Fig. 3. (a) The Shimmer3 IMU, (b) the Shimmer sensor is worn by a subject on the head.
158 Z. You et al.
4 Methods
We propose a novel algorithm to identify the steps using the accelerometer signal from a
smart glass device and compare the accuracy of our results against the WPD method. The
WPD uses a moving average to smooth the accelerometer signal, and it detects single
peaks via a fixed size sliding window; it finds the maximum value in the window, shifts
the window, and discards the chosen maximum if it persists for two windows in a row.
This algorithm has been identified as an optimal step detection approach for wearable
devices owing to its computationally inexpensive nature [20, 36]. Figure 4 presents the
block diagram of our step detection approach; the description of each step will follow
in the preceding subsections.
4.1 Pre-processing
The signal preprocessing consists of calibration and low-pass filtering. First, the cali-
bration process is utilized to reduce the drift errors and offsets from the raw acceleration
signals. Second, a moving average filter is used to suppress the high-frequency noise of
the calibrated inertial signals. Details of the preprocessing phase can be found in [29].
We calculate the salience of each acceleration sample point. Considering all possible
intervals in a given signal of size N, salience is the length of the longest interval for which
a sample is a maximum [37, 38]. The key property of the salience values algorithm is
Activity Monitoring Using Smart Glasses 159
that the starting point of each step has a large salience value. Hence, steps can be found
by locating these prominent points.
As an example, salience can be visualized as shown in Fig. 5. Considering the fourth
sample in the signal shown in Fig. 5; despite the fact that it has a higher magnitude
than the seventh sample, it has a smaller salience comparing to the seventh sample, s(4)
= 4 as opposed to s(7) = 8. The term salience vector represents the resulting signal
containing the salience of each sample in the original signal. The list of salience vector
of the example signal shown in Fig. 5 can be found in (2). We use salience signals to
find each stride that has the largest salience samples over a time threshold of 30 s. Once
the time threshold is met, the salience vector is then processed through a peak detection
algorithm to determine the steps of the filtered data.
We have implemented all three algorithms found in [38] for computing the salience
vector, s, of a signal. These algorithms include: 1) basic salience computation, 2) par-
tial salience allocation, and 3) sliding window analysis. We found the sliding window
approach to be the most suitable one for the purpose of step detection, as it offers faster
execution time and it addresses the issues pertaining to the signal’s origin. The following
briefly explains three algorithms with which we can calculate salience that is done after
combining the three axes of the signal and obtaining the r vector [37].
Basic Scheme. To find the length of the longest interval for which a sample is maximum
in a signal, the following steps are required:
1. Initialization: Since each sample is a maximum with respect to itself, all salience
values are set equal to 1. Thus, the length of the analysis interval (n) is set as n = 2.
2. Subdividing the input signal of length N into analysis intervals of length n. The
length of the last interval will be between 1 and n.
3. Finding the maximum point within each interval and assigning a salience of n to the
corresponding sample.
160 Z. You et al.
4. Increasing the size of the analysis interval by one and going back to step 2 until n
reaches N.
∗ and S ∗
1. Initialization: all saliences S * are set equal to 1 and all saliences Sleft right are
set equal to zero.
2. Applying the partial salience allocation scheme to the samples within the sliding
window with origin i and computing the local S(k, i), S left (k, i), and S right (k, i)
saliences, where k = i, i +1, …, i + M − 1.
3. Updating running saliences as follows: for each sample k, S * = S(k, i), Sleft ∗ (k, i) =
∗
Sleft (k, i), Sright (k) = Sright (k, i) if their values will be increased, otherwise, we
skip this step.
4. Shifting the sliding window to the right by one sample, i.e., (i → i +1) and going
back to step 2.
Once the sliding window reaches the right boundary of the input signal, the final salience
vector, S final (k) is given by (3):
∗ ∗
Sfinal (k) = Sleft (k) + Sright (k) + 1, k = 1, 2, . . . , M (3)
Activity Monitoring Using Smart Glasses 161
We discard the first and last M − 1 element of the salience vector since these values
are in the boundary. Due to this problem, it is important to properly choose the size of
the sliding window.
(r.s)
u= (4)
max(s)
where s is the salience vector and dot (.) represents an element-wise multiplication. The
idea behind deriving u is to make peaks of r more pronounced and to diminish the rest
of the samples.
We extract all the elements of u that exceed a certain threshold, that is given by (5) as
potential cycle indices [38].
2
threshold = max(u) (5)
3
Then the difference vector, d, between adjacent extracted indices is calculated. We nor-
malize d around its mean and extract one of the two indices of points that fall within
this range, i.e., | d − mean(d) | < mean(d). This elimination phase helps to increase the
accuracy of our stride detection algorithm by counting two close peaks only once. The
number of such points is indicative of the number of steps taken and in fact, these points
are the start/endpoints of each step. Finally, we return a list of indices that these points
correspond to.
Among the three algorithms to calculate the salience vector, the sliding window
scheme is more efficient than the basic and partial salience allocation. Hence, we will
base our results on the calculations from the sliding window algorithm. We choose the
window size of 94 [38] and calculate the salience vector.
Figure 6a shows the combined accelerometer signal, r, and the red lines represent the
occurrence of a step. Figure 6b exhibits the salience vector of the combined acceleration
signal. Figure 6c depicts the enhanced salience vector where the peaks (associated with
steps) become pronounced, and that this subfigure corresponds to the vector, u, where
we enhance the signal. As shown, the peaks are more significant and distinguishable
from the rest of the signal.
162 Z. You et al.
Fig. 6. Original signal (a), the signal’s salience vector (b), and the salience vector after
normalization (c).
To quantify the differences between the signals from different parts in the body namely
foot, head, and pocket, we calculate the error for each trial and each person as written
in (6) and (7). The error in our experiments is defined as the absolute difference of the
number of steps calculated by the algorithm from the ground truth [36]:
stepsj (k) − stepsj (k)
ej (k) = (6)
stepsj (k)
with j being the subject number, and k being the trial number. The term stepsj (k) is the
true number of steps that subject j took in trial k, and stepsj (k) is the step calculated by
the algorithm. Each subject performs each trial 10 times, thus, the averaged error for
subject j and overall repeats (ej ) is given by (7):
n
ej (k)
ej = k=1 (7)
n
5 Results
We evaluate the step detection performance of our algorithm on commercial smart glasses
as well as IMUs attached to the head and other parts of the body. In the pilot trial, we
collected gait data from 10 subjects and applied our proposed algorithm to these signals.
In this section, we compare the performance of the algorithm for the foot, pocket, and
head signals, and provide error analysis for the results.
Activity Monitoring Using Smart Glasses 163
Figure 7 graphs the changes in step detection error from the WPD method to our salience-
based approach. The average step detection error of our approach (2.6% with SD of 2.8)
was significantly lower than that of the WPD method (21.8% with SD of 9.7).
Fig. 7. Comparing the error for step counting from the head signal between the WPD method and
our approach.
Table 2 lists the average step detection for three IMU locations in experiment 2. For
both the WPD method and our approach, the foot location performs remarkably well
and achieves similar results with an average error of 2.9% (SD = 1.6) and 2.7% (SD =
2.4), respectively.
We note moderate improvements in step detection for the pocket location with our
approach (6% with SD of 3.5) comparing to the WPD (7.2% with SD of 6.5). The head
location benefitted the most from our salience-based approach, where the step detection
error declined from 25.6% (SD = 9.4) to 3.9% (SD = 2.4). The error range for the head
location was from 13% to 39% in the WPD method; however, with our approach, the
range was narrowed down to 0% to 8%.
164 Z. You et al.
During the process of this research, we are attempting to develop an algorithm that further
improves on the current step detection algorithms by collecting additional data for testing
and applying the salience algorithm to filter the noisy data received from accelerometer
sensors. We focused on analyzing smart glass data received from the sensors. There
are several factors that make it difficult to achieve the same accuracy from head data
than it is from the foot data. One of the most challenging issues with collecting data
from the head is all of the movement the head experiences throughout walking. Every
slight acceleration from the head can be falsely interpreted as a step, which is where the
salience algorithm aids in fixing. Moreover, in our trials, the subjects are asked to walk
at their normal pace that is relatively slow which is more challenging. In the future, we
intend to investigate the performance of our algorithm for various speeds. As people
age, the angular displacement of the head changes and the body will have a decreased
ability to attenuate accelerations from trunk to head [39]. As another future direction,
we will investigate our algorithm’s performance on older adults.
Providing an improvement in accuracy on current step detection algorithms can
also be applied on a myriad of other fields ranging from physical health measurements,
medical studies, and personal localization. Although step counters are not commonly
used in clinical research, steps per days can now be considered as vital signs for crucial
medical information in the future [24].
Before activity monitors can be adequately used for clinical research, they must
first prove there is a connection between steps taken and future occurrence of diseases.
Having accurate measurements of physical activity is crucial during medical studies
Activity Monitoring Using Smart Glasses 165
as any slight mismeasurement could result in obscuring actual links between physical
activity and certain ailments that affect physical movements [40].
Another future application of this research can be implemented in personal local-
ized positioning systems based on steps detection and the calculated distance the user
has travelled [41]. A group of researchers from Seoul National University worked on
a method to determine the user’s location in indoor settings. Due to the lack of GPS
measurements for indoor environments, these researchers resorted to step detection in
combination with pedestrian dead reckoning to capture the user’s current location. They
are able to achieve step detection through several conditions such as handheld texting,
in pocket of pants front and back [14]. For indoor position to be accurate the direction in
which the user is walking and their heading is crucial to be determined, which is accom-
plished by using the magnetometers to find their absolute direction [42]. Furthermore,
the algorithm developed in this paper can be used on other data sets from other studies.
The data set from [43] is of accelerometer data collected from two groups of individuals
who are sighted and blind using the aid of walking cane or guide dog. The paper [43]
discusses the interesting differences between the sighted and blind walkers.
Here, we perform the analysis assuming the data we are analyzing is walking signal,
in other words, walking is granted, however, the salience algorithm can be employed to
detect whether the subject is actually walking in the first place. The proposed method is
computationally inexpensive, performs well on slow walking data, and is a low battery
consumer. These qualities make this approach efficient and highly practical.
7 Conclusions
A biomechanical process (called Pronation [44]) occurs during ambulation that allows
the body to naturally absorb shock as each foot strikes the ground. Since the head is the
farthest body location from the ground, the accelerations become significantly damp-
ened [45], making it an unsuitable signal to detect steps. On the other hand, applications
in fitness tracking, indoor navigation, user authentication, vision enhancement for the
visually impaired will comprise a considerable portion of the smart glasses market and
they are all dependent on accurate step counts. With this motivation, we implement
and evaluate an accurate and reliable method for step detection using head acceleration
signals. Furthermore, our algorithm achieves superior step counting performance when
applied to the acceleration signal collected from other body parts. Our results demon-
strate the feasibility of our salience-based algorithm for performing pedometry on smart
glasses.
References
1. Park, Y., Yun, S., Kim, K.H.: When IoT met augmented reality: Visualizing the source of the
wireless signal in AR view. In: MobiSys 2019 - Proceedings of the 17th Annual International
Conference on Mobile Systems, Applications, and Services, pp. 117–129 (2019)
2. Level Smartglasses by VSP Global. https://appadvice.com/app/level-smart-glasses/133662
5786. Accessed 01 Aug 2020
3. Vue Glasses by Vigo Technologies Inc. https://www.vueglasses.com/. Accessed 01 Aug 2020
4. GlassUp F4 AR Smartglasses. https://www.glassup.com/en/f4/. Accessed 01 Oct 2020
166 Z. You et al.
27. Zhang, X., Xu, W., Huang, M.C., Amini, N., Ren, F.: See UV on your skin: an ultraviolet
sensing and visualization system. In: Proceedings of the 8th International Conference on Body
Area Networks, pp. 22–28 (2013)
28. Case, M.A., Burwick, H.A., Volpp, K.G., Patel, M.S.: Accuracy of smartphone applications
and wearable devices for tracking physical activity data. JAMA – J. Am. Med. Assoc. 313(6),
625–626 (2015)
29. Wang, L., Liu, T., Wang, Y., Li, Q., Yi, J., Inoue, Y.: Evaluation on step counting performance
of wristband activity monitors in daily living environment. IEEE Access 5, 13020–13027
(2017)
30. Lee, H.H., Choi, S., Lee, M.J.: Step detection robust against the dynamics of smartphones.
Sensors 15(10), 27230–27250 (2015)
31. Abadleh, A., Al-Hawari, E., Alkafaween, E.A., Al-Sawalqah, H.: Step detection algorithm
for accurate distance estimation using dynamic step length. In: Proceedings - 18th IEEE
International Conference on Mobile Data Management, MDM, pp. 324–327 (2017)
32. Kang, X., Huang, B., Qi, G.: A novel walking detection and step counting algorithm using
unconstrained smartphones. Sensors 18(1), 297 (2018)
33. Scholkmann, F., Boss, J., Wolf, M.: An efficient algorithm for automatic peak detection in
noisy periodic and quasi-periodic signals. Algorithms 5(4), 588–603 (2012)
34. Caserman, P., Krabbe, P., Wojtusch, J., von Stryk, O.: Real-time step detection using the
integrated sensors of a head-mounted display. In: 2016 IEEE International Conference on
Systems, Man, and Cybernetics, SMC 2016 - Conference Proceedings, pp. 003510–003515
(2017)
35. Burns, A., et al.: SHIMMERTM - a wireless sensor platform for noninvasive biomedical
research. IEEE Sens. J. 10(9), 1527–1534 (2010)
36. Apostolopoulos, I., Coming, D.S., Folmer, E.: Accuracy of pedometry on a head-mounted
display. In: Conference on Human Factors in Computing Systems - Proceedings, pp. 2153–
2156 (2015)
37. Amini, N.: Transmission Power Management for Wireless Health Applications. UCLA
Electron. Theses Diss. (2012)
38. Mertens, C., Grenez, F., Schoentgen, J.: Speech sample salience analysis for speech
cycle detection. In: Proceedings of the Annual Conference of the International Speech
Communication Association, INTERSPEECH (2009)
39. Miraftabi, A., et al.: Macular SD-OCT outcome measures: comparison of local structure-
function relationships and dynamic range. Investig. Ophthalmol. Vis. Sci. 57(11), 4815–4823
(2016)
40. Ewald, B., McEvoy, M., Attia, J.: Pedometer counts superior to physical activity scale for
identifying health markers in older adults. Br. J. Sports Med. 44(10), 756–761 (2010)
41. Vahdatpour, A., Amini, N., Sarrafzadeh, M.: Toward unsupervised activity discovery using
multi-dimensional motif detection in time series. In: IJCAI International Joint Conference on
Artificial Intelligence (2009)
42. Ilkovičová, Ľ., Kajánek, P., Kopáčik, A.: Pedestrian indoor positioning and tracking using
smartphone sensors, step detection and map matching algorithm. In: International Symposium
on Engineering Geodesy pp. 20–22 (2016)
43. Flores, G.H., Manduchi, R.: WeAllWalk: an annotated dataset of inertial sensor time series
from blind walkers. In: Proceedings of the 18th International ACM SIGACCESS Conference
on Computers and Accessibility - ASSETS 2016, vol. 11, no. 1, pp. 1–28 (2016)
44. Chan, C.W., Rudins, A.: Foot biomechanics during walking and running. In: Mayo Clinic
Proceedings, vol. 69, no. 5, pp. 448–461. Elsevier (1994)
45. Maslivec, A., Bampouras, T.M., Dewhurst, S., Vannozzi, G., Macaluso, A., Laudani, L.:
Mechanisms of head stability during gait initiation in young and older women: a neuro-
mechanical analysis. J. Electromyogr. Kinesiol. 38, 103–110 (2018)
Real-Time Human Activity Recognition
Using Textile-Based Sensors
1 Introduction
The field of Human Activity Recognition (HAR) aims to monitor and model
human behaviors and body kinematics. In daily life, humans perform different
body motions to sustain life routines, to carry out duties or to meet their needs.
A combination of the motions of different body parts represents a specific activ-
ity such as walking, running, jumping, sitting, standing, lying on the sofa, etc.
where each body motion has some distinctive characteristics on the signal level.
Last decade, the progress in wearable sensor technologies made it possible to
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 168–183, 2020.
https://doi.org/10.1007/978-3-030-64991-3_12
Real-Time Human Activity Recognition Using Textile-Based Sensors 169
collect useful data regarding body kinematics, muscle response, physical and
neural changes that occur during the action. The estimation of these distinc-
tive features is challenging, however capturing and modeling human movements
provide utmost beneficial information for autonomous computer-aided proactive
and personalized services. Therefore, in the last two decades, scientists have been
intensively working on monitoring and modeling the body movements and uti-
lizing the power of computers in terms of data processing, high computational
capacities, and re-usability of activity data.
In HAR, vision-based sensors [1–3], embedded sensors such as accelerometer,
gyroscope, magnetometer, etc., [4–6] and various body-mounted sensors [7–11]
are popular technologies that are used to collect motion data. One of the most
widely used sensors in HAR are the Inertial Measurement Unit sensors (IMUs).
IMUs are capable of tracking kinematics of the user when they are attached to
body joints. Although IMUs are rather low-cost, the localization of the IMUs
is still a challenging task and IMUs are mostly prone to the drift problem that
leads to cumulative error in sensing.
Currently, each sensor system has its limitations in terms of reliability, pre-
cision, power consumption and cost. There is no silver bullet for HAR yet and it
has been a progressive field of research for the past two decades. With the devel-
opment of the wearable textile-based sensors, motion data collection became
more effective since they are manufactured from flexible and body conformal
textile material. The body-fitted wearable sensors are good at capturing the
activity pattern as they are worn directly on body joints. Textile based sensors
are widely used in a number of applications including sports/recreation [12,13],
elderly care [14,15], rehabilitation [16,17], gaming [18–21], and robotics [22,23]
etc. Herein, low-cost textile-based sensors manufactured [24] for this study were
used to establish a wearable HAR system. Stretchable wearable braces are used
for sensor attachment and placement on knees. It is feasible to measure different
body kinematics by attaching them to belts, wristbands, or elbows.
The textile-based sensors have embedded capacitive, resistive, optical and
piezoelectric properties that are able to sense strain, pressure, touch, tempera-
ture, humidity [25,26]. In this study, the textile-based capacitive strain sensors
are used that measure the capacitance variation depending on the elongation dur-
ing lower limb motion for HAR system. We tested our prototype system on four
different lower limb motion activities; walking, running, squatting, and standing.
We initially chose these basic activities before moving on to more complex activ-
ities, since these activities have distinctive signal patterns. We collected activity
data from multiple participants. Each participant wore these knee braces and
performed 4 different activities. Finally, we evaluated the performance of our
HAR system by using signal segmentation and machine learning methods.
2 Related Studies
Although IMUs are one of the most commonly used sensors, they are not suffi-
cient alone in terms of the performance in HAR, and scientists use some other
170 U. Ayvaz et al.
Right Knee
MoƟon
Data
Filtering Human
Signal Feature
& ClassificaƟon AcƟvity
SegmentaƟon ExtracƟon Type
NormalizaƟon
LeŌ Knee
MoƟon Preprocessing
Data
Machine
Basic Human Learning
AcƟviƟes Model
ConducƟve yarns
ConducƟve fabrics
Silicone insulator
Design of the Knee Braces with Sensors. As legs are the most active body
parts involved in many movements, we decided to track the knee joints. The knee
joint movements yield information about the patterns of sports activities like
walking, running, squatting, etc. One of the novelties of this study is producing
a new wearable sensor to estimate human activities in real-time. Therefore, the
172 U. Ayvaz et al.
sensors are affixed to braces worn on both knees throughout the data collection
in the training and testing procedures (Fig. 3).
These sensors can easily be worn and taken off by the participants. In addi-
tion, they can be attached to fabrics on different body joints such as wristbands
and elbows.
Textile-based Battery
strain sensor
(left knee)
Regulator
RB PC
TB
Textile-based
strain sensor
Microcontroller Data
(right knee) Power
3.2 Preprocessing
Walking Walking
90
80
Running Running
120
Capacitance (pF)
100
Squatting Squatting
125
100
75
Standing Standing
84
82
80
0 1 2 3 4 5 6 0 1 2 3 4 5 6
Time (s) Time (s)
Fig. 5. Recorded signals of human activities before smoothing (left column) and after
smoothing (right column)
In this study, we create different feature sets for obtaining the optimal HAR
performance of our HAR system. We applied two different data normalization
approaches by taking the ratio and the difference of raw sensor data retrieved
from the right and left knees simultaneously. This approach is intended to
174 U. Ayvaz et al.
improve the data integrity and make the features more robust, especially when
one (or more) of the following changes: 1) the user of the braces, 2) the initial
positioning of the braces at the knee of the user, and 3) the location of the braces
while performing the activity.
Fig. 6. Signals in one frame for each activity using shifting window method
Fig. 7. Signals in one frame for each activity using onset offset detection method
3.4 Classification
Four different machine learning algorithms are proposed to be used in the frame-
work of this paper. These algorithms are SVM, kNN, RF and DT. Each algo-
rithm is trained using different parameters to create the corresponding models
as given in Table 2. It is noteworthy to mention that the Radial Basis Function
(RBF) [44] for SVM as a kernel achieved higher performance compared to other
kernel functions.
176 U. Ayvaz et al.
Features Definition
Mean Central tendency of the data in one frame
Median Value which divides the data in 2 equal parts
Min Minimum value in a frame data
Max Maximum value in a frame data
Standard deviation Average distance between each quantity and mean
Kurtosis Measure of whether the data has profusion of outliers
or lack of outliers relative to a normal distribution
Skewness Measure of the asymmetry of the probability
distribution of a real-valued random variable
Quantiles Points in a distribution that relate to the rank order
of values in that distribution
4 Experiments
4.1 Experimental Framework
In this study, we used a specific sports activities dataset to compare the effect
of two signal segmentation methods in classification. We investigated the perfor-
mances of five different machine learning models and finally perform a real-time
HAR. Firstly, we collected activity data from the participants using the knee
brace sensors presented in the Sect. 3.1. Participants between the age of 21 to
Real-Time Human Activity Recognition Using Textile-Based Sensors 177
30 and were assessed. Body weight and height of participants ranged from 62
to 75 kg and 168 to 178 cm, respectively. Each participant wears the braces and
performs four different sports activities in different time slots. An experimenter
checks the connection between the sensor and the computer to ensure that there
is no interruption or distortion during the recording.
A PC with the following features; Intel Core i5 2.90 GHz with 8 GB RAM was
used. On the PC side, all implementations involving signal processing, feature
extraction, and classification were carried out using Python 3.7 platform.
4.2 Dataset
Our training and test data were collected from 3 participants with different
anthropometrics in different sessions. The training data set include 36 min long
data (12 min for each participant consisting of three minutes for each activity).
The total number of data samples collected for the training process is 108.000
(36 × 60 s × 50 Hz). The testing data include 12 min long data (4 min for each
participant consisting of one minute for each activity). The size of testing data
is about 36.000 (12 × 60 s × 50 Hz).
Each machine learning model (i.e., SVM-1, SVM-2, DT, kNN, RF) is trained
with the training set and tested with the test data. One of the main purposes
of this study is to inspect the effects of two signal segmentation methods not
only on the classification accuracy, but also on the response time considering the
real-time constraints. Therefore, we evaluated the performance of each algorithm
by using the 10-fold cross-validation method in terms of classification accuracy
(Acc) and execution time (ET [s]) in an offline manner. In the real-time HAR
system, however, we selected the system with the model showing the optimal
performance.
5 Results
MODELS
Feature sets SVM-1 SVM-2 DT kNN RF
Acc ET[s] Acc ET[s] Acc ET[s] Acc ET[s] Acc ET[s]
Single sensor (wo. SF) 0.399 15.00 0.661 5.80 0.717 4.08 0.803 1.01 0.762 28.89
Single sensor (w. SF) 0.771 1.95 0.515 1.68 0.796 0.26 0.786 0.16 0.785 8.21
Two sensors without 0.367 30.79 0.643 11.80 0.73 8.69 0.767 2.52 0.772 41.89
normalization (wo. SF)
Two sensors without 0.782 3.51 0.648 2.24 0.831 0.52 0.773 0.28 0.827 12.24
normalization (w. SF)
Two sensors normalized 0.464 9.82 0.615 8.52 0.703 6.90 0.745 1.94 0.754 32.46
by ratio (wo. SF)
Two sensors normalized 0.495 1.45 0.611 0.98 0.751 0.14 0.682 0.13 0.762 7.16
by ratio (w. SF)
Two sensors normalized 0.376 14.42 0.585 5.95 0.683 3.77 0.735 1.11 0.752 26.14
by difference (wo. SF)
Two sensors normalized 0.745 1.33 0.683 1.11 0.742 0.21 0.749 0.14 0.76 6.97
by difference (w. SF)
Overall results show that RF model achieved the highest accuracy on most
of the feature sets. However, the highest accuracy is obtained by DT model with
a value of 83.1% using two sensors without normalization and with statistical
features. Although RF has the best overall performance in terms of classification
accuracy, it is the laziest model in terms of ET. Herein, kNN proves to be
the fastest model. However, DT can be chosen as the ideal model for our real-
time HAR system with an acceptable processing latency. In addition, the results
indicate that the SF have characteristic properties helping in the improvement
of the classification accuracies in most of the classification models. It is also
observed that the proposed normalization scheme by using neither ratio nor
difference of the two sensor signals have contributed to an improvement in terms
of accuracy.
In Table 4 the classification results of the onset-offset detection based seg-
mentation approach is given. The best ET (0.20 s) is observed using kNN model.
Herein, we omit the onset-offset dataset (wo. SF) since each detected onset-offset
frame has a different number of samples and doesn’t have a regular shape.
The detailed classification performance in terms of accuracy, precision, recall
and F1-score for the DT model using SW-based segmentation and for the RF
Table 6. Classification performance of different models using single sensor with OOD-
based segmentation
6 Conclusion
In this study, a novel approach is applied using textile-based knee sensors to rec-
ognize specific human activities, such as walking, running, squatting, and stand-
ing. These sensors have capacitive properties and are able to measure capaci-
tance variation during the movement. We attached these sensors to knee braces
to accurately measure the variations. We implemented two different signal seg-
mentation algorithms, i.e. the sliding-window method and onset-offset detection
method before statistical features were extracted. Using different classifiers, such
as SVM, kNN, RF, DT, we evaluated the proposed system using performance
criteria, such as classification accuracy and execution time. The overall classi-
fication results show that although RF attained the highest accuracy, it is the
slowest model, thus not sufficient for our real-time HAR system. Therefore, DT
model showing similar accuracy, but drastically improved execution speed is
ideally recommended for HAR.
Due to Covid-19, we conducted this study with a limited size dataset. The
classification accuracy also depends on the size of data. We believe that a higher
accuracy will be obtained in a more balanced data set. In the future, we plan
to improve our experimental setup and collect more activity data from multiple
participants. Besides, only knee bracer sensors are used in this study. We aim
to improve our sensor framework by attaching new sensors to full pants instead
of knee braces. Our ultimate goal is to design a textile-based sensor that can be
worn on the whole body. Moreover, in the next research, we will investigate the
contribution of auxiliary sensors such as smartphone IMUs on the performance
of the HAR system.
References
1. Desai, C., Ramanan, D.: Detecting actions, poses, and objects with relational
phraselets. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.)
ECCV 2012. LNCS, vol. 7575, pp. 158–172. Springer, Heidelberg (2012). https://
doi.org/10.1007/978-3-642-33765-9 12
2. Donahue, J., et al.: Long-term recurrent convolutional networks for visual recogni-
tion and description. In: Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pp. 2625–2634 (2015)
3. Nazir, S., Yousaf, M.H., Velastin, S.A.: Evaluating a bag-of-visual features app-
roach using spatio-temporal features for action recognition. Comput. Electr. Eng.
72, 660–669 (2018)
4. Ronao, C.A., Cho, S.-B.: Human activity recognition with smartphone sensors
using deep learning neural networks. Expert Syst. Appl. 59, 235–244 (2016)
5. Hassan, M.M., Uddin, Md.Z., Mohamed, A., Almogren, A.: A robust human activ-
ity recognition system using smartphone sensors and deep learning. Future Gener.
Comput. Syst. 81, 307–313 (2018)
6. Lara, O.D., Labrador, M.A.: A survey on human activity recognition using wear-
able sensors. IEEE Commun. Surv. Tutor. 15(3), 1192–1209 (2012)
7. Labrador, M.A., Lara Yejas, O.D.: Human Activity Recognition: Using Wearable
Sensors and Smartphones. CRC Press, Boca Raton (2013)
8. Li, F., Shirahama, K., Nisar, M.A., Köping, L., Grzegorzek, M.: Comparison of
feature learning methods for human activity recognition using wearable sensors.
Sensors 18(2), 679 (2018)
9. De Leonardis, G., et al.: Human activity recognition by wearable sensors: compar-
ison of different classifiers for real-time applications. In: 2018 IEEE International
Symposium on Medical Measurements and Applications (MeMeA), pp. 1–6. IEEE
(2018
10. Davila, J.C., Cretu, A.-M., Zaremba, M.: Wearable sensor data classification for
human activity recognition based on an iterative learning framework. Sensors
17(6), 1287 (2017)
11. Jiang, W., Yin, Z.: Human activity recognition using wearable sensors by deep
convolutional neural networks. In: Proceedings of the 23rd ACM International
Conference on Multimedia, pp. 1307–1310 (2015)
12. Stetter, B.J., Ringhof, S., Krafft, F.C., Sell, S., Stein, T.: Estimation of knee joint
forces in sport movements using wearable sensors and machine learning. Sensors
19(17), 3690 (2019)
13. Ray, T., et al.: Soft, skin-interfaced wearable systems for sports science and ana-
lytics. Curr. Opin. Biomed. Eng. (2019)
14. Wang, Z., Yang, Z., Dong, T.: A review of wearable technologies for elderly care
that can accurately track indoor position, recognize physical activities and monitor
vital signs in real time. Sensors 17(2), 341 (2017)
15. Awais, M., et al.: An internet of things based bed-egress alerting paradigm using
wearable sensors in elderly care environment. Sensors 19(11), 2498 (2019)
16. Porciuncula, F., et al.: Wearable movement sensors for rehabilitation: a focused
review of technological and clinical advances. PM&R 10(9), 220–232 (2018)
17. Dorsch, A.K., King, C.E., Dobkin, B.H.: Wearable wireless sensors for rehabilita-
tion. In: Reinkensmeyer, D.J., Dietz, V. (eds.) Neurorehabilitation Technology, pp.
605–615. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-28603-7 29
182 U. Ayvaz et al.
18. Ahram, T., Falcão, C.: Advances in Human Factors in Wearable Technologies
and Game Design. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-
319-60639-2
19. Cao, M., Xie, T., Chen, Z.: Wearable sensors and equipment in VR games: a
review. In: Pan, Z., Cheok, A.D., Müller, W., Zhang, M., El Rhalibi, A., Kifayat,
K. (eds.) Transactions on Edutainment XV. LNCS, vol. 11345, pp. 3–12. Springer,
Heidelberg (2019). https://doi.org/10.1007/978-3-662-59351-6 1
20. Wei, S.-Y., et al.: Runplay: action recognition using wearable device apply on
Parkour game. In: Proceedings of the 29th Annual Symposium on User Interface
Software and Technology, pp. 133–135 (2016)
21. Nam, S.-H., Kim, J.-Y.: Dance exergame system for health using wearable devices.
IEEE Access 6, 48224–48230 (2018)
22. Moschetti, A., Cavallo, F., Esposito, D., Penders, J., Di Nuovo, A.: Wearable sen-
sors for human-robot walking together. Robotics 8(2), 38 (2019)
23. Özcan, B., Caligiore, D., Sperati, V., Moretta, T., Baldassarre, G.: Transitional
wearable companions: a novel concept of soft interactive social robots to improve
social skills in children with autism spectrum disorder. Int. J. Soc. Robot. 8(4),
471–481 (2016)
24. Atalay, A., et al.: Batch fabrication of customizable silicone-textile composite
capacitive strain sensors for human motion tracking. Adv. Mater. Technol. 2(9),
1700136 (2017)
25. Gonçalves, C., da Silva, A.F., Gomes, J., Simoes, R.: Wearable e-textile technolo-
gies: a review on sensors, actuators and control elements. Inventions 3(1), 14 (2018)
26. Wang, J., Chunhong, L., Zhang, K.: Textile-based strain sensor for human motion
detection. Energy Environ. Mater. 3(1), 80–100 (2020)
27. Wu, Y., Qi, S., Hu, F., Ma, S., Mao, W., Li, W.: Recognizing activities of the elderly
using wearable sensors: a comparison of ensemble algorithms based on boosting.
Sens. Rev. (2019)
28. Sufeng, H., Dai, M., Dong, T., Liu, T.: A textile sensor for long durations of human
motion capture. Sensors 19(10), 2369 (2019)
29. Merriaux, P., Dupuis, Y., Boutteau, R., Vasseur, P., Savatier, X.: A study of vicon
system positioning performance. Sensors 17(7), 1591 (2017)
30. Leier, M., Jervan, G., Allik, A., Pilt, K., Karai, D., Fridolin, I.: Fall detection and
activity recognition system for usage in smart work-wear. In: 2018 16th Biennial
Baltic Electronics Conference (BEC), pp. 1–4. IEEE (2018)
31. Amari, S., Si, W.: Improving support vector machine classifiers by modifying kernel
functions. Neural Netw. 12(6), 783–789 (1999)
32. Freund, Y., Mason, L.: The alternating decision tree learning algorithm. In: ICML
1999, pp. 124–133 (1999)
33. Liaw, A., Wiener, M., et al.: Classification and regression by randomforest. R News
2(3), 18–22 (2002)
34. Keller, J.M., Gray, M.R., Givens, J.A.: A fuzzy k-nearest neighbor algorithm. IEEE
Trans. Syst. Man Cybern. 4, 580–585 (1985)
35. Nguyen, H.D., Tran, K.P., Zeng, X., Koehl, L., Tartare, G.: Wearable sensor data
based human activity recognition using machine learning: a new approach. arXiv
preprint arXiv:1905.03809 (2019)
36. Banos, O., et al.: mHealthDroid: a novel framework for agile development of mobile
health applications. In: Pecchia, L., Chen, L.L., Nugent, C., Bravo, J. (eds.) IWAAL
2014. LNCS, vol. 8868, pp. 91–98. Springer, Cham (2014). https://doi.org/10.1007/
978-3-319-13105-4 14
Real-Time Human Activity Recognition Using Textile-Based Sensors 183
37. Zhang, M., Sawchuk, A.A.: USC-HAD: a daily activity dataset for ubiquitous activ-
ity recognition using wearable sensors. In: Proceedings of the 2012 ACM Conference
on Ubiquitous Computing, pp. 1036–1043 (2012)
38. Chi, V., Kim, J.: Human motion recognition by textile sensors based on machine
learning algorithms. Sensors 18(9), 3109 (2018)
39. Bhat, G., Deb, R., Chaurasia, V.V., Shill, H., Ogras, U.Y.: Online human activity
recognition using low-power wearable devices. In: Proceedings of the International
Conference on Computer-Aided Design, p. 72. ACM (2018)
40. Ozlem, K., Atalay, O., Atalay, A., Ince, G.: Textile based sensing system for lower
limb motion monitoring. In: Masia, L., Micera, S., Akay, M., Pons, J.L. (eds.)
ICNR 2018. BB, vol. 21, pp. 395–399. Springer, Cham (2019). https://doi.org/10.
1007/978-3-030-01845-0 79
41. Luo, J., Ying, K., Bai, J.: Savitzky-Golay smoothing and differentiation filter for
even number data. Sig. Process. 85(7), 1429–1434 (2005)
42. Kozina, S., Lustrek, M., Gams, M.: Dynamic signal segmentation for activity recog-
nition. In: Proceedings of International Joint Conference on Artificial Intelligence,
Barcelona, Spain, vol. 1622, p. 1522 (2011)
43. Anguita, D., Ghio, A., Oneto, L., Parra, X., Reyes-Ortiz, J.L.: A public domain
dataset for human activity recognition using smartphones. In: Esann (2013)
44. Shi, H., Xiao, H., Zhou, J., Li, N., Zhou, H.: Radial basis function kernel parameter
optimization algorithm in support vector machine based on segmented dichotomy.
In: 2018 5th International Conference on Systems and Informatics (ICSAI), pp.
383–388. IEEE (2018)
Extraction of Respiratory Signals
and Respiratory Rates
from the Photoplethysmogram
Shenglang Xiao1 , Pengfei Yang1(B) , Luyao Liu2 , Zhiqiang Zhang3 , and Jiankang Wu4
1 Xidian University, Xi’an 710071, Shaanxi, China
[email protected], [email protected]
2 University of Science and Technology Beijing, Beijing 100083, China
[email protected]
3 University of Leeds, Leeds LS2 9JT, UK
[email protected]
4 University of Chinese Academy of Sciences, Beijing 100049, China
1 Introduction
Respiratory rate (RR) is one of the indicators used by hospitals to monitor patients for
abnormal conditions, such as cardiac, respiratory arrest, systemic inflammatory response
syndrome (SIRS), and renal failure [1]. Adults have a normal respiratory rate of 8–20
breaths per minute (bpm) [2]. In a study of respiratory abnormalities, 54% of cardiac
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 184–198, 2020.
https://doi.org/10.1007/978-3-030-64991-3_13
Extraction of Respiratory Signals and Respiratory Rates 185
arrest patients had at least one RR > 27 bpm three days before cardiac arrest [3]. There-
fore, it is essential to monitor patients’ respiratory. However, although pulse oximetry
can be used to continuously measure heart rate (HR) and peripheral oxygen saturation
(SpO2), continuous estimation of RR requires additional equipment, such as measure-
ment of gas flow. Therefore, these is a need to improve the accurate of RR estimates
from the electrocardiogram (ECG), the photoplethysmogram (PPG) obtained from pulse
oximeters [4, 5]. This paper focuses on extracting RR from PPG signals. Pulse oximeters
estimate blood oxygen saturation (SpO2) based on Beer-Lambert’s law, which indicates
that the light intensity decays exponentially as it passes through the medium and the
degree of attenuation is related to wavelength [6]. Therefore, we can use PPG to show
the change in blood volume in the finger over time. The PPG signal includes a pulse
component and a constant component, and the respiratory signal and the heartbeat signal
are included in the pulse component [7].
The modulation of PPG signals by respiratory cycle includes a variety of ways,
including amplitude modulation (AM), frequency modulation (FM), and baseline wan-
der (BW) [8]. To extract the respiratory modulation signal from the PPG, the most
common method is to detect the peak and trough of the PPG signal and obtain the res-
piratory modulation signal by calculation. In peak-trough detectionin the time-domain,
we define the time-series of peaks in the PPG to be a set of pairs tpk,i , ypk,i i=1...Npk ,
and the time-series of troughs in the PPG to be a set of pairs ttr,i, ytr,i i=1...Ntr , where
Npk and Ntr are the number of peaks and troughs, respectively. Npk = Ntr will be
caused by noise in the signal or misdetection of the detection algorithm [6, 9, 10].
The time-series of peak and trough will be used to derive three different respiration-
modulated signals, representing three different kinds of information about respiration
[6]. (1) Respiration leads to change in cardiac output, causing respiratory-induced
amplitude variation (RIAV), that is, change in peripheral pulse intensity. RIAV is
defined as the height difference
between two adjacent peaks and troughs. Therefore,
yRIAV = ti , ypk,i − ytr,i i=1...Ntr . (2) Respiration causes periodic changes in heart rate,
namely respiratory-sinus arrhythmia (RSA). It appears that the heart rate increases dur-
ing inhalation and decreases during exhalation, thereby causing respiratory-induced
frequency variation (RIFV), which is defined as the time interval between successive
PPG peaks. Therefore, yRIFV = {ti , ti+1 − ti }i=1...Npk . (3) Respiration causes change in
the pressure in the chest, causing blood exchange between the pulmonary and systemic
circulation. Leading to a change in the baseline of perfusion, called respiratory induced
intensity variation (RIIV). RIIV appears as the change in the amplitude of the peak of
PPG waveform. Therefore, yRIIV = ti , ypk,i i=1...Npk . There are also other respiratory
modulation signals, such as pulse width variability [11], which can be used to estimate
the RR (see Fig. 1).
Respiration modulates the PPG in different ways. Different methods of modulation
signal extraction have been proposed in a number of literatures, which are discussed in
Sect. 2. In Sect. 3, the improved Incremental-Merge Segmentation (IMS) algorithm and
peak detection algorithm are introduced, and a combined algorithm for spectral analysis
is proposed to improve the accuracy of RR estimation. Databases and evaluation methods
are described in Sect. 4. Section 5 shows the results of RR estimation using the proposed
algorithm. The significance and results of this study are discussed in Sect. 6.
186 S. Xiao et al.
Fig. 1. PPG waveform and three respiration modulation signals. RIIV is the change in the baseline
of perfusion; RIAV is the change in peripheral pulse intensity; RIFV is periodic changes in heart
rate.
2 Related Work
Different algorithms have been proposed to estimate RR form PPG, such as digital filters
[12], fast Fourier transforms (FFT) [6], wavelet decomposition [13] and hidden semi-
Markov model [14]. Autoregressive model (AR) [9, 15], principal component analysis
(PCA) [16] and artificial neural network (NN) [17], have all been successfully applied to
various PPG databases with good estimation results. Some studies use neural networks
to analyze the three modulation signals to select the best waveform for the algorithm
design. There are also studies that use data fusion to combine estimates of multiple
modulation signals [6, 18]. However, these methods have higher requirements for time
domain waveforms. This problem can be solved by autocorrelation analysis. Autocor-
relation analysis is a mathematical tool for finding repetitive patterns, such as periodic
signals masked by noise. Since the respiratory signal can be viewed as a noisy periodic
signal, the autocorrelation analysis can be used to calculate the respiratory rate [19].
In the autocorrelation signal, each peak (except the first) represents a period of strong
autocorrelation, and the period with the greatest correlation can be regarded as the RR.
In order to extract effective information from chaotic PPG signal, researchers have
proposed various methods. Byung S. Kim et al. used independent component analysis
(ICA) to reduce motion artifact [16]. Despite so many advances, the use of pulse oxime-
ters to measure respiratory rate has only recently been used commercially, because there
are more reliable methods of RR estimation in clinical settings, such as spirometry or
capacitance. Therefore, it is important to come up with a reliable method for PPG. A
common method now is to introduce the signal quality index (SQI) to evaluate the signal
quality [20]. If the PPG signal does not carry meaningful physiological information, it
will not be algorithmically estimated. The lack of quality indicators may lead to serious
clinical errors, and the introduction of evaluation indicators can improve accuracy and
reliability.
To overcome this limitation, we designed an algorithm that uses all available
respiratory-induced waveform to achieve significant accuracy. In this study, we pro-
pose an algorithm that combines the results of the three respiratory-induced variations
described above, and use the AC-AR algorithm to estimate respiratory rate.
Extraction of Respiratory Signals and Respiratory Rates 187
3 Proposed Algorithm
As for RR estimation, the most essential is the extraction of respiratory modulation sig-
nals. The main methods for extracting respiratory modulation signals are peak detection
and signal quality assessment. Before the peak detection, the pre-processing procedure
should be carried out first. A high-pass filter is applied to remove the dc component of
the PPG signal. Then the PPG is segmented into pulses using IMS algorithm and artifacts
are detected which are used to calculate signal quality (see Fig. 2). If the assessed quality
is low, the RR estimation is not provided. This paper proposes an improved method for
peak detection and signal evaluation, and then uses spectrum analysis and data fusion to
estimate respiratory rate. In the following sections, we will describe RR estimation in
more detail.
The general principle of peak detection is that any singular point of a differentiable signal
corresponds to a zero-crossing point or two inflection points in its derivative signal. This
paper proposes a new method for peak detection (see Fig. 3). This method does not
need to solve the second derivative, also does not need to solve the inflection point of
the first derivative. Therefore, the computational efficiency can be improved to facilitate
real-time processing. The specific method is shown in the Algorithm 1 below. In order
to avoid the impact of PPG signal amplitude changes on peak detection and verification,
a 10 s sliding window is used for PPG waveform with an overlap time of 5 s.
In order to improve detection accuracy, peak verification is needed which mainly con-
siders two factors, the amplitude threshold and the time interval threshold. The method
of setting the amplitude threshold is shown below. Let thresh1 be the ninth decile and
thresh2 be the first decile. Then,
and then,
In terms of time interval, because the pulse wave is mainly regulated by the heartbeat,
and the normal person’s resting heart rate is 60–100 bpm, the peak of the time interval
corresponding to this range will be detected. For trough detection, the PPG waveform
shows that the minimum value between two peaks is the trough. The time-series of
peak and trough will be used to derive three different respiration-modulated signals,
representing three different kinds of information about respiration.
Since there are motion artifacts and noise that cannot be filtered out in the PPG, the
quality of the PPG needs to be evaluated. The signal quality evaluation method used in
this paper is analyzed for consistency. First, the PPG pulse is divided into line segments
Extraction of Respiratory Signals and Respiratory Rates 189
PPG
Interval
Arfact Clip
Threshold
Total me
Threshold
No Yes
Bad Good
E (xi − μ)(xi+τ − μ)
ρx (τ ) = (6)
σ2
where xi is the time-series of signal, xi+τ is the time-series translated by τ units, μ is
the mean, and σ 2 is the variance. An autocorrelation sequence C[τ] can be combined by
the value of formula from τ = 0 to τ = n − 1. In the autocorrelation signal, each peak
(except the first) represents a period of strong autocorrelation, and the period with the
greatest correlation can be regarded as the RR. Therefore, we can use autocorrelation
analysis to obtain the periodicity of the respiratory signal.
We apply the autocorrelation to analyze the signal as Fig. 6 shows. As the result, the
autocorrelation coefficient waveform contains the breath rate signal, and it overcomes
the effect of noise and clutter. At last, we can analyze these coefficients by AR model
to acquire the more accurate RR.
biomedical engineering, AR models are widely used for spectrum analysis of heart rate
variability and electroencephalography analysis. In AR model, each point in the time-
series is a regression of its past points. The number M of past points used is called
the order of AR model. AR model can be regarded as a filter, which divides the time-
series into predictable time series and prediction error series. Compared with the DFT,
it provides a smoother and more intuitive power spectrum, and yet is more complicated.
The AR model is defined as,
M
x[n] = ai x[n − i] + ε[n] (7)
i=1
where M is the model order, ai is the weight, and ε[n] is the prediction error and
follows ε ∼ N(0, σ). The least squares method is used to minimize the prediction error
ε[n] to obtain the optimal parameter aopt . Matrix the above formula,
x = Xa + ε (8)
when the prediction error ε[n] reaches the minimum, the parameter aopt is optimal, that
is,
ε = x − Xaopt = 0 (9)
X T ε = X T x − Xaopt = 0 (10)
X T x = X T Xaopt (11)
−1 −1
XTX X T X aopt = aopt = X T X XTx (12)
Another point of AR model is the choice of model order M. Different orders have
different effects in AR model. In practice, by fitting the sequence to multiple orders, the
order with the best effect is selected. The most common selection criterion is Akaike’s
Information Criterion (AIC),
AIC(M) = N · ln σp2 + 2M (13)
where σp2 is the variance of the prediction error ε[n]. The best model order is M that
minimizes AIC.
Then, the time-series spectrum R ejω can be obtained by multiplying the square of
the transfer function and the variance of the prediction error,
2
R ejω = H ejω σp2 (14)
where H ejω is the transfer function of AR model,
1
H ejω = (15)
1 − a1 e−jω − · · · − aM e−jM ω
The autocorrelation method can remove the noise in the periodic signal with the
characteristics described above. Each peak of the autocorrelation sequence represents
a period of strong autocorrelation, so the period of the autocorrelation corresponds to
the period of the original signal. Therefore, the autocorrelation signal of the respiratory
modulation signal used as the input signal of AR spectrum analysis to estimate the RR.
192 S. Xiao et al.
where var is the variance of these line segments, and mean is the mean of these line
segment. The spectrums of the modulation signal with ASQ less than a certain range are
processed by average.
tracing waveform was used as a reference “gold standard” record for RR. Each breath
on the carbon dioxide map in the database has been manually marked by the research
assistant, and the reference RR value is derived based on the average time between two
consecutive breaths using annotations [6].
Before data analysis, preprocessing is performed. We remove the linear trend of the
signal to avoid errors caused by data offset and then use low-pass filtering to remove high-
frequency noise. The three methods mentioned above are then used to extract the res-
piratory modulation signal. The signals are resampled since they are unevenly-sampled
time-series. Each resampled time-series is normalized using a zero-mean unit-variance
transformation. In order to increase the reliability of the signal, a signal evaluation index
(SQI) is introduced to evaluate the quality of the modulated signal. In this study, RR was
estimated to be within a reasonable range of breathing frequencies set at 4 to 65 breaths
per minute.
To extract the RR from the PPG, a common method is to use a sliding window to
segment the PPG time-series, and each window obtains an RR. This experiment uses two
windows size of 30 s and 60 s, and estimates the RR every 3 s and 6 s, respectively. Based
on the estimated value and the reference value, performance was assessed by calculating
the mean absolute error (MAE) and average absolute error percentage (AAEP) in breaths
per minute for each record, defined as,
1 w
MAE = yi − yref ,i (17)
w i=1
1 w yi − yref ,i
AAEP = (18)
w i=1 yref ,i
where w is the number of reference value, yi is estimate value, and yref ,i is reference value.
The observation value of each algorithm is compared with the reference observation
value, and the measurement error of the observation value of each algorithm is calculated.
The first 64 s are not used for performance measurements because they are used to
initialize high-pass filters and sliding window. All RR estimation methods, including the
single modulation methods, ignore the measurement errors of the windows containing
artifacts automatically detected by the algorithm.
5 Results
According to the experiment, for the signal with a sampling frequency of 300 Hz, the IMS
algorithm can obtain a better result when m = 10. It provides a good tradeoff between
calculating load and time resolution for pulse peak detection. Different time windows
have no significant effect on RR measurement errors, but larger windows can slow down
the real-time response of the algorithm. But when the time window is too small, the
lower respiratory rate cannot be detected. Therefore, we eclectically selected the time
window of 60 s for analysis. Firstly, the PPG signal is analyzed from the time-frequency
domain. Figure 8(a) is the PPG signal, and the spectrum analysis is shown in Fig. 8(b).
From the frequency spectrum, we can find that the energy of the breath rate signal is
weaker compared with the heart signal and its harmonics. Therefore, it is necessary to
194 S. Xiao et al.
extract the respiratory modulation signal from PPG signal to avoid the interference of
heartbeat signal. As can be seen from Fig. 9, after using the AC-AR algorithm proposed
in this paper, the spectrum is concentrated near RR.
Fig. 9. The frequency spectrum of 180 s respiratory signal before AC-AR (yellow) and after
AC-AR (black). The red dotted line is the respiratory rate. (Color figure online)
After signal preprocessing, we get the respiratory modulation signal from the PPG
signal. Figure 10 shows the comparison between the reference respiratory signal and the
respiratory modulation signal extracted using the peak detection algorithm proposed in
this paper. The extracted respiratory signal is basically similar to the reference respiratory
signal, which is of great help to the subsequent analysis. Following the signal processing
method previously mentioned, respiratory rates are acquired through the AC-AR algo-
rithm. By the above formula and reference respiratory rate, we can calculate the MAE
and AAEP. From Table 1, we can see that the result is much improved after using SQI. In
the CapnoBase database, some signals are chaotic, and the results with large errors will
be obtained by using these signals to analyze. Using SQI can avoid these errors, which
is beneficial to the reliability of clinical results. Meanwhile, compared with AR model,
the AAEP of the AC-AR algorithm decreased by about 1%. From Table 2, the accuracy
is improved to some extent after data fusion with ASQ, which proves that the feasibility
Extraction of Respiratory Signals and Respiratory Rates 195
of data fusion using this method. Compared with averaging the spectrum directly, using
ASQ can dynamically select a better spectrum as the result according to the quality of
autocorrelation signal.
Fig. 10. Comparison of respiratory modulation signals with reference breathing signals. After
processing, the respiratory signals can be extracted normally.
AAEP
AC AC-AR
Before using SQI 8.37% 7.56%
After using SQI 4.27% 3.72%
As can be seen from the boxplot (see Fig. 11), the MAEs are quite different when
using one of the modulation signals alone. The results of RIIV are obviously better than
the other two, indicating that RIIV has the strongest modulation of PPG signal. After
using data fusion and SQI, the experimental results are obviously better. Among them,
the results of data fusion using ASQ were better than SQI analysis of single respiratory
modulated signal, indicating that it is necessary to conduct quality analysis of modulated
signal. Moreover, the result of data fusion using autocorrelation signal quality is better
than that of spectrum averaging. Without considering the outliers, the error of the AC-AR
algorithm is 0.12 ± 0.36 bpm.
To further evaluate the algorithm, a scatter plot is drawn for analysis (see Fig. 12).
Best Fit stands for PPG respiratory rate equal to the reference respiratory rate, and the
196 S. Xiao et al.
Fig. 11. Results for the CapnoBase benchmark dataset using 60 s windows. The boxplots give
the RMS Error for the different RR estimation methods.
closer the vertical distance to the line, the better the result. As can be seen from the
figure, results are concentrated near the Best Fit, indicating that the AC-AR algorithm
identified and eliminated a majority of high error estimations. This also shows that the
algorithm proposed in this paper is feasible and accurate.
Fig. 12. Scatter plot comparing the reference RR obtained from capnometry with the PPG RR
obtained from the ACF and AC-AR algorithm. The AC-AR eliminates the estimations with large
error (distance from Best fit). Box A: The signal has been badly distorted.
6 Conclusion
In this paper, we improved the method of obtaining respiratory modulation signals and
proposed a new analysis method that can be used in combination with other respiratory
frequency analysis methods to improve the accuracy and robustness of respiratory fre-
quency estimation. The autocorrelation method can remove noise in a periodic signal
having the above characteristics. Each peak of the autocorrelation sequence represents
Extraction of Respiratory Signals and Respiratory Rates 197
References
1. Van Leuvan, C.H., Mitchell, I.: Missed opportunities? An observational study of vital sign
measurements. Crit. Care Resuscitation 10(2), 111–115 (2008)
2. Hooker, E.A., et al.: Respiratory rates in emergency department patients. J. Emerg. Med. 7(2),
129–132 (1989)
3. Birrenkott, D.A., Pimentel, M.A., Watkinson, P.J., Clifton, D.A.: A robust fusion model for
estimating respiratory rate from photoplethysmography and electrocardiography. IEEE Trans.
Biomed. Eng. 65(9), 2033–2041 (2018)
4. Walsh, J.A., et al.: Novel wireless devices for cardiac monitoring. Circulation 130(7), 573–581
(2014)
5. Hubner, P., et al.: Surveillance of patients in the waiting area of the department of emergency
medicine. Medicine 94(51), Article no. e2322 (2015)
6. Karlen, W., Raman, S., Ansermino, J.M., Dumont, G.A.: Multiparameter respiratory rate
estimation from the photoplethysmogram. IEEE Trans. Biomed. Eng. 60(7), 1946–1953
(2013)
7. Charlton, P.H., Birrenkott, D.A., Bonnici, T., Pimentel, M.A.F.: Breathing rate estimation
from the electrocardiogram and photoplethysmogram: a review. IEEE Rev. Biomed. Eng. 11,
2–20 (2018)
8. Birrenkott, D.: Respiratory quality indices for ECG- and PPG-derived respiratory data. D.Phil
transfer of status report, Department of Engineering and Science, University of Oxford,
Oxford, U.K (2015)
9. Pimentel, M.A.F., et al.: Toward a robust estimation of respiratory rate from pulse oximeters.
IEEE Trans. Biomed. Eng. 64(8), 1914–1923 (2017)
10. Meredith, D., et al.: Photoplethysmographic derivation of respiratory rate: A review of relevant
respiratory and circulatory physiology. J. Med. Eng. Technol. 36(1), 60–66 (2012)
11. Lázaro, J., Gil, E., Bailón, R., Mincholé, A., Laguna, P.: Deriving respiration from
photoplethysmographic pulse width. Med. Biol. Eng. Comput. 51, 233–242 (2013)
12. Nilsson, L., et al.: Monitoring of respiratory rate in postoperative care using a new
photoplethysmographic technique. J. Clin. Monit. Comput. 16(4), 309–315 (2000)
13. Leonard, P., et al.: An algorithm for the detection of individual breaths from the pulse oximeter
waveform. J. Clin. Monit. Comput. 18(5/6), 309–312 (2004)
198 S. Xiao et al.
14. Pimentel, M.A.F., Santos, M.D., Springer, D.B., Clifford, G.D.: Heart beat detection in mul-
timodal physiological data using a hidden semi-Markov model and signal quality indices.
Physiol. Meas. 36, 1717–1727 (2015)
15. Takalo, R., Hytti, H., Ihalainen, H.: Tutorial on univariate autoregressive spectral analysis. J.
Clin. Monit. Comput. 19, 401–410 (2005)
16. Kim, B.S., Yoo, S.K.: Motion artifact reduction in photoplethysmography using independent
component analysis. IEEE Trans. Biomed. Eng. 53(3), 566–568 (2006)
17. Johansson, A.: Neural network for photoplethysmographic respiratory rate monitoring. Med.
Biol. Eng. Comput. 41, 242–248 (2003)
18. Khreis, S., Ge, D., Rahman, H. A., Carrault, G.: Breathing rate estimation using kalman
smoother with electrocardiogram and photoplethysmogram. IEEE Trans. Biomed. Eng. 67,
893–904 (2019)
19. Nguyen, N.T.P., Lyu, P., Lin, M.H., Chang, C., Chang, S.: A short-time autocorrelation method
for noncontact detection of heart rate variability using CW doppler radar. In: 2019 IEEE
MTT-S International Microwave Biomedical Conference (IMBioC), China, pp. 1–4 (2019)
20. Orphanidou, C., Bonnici, T., Charlton, P., Clifton, D., Vallance, D., Tarassenko, L.:
Signal-quality indices for the electrocardiogram and photoplethysmogram: derivation and
applications to wireless monitoring. IEEE J. Biomed. Health Inf. 19(3), 832–838 (2015)
21. Karlen, W., Ansermino, J.M., Dumont, G.: Adaptive pulse segmentation and artifact detection
in photoplethysmography for mobile applications. In: 34th Annual International Conference
of the IEEE EMBS (2012)
An Ultra-low-Power Integrated Heartbeat
Detector for Wearable Sensors
1 Introduction
In the context of wearable systems, every integrated sensor needs a long bat-
tery life in order to avoid frequent replacements. Because communication is the
most energy-hungry part of each sensor, data exchanges between the sensors (or
nodes) and aggregators have to be reduced to a minimum, while maintaining the
synchronization between all the nodes.
A conventional solution to address this problem is putting the nodes to sleep
most of the time, and regularly wake up the nodes at defined time steps. During
the wake-up phase, the aggregator can establish specific communication with cer-
tain nodes, which remain active, whereas the others return in sleep mode. While
reducing the average power consumption of the nodes, it requires an always-on
local oscillator in each node. Moreover, all the oscillators have to be in sync so
that the communication between the aggregator and the nodes can be estab-
lished.
c ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
Published by Springer Nature Switzerland AG 2020. All Rights Reserved
M. M. Alam et al. (Eds.): BODYNETS 2020, LNICST 330, pp. 199–211, 2020.
https://doi.org/10.1007/978-3-030-64991-3_14
200 A. Gautier et al.
On the human body, the heartbeats can be interpreted as a clock signal with
a low duty cycle, and act as a synchronized wake-up signal [1,9]. An example of
a heart-rate paced communication is depicted in Fig. 1. A typical application for
this slow-paced scheme is posture or pose recognition [11,12]. Once a heartbeat
occurs, all the nodes and the aggregator are activated. The aggregator sets up
a communication with some nodes, e.g. Node1, and the other nodes go back in
sleep mode. Compared to the previous scheme, the local oscillators are replaced
by independent heartbeat detectors in each node. This method has the advantage
to ensure synchronicity for the wake-up phase between all the nodes distributed
on the entire body.
2 System Overview
The proposed structure is based on the differential ECG heart rate measured
between 2 input electrodes, depicted in Fig. 2. The objective is to detect the
high amplitude of the R-wave in the QRS complex for each heartbeat. The 2
electrodes are capacitively coupled to the inputs of the differential amplifiers for
DC offset suppression. The input biasing voltage is set to VDD /2 through large
resistors in the TΩ range allowing input impedances orders of magnitude larger
than the electrodes impedances 1/G1 and 1/G2 . These resistors are implemented
using transistor-based pseudo-resistors, yielding a silicon occupation of 10 µm2 ,
and thus compatible with on-chip integration. The resulting high-pass filters are
called HPF1 and HPF2.
Since the electrodes are very close from each other, they sense the same
ECG signal with very few differences. The closer the 2 ECG signals are, the
202 A. Gautier et al.
3 Circuit Design
3.1 Amplifier A1
The structure of the amplifiers used in this approach is a conventional 3-stage
amplifier structure. It is composed of a differential pair and a gain stage. The
electrical schematic of amplifier A1 is shown in Fig. 3. For the differential pair,
composed of M11 and M12 , the inputs are connected to PMOS transistors instead
of the NMOS transistors to mitigate the 1/f noise. The gain stage, composed
of 2 transistors in the conventional amplifier structure (M15 and M16 in Fig. 3),
is doubled with the purpose of increasing the gain (addition of M17 and M18 ).
The body voltage of M17 is fixed and set to VDD /2. For this application, there
is no need for a high CMRR because the system does not need to be linear and
detect all the components of the heartbeats. Thus, the design effort can be set
on lowering the current consumption while still acquiring the R-wave with high
precision. A CMFB circuit is added to the structure for stability and ensures
operation at a fixed common-mode voltage for the first 2 stages. It presents the
particularity to directly drive the body voltage of transistors M13 and M14 .
204 A. Gautier et al.
Fig. 3. Electrical schematic of the designed amplifiers A1 and A2, including each a
Common-Mode Feedback (CMFB) loop. The naming convention is X = 1 for A1,
X = 2 for A2. In A2, the bulk of M27 is connected to the self-calibration unit for VO
adjustment.
3.2 Amplifier A2
The self-calibration unit acts as the feedback loop for adjusting the offset voltage
of A2, Fig. 5. It takes VOU T as an input and charges the capacitor CC with a
constant current ICHARGE , depending on the duty cycle of VOU T . To calibrate
the system, the resulting voltage VC must be between 2 reference voltages Vref L
and Vref H , defined externally depending on the user. If VC is over Vref H , it means
An Ultra-low-Power Integrated Heartbeat Detector for Wearable Sensors 205
Fig. 5. Block diagram of the proposed scheme for the self-calibration unit.
that the offset component VO is too low, and the signal inc offset is set. If VC is
below Vref L , the signal dec offset is set instead. The digital signals inc offset and
dec offset are then used to command a charge pump circuit allowing to increase
and decrease the body biasing of M27 , respectively. In addition, a resistor RC
is used to discharge the capacitor CC . The passive components RC and CC can
be implemented off-chip so that the resulting time constant can be adapted
externally to each person’s heartbeat. Once the value of VO is calibrated, it does
not need to change while the system is on-line, therefore the self-calibration unit
can be put in sleep mode.
4 Results
4.1 System-Level Model
The proposed structure has been simulated using Matlab R
, and the intermedi-
ate signals are shown in Fig. 6. The ECG signal is generated by the ECGSYN
application from Physionet [6,13], 50 Hz coupling due to the absence of a ref-
erence electrode, Fig. 6-(a). Its amplitude and shape are similar to that of a
206 A. Gautier et al.
Fig. 6. Transient response of different voltages in the simulated system using Matlab
R
.
a) Input signal at electrode #1, 50 Hz coupling. b) Difference between the signals V1
and V2 at the output of the amplifiers A1 and A2, without taking the threshold VO
into account. An acceptable value of VO is indicated on the graph. c) Output signal
VOU T .
measured ECG signal [13], sensed by both electrodes as they are next to each
other. A random electrode conductivity is modeled, depending on the electrode
material itself and its placement on the skin. The highpass filters HPF1 and
HPF2 are designed to have a cut-off frequency 15 Hz, allowing the attenua-
tion of motion artifacts and baseline wandering caused by the respiration [2].
The model includes a random variation of the passive elements values, extracted
from transistor-level Monte-Carlo simulations. Moreover, a voluntary mismatch
between the highpass filters capacitances is added to enhance the differences
between the 2 input signals. Given simulation results, a 40% capacitance mis-
match can produce a detectable differential voltage corresponding to the R-
wave at the output of A1. However, a capacitance mismatch superior to 150%
bring the filter cut-off frequency closer 50 Hz, and produces a differential voltage
An Ultra-low-Power Integrated Heartbeat Detector for Wearable Sensors 207
Fig. 7. Transient response of different voltages in the system simulated using Spectre
R
.
a) Input signal at electrode #1, 50 Hz coupling, baseline drift and motion artifact. b)
Intermediate signals at the output of the amplifiers A1 and A2. c) Output signal
VOU T .
including also amplified environmental artifacts and not only the R-wave. The
recovery of the heartbeat is not possible anymore. A capacitance mismatch of
100% is thus set for the behavioral simulations.
Amplifiers A1 and A2 are then modeled, with a differential gain GD and a
common-mode gain GCM . The CMRR value of the amplifiers is derived from those
2 gain values. For a defined value of the CMRR, the model generates 100 ECG
signals for statistical purposes, and tests if an acceptable value of the threshold VO
exists after the processing of each signal, as in Fig. 6-(b). If this value exists, a test is
208 A. Gautier et al.
considered a success and the signal VOU T is output, Fig. 6-(c). Otherwise, the test
is considered a failure. From the simulation, a minimum CMRR of 41 dB is needed
to ensure a 95% success rate. This requirement is thus used to refine the amplifier
design described in Sect. 3.1.
detector VC is shown in Fig. 7-(c). Considering the offset calibration, Fig. 8 shows
that the DC output voltage of A2 can be tuned in that range with a variation
of the body biasing voltage of M27 that does not modify the common-mode gain
GCM of A2, thus enabling self-calibration without risking a behavioral change
in the amplifiers.
The amplifiers consume 7.5 nW each, and the comparator consumes only
4.2 nW at 60 bpm. The system power consumption is 19 nW without taking into
account the automatic offset calibration unit, since it is in sleep mode while
on-line.
Since they are the most power-hungry part of the system, the characteristics
of the amplifiers are compared with state-of-the-art ECG amplifiers, Table 1.
In this work, even though the CMRR is far below that of conventional instru-
mentation amplifiers used for ECG detection [3,4,8,17], it is still sufficient for
the application since signal reconstruction is not needed. Moreover, since the
CMRR constraint is lowered, an ultra-low-power design can be envisioned for
the amplifiers, yielding to a total power consumption reduction of more than
50% compared to an amplifier used for a similar application [8]. This system is
thus suitable for near-sensor integration.
5 Conclusion
This work presents a low power circuit for wearable systems detecting the ECG
signal and converting the heart rate into a digital signal. This solution permits
waking up the sensors from time to time (e.g. once or twice per second), and
consumes only 19 nW at a 900 mV supply voltage. The applications for this
integrated circuit are in medical monitoring and more generally in high autonomy
210 A. Gautier et al.
Acknowledgment. This work has been initiated in the frame of the Human Body
Intranet collaborative project between STMicroelectronics, BWRC at UC Berkeley and
IEMN. The authors wish to acknowledge Andreia Cathelin, Jan Rabaey and Andreas
Kaiser for their support. This work was supported in part by the European CHIST-
ERA JEDAI program under number ANR-19-CHR3-0005-01.
References
1. Benarrouch, R., et al.: Heartbeat-based synchronization scheme for the human
intranet: modeling and analysis (2020). http://arxiv.org/abs/2005.05915
2. Berwal, D., Vandana, C., Dewan, S., Jiji, C., Baghini, M.: Motion artifact removal
in ambulatory ECG signal for heart rate variability analysis. IEEE Sens. J. 19(24),
12432–12442 (2019). https://doi.org/10.1109/JSEN.2019.2939391
3. Bose, S., Shen, B., Johnston, M.L.: A 20 µW heartbeat detection system-on-chip
powered by human body heat for self-sustaining wearable healthcare. In: 2020
IEEE International Solid-State Circuits Conference - (ISSCC), pp. 408–410 (2020).
https://doi.org/10.1109/ISSCC19947.2020.9063071
4. Chen, Y., et al.: An injectable 64 nW ECG mixed-signal SoC in 65 nm for arrhyth-
mia monitoring. IEEE J. Solid State Circuits 50(1), 375–390 (2015). https://doi.
org/10.1109/JSSC.2014.2364036 √
5. Dong, Y., et al.: A 1.8 µW 32 nV/ Hz current-reuse capacitively-coupled instru-
mentation amplifier for EEG detection. In: 2017 IEEE International Symposium
on Circuits and Systems (ISCAS), pp. 1–4, May 2017. https://doi.org/10.1109/
ISCAS.2017.8050494
6. Goldberger, A., et al.: PhysioBank, PhysioToolkit, and PhysioNet: components
of a new research resource for complex physiologic signals. Circulation 23(101),
e215–e220 (2003). https://doi.org/10.1161/01.CIR.101.23.e215
7. Ha, H., et al.: A bio-impedance readout IC with digital-assisted baseline cancel-
lation for two-electrode measurement. IEEE J. Solid State Circuits 54(11), 2969–
2979 (2019). https://doi.org/10.1109/JSSC.2019.2939077
8. He, D.D., Sodini, C.G.: A 58 nW ECG ASIC with motion-tolerant heartbeat timing
extraction for wearable cardiovascular monitoring. IEEE Trans. Biomed. Circuits
Syst. 9(3), 370–376 (2015). https://doi.org/10.1109/TBCAS.2014.2346761
9. Li, H., Tan, J.: Heartbeat-driven medium-access control for body sensor networks.
IEEE Trans. Inf. Technol. Biomed. 14(1), 44–51 (2010). https://doi.org/10.1109/
TITB.2009.2028136
10. Izumi, S., et al.: Normally off ECG SoC with non-volatile MCU and noise toler-
ant heartbeat detector. IEEE Trans. Biomed. Circuits Syst. 9(5), 641–651 (2015).
https://doi.org/10.1109/TBCAS.2015.2452906
11. Larras, B., Frappé, A.: On the distribution of clique-based neural networks for
edge AI. IEEE J. Emerg. Sel. Top. Circuits Syst. 1 (2020). https://doi.org/10.
1109/JETCAS.2020.3023481
12. Laurijssen, D., Saeys, W., Truijen, S., Daems, W., Steckel, J.: Synchronous wireless
body sensor network enabling human body pose estimation. IEEE Access 7, 49341–
49351 (2019). https://doi.org/10.1109/ACCESS.2019.2910636
An Ultra-low-Power Integrated Heartbeat Detector for Wearable Sensors 211
13. McSharry, P., Clifford, A., Tarassenko, L., Smith, L.: A dynamical model for gener-
ating synthetic electrocardiogram signals. IEEE Trans. Biomed. Eng. 3(50), 289–
294 (2003). https://doi.org/10.1109/TBME.2003.808805
14. Xiang, J., Dong, Y., Xue, X., Xiong, H.: Electronics of a wearable ECG with level
crossing sampling and human body communication. IEEE Trans. Biomed. Circuits
Syst. 13(1), 68–79 (2019). https://doi.org/10.1109/TBCAS.2018.2879818
15. Yan, L., et al.: A 680nA ECG acquisition IC for leadless pacemaker applications.
IEEE Trans. Biomed. Circuits Syst. 8(6), 779–786 (2014). https://doi.org/10.1109/
TBCAS.2014.2377073
16. Yoo, J., Yan, L., Lee, S., Kim, Y., Yoo, H.: A 5.2 mW self-configured wearable body
sensor network controller and a 12µW wirelessly powered sensor for a continuous
health monitoring system. IEEE J. Solid State Circuits 45(1), 178–188 (2010).
https://doi.org/10.1109/JSSC.2009.2034440
17. Zhang, J., Zhang, H., Sun, Q., Zhang, R.: A low-noise, low-power amplifier with
current-reused OTA for ECG recordings. IEEE Trans. Biomed. Circuits Syst.
12(3), 700–708 (2018). https://doi.org/10.1109/TBCAS.2018.2819207
Anxiety Detection Leveraging Mobile
Passive Sensing
therefore crucial for preventing conditions from becoming chronic and debilitat-
ing. However, traditional methods of psychiatric assessment, including clinical
interviews and self-reports, are limited in their ability to provide just-in-time
interventions as well as early identification. They depend heavily on retrospective
summaries collected in clinical settings, conditions that often result in reporting
biases, inaccurate recall, or late and ineffectual treatment.
Additionally, anxiety disorders are, for the most part, vastly overlooked and
under-treated in the community; only 15–30% of anxious individuals in the com-
munity receive treatment of any kind. Recent research has found strikingly high
levels of anxiety among college-age youth. Indeed, 58.4% of college-aged youth
report feeling “overwhelmed by anxiety” [3]. Several other recent studies docu-
ment the high proportion of college students meeting full diagnostic criteria for
an anxiety disorder [8]. At the same time, young adults are particularly over-
looked within the health care system, with rates of screening, identification, and
referral falling below those of either children or adults [27]. Given this landscape,
there remains a pressing need for tools that improve early identification of anxi-
ety symptoms, provide users with the platforms to monitor their activities, raise
awareness of factors impacting on their wellbeing, and provide a mechanism for
intervention should an anxiety episode escalate.
The growing ubiquity of consumer devices, among them smartphones, smart-
watches, and in-home sensors, all equipped with an array of sensors and user-logs,
have resulted in an unprecedented opportunity to catalog and quantify the daily
aspects of an individual’s life, creating repositories of personalized information
[23].
While much has been noted about the insidious aspects of such surveillance
capabilities, there is also significant potential for such monitoring, if harnessed
and utilized by the individuals themselves, to dramatically improve their health-
care outcomes. Such tools could potentially allow the user to accurately track
their behaviors and habits, compare personal activities with population-level
baselines, establish outlier behaviors with their peers, and even motivate behav-
ioral change and the promotion of healthy habits.
There is significant potential for such monitoring, if harnessed and utilized by
the individuals themselves, to improve their healthcare outcomes dramatically.
This potential has long been recognized with physical behavior and physiological
health, as both are extensively tracked. In contrast, mental health is largely
overlooked.
The notable exception to this trend has been the success in remote stress
monitoring that has been achieved with physiological stress monitoring of fea-
tures like heart-rate variability and Galvanic Skin Response that is accomplished
by wearable sensing devices like smartwatches to determine stress level [10].
While such approaches have demonstrated efficacy, they are limited in their
potential applicability by requiring the wearing of a physical sensing device, and
provide little contextual awareness as to the causes of stress that are encoun-
tered. More recent advances have attempted to compensate for the restrictions
214 L. M. Levine et al.
2 Framework
2.1 Server
Data from the study, both sensor feeds and usage-logs, along with user-generated
EMA responses, are first encrypted, cached locally on the user’s device, and then
transmitted to a secure remote server, where it is stored in an encrypted scalable
MySQL database.
The eWellness mobile application, developed for android devices, collects passive
behavioral data derived from communications logs, embedded sensors, and user-
logs capturing (Fig. 1) the following metrics:
– Communication: monitors incoming and outgoing phone calls and text mes-
sages, including the duration of phone calls, the number of texts and phone
calls, and unique individuals contacted. This does not assess the content of
communications or the recipient of the communication, beyond establishing
a unique contact.
– Location: is periodically sampled using GPS, network, and Wi-Fi detection.
Prompts for a new location after moving 5 m, up to once a minute. This
metric leverages the Google Fused Location API. The application does not
track specific locations; instead, it keeps a total distance traveled using the
vectorized haversine distance function.
– Ambient Sound: is a numeric measure, designed to detect speech and com-
munication above 50 decibels using the phone’s microphone. It samples every
5 min for 5 s. This metric does not capture the audio files of communications
and merely documents the sound frequency and decibel level as numeric val-
ues.
– Activity and Movements: leverage the device’s accelerometer, gyroscope,
and GPS tracking. Activity is sampled every 60 s. In order to determine sta-
tionary and moving activity-type, the application leverages Google’s Activity
Recognition API.
– Light: detects light level associated with possibly being in an outdoor or
indoor location. This sensor is sampled every 6 s.
– Phone Use: is user-log monitoring the device’s screen on-time.
From these raw values, we derived daily aggregated features from these met-
rics to infer both a user’s sociability, and behavioral patterns. These were then
used to learn a model for prediction of anxiety symptom severity. We obtained
statistical characteristics, such as minimum, maximum, mean, standard devia-
tion, the 25th, 50th, and 75th percentiles, of the numeric values of noise exposure
and the ambient luminescence. The number of activity transitions and duration
of each physical activity per day also became a significant metric of identifying
mentally distressed days.
Recognizing the potentially invasive nature of applications like this, data col-
lection was carefully scoped to avoid the collection of Personally Identifiable
Information (PII) that could link a particular user to a particular dataset. For
example, when attempting to gauge sociability, the application logs the total
number of phone calls made, total time on the phone, and the number of unique
contacts called; the identities of specific callers were not tracked. This has the
consequence of introducing a degree of obscurity into an observed finding (e.g.,
as the application is unable to differentiate between calls to friends and calls to
Anxiety Detection Leveraging Mobile Passive Sensing 217
previous 24 h period. The modified K10 prompted the users as daily EMA to
measure their feelings of anxiety and depression. The K10 is composed of ten
questions, structured on the following standardized template, “Over the past
24 h, how often have you...”, to which users can provide one of five standardized
responses: All of the time, Most of the time, Some of the time, A little of the
time, and None of the time). These responses are scored on a range from five
(All of the time) through one (None of the time). The minimum possible score
of K10 is 10, and the maximum possible score is 50. K10 results are categorized
into four levels of psychological distress: low distress, moderate distress, high
distress, and very high distress. Table 1 details the stress threshold scores. These
results were leveraged as a label for the classification of supervised learning.
4 Results
Only 10 participants answered at least seven days of EMAs and provided success-
ful passive sensing data throughout the month. Our analysis focused on a fully
supervised learning approach, and only labeled samples were included. For this
pilot study, we used 146 daily samples to identify daily anxiety and depression
levels. The Z-Score normalization was applied to the features to reach normalized
values from different participants.
We selected 25 features that have a relatively higher correlation with the
raw K10 score. Table 2 provides a detailed list of feature labels and associated
descriptions.
For the 4-class classification, we used 5-fold Cross-Validation (CV) with
four models: K-Nearest Neighbors (KNN), Extra-Trees (ET), Support Vector
Machine (SVM), and Multilayer Perceptron (MLP). The class weight was auto-
matically applied to the models inversely proportional to the class frequencies to
train the imbalanced dataset. The highest classification accuracy achieved was
around 76% with the extra-trees model. We also applied the under-sampling
technique to improve the performance of an imbalanced dataset. Samples from
the low distress class were removed randomly to make uniformly distributed class
labels. Samples from the very high distress class were also ignored. A confusion-
matrix (Fig. 3) demonstrates that the average score of classifying three classes
is 0.65.
Anxiety Detection Leveraging Mobile Passive Sensing 219
Fig. 3. 3-class (Low, Moderate, and High distress) classification confusion matrix.
220 L. M. Levine et al.
5 Discussion
5.1 Relevant Features
There are some notable and counter-intuitive findings regarding what data ele-
ments proved to be most-highly correlated to mental health. It is not surprising
to note the presence of features closely related to physical activities (e.g., Dura-
tion of time spent biking or walking) as such activities have been definitively
linked to mental health [22].
What is somewhat less intuitive is the presence of multiple audio and light
sensing features. Audio sensing was included in the protocol under the hypoth-
esis that a moderate level of sound could be indicative of pro-social activities
like being outdoors or in group settings. Conversely, overly loud or quiet noise
profiles could be indicative of stressful environments or isolated conditions that
could be deleterious to mental health. But while interesting in theory, there are
many confounding causes of noise that, by limiting ourselves to solely captur-
ing the frequency and decibel levels of the sound, we would fail to distinguish.
(intuitively, someone watching TV at home alone could register the same noise
profile as someone out to dinner with friends).
Similarly, it was hypothesized that light sensing could be indicative of an
individual being outside, which has been shown to positively correlate to mental
health [16], however here too, many confounding factors would impact light
readings, foremost among them, that the user would actually have to have their
phones out and exposed when outside for the light sensor to register it.
The authors note that Sound and Light sensing is notable in that both were
the most frequently sampled of all features. It is possible that the high degree of
granularity of readings afforded to these particular sensing modalities explains
their relevance. Regardless, the authors suggest additional work is needed to
understand whether or not these features are indeed more universally indicative
of mental health, and explore why that is potentially the case.
structing the experimental design, focus was placed on maximizing user par-
ticipation in the study. At the time, the primary concern the authors had was
that participants would fail to submit a sufficient number of survey responses.
Therefore the protocol was designed to combat this, by prompting users to fill
out a daily EMA in the application via push-notification, with manual outreach
to users who failed to complete an EMA within 48 h, as well as designing the
K10 to be a simple to complete multiple-choice assessment. This combination
resulted in successfully encouraging active participation in the study; however,
there was no mechanism designed to confirm or validate that the resulting inputs
were an accurate reflection of a user’s actual wellbeing.
It is highly likely, therefore, that at least some users were motivated to
respond quickly, and not necessarily accurately. This would result in users simply
selecting the default answer of no reported anxiety to each question.
Furthermore, there may have been a reluctance among users to accurately
report out mental health issues given perceived embarrassment or stigma asso-
ciated with poor mental health. Under-reporting of mental health issues is a
persistent issue that plagues the domain more generally, and isn’t limited to this
study [11], however failing to account for under-reporting is a notable issue.
Finally, even well-meaning participants may have failed to accurately rep-
resent their mental health state due to their either overlooking, or mischarac-
terizing, stresses they encountered. This is particularly true when comparing
responses across users, where baseline expectations of stress may vary wildly
among participants, with prior work for instance demonstrating a clear asso-
ciation between gender and reported wellbeing [21], the result being that one
participant’s perception of a ‘normal’ day, might easily be classified as a low or
moderately-stressed day by another.
Solving this challenge is essential for ultimately achieving the intended goal of
accurate classification of mental illness, for unlike alternative labeling exercises,
where quantifiable metrics are possible, here the labeling of an objective state,
mental illness, particularly when physiological monitoring is not available, is
entirely reliant on subjective inputs, ones that are difficult to accurately capture,
and even more difficult to standardize across users.
The authors recommend that future studies will have to address these con-
cerns by better anticipating and correcting for challenges with accurate labeling
of mental health.
There are a number of possible remedies to this. In the questionnaire itself,
careful structuring of the questions can engage users to provide more thought-out
results [14]. Cross-validating questions designed to ensure internal consistency
are also an effective means of ensuring user accuracy [15].
Consideration should also be given to alternative methods for collecting
labels. Interviewing subjects to determine their mental health, for instance,
would likely produce more accurate results, although would have attendant
tradeoffs of its own, such as reducing the number of labels that could effectively
be captured.
222 L. M. Levine et al.
Fig. 4. Histogram of normalized values of Duration on Foot for the 4 labels of stress
Figure 4 showcases a fairly typical distribution, in this case the duration spent
on foot in a given day, bucketed into quartiles, with the 4 labels of interest (with
L1 or Level-1 corresponding to Low-distress, L2 to Moderate Distress, L3 to
High-Distress, and L4 to Very high Distress), in this classification superimposed.
While intuitively more time spent on foot may be associated with better mental
health, here we observe no clear pattern.
It was therefore assumed that primary-success would be achieved by classi-
fying mental health within users across time, once their baselines for normative
behavior were established, rather than across users. The limitations of this initial
dataset did not allow for adequate classifying by individual; however, the fact
that classification success was achieved by bundling samples across all subjects
is remarkable in its indication that cross-subject learning in this domain could
be possible. The authors suspect that part of this result likely stems from nor-
malization performed on the data to account for habitual differences in subject
usage. By normalizing the data in this manner, the absolute number is ren-
dered largely moot, and instead variances in user patterns are highlighted, as
it is likely the day-to-day variations that are more reflective of shifts in mental
health. Additional data collection is necessary to validate this finding.
Anxiety Detection Leveraging Mobile Passive Sensing 223
5.5 Usability
Attempting to gauge the viability of the concept, participants in the pilot were
asked to submit a voluntary anonymized post-study questionnaire regarding
their perceptions about the application and its data collection practices. All
participants responded. A significant majority described the application as some-
what (40%) or mostly (40%) useful. Likewise, all users endorsed feeling comfort-
able with the application, and only one user expressed reservations about the
data being collected.
All participants obtained detailed accounting of the data that was collected
as part of their onboarding process to the study. No individual declined to partic-
ipate after learning the precise nature of what was being tracked. This sampling
suggests that, particularly among the young adults who are more accustomed to
digitized lives, there is less concern about data collection through their mobile
devices. Limiting the collection of PII could be sufficient to assuage most privacy
concerns.
The primary issue users had with the application was its battery consump-
tion resulting from heavy over-sampling of the sensors. Future iterations of the
application will seek to optimize battery usage by minimizing the sampling fre-
quency.
6 Conclusion
Remote health monitoring of mental health, when done so leveraging passive and
unobtrusive data collection, could be a useful alternative for conducting real-
time mental health surveillance. This paper presents eWellness, an experimental
mobile application designed to track a full-suite of sensor and log data off a user’s
device continuously and passively. An initial pilot study tracking ten people over
a month showed a nearly 76% success rate at predicting daily anxiety levels
based solely on the passively monitored features. Our current approach may
prove useful at tracking longitudinal trends in an individual’s mental health,
as well as providing a platform for just-in-time interventions to mental health
crises. Additional work is needed to refine both the technology and analytics.
References
1. Chapter - k10 scoring. https://www.abs.gov.au/ausstats/[email protected]/lookup/4817.0.
55.001Chapter92007-08
2. Andrews, G., Slade, T.: Interpreting scores on the kessler psychological distress
scale (k10). Aust. New Zealand J. Public Health 25(6), 494–497 (2001)
3. American College Health Association: American college health association-national
health assessment II: Reference group executive summary spring 2016 (2016)
4. American Psychiatric Association: what are anxiety disorders? (2019). https://
www.psychiatry.org/patients-families/anxiety-disorders/what-are-anxiety-
disordersg
224 L. M. Levine et al.
5. Bardone, A.M., Moffitt, T.E., Caspi, A., Dickson, N., Stanton, W.R., Silva, P.A.:
Adult physical health outcomes of adolescent girls with conduct disorder, depres-
sion, and anxiety. J. Am. Acad. Child Adolesc. Psychiatry 37(6), 594–601 (1998)
6. Ben-Zeev, D., Scherer, E.A., Wang, R., Xie, H., Campbell, A.T.: Next-generation
psychiatric assessment: using smartphone sensors to monitor behavior and mental
health. Psychiatric Rehabil. J. 38(3), 218 (2015)
7. Bitsko, R.H., et al.: Epidemiology and impact of health care provider-diagnosed
anxiety and depression among us children. J. Dev. Behav. Pediatr. JDBP 39(5),
395 (2018)
8. Bruffaerts, R., et al.: Mental health problems in college freshmen: prevalence and
academic functioning. J. Affect. Disord. 225, 97–103 (2018)
9. Cartwright-Hatton, S.: Anxiety of childhood and adolescence: challenges and
opportunities (2006)
10. Ciabattoni, L., Ferracuti, F., Longhi, S., Pepa, L., Romeo, L., Verdini, F.: Real-
time mental stress detection based on smartwatch. In: 2017 IEEE International
Conference on Consumer Electronics (ICCE), pp. 110–111. IEEE (2017)
11. Corrigan, P.W., Watson, A.C.: The paradox of self-stigma and mental illness.
Clin. Psychol. Sci. Pract. 9(1), 35–53 (2002). https://doi.org/10.1093/clipsy.9.1.
35. https://onlinelibrary.wiley.com/doi/abs/10.1093/clipsy.9.1.35
12. Fukazawa, Y., Ito, T., Okimura, T., Yamashita, Y., Maeda, T., Ota, J.: Predicting
anxiety state using smartphone-based passive sensing. J. Biomed. Inf. 93, 103151
(2019)
13. Hammerness, P., Harpold, T., Petty, C., Menard, C., Zar-Kessler, C., Biederman,
J.: Characterizing non-OCDanxiety disorders in psychiatrically referred children
and adolescents. J. Affect. Disord. 105(1–3), 213–219 (2008)
14. Jenn, N.C.: Designing a questionnaire. Malays. Fam. Phys. Off. J. Acad. Fam.
Phys. Malays. 1(1), 32–35 (2006). note =PMID: 26998209
15. Li, F., Harmer, P., Duncan, T.E., Duncan, S.C., Acock, A., Yamamoto, T.: Confir-
matory factor analysis of the task and ego orientation in sport questionnaire with
cross-validation. Res. Quart. Exerc. Sport 69(3), 276–283 (1998). https://doi.org/
10.1080/02701367.1998.10607694. pMID: 9777664
16. Triguero-Mas, M., et al.: Natural outdoor environments and mental and physical
health: relationships and mechanisms. Environ. Int. 77, 35–41 (2015). https://doi.
org/10.1016/j.envint.2015.01.012
17. Merikangas, K.R., et al.: Lifetime prevalence of mental disorders in us adolescents:
results from the national comorbidity survey replication-adolescent supplement
(NCS-A). J. Am. Acad. Child Adolesc. Psychiat. 49(10), 980–989 (2010)
18. Narziev, N., Goh, H., Toshnazarov, K., Lee, S.A., Chung, K.M., Noh, Y.: STDD:
short-term depression detection with passive sensing. Sensors 20(5), 1396 (2020)
19. Newby, J.M., Mewton, L., Williams, A.D., Andrews, G.: Effectiveness of transdiag-
nostic internet cognitive behavioural treatment for mixed anxiety and depression
in primary care. J. Affect. Disord. 165, 45–52 (2014)
20. Osma, J., Plaza, I., Crespo, E., Medrano, C., Serrano, R.: Proposal of use of smart-
phones to evaluate and diagnose depression and anxiety symptoms during preg-
nancy and after birth. In: IEEE-EMBS International Conference on Biomedical
and Health Informatics (BHI), pp. 547–550. IEEE (2014)
21. Pinquart, M., Sörensen, S.: Gender differences in self-concept and psychological
well-being in old age: a meta-analysis. J. Gerontol. Ser. B 56(4), P195–P213 (2001).
https://doi.org/10.1093/geronb/56.4.P195
Anxiety Detection Leveraging Mobile Passive Sensing 225
22. Stevens, T.: Physical activity and mental health in the United States and Canada:
evidence from four population surveys. Prev. Med. 17, 35–47 (1988). https://doi.
org/10.1016/0091-7435(88)90070-9
23. Swan, M.: Health 2050: the realization of personalized medicine through crowd-
sourcing, the quantified self, and the participatory biocitizen. J. Pers. Med. 2(3),
93–118 (2012)
24. Taylor, W., Shah, S.A., Dashtipour, K., Zahid, A., Abbasi, Q.H., Imran, M.A.:
An intelligent non-invasive real-time human activity recognition system for
next-generation healthcare. Sensors 20(9), 2653 (2020). https://doi.org/10.3390/
s20092653
25. Topper, M., Emmelkamp, P.M., Watkins, E., Ehring, T.: Prevention of anxiety dis-
orders and depression by targeting excessive worry and rumination in adolescents
and young adults: a randomized controlled trial. Behav. Res. Therapy 90, 123–136
(2017)
26. Wagner, S., et al.: Mental health interventions in the workplace and work outcomes:
a best-evidence synthesis of systematic reviews. Int. J. Occup. Environ. Med. (The
IJOEM) 7 1–14 (2016)
27. Woodward, L.J., Fergusson, D.M.: Life course outcomes of young people with anx-
iety disorders in adolescence. J. Am. Acad. Child Adolesc. Psychiatr. 40(9), 1086–
1093 (2001)
Author Index