Abstract
Wireless and mobile healthcare systems are proliferating. Many of these systems are Cyber Physical Systems (CPS). However, the complexities involved in building healthcare systems often go beyond those CPS systems that are constructed using principles from physics and other natural physical sciences. In healthcare CPSs, complex human physiology and free will, both of which are person dependent, are paramount. These complexities give rise to many new research problems for CPS. This article highlights some of the major new research questions and promising directions for wireless and mobile healthcare CPSs of the future.
- T. Abdelzaher, S. Prabh, and R. Kiran. 2004. On real-time capacity limits of ad hoc wireless sensor networks. In Proceedings of RTSS (2004). Google ScholarDigital Library
- Y. Aguiar, M. Vieira, E. Galy, J. Mercantini, and C. Santoni. 2011. Refining a user behavior model based on the observation of emotional states. In Proceedings of the International Conference of Advanced Cognitive Technologies and Applications (COGNITIVE 2011).Google Scholar
- Apple app store. http://www.apple.com/osx/apps/app-store.html.Google Scholar
- Control4 Home Automation and Control. http://www.control4.com.Google Scholar
- J. Deng, R. Han, and S. Mishra. 2006. Secure code distribution in dynamically programmable wireless sensor networks. In Proceedings of the ACM/IEEE IPSN (2006). 292--300. Google ScholarDigital Library
- R. Dickerson, E. Gorlin, and J. Stankovic. 2011. Empath: A continuous remote emotional health monitoring system for depressive illness. In Proceedings of the 2nd Conference on Wireless Health (2011). Google ScholarDigital Library
- C. Dixon, R. Mahajan, S. Agarwal, A. Brush, B. Lee, S. Saroiu, and P. Bahl. 2012. An operating system for the home. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI’12). Google ScholarDigital Library
- E. Hoque, R. Dickerson, S. Masud Preum, A. Barth, M. Hansen, and J. Stankovic. 2015. Holmes: A comprehensive anomaly detection system for daily in-home activities. In Proceedings of the 2015 International Conference on Distributed Computing in Sensor Systems (DCOSS’15). Google ScholarDigital Library
- M. Huang, J. Li, X. Song, and H. Guo. 2012. Modeling impulsive injections of insulin: Towards artificial pancreas. SIAM Journal of Applied Mathematics 72, 5 (2012), 1524--1548. Google ScholarCross Ref
- M. Kay, E. Choe, J. Shepherd, B. Greenstein, N. Watson, S. Consolvo, and J. Kientz. 2012. Lullaby: A capture 8 access system for understanding the sleep environment. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp’12). 226--234. Google ScholarDigital Library
- M. Klein, N. Mogles, and A. van Wisson. 2013. An intelligent coaching system for therapy adherence. Pervasive Computing, 12, 3 (July-Sept. 2013). Google ScholarDigital Library
- M1 Security and Automation Controls. http://www.elkproducts.com/m1 controls.html.Google Scholar
- S. Mohammed, P. Fraisse, D. Guiraud, P. Poignet, and H. Makssoud. 2005. Towards a Co-contraction muscle control strategy for paraplegics. In Proceedings of the 44th IEEE Conference on Decision and Control (CDC-ECC’05). Google ScholarCross Ref
- S. Munir, J. Stankovic, C. Liang, and S. Lin. 2013. New cyber physical system challenges for human-in-the-loop control. In Proceedings of the 8th International Workshop on Feedback Computing (2013).Google Scholar
- S. Munir and J. Stankovic. 2013. DepSys: Dependency aware integration of systems for smart homes. In Proceedings of the ACM/IEEE 5th International Conference on Cyber-Physical Systems (ICCPS’13). 127--138. Google ScholarDigital Library
- S. Munir, M. Ahmed, and J. Stankovic. 2015. EyePhy: Detecting dependencies in cyber physical system apps due to human-in-the-loop. In Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS’15). 170--179. Google ScholarDigital Library
- S. Ravi, A. Raghunathan, and S. Chakradhar. 2004. Tamper resistance mechanisms for secure, embedded systems. In Proceedings of the 17th International Conference on VLSI Design (2004). 605. Google ScholarDigital Library
- S. Rost and H. Balakrishnan. 2006. Memento: A health monitoring system for wireless sensor networks. In Proceedings of SECON (2006).Google Scholar
- L. Ruiz, J. Nogueira, and A. Loureiro. 2003. MANNA: A management architecture for wireless sensor networks. IEEE Communications Magazine, February 2003. Google ScholarDigital Library
- G. Schirner, D. Erdogmus, K. Chowdhury, and T. Padir. 2013. The future of human-in-the-loop cyber-physical systems. Computer 46, 1 (2013), 36--45. Google ScholarDigital Library
- V. Srinivasan, J. Stankovic, and K. Whitehouse. 2008. Protecting your daily in-home activity information from a wireless snooping attack. In Proceedings of the 10th International Conference on Ubiquitous Computing (Ubicomp’08). 202--211. Google ScholarDigital Library
- J. Stankovic. 2008. When sensor and actuator networks cover the world, invited keynote article, special issue on ubiquitous sensor networks. ETRI Journal, Korea 30, 5 (Oct. 2008), 627--633. Google ScholarCross Ref
- J. Stankovic, I. Lee, A. Mok, and R. Rajkumar. 2005. Opportunities and obligations for physical computing systems. IEEE Computer 38, 11 (Nov. 2005), 23--31. Google ScholarDigital Library
- J. Stankovic. 2013. A vision of a smart city in the future. Smart Cities 1, 10 (Oct. 2013).Google Scholar
- K. Tsui, D. Kim, A. Behal, D. Kontak, and H. Yanco. 2011. I want that: Human-in-the-loop control of a wheelchair-mounted robotic arm. Journal of Applied Bionics and Biomechanics 8 (2011). Google ScholarDigital Library
- A. Wood, J. Stankovic, G. Virone, L. Selavo, T. He, Q. Cao, T. Doan, Y. Wu, L. Fang, and R. Stoleru. 2008. Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Network 22, 4 (Jul.-Aug. 2008), 26--33. Google ScholarDigital Library
- Y. Wu, J. Li, J. Stankovic, K. Whitehouse, S. Son, and K. Kapitanova. 2010. Run time assurance of application-level requirements in wireless sensor networks. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN’10). 197--208. Google ScholarDigital Library
- W. Xu, W. Trappe, Y. Zhang, and T. Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of MobiHoc (2005). 46--57. Google ScholarDigital Library
Index Terms
- Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare
Recommendations
Cyber physical systems security
Cyber Physical Systems (CPS) are networked systems of cyber (computation and communication) and physical (sensors and actuators) components that interact in a feedback loop with the possible help of human intervention, interaction and utilization. These ...
Security Objectives of Cyber Physical Systems
SECTECH '14: Proceedings of the 2014 7th International Conference on Security TechnologyToday, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, ...
Smart City Healthcare Cyber Physical System: Characteristics, Technologies and Challenges
AbstractThe recent pandemic has demanded a strong and smart healthcare system which can monitor the patients efficiently and handle the situation that arises from the outbreak of the disease. Smart healthcare cyber physical systems are the future systems ...
Comments