Skip to main content
Log in

Context Aware Trust Management Scheme for Pervasive Healthcare

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Medical sensor nodes are used in pervasive healthcare applications like remote patient monitoring, elderly care to collect patients vital signs for identifying medical emergency. These resource restricted sensor nodes are prone to various malicious attacks, data faults and data losses. Presence of faulty data, data loss in collected patient data may lead to incorrect analysis of patient condition, which decreases the reliability of pervasive healthcare system. The aim of this work is to alert the caregiver and raise the alarm only when the patient enters into medical emergency situation. The proposed scheme also reduces the false alarms and alerts caused by data fault and misbehaving sensor nodes. To achieve this, we introduce a context aware trust management scheme for data fault detection, data reconstruction and event detection in pervasive healthcare systems. It employs heuristic functions, data correlation and contextual information based algorithms to identify the data faults and events. It also reconstructs the data faults and data loss for identifying patient condition. Performance of this approach is evaluated with the help of real data samples collected by medical sensor network prototype of remote patient monitoring application. The experimental results show that the proposed trust scheme outperforms state-of-the-art techniques and achieves good detection accuracy in data fault detection and event detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  MathSciNet  Google Scholar 

  2. Yu, H., Shen, Z., & Leung, C. (2010). Towards trust-aware health monitoring body area sensor networks. International Journal of Information Technology, 16(2), 1–20.

    Google Scholar 

  3. Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.

    Article  Google Scholar 

  4. Gao, Y., & Liu, W. (2015). A security routing model based on trust for medical sensor networks. In 2015 IEEE international conference on communication software and networks (ICCSN). IEEE.

  5. Dondio, P., Manzo, E., & Barrett, S. (2007). Applied computational trust in utilities management: A case study on the town council of Cava deTirreni. In IFIP international conference on trust management. Boston, MA: Springer.

  6. Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.

    Article  Google Scholar 

  7. Gwadera, R., Riahi, M., & Aberer, K. (2014). Pattern-wise trust assessment of sensor data. In 2014 IEEE 15th international conference on mobile data management (MDM) (Vol. 1). IEEE.

  8. Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137–5170.

    Article  Google Scholar 

  9. Karthik, N., & Ananthanarayana, V. S. (2016). Data trustworthiness in wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/I SPA. IEEE

  10. Karthik, N., Ananthanarayana, V. S. (2017). Data trust model for event detection in wireless sensor networks using data correlation techniques. In 2017 fourth international conference on signal processing, communication and networking (ICSCN) . IEEE.

  11. Han, G., et al. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80.3, 602–617.

    Article  MATH  Google Scholar 

  12. Gilbert, E. P. K., et al. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.

    Article  Google Scholar 

  13. Chen, H., et al. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage, NAS’08, 2008. IEEE.

  14. Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in event detection wireless sensor networks. IEEE Transactions on Network and Service Management, 12(3), 496–510.

    Article  Google Scholar 

  15. Salem, O., et al. (2013). Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In 2013 IEEE international conference on communications (ICC). IEEE.

  16. Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.

    Article  Google Scholar 

  17. Zhang, L., Wu, X., & Luo, D. (2015). Improving activity recognition with context information. In 2015 IEEE international conference on mechatronics and automation (ICMA). IEEE.

  18. Mannini, A., et al. (2013). Activity recognition using a single accelerometer placed at the wrist or ankle. Medicine and Science in Sports and Exercise, 45(11), 2193.

    Article  Google Scholar 

  19. Guestrin, C., Bodik, P., Thibaux, R., Paskin, M., & Madden, S. (2004). Distributed regression: An efficient framework for modeling sensor network data. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 1–10). IEEE.

  20. Zhang, H., et al. (2016). A data reconstruction model addressing loss and faults in medical body sensor networks. In Global communications conference (GLOBECOM), 2016 IEEE. IEEE.

  21. Sharma, A. B., Golubchik, L., & Govindan, R. (2010). Sensor faults: Detection methods and prevalence in real-world datasets. ACM Transactions on Sensor Networks (TOSN), 6(3), 23.

    Article  Google Scholar 

  22. Madden, S. (2003). Intel Berkeley research lab data. Web page, Intel. http://berkeley.intel-research.net/labdata.

  23. Tolle, G., Polastre, J., Szewczyk, R., Culler, D., Turner, N., Tu, K., & Hong, W. (2005). A macroscope in the redwoods. In Proceedings of the 3rd international conference on embedded networked sensor systems (pp. 51–63). ACM

  24. Li, W., & Zhu, X. (2014). Recommendation-based trust management in body area networks for mobile healthcare. In 2014 IEEE 11th international conference on mobile ad hoc and sensor systems (MASS). IEEE.

  25. Bui, V. T. (2011). A trust management model for body sensor networks. In 2011 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM). IEEE.

  26. Chitra, A., & Kanagachidambaresan, G. R. (2018). Fault aware trust determination algorithm for wireless body sensor network (WBSN). In Proceedings of first international conference on smart system, innovations and computing. Singapore: Springer.

  27. Kanagachidambaresan, G. R. (2018). Trustworthy architecture for wireless body sensor network. In Information Resources Management Association. Wearable technologies: Concepts, methodologies, tools, and applications (pp. 333–362). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-5225-5484-4.

  28. Gao, Y., & Liu, W. (2014). BeTrust: A dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks. Journal of Sensors. https://doi.org/10.1155/2014/649392.

    Google Scholar 

  29. Wu, G. W., Liu, Z. S., & Pirozmand, P. (2014). A fuzzy trust model for public key distribution in body area networks. In Advanced materials research (Vol. 989, pp. 4837–4840). Trans Tech Publications.

  30. Bui, V., et al. (2013). A trust evaluation framework for sensor readings in body area sensor networks. In Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

  31. Bui, V. T., Lukkien, J. J., Verhoeven, R. (2011). Toward a trust management model for a configurable body sensor platform. In Proceedings of the 6th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

  32. Ye, J., Stevenson, G., & Dobson, S. (2016). Detecting abnormal events on binary sensors in smart home environments. Pervasive and Mobile Computing, 33, 32–49.

    Article  Google Scholar 

  33. Paschalidis, I. C., & Chen, Y. (2010). Statistical anomaly detection with sensor networks. ACM Transactions on Sensor Networks, 7(2), 17.

    Article  Google Scholar 

  34. Dereszynski, E. W., & Dietterich, T. G. (2011). Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns. ACM Transactions on Sensor Networks, 8(1), 3:1–3:36.

    Article  Google Scholar 

  35. Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.

    Article  Google Scholar 

  36. Salem, O., et al. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE Journal of Biomedical and Health Informatics, 18(5), 1541–1551.

    Article  Google Scholar 

  37. Cover, T., & Hart, P. (1967). Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT, 13(1), 21–27.

    Article  MATH  Google Scholar 

  38. Rajasegarar, S., Leckie, C., Palaniswami, M., & Bezdek, J. C. (2006). Distributed anomaly detection in wireless sensor networks. In Proceedings of IEEE ICCS.

  39. Kong, L., Xia, M., Liu, X.-Y., Wu, M.-Y., & Liu, X. (2013). Data loss and reconstruction in sensor networks. INFOCOM, 13, 1654–1662.

    Google Scholar 

  40. Nasridinov, A., et al. (2014). Event detection in wireless sensor networks: Survey and challenges. Mobile, ubiquitous, and intelligent computing (pp. 585–590). Berlin: Springer.

    Google Scholar 

  41. Wittenburg, G., Dziengel, N., Adler, S., Kasmi, Z., Ziegert, M., & Schiller, J. (2012). Cooperative event detection in wireless sensor networks. IEEE Communications Magazine, 50(12), 124–131.

    Article  Google Scholar 

  42. Duarte, M. F., & Hu, Y. H. (2004). Vehicle classification in distributed sensor networks. Journal of Parallel and Distributed Computing, 64(7), 826–838.

    Article  Google Scholar 

  43. Ghasemzadeh, H., Loseu, V., & Jafari, R. (2010). Collaborative signal processing for action recognition in body sensor networks: A distributed classification algorithm using motion transcripts. In Proceedings of the ninth ACM/IEEE international conference on information processing in sensor networks (IPSN 10), Stockholm, Sweden.

  44. Walchli, M., Skoczylas, P., Meer, M., & Braun, T. (2007). Distributed event localization and tracking with wireless sensors. In Proceedings of the fifth international conference on wired/wireless internet communications (WWIC 07), Coimbra, Portugal.

  45. Haron, N., Jaafar, J., Aziz, I. A., Hassan, M. H., & Shapiai, M. I. (2017). Data trustworthiness in internet of things: A taxonomy and future directions. In 2017 IEEE conference on big data and analytics (ICBDA) (pp. 25–30). Kuching.

  46. Jadidoleslamy, H., Aref, M. R., & Bahramgiri, H. (2016). A fuzzy fully distributed trust management system in wireless sensor networks. AEU-International Journal of Electronics and Communications, 70(1), 40–49.

    Article  Google Scholar 

  47. Attal, F., et al. (2015). Physical human activity recognition using wearable sensors. Sensors, 15(12), 31314–31338.

    Article  Google Scholar 

  48. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of third IEEE international conference on mobile ad-hoc and sensor systems (MASS 06) (pp. 437–446).

  49. Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. M. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.

    Article  Google Scholar 

  50. Cho, J.-H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.

    Article  Google Scholar 

  51. Yu, T., et al. (2015). Temporal and spatial correlation based distributed fault detection in wireless sensor networks. In 2015 IEEE 28th Canadian conference on electrical and computer engineering (CCECE). IEEE.

  52. Karthik, N., & Sarma Dhulipala, V. R. (2011). Trust calculation in wireless sensor networks. In 2011 3rd international conference on electronics computer technology (ICECT) (Vol. 4). IEEE.

  53. Li, Z., Zhu, Y., Zhu, H., & Li, M. (2011). Compressive sensing approach to urban traffic sensing. In Proceedings of IEEE ICDCS, Minneapolis, MN, USA.

  54. Zhu, H., Zhu, Y., Li, M., & Ni, L. (2009). Seer: Metropolitan-scale traffic perception based on lossy sensory data. In Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil.

  55. Kong, L., et al. (2014). Data loss and reconstruction in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2818–2828.

    Article  Google Scholar 

  56. Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1228–1237.

    Article  Google Scholar 

  57. Ni, K., et al. (2009). Sensor network data fault types. ACM Transactions on Sensor Networks (TOSN), 5(3), 25.

    Article  Google Scholar 

  58. Kelly, G. (2006). Body temperature variability (part 1): A review of the history of body temperature and its variability due to site selection, biological rhythms, fitness, and aging. Alternative Medicine Review, 11(4), 278.

    Google Scholar 

  59. Berger, A., et al. (2016). Exercise systolic blood pressure variability is associated with increased risk for new-onset hypertension among normotensive adults. Journal of the American Society of Hypertension, 10(6), 527–535.

    Article  Google Scholar 

  60. Sunita, A. S. M., et al. (2013). Heart rate and blood pressure response to exercise and recovery in subclinical hypothyroid patients. International Journal of Applied and Basic Medical Research, 3(2), 106.

    Article  Google Scholar 

  61. Schnbrodt, F. D., & Perugini, M. (2013). At what sample size do correlations stabilize? Journal of Research in Personality, 47(5), 609–612.

    Article  Google Scholar 

  62. Oh, D.-J., Hong, H.-O., & Lee, B.-A. (2016). The effects of strenuous exercises on resting heart rate, blood pressure, and maximal oxygen uptake. Journal of Exercise Rehabilitation, 12(1), 42.

    Article  Google Scholar 

  63. Ravichandran, J., & Arulappan, A. I. (2013). Data validation algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 9(12), 634278.

    Article  Google Scholar 

  64. Burton, D. A., Stokes, K., & Hall, G. M. (2004). Physiological effects of exercise. Continuing Education in Anaesthesia Critical Care & Pain, 4(6), 185–188.

    Article  Google Scholar 

  65. Karthik, N., & Ananthanarayana, V. S. (2017). Sensor data modeling for data trustworthiness. In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE.

  66. Zhang, Y., Cheng, H., Chen, D. (2016). Data reconstruction with spatial and temporal correlation in wireless sensor networks. In Proceedings of the 3rd ACM workshop on mobile sensing, computing and communication. ACM.

  67. Zhang, H., Liu, J., & Pang, A.-C. (2018). A Bayesian network model for data losses and faults in medical body sensor networks. Computer Networks, 143, 166–175.

    Article  Google Scholar 

  68. Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in wireless sensor networks: A survey. ACM Computing Surveys (CSUR), 48(2), 24.

    Article  Google Scholar 

  69. Wang, M., Xue, A., & Xia, H. (2017). Abnormal event detection in wireless sensor networks based on multiattribute correlation. Journal of Electrical and Computer Engineering. https://doi.org/10.1155/2017/2587948.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Karthik.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karthik, N., Ananthanarayana, V.S. Context Aware Trust Management Scheme for Pervasive Healthcare. Wireless Pers Commun 105, 725–763 (2019). https://doi.org/10.1007/s11277-018-6091-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6091-9

Keywords

Navigation