skip to main content
research-article
Public Access

Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare

Published:03 November 2016Publication History
Skip Abstract Section

Abstract

Wireless and mobile healthcare systems are proliferating. Many of these systems are Cyber Physical Systems (CPS). However, the complexities involved in building healthcare systems often go beyond those CPS systems that are constructed using principles from physics and other natural physical sciences. In healthcare CPSs, complex human physiology and free will, both of which are person dependent, are paramount. These complexities give rise to many new research problems for CPS. This article highlights some of the major new research questions and promising directions for wireless and mobile healthcare CPSs of the future.

References

  1. T. Abdelzaher, S. Prabh, and R. Kiran. 2004. On real-time capacity limits of ad hoc wireless sensor networks. In Proceedings of RTSS (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Y. Aguiar, M. Vieira, E. Galy, J. Mercantini, and C. Santoni. 2011. Refining a user behavior model based on the observation of emotional states. In Proceedings of the International Conference of Advanced Cognitive Technologies and Applications (COGNITIVE 2011).Google ScholarGoogle Scholar
  3. Apple app store. http://www.apple.com/osx/apps/app-store.html.Google ScholarGoogle Scholar
  4. Control4 Home Automation and Control. http://www.control4.com.Google ScholarGoogle Scholar
  5. J. Deng, R. Han, and S. Mishra. 2006. Secure code distribution in dynamically programmable wireless sensor networks. In Proceedings of the ACM/IEEE IPSN (2006). 292--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Dickerson, E. Gorlin, and J. Stankovic. 2011. Empath: A continuous remote emotional health monitoring system for depressive illness. In Proceedings of the 2nd Conference on Wireless Health (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Dixon, R. Mahajan, S. Agarwal, A. Brush, B. Lee, S. Saroiu, and P. Bahl. 2012. An operating system for the home. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI’12). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. E. Hoque, R. Dickerson, S. Masud Preum, A. Barth, M. Hansen, and J. Stankovic. 2015. Holmes: A comprehensive anomaly detection system for daily in-home activities. In Proceedings of the 2015 International Conference on Distributed Computing in Sensor Systems (DCOSS’15). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Huang, J. Li, X. Song, and H. Guo. 2012. Modeling impulsive injections of insulin: Towards artificial pancreas. SIAM Journal of Applied Mathematics 72, 5 (2012), 1524--1548. Google ScholarGoogle ScholarCross RefCross Ref
  10. M. Kay, E. Choe, J. Shepherd, B. Greenstein, N. Watson, S. Consolvo, and J. Kientz. 2012. Lullaby: A capture 8 access system for understanding the sleep environment. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp’12). 226--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Klein, N. Mogles, and A. van Wisson. 2013. An intelligent coaching system for therapy adherence. Pervasive Computing, 12, 3 (July-Sept. 2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M1 Security and Automation Controls. http://www.elkproducts.com/m1 controls.html.Google ScholarGoogle Scholar
  13. S. Mohammed, P. Fraisse, D. Guiraud, P. Poignet, and H. Makssoud. 2005. Towards a Co-contraction muscle control strategy for paraplegics. In Proceedings of the 44th IEEE Conference on Decision and Control (CDC-ECC’05). Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Munir, J. Stankovic, C. Liang, and S. Lin. 2013. New cyber physical system challenges for human-in-the-loop control. In Proceedings of the 8th International Workshop on Feedback Computing (2013).Google ScholarGoogle Scholar
  15. S. Munir and J. Stankovic. 2013. DepSys: Dependency aware integration of systems for smart homes. In Proceedings of the ACM/IEEE 5th International Conference on Cyber-Physical Systems (ICCPS’13). 127--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Munir, M. Ahmed, and J. Stankovic. 2015. EyePhy: Detecting dependencies in cyber physical system apps due to human-in-the-loop. In Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS’15). 170--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Ravi, A. Raghunathan, and S. Chakradhar. 2004. Tamper resistance mechanisms for secure, embedded systems. In Proceedings of the 17th International Conference on VLSI Design (2004). 605. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Rost and H. Balakrishnan. 2006. Memento: A health monitoring system for wireless sensor networks. In Proceedings of SECON (2006).Google ScholarGoogle Scholar
  19. L. Ruiz, J. Nogueira, and A. Loureiro. 2003. MANNA: A management architecture for wireless sensor networks. IEEE Communications Magazine, February 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. Schirner, D. Erdogmus, K. Chowdhury, and T. Padir. 2013. The future of human-in-the-loop cyber-physical systems. Computer 46, 1 (2013), 36--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. V. Srinivasan, J. Stankovic, and K. Whitehouse. 2008. Protecting your daily in-home activity information from a wireless snooping attack. In Proceedings of the 10th International Conference on Ubiquitous Computing (Ubicomp’08). 202--211. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Stankovic. 2008. When sensor and actuator networks cover the world, invited keynote article, special issue on ubiquitous sensor networks. ETRI Journal, Korea 30, 5 (Oct. 2008), 627--633. Google ScholarGoogle ScholarCross RefCross Ref
  23. J. Stankovic, I. Lee, A. Mok, and R. Rajkumar. 2005. Opportunities and obligations for physical computing systems. IEEE Computer 38, 11 (Nov. 2005), 23--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Stankovic. 2013. A vision of a smart city in the future. Smart Cities 1, 10 (Oct. 2013).Google ScholarGoogle Scholar
  25. K. Tsui, D. Kim, A. Behal, D. Kontak, and H. Yanco. 2011. I want that: Human-in-the-loop control of a wheelchair-mounted robotic arm. Journal of Applied Bionics and Biomechanics 8 (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Wood, J. Stankovic, G. Virone, L. Selavo, T. He, Q. Cao, T. Doan, Y. Wu, L. Fang, and R. Stoleru. 2008. Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Network 22, 4 (Jul.-Aug. 2008), 26--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. Wu, J. Li, J. Stankovic, K. Whitehouse, S. Son, and K. Kapitanova. 2010. Run time assurance of application-level requirements in wireless sensor networks. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’10). 197--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. W. Xu, W. Trappe, Y. Zhang, and T. Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of MobiHoc (2005). 46--57. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Cyber-Physical Systems
          ACM Transactions on Cyber-Physical Systems  Volume 1, Issue 1
          Inaugural Issue
          January 2017
          77 pages
          ISSN:2378-962X
          EISSN:2378-9638
          DOI:10.1145/3015145
          • Editor:
          • Tei-Wei Kuo
          Issue’s Table of Contents

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 November 2016
          • Accepted: 1 March 2016
          • Revised: 1 January 2016
          • Received: 1 October 2015
          Published in tcps Volume 1, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader