UNIT III
UNIT III
Need for wireless monitoring, Definition of Body area network, BAN and
3.1. INTRODUCTION
Wireless health system is the integration of wireless technology into traditional medicine,
such as diagnosis, monitoring and treatment of illness, as well as other tools that can help
individuals improve their personal health and wellbeing. Wireless health differs
from mHealth in that wireless health solutions will not always be mobile and mobile health
solutions will not always be wirelessly enabled. Mobile broadband connectivity is useful in
reaching new patients in remote areas while improving productivity and convenience
Enabling Technologies
multiple sensors and devices, designed for wireless sensor networks that require low-
+ Zarlink,
Examples
enables users to manage diabetes with real-time glucose information and trends that can
makes connected activity monitors, weight scales and blood pressure monitors
Entra Health Systems makes integrated bluetooth-enabled, WiFi, and Cellular blood
glucose meters that work with an online data collection network to upload and report
patient blood glucose readings.
Wearable Devices
that automatically tracks activity and sleep. Used in combination with a food log, the
system provides a complete picture ofthe three components of weight loss: calories in,
EMRIHIS
VinCense Wearable
Energy)
Wifi/Data
Fig. 3.1.
VinCense
Web Interface
Remote Monitoring
•9
wireless Health wearables, includes remotely monitoring a patient's vital signs using
The -devices use a wide range of sensors to monitor the patient's vitals, including heart
specialist care.
Wireless health monitors not only send crucial physiological signs to medical workeß
It also reduces measurement time and aids in receiving care at the optimal time during
3.3
During treatment, it is critical to keep track of the patient's. health. As a result, even in
rural locations, the wireless health monitoring system plays a critical role in providing
The wireless health monitoring system provides healthcare providers with real-time
dependency patients like postoperative, step down, and rehab patients. As a result, it
+ Wireless monitoring through wearable devices could be useful for hospitalized patients,
particularlythosewhoareunstableorathigherriskforseriouscomplicationssuchascritically
Wireless sensor network (WSN) technologies have the potential to change our lifestyle
- industry, dependent care and emergency management, in addition to many other areas.
+ The combination of wireless sensors and sensor networks with computing and artificial
BAN devices may be embedded inside the body as implants or pills, may
devices which humans can carry in different positions, such as in clothes pockets,
Devices are becoming smaller, especially in body area networks. These networks
include multiple small body sensor units (BSUs) and a single central unit (BCU).
Despite this trend, decimeter (tab and pad) sized smart devices still play an
important role. They act as data hubs or gateways and provide a user iliterface for
The development of WBAN technology started around 1995 around the idea of
About six years later, the term "BAN" came to refer to systems where
communication is entirely within, on, and in the immediate proximity ofa human
body.
Wearable Devices
3.4
•+ A WBAN system can use WPAN wireless technologies as gateways to reach longer
ranges. Through gateway devices, it is possible to connect the wearable devices on the
human body to the internet This way, medical professionals can access patient data
+ Body AreaNetwork (BAN) technology uses small, low power wireless devices that can
be carried or embedded inside or on the body. Applications include but are not limited
to:
on the existing radio technologies. However, if BAN technology is to achieve its full
potential, it needs a more specific and dedicated technology, which is optimized for
BAN.
+ For example, solutions for monitoring people during exercise one or two hours a day, or
a few days a week, may not be suitable for 24/7 monitoring as a part of the Internet of
Concept of BAN:
•9
The rapid growth in physiological sensors, Iow-power integrated circuits, and wireless
communication has enabled a new generation of wireless sensor networks, now used for
The body area network field is an interdisciplinary area which could allow inexpensive
and continuous health. monitoring with real-time updates of medical records through the
Internet.
body area network, which can be used for computer-assisted rehabilitation or early
This area relies on the feasibility of implanting very small biosensors inside the human
body that are comfortable and that don't impair normal activities.
The implanted sensors in the human body will collect various physiological changes in
device will instantly transmit all information in real time to the doctors throughout the
world.
If an emergency is detected, the physicians will immediately inform the patient through
Wearable Devices
3.6
+ Usage of the 2360-2390 MHz frequencies are restricted to indoor operation at health.
care facilities and are subject to registration and site approval by coordinators to protect
+ operation in the 2390-2400 MHz band is not subject to registration or coordination and
Ultra-small medical sensors/actuators can be either worn or implanted inside the body
existing IT infrastructure could result into a pervasive environment that can convey
health-related information between the user's location and the healthcare service
provider.
This flexibility for greater physical mobility (i.e. mHealth) directly translates into a
Body Area Network (BAN) is a technology that allows communication between ultra-
small and ultra Iow-power intelligent sensors/devices that are located on the body
is located in the vicinity of the body. These radio-enabled sensors can be used to
among which we can point to smart pills for precision drug delivery, intelligent
Wearable devices that work outside the confines of the hospital without expert medical
• Usability: The device has to be worn on a continuous basis and must therefore be
small and lightweight. The challenge is to compress the device size down.
e Power consumption: The device should have low power consumption, reducing
and
• Design: The device must be elegant without the need to attach long wires
electrodes from the device to the patient and from the device to the mobile
gateway that transmits data (to the remote medical care unit).
Health Systems
3.7
Cost: If a patient is required to purchase the unit, it should cost sub US$200 to be
affordable or for the hospital to give it away free as part of medical care.
Devices that fulfill these conditions can expect to become popular. Manufacturers will
find that users are able to easily integrate such devices into their daily lives for
naximum benefit.
The typical set of parameters that the device must monitor include heart activity, fetal
heart rate, skin resistance, skin temperature, refractive index of blood etc. Based on
what the device is required to measure and monitor, its components would include:
Bio sensors: Application specific bio sensors that emit signals indicating
measured parameters
the sensor signals. The device may also be equipped with signal conditioning
circuitry.
Signals could indicate battery levels, failure, etc. or signals received from
gateway over a Body Area Network (BAN) or the newer Bluetooth LE (Iow
gateway (smart phone or a tablet) and then to the patient's remote health care
provider. These devices can also store data in off line mode, synchronizing the
Power management: The device design must ensure that energy consumption is
A BAN is an evolution of a wireless sensor network (WSN). WSNs were first used for
Personal devices like cellphones, laptops, and cameras. These devices form a personal area
network (PAN). The same concept is applied to a BAN. A BAN is a network of nodes with
In addition to addressing aspects related to the lower layers of the OSI model, the design
of BAN solutions should consider many general requirements such as safety, privacy and
security and sustainability to ensure proper operation. However, in order to provide the best
user experience, there are other aspects, e.g., quality of service and usability, which should
be considered as well.
+ safety: These types of networks, which are in direct contact with the body, must be
designed to ensure they are safe for the end user. Hence, this is a critical point in the
Wearable Devices
3.8
information that must only be accessible •to authorized people. Unauthorized use of
private information may lead to abuse and discrimination. BAN solutions that have
encryption. However, security policies should not overhead the energy consumption of
mandatory in BAN products. Energy supply must be available when required to achieve
a good performance of the BAN solution. Energy-supply models are divided into two
groups: (I) the node is supplied directly by the harvesting energy source (SSCS), and
(2) the harvesting source saves energy into a battery and the battery supplies energy to
the node (SBCS). SSCS involves connecting the energy' source (solar panel, wind
turbine, etc.) to the computing unit without any. energy storage in between.
configuration must be calibrated to match the power supply and the demand in order to
be sustainable. The SBCS uses a battery to store energy for later use, which is useful in
situations where the power supply is not available at any time, like solar power in the
night. In SBCS, the energy' generated must be in balance with the energr that the battery
can store to reduce waste. Testing the energy consumption of nodes helps to choose the
•3 Quality of service: Each type of BAN application has a different definition of quality
of service (QOS) depending on the services offered. Some elements to measure QoS are
latency, jitters, and bandwidth of the network, stats of data transmission, errors and
useful information sent in a period of time. In any case, QoS includes adaptability,
timeliness, reliability, robustness and credibility for most applications. QoS can be
separated into two cases, namely application and network. The application perspective
refers to the quality of the user interface (UI). The UI must be understandable and meet
all the user's requirements. The network case measures the quality of the application'S
Usability: This is another requirement that has to be Considered when developing BAN
Many high-level architectures have been proposed for health monitoring systems that
employ sets of wearable sensors and their supporting communication and information
storage networks
l. a network of sensors on the body that stores its data to a wearable or handheld
data logger/hub that then communicates wirelessly with a local base station or
Intemet gateway,
2. a central command center that receives data from these gateways, and
3.9
between the command center and the appropriate medical service centers.
While issues such as security and reliability as addressed in this chapter apply to all
This is because architectural topologies at the body level are quite limited, promoting a
loggers, which then interact with the resources external to the wearer.
Mesh sensor topologies, wireless routing schemes, and other more complex topological
approaches are typically unnecessary at the body level due to the close proximity of the
wireless nodes.
In addition, the peripheral technologies that support the local gateways and the extended
backbone network infrastructure (which may include cellular systems, wireless local
ECG &
Tilt sensor
sp02 &
Motion sensor
Body
Area
Network
Motion
senso
ZigBee
Server
GPR
Internet
Bluetoo
or
temperature/
humidity sensor
Weather Forecast
Emergency
Caregiver
Medical Server
Physician
Fig• 3.2. Depiction ofa body area network with its supporting information infrastructure
Wearable Devlced
3.10
3.5. TECHNICAL CHALLENGES
I. Data quality: Data generated and collected through BANS can play a-key role in the
patient care process. It is essential that the quality Of this data is ofa high standard to
ensure that the decisions madc are based on the best information possible
2. Data management: As BANS generate large volumes of data, the need to manage and
and limited power reserves. This may result in erroneous datasets being transmitted
back to the end user. It is of the utmost importance especially within a healthcare
domain that all sensor readings are validated. This helps to reduce false alarm
generation and to identify possible weaknesses within the hardware and software
design.
4. Data consistency: Data residing on multiple mobile devices and wireless patient notes
need to be collected and analysed in a semnlcss fashion. Within body area networks,
vital patient datasets may be fragmented over a number of nodes and across a number of
networked PCs or Laptops. Ifa medical practitioner's mobile device does not contain all
and accurate. It would have to be made sure that the patient secure data is only derived
from each patient's dedicated WBAN system and is not mixed up with other patient's
data. Further, the data generated from WBAN should have secure and limited access.
Although security is a high priority in most networks, little study has been done in this
communication rate and computational capability, security solutions proposed for other
and freshness of data together with availability and secure management are the security
requirements in WBAN. The IEEE 802.15.6 standard, which is latest standard for
WBAN, tried to provide security in WBAN. However, it has several security problems.
6. Interoperability: WBAN systems would have to ensure seamless data transfer across
standards such as Bluetooth, Zigbee etc. to promote information exchange, plug and
play device interaction. Further, the systems would have to be scalable, ensure efficient
7. System devices: The sensors used in WBAN would have to be Iow on complexity
small in form factor, light in weight, power efficient, easy to use and reconfigurable•
Further, the storage devices need to facilitate remote storage and viewing of patient data
as well as access to external processing and analysis tools via the Internet.
3.11
Energy vs• accuracy: Sensors' activation policy should be determined to optimizing the
trade-off between the BAN's power consumption versus the probability of patient's
health state mis-classification. High power consumption Often results in more accurate
9. -privacy: People might consider the WBAN technology as a potential threat to freedom
if the applications go beyond "secure" medical usage. Social acceptance would be key
10. Interference: The wireless link used for body sensors should reduce the interference
and increase the coexistence of sensor node devices with other network devices
11. Cost: Today's consumers expect -low cost health monitoring solutions which provide
12. Constant monitoring: Users may require different levels of monitoring, for example
those at risk of cardiac ischemia may want their WBANs to function constantly, While
others at risk of falls may only need WBANs to monitor them while they are walking or
moving. The level of monitoring influences the amount of energy required and the life
13. Constrained deployment: The WBAN needs to be wearable, lightweight and non
intrusive. It should not alter or encumber the user's daily activities. The technology
should ultimately be transparent to the user i.e., it should perform its monitoring tasks
measurements should be accurate and calibrated, even when the WBAN is switched off
and switched on again. The wireless links should be robust and work under various user
environments.
Effectiveness of the WBAN is important from both patients and healthcare perspective.
As the time passes, challenges to the emerging technologies increases along with the
challenges are classified in six major classes such as energy, mobility, security and
1• Energy Requirements: Since, most of the devices in WBAN are using the wireless
medium, therefore they are portable. Such devices are small in size and carry power
source too. Hence, the power is alwayS limited. Wireless natures made them roam free,
meaning the devices are free to move. The power to the device of the network is
provided with the help of batteries. Things are not simplified by allowing the power
Wearable Dev•
3.12
from battery hut is encompasses some more challenges of power management of the
battery supplies especially in case of implants. Since the sensors that are implanted in
the body are so small that the battery cannot sustain more than a month. Removing the
of WBAN, it becomes more critical as it has been connected to the Physical system.
These communication channels are very much visible to the attacker and if not securely
implemented it could any of the attack including eavesdropping on traffic between the
nodes, message injection, message replay, spoofing and off course compromise the
integrity of physical devices. Upon successful attack, such actions not only invade
3. Mobility Support: WBAN provides two major advantages, i.e., portable monitoring
and location independence. Regardless of the application, these are the key factors due
to which WBAN is potential candidate in many venues. But these two advantages put
some special limitations i.e., mobility. Mobility can pose serious problem in some
application like E-Health care even posture do effect the communication. The mobility
is defined between the user and the WBAN as a seamless link. One of the major issues
is to reach to sink, which may be single or multi hop. Message is flooded to all nodes to
reach sink node and the path with minimum delay is selected. Reliable multipath routing
is another solution proposed. A path list is maintained depending upon different factors
requested by the users. For more life critical system, timeliness may be the parameter
for the quality. System, that cannot fulfill the said requirement, falls short of providing
the QoS. Same is true for other factors like bandwidth, latency, jitter, robustnes
connection between the body nodes and the sink nodes is another QoS factor.
5. Cooperation between Nodes: When the intermediate nodes help source destinatiOn
pair in communiéation, the cooperation occurs. The intermediate nodes may refer as
helper or relay. Cooperation offers a good solution for many of the limitations in
In wireless body area networks, many security techniques are invOlved to improve the
authentication of data communication between patients and doctors. The most involved
techniques are intrusion detection systems and cryptography with key management
techniques. Table I shows the different security techniqueS used in the body area network'
3.13
research issues, and outcomes. Table 3.3 lists the merits of security-based techniques used in
Acting as
Fig. 3.3.
Table 3.1.
Technique
Intrusion detection
system
Cloud- based
WBAN
Mobile agent-based
IDS
Signal propagation
based mutual
authentication
DMASK-BAN
Invariant feature-
based approach
Research Issues
Jamming Attacks
Data Secürity
Lesser users
Network-level
intrusion attacks
network attacks
Vulnerable attacks
High-rate attacks
Methodology
involved (ZIGBEE
and TMAC)
Constant monitoring
Increased storage
level
Machine learning
and regression
algorithms
algorithm
with movement
attacks
Maintain the
bandwidth
conditions in
cooperative routing
Outcome
Successful packet
delivery rate
Data authentication
and authorization
network lifetime
lesser resource
overhead
Minimal routing
computational cost
Minimum power
consumption with
high QoS
Low-rate attacks
3.14
Identity-based
anonymous
authentication and
key agreement
Trust management
Enhanced
authentication and
access control
protocol
Several security
issues
User impersonation
attacks
Cloud technology
and wireless
communication
Fuzzy logic
technique
elliptic curve
cryptography
Wearable Device;
computation cost
performance
High security
authentication scheme to improve the security performance in mufti-hop body area networks.
results in lower storage overhead, resource loss, conflict rates, channel utilization rate, and
Demir et al. discussed the cyber-physical systems for 6G networks for security
enhancement. Smart grid technology is used in the wireless body area network and is
adaptable to all applications, including vehicles. The multilayer protection scheme is used to
improve the network lifetime, reliability, and Iow latency which is suitable for real-time
applications.
Mo et al. suggested the wearable health monitoring system for known session special
temporary information with the two-factor authentications to enhance the security features in
a wireless sensor network. A key agreement scheme is involved to improve the security
enhancement with high network efficiency and it reduces the computational cost,
Amel Zendehdel et al. introduced the telehealth monitoring scheme with Bluetooth for
biometrics, and vulnerability scanning for high security and high reliability on the internet Of
things.
Kong et al. suggested smart healthcare systems which promotes communication security
Jithish et al. discussed the cyber-physical system and used the Markov decision process in
wireless body area networks to increase network longevity and energy efficiency, as well as
Vyas et al. discussed the remote health monitoring scheme for health care applicationS
with the help of the Symmetric key generation method. Cloud-assisted technology is
3.15
Damasevicius et al. explained the network flow features to detect the different types of
attackers by using the cyber security mechanism in wireless sensor networks.
et al. explained the cloud-based IoT scheme for remote patient health
monitoring in body area networks. Authentication protocols with session key mechanisms to
Irshad et al. described how to detect cyber-attacks in wireless networks using a smart
grid-based authentication protocol for energy and internet-based vehicle to grid networks.
These smart grid networks boost energy efficiency while also lowering computing and
communication expenses.
Reliability Of BAN:
The process Of adaptable secure data aggregation framework to improve the data
integrity, security, and privacy measures in the wearable sensors for the wireless body area
networks. This secure data framework improves the homomorphism security approach for
Hasan et al. introduced the software-defined network (SDN) based WBAN for secure
data transmission. This technique distributes the patient's health record information based on
critical and non-critical patients. Furthermore, by employing the sector-based distance vector
(DV) protocol for the earliest contact between patients and doctors, the suggested technique
Roy et al. explained the security and privacy issues in the wireless body area networks
and also suggested adding a cybersecurity mechanism to defend the security challenges.
Zhen et al. developed the privacy protection scheme with the cooperation of mobile edge
Sammoud et al. proposed an innovative routing protocol for secure data communication
with the aid of a biometrics-based cryptographic technique. This innovative routing protocol
transfers the data with cryptographic keys and also concentrates on minimal power
Wang et al. introduced the double hash chains for secure data transmission and it also
enables data authenticity and reliability. This proposed scheme supports dynamic conditions
Sensor •nodes/actuators represent essentially the wireless sensor network, and the sensor
node senses acoustic factors including temperature, pressure, sound, pulse rate, ECG, blood
Pressure, and heart rate of the •human body. In healthcare, this form of sensor network is
Wireless body area networks consist of sensors, biological parameters, body control unit,
Personal device assistant, transmission factor, and user access. Figure 3.4 shows that the
Wireless body area network along with the sensor senses the biological factors continuously
wearaote ueVicéa
in order to obtain the human health information from the body control unit. The electro
3.16
cardiogram (ECG)sensor records the patient's electric impulse as it passes through the heart
• muscle. This assists in monitoring the patient's heartbeat, which is used to tinck various
movements such as resting and moving. The temperature of the human body's ears, skin, and
Internec
sEhGA@)))
ECG
Temperature
Member
Blood Oxygen
Blood Pressure
Base Station
Heart Rate
The pressure of blood as it travels through the arteries is measured by blood pressure
andthepulsewaveismeasuredbytheheartratesensorasitpumpsbloodthroughthepatient's body.
The saturation level of oxygen in the blood is measured with a pulse oximeter. The airflow
sensor can be positioned near the human body's nasal to assess the body's respiration. The
collected information will be transferred and stored in the personal device assistants(PDA)
and later transmitted to the base station. From the base station, the data will be transferred to
the respective user applications such as cloud databases, ambulances, family members, and
doctors via the Internet.
A cloud database's purpose is to store the patient's data on a server so that the doctor can
access it and then send the patient's information to the user via the internet. Star topology is
used in the body area network. The body control unit acts as a central node and then each
sensor will sense and communicate to the center node. The center node interfaces the human
The purpose of network security is to protect data from threats during data transmissiOll•
There are two forms of attacks in network security: active and passive attacks, both of which
contribute to the detection of malicious data. An active attack is primarily focused on data
and has a significant impact on the system's operation. A passive attack damages or modifies
data but does not degiade information resources. The security flaws are applied at various
3.17
levels. Each layer of the TCP/IP 'layered architecture generates attacks. IP attacks are
introduced in the second layer (logic link control),resulting in address spoofing for incörrect
communication. Internet Control Message Protocol (ICMP) attacks is generated in the media
access control layer', which results in sniffing and man-in-the-middle attacks. In the third
network layer, routing attacks such as blackhole and eavesdropping attacks are created. TCP
attacks are originated in the transport layer, resulting in high synchronization flooding in
data communication. Application layer attacks are generated in the OSI model's application
layer, resulting in authentication issues such as accessing the user's username and password
A denial of service (DoS) attack will restrict data from authorized users and prevent them
from accessing their resources. Because of the week password, distributed denial of service
(DDOS) attacks is generated. The main difference between a DOS and a DDOS attack is that
a DOS attack targets a single host at a time, but a DDoS attack targets numerous hosts
The term "reliability" refers to the fact that health-care practitioners receive monitoring
data in a timely and accurate manner. WBAN sensors must be capable of viewing and
detecting essential active signs of human health; therefore, reliability is critical. WBAN
sensors must be capable of viewing and detecting essential active signs of human health;
WBAN is designed with special purpose sensor which can autonomously connect with
various sensors and appliances, located inside and outside ofa human body.
divided into several sections. Here we have classified the network architecture into four
sections. The first section is the WBAN part which consists of several numbers of sensor
nodes. These nodes are cheap and low-power nodes with inertial and physiological sensors,
strategically placed on the human body. All the sensors can be used for continuous
monitoring of movement, vital parameters like heart rate, ECG, Blood pressure etc. and the
surrounding environment. There are vast monitoring systems are being used already based
on wired connectioGS. Any wired connection in amonitoring system can be problematic and
awkward worn by a person and could restrict his mobility. So, WBAN can be a very
effective solution in this area especially in a healthcare system where a patient needs to be
The next section is the coordination node where the entire sensor nodes will directly
COnnected with a coordination. node known as Central Control Unit (CCU). CCU takes the
reSPOnsibility to collect information from the sensor nodes and to deliver to the next section.
For mnitoring human body activities there is no such wireless technoloy is fixed for
targeting WBAN. Most popular wireless technologies used for medical monitoring system
are WLAN, WiFi, GSM, 3G, 4G,WPAN (Bluetooth, ZigBee) etc.. Except Cellular network
Standard all of these technologies are commonly available for short distance communication.
WMTS (Wireless Medical Telemetry Service) and Ultra-Wide Band are another technoloo
The third section is the WBAN communication which will act as a gateway to transfer the
information to the destination. A mobile node can be a gateway to a remote station to send
node to communicate via email or other service using Ethernet which is shown in Figure 3.5.
The last section will be a control center consists of end node devices such as Mobile
phone for message, PC for monitoring and email and server for storing the information in the
database.
O
Gateway Node
Sensor N es
rdination.
Node I nterne
Control Center
GSM/3G
Mobile Node
Fig. 3.5.
Before you begin to format your paper, first write and save the content as a separate text
file. Keep your text and graphic files separate until after the text has been formatted and
styled. Do not use hard tabs, and limit use of hard returns to only one return at the end ofa
paragraph. Do not add any kind of pagination anywhere in the paper. Do not number ted
Wireless medical sensors should satisfy the following main requirements such as
Wearibility is a very important issue. These sensors must be lightweight and small. Size and
weight of sensors are mainly determined by the size and weight Of batteries . But, a battery'S
WBAN application. So the designer should target a reliable communication technique which
between communication and computation is very crucial for a reliable system design.
Security: Another important issue is the security Of the network. All the wireless medical
sensors must meet the requirements of privacy and should ensure data integrity and
authentication.
3.19
Interoperability: Wireless medical sensors should allow users to easily build a robust
WBAN. Standards governing that interaction Of wireless medical sensors will help vendor
Cellular
(4
WiFi
WPAN
IP backbone
Monitoring Sensors
Wireless body area network is a system which can continuously monitor a person's
activities. Based on the operating environments the monitoring sensors can bé classified into
two types.
Wearable sensor devices worked on the human body surface. v Implantable devices
Wearable sensor devices allow the individual to follow closely the changes in her or his
functions and in the surroünding environment and provide feedback for maintaining optimal
and instant status. For example ECG, EEG, Blood pressure sensor can be used to monitor a
critical patient, GPS sensor can be used to locate an area and different types of sensor that
TO measure heath parameters, implantable sensors are planted in close contact with the
skin, and sometimes even inside the human body. Implantable biosensors are an important
class Of biosensors based on their ability to continuously measure metabolite levels, without
the need for person interference and regardless of the person's physiological state(sleep, rest,
implantable biosensors have great impact to diabetes and trauma care patients, as
well as soldiers in action (military). Figure 3.7 focuses on the sensor podes with wireless
capabilities.
In a WBAN traffic can be divided into three categories such as: v Normal traffic v
Traffic Types
Sensor node
electronics with
wireless capability
ECG
CCU
Wireless distance
Normal tramc is the data traffic which is used to monitor the normal condition of a
person without any criticality and on demand events. Emergency traffic is initiated by nodes
when they exceed a predefined threshold or in any emergency situation. Such type of traffic
is totally unpredictable.
On-demand traffic is initiated by the authorized personnel like doctor or. consultant to
Work Flow
Figure 3.8 shows the work flowchart of WBAN. In the flowchan workflow is divided in
to two sections. First section is the WBAN where all the sensors devices will collect data and
process them to the control center. While processing if any error occurs then it will read data
The control center will send the data to the desired location. If any problem occurs then it
As WBAN is a short range wireless networks so different types of wireless short range
technologies can be involved in different stages. In this • segment we will describe most
common technologies such as Bluetooth, ZigBee, WiFi, IEEE 802.15.6 etc. that can be used
to deploy WBAN.
Bluetooth
Area Network). Bluetooth technology was designed as a short range wireless communicatiOn
Standard, anticipated to form a network with security and Iow power consumption. A typical
"fireless Health Systems
3.21
Bluetooth network forms a Piconet where a Bluetooth device works as a master and another
WBAN
Process Data
Control Center
Learn
Problem
Detected
Compare with
Send Event
Send Alert
No
Yes
Send
work as slaves which gives each device to communicate with each other simultaneously.
An other type of Bluetooth network can be formed with more than one Piconet known as
another Piconet. Figure 3.9 shows how a Piconet and Scatternet are formed using Bluetooth
nodes. Though, the basic Bluetooth protocol does not support relaying but it is possible to
join together numerous Piconet into a large Scatternet, and to expand the physical size of the
Bluetooth devices operate in the 2.4GHz ISM band(lndustrial, Scientific and Medical
band), utilizing frequency hopping among 79 1 MHz channels at a nominal rate of 1600
hops/sec to avoid interference. It is classified with three classes of devices with coverage
ranging from I to 100 m and different transmission powers ranging from I mw to 100 mw
with 3 Mbps data rate. A very key feature of Bluetooth is that all the Bluetooth devices can
communication with each other in NLOS condition. Bluetooth is suitable for short distance
data transmission applications such as between servers of WBANs or between a WBAN and
a personal computer.
ZigBee
designéd for sensors and controls, and suitable for use in harsh or isolated conditions. One of
the biggest advantages of ZigBee network is its low power consumption. Figure 3.10 shows
a typical ZigBee network •topology which consist of three kinds of devices or nodes such as
coordinator, router and end device. One coordinator exists in every ZigBee network. It starts
Wearablé Devicéi
3.22
the network and handles management functions as well as data routing functions. End
devices are devices that are battery-powered due to their Iow-power consumption. They are
in standby mode most of the time and become active to collect and transmit data.
Piconet 2
Piconet I
M Master
S Slave
Slave/Slave
Bluetooth network
Scatternet
Fig. 3.9.
Devices such as sensors are configured as end devices. They are connected to the network
through the routers. Routers help to carry data across multi-hop ZigBee networks. In some
cases ZigBee network topology are formed without routers when the network is point to
ZigBee is aimed at RF applications that require low data rate, long battery lifespan and
secure networking. Through the standby mode, ZigBee enabled devices can be operational
for several years. ZigBee-based Wireless devices operate in three different frequency bands
O Coordinator
O Router
O End Device
3.23
Therefore, one substantial drawback of using ZigBee network for WBAN applications is
due to interference with wireless local area network WLAN) transmission, especially at
2.4GHz. As ZigBee devices operate at low data rate so it can be unsuitable for large-scale
and realtime WBAN applications. But, it can be very much suitable for personal use like
assisted living, health monitoring, sports, environment etc. within a modest range between
50 - 70 meters.
WiFi
WiFi is an IEEE 802.11 standard for wireless local area network (WLAN). Generally
WiFi technology comes with four standards (802.11 a/b/g/n) that runs in ISM band 2.4 and 5
GHz with a modest coverage of 100 meter. Wi-Fi permits users to transfer data at broadband
speed when connected to an access point (AP) or in ad hoc mode. WiFi network where WiFi
sensor nodes and users can transfer data using internet by standard WiFi router. In some
modified version, WiFi devices can be used in data acquisition applications that allow a
direct communications between the sensors and the smart phones/ PC even without an
intermediate router.
WiFi is preferably suitable for large amount of data transfers with high-speed Wireless
connectivity that allows videoconferencing, voice calls and video streaming. An important
advantage is that all smartphones, tablets and laptops have Wi-Fi integrated; however the
-IEEE802.15.6WBAN
IEEE802.15.6 is the latest addition in WPAN which is known as WBAN standard that
provides various medical and non medical applications and supports communications inside
and around the human body. This standard supports communication inside and outside of
human body which can be used for different medical and non medical applications such as e-
IEEE 802.15.6 standard is classified by three physical layer standards. Each standard uses
different frequency bands for data transmission with data rate IO Mbps maximum. First one
is Narrowband (NB) which operates within the range of 400, 800, 900 MHz and 2.3, 2.4
GHz bands. The Human Body Communication (HBC) is another standard which operates at
range of50 MHz. The Ultra Wideband (UWB) technology operates between 3.1 GHz to 10.6
networks. It is fast becoming a vital productivity tool for today's mobile workforce.
A wireless network uses radio waves instead of cables to connect devices such as laptops
to the internet, or to your business network. It removes the need for expensive and messy
wires, and allows you or your staff to access your company's documents, emails and other
resources from any location within your network's coverage area or any Wi-Fi hotspot. By
Wearable Devices
3.24
removing the need for wiring, wireless networks can be a quick and cost-effective small
•9
•9
We can use wireless networks in the form of WLAN or Wi-Fi in various fields such as
As the technology is growing, the demands of users as well as the demand of ubiquitous
networking is increasing.
WBAN(Wireless Body Area Network) allows the user to move another 'vvithout having
In-body communication
• On-body communication
In-body communication is the communication between sensor nodes that are implanted
inside human body. The MICS (Medical Implant Communication System)
a body sensor network (BSN) or a medical body area network (MBAN), is a wireless
which humans can carry in different positions, in clothes pockets, by hand or in various
bags.
A WBAN system can use WPAN wireless technologies as gateways -to reach longer
ranges. Through gateway devices, it is possible to connect the wearable devices on the
This way, medical professionals can access patient data online using the internet
Intelligent mobile communication network and WLAN, Wi-Fi are applied to variOUS
sectors such as education; healthcare service and industry in order to provide people a
3.25
As the demand of ubiquitous network is increased, the devices for home, office and
other information devices, that can communicate wireless in short range have been
The standard and technique development Of ubiquitous network has rapidly put itself
(radio waves), magnetic fields, and electric fields, whereas optical communication uses light
without using wires or cables. Among the various methods of wireless communication,
telecommunication that uses radio waves enables long-distance communication in the order
radio waves are used in most wireless communication systemS. We would like to focus our
Wireless communication systems that use radio waves are configured to use space as the
transmission path (or communication channel) and to send data on radio waves as
Transmitter
Radio
Waves
Receiver
Fig. 3.11. Configuration •ofa Simple Model for a Wireless Communication System
Information: Data including audio, text, and images that can be interpreted by humans
using radio waves and the typical applications of each category. Wireless
3.26
Wearable
We should note here that wireless communication is also being developed beyond the
boundaries of these categories in recent years. For example, various countries have be
satellite mobile communication services that incorporate satellite communication into mobile
Categories of Wireless
Communication
Mobile communication
Aviation communication
Satellite communication
Ship communication
Broadcast communication
Fixed communication
(microwave communication)
Typical Applications
Mobile phones
observation
communication
television relays
LPWA, etc.
Table 3.3.
Term
Description
Global Positioning system (GPS) A satellite positioning system for the entire earth
Microwaves
3 MHz to 30 MHz
Also described as Super Very High Frequency(SHF) The frequency range is 3 GHz to 30 GHz
3.27
noise.
We call the data transmitted through a transmission path a "signal." We refer to the
unnecessary components that negatively affect these signals and make it difficult to transmit
the data we want to send to the recipient "noise." In practice, noise may occur in both
transmitters and receivers and then cause interference with the operation of devices and other
problems. In other words, we can call a communication system completely unaffected by this
Sender
Transmitter
Data
Noise
Receiver
Recipient
Table 3.4. Constituent Elements of the Basic Model for Communication Systems
Constituent Elements
Sender
Data
Transmitter
Transmission path
(communication channel)
Receiver
Recipient
Description
technique. WBAN differs with other wireless sensor networks(WSN) with some significant
points• First difference between a WBAN and WSN is mobility. In WBAN user can move
Wearable Devices
3.28
with' sensor nodes with same mobility pattern whereas WSN is generally used to be
stationary. Energy consumption is much less in WBAN than other WSNs arrangement. In
addition, WBAN sensor devices are found cheaper than WSNs. For reliability, node
complexity and density, WBAN nodes are however traditional. WSNs do not tackle specific
requirements associated with the interaction between the network and the human body. The
WBAN performs like Virtual Doctor Server, by keeping the different responsibilities like.
maintain the history of the patient, giving advices to the patient in general/emergency (first
aid help from second person) case etc. To understand the communication approach of this
emerging WBAN technology, we first need to know the conceptual structure of WBAN so
that, one can easily know the flow Of communication within the system and to the outside
world, this has been achieved by the demonstration of a simple WBAN communication
architecture. Where this architecture is mainly comprised with three different layers namely:
Tier I, Tier 2 and Tier 3 and these are further described better in the given figure 3.14.
There are different WBAN architectures proposed by many different research groups for
specific applications. The architecture and communication protocols are application specific
for optimizing the performance. Three-tier WBAN architecture is the most common
architectures are there. Figure I .shows an example of the three-tier WBAN architecture used
in healthcare systems.
oxygen saturation (SP02) sensors attached on the body, implanted in the body, or swallowed.
This tier is called' the intra-WBAN tier where all the communications happen within the
WBAN. Tier 2 has external communication gateways such as a mobile phone or a wi-fi
router connected to the internet. There may be one WBAN communicating with another
WBAN and this is called the inter-WBAN tier, but still categorized under tier 2. The
communication between the gateways and end users is categorized as tier 3, commonly
known as the beyond-WBAN tier. Cloud computing sits between tiers 2 and 3.
WBAN Topologies
WBANs have four common network topologies as shown in Fig.3.13, where the star
top0100' has equal access levels for all peripheral sensor nodes to the access point or the
centralnode. This is preferred when the sensor nodes do not need to communicate with each
other. In case one sensor node needs to talk to another node, it must go through the central
node. In contrast, the mesh topology provides all sensor nodes the same level of access rights
as in star topology and each sensor node can talk to the other sensor nodes individually•
However, this comes with the cost of high signal collision probability and therefore may
cause delays in successful data transmission. Therefore, the fully meshed network topolog
is not used unless it is essential for a particular application. The tree network topolog has
different priority levels for different sensors and the number of hops needed to access the
central node is also dependent on how they are configured. Sensor-to-sensor communication
in a tree network always needs more than one hop unless it is between
nodes. The hybrid topology has all the above-mentioned configurations within it dependent
on the configuration and this is the most common WBAN configuration used in the field
Sensor
Central Node
Sensor
Node
Central Node
Sensor
Sensor
Sensor
Node
Sensor
Central Node
Sensor
Sensor
Node
Sensor Sensor
Node
Sensor
Node
Fig. 3.13.
Sensor
Central Node
Sensor
Sensor
Sensor Sensor
Node
IEEE has derived several network standards related to WBANs. The first one was IEEE
802.15.1 developed in 2002 for Wireless Personal Area Network (WPAN) which was based
on Bluetooth. It defined the physical layer (PHY) and the media. IEEE 802.15.4 low rate
was also introduced in 2003 for longer battery access control (MAC) layer
qecifications for fixed and mobile WPAN [20]. Later IEEE 802.15.2 was developed as a
coexisting network and IEEE 802.15.3 was developed as the high rate WPAN in 2003 life
specific regulatory changes. IEEE 802.15.5 is the standard provided for interoperable;
and stable WPANs. The IEEE 802.15.6 standard was specifically developed for
3.30
WBAN. The body area network node locations have three major zones namely, implant, on
the surface, and external where the external devices can operate from a maximum of S
away from the body. Dependent on the scenario of transmission, the channel models (CMS)
protocols
Interoperability
Temperature
control
Changing
topology
Varying
bandwidth
needs
Constant
signaling
Interference
Fault
acceptance
Security
Quality of
Service (QoS)
Varying data
rates
MAC Layer
Dynamic
channel
assignment
Control packets
overhead
Protocol
overhead
Synchronization
Optimum
routing
Network
condition
Real-time
streaming
Localization
Mobility
Temperature
Traffic control
Multi-path
routing
Security
Qos
Fault tolerance
Layer
Reliable
transport
Congestion
control
Self-
configuration
Energy
awareness
Biased
implementation
Constrained
addressing
Application
Layer
Efficient
interface
Security
Congestion
control
Flow control
Bandwidth
allocation
Packet-loss
recovery
Energy
efficiency
Throughput
Consistency
Over-emitting
Packet
scheduling
Error control
Overheating
Calibration
Fault
acceptance
Energy
conservation
Qos
Multi-radio and
multi-channel
design
Data flow
control
Idle listening
Security
Delay control
EEG
Air Flow
ECG
Bool Glucose
Pulse
SP02
EMG
Motion
Implanted
ensor
Access Point
nut o
Fig. 3,14.
3.31
iHospitaI
Ambulance
Medical
Server
Tier 3