Wireless telemedicine and m-health: technologies, applications and research issues

Telemedicine is not medicine, but it is used to compute, to communicate and to deliver high-quality medical care regardless of location. It reduces cost, time and resources. Furthermore, wireless technologies play significant roles in telemedicine, and they are therefore called wireless telemedicine or mobile-health. This paper provides a comprehensive survey on wireless telemedicine, including the relevant wireless technologies, applications and research issues.

[1]  Dov Te'eni,et al.  Human-Computer Interaction: Developing Effective Organizational Information Systems , 2006 .

[2]  Ieee . Wg Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .

[3]  Yang Xiao,et al.  Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs , 2010, IEEE Transactions on Wireless Communications.

[4]  Tarik Taleb,et al.  Angelah: a framework for assisting elders at home , 2009, IEEE Journal on Selected Areas in Communications.

[5]  Ju Wang,et al.  A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.

[6]  Hal B. Jenson,et al.  Nelson Textbook of Pediatrics , 1965 .

[7]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[8]  Johnny S. Wong,et al.  An agent-based framework for intrusion detection alert verification and event correlation , 2008, Int. J. Secur. Networks.

[9]  Edward H. Shortliffe,et al.  Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project (The Addison-Wesley series in artificial intelligence) , 1984 .

[10]  Jelena V. Misic,et al.  Implementation of security policy for clinical information systems over wireless sensor networks , 2007, Ad Hoc Networks.

[11]  P. Palatini,et al.  Need for a revision of the normal limits of resting heart rate. , 1999, Hypertension.

[12]  Sandeep K. S. Gupta,et al.  TARA: Thermal-Aware Routing Algorithm for Implanted Sensor Networks , 2005, DCOSS.

[13]  Yusheng Ji,et al.  Secure and efficient data transmission in RFID sensor networks , 2010, Int. J. Secur. Networks.

[14]  Adrian Perrig,et al.  Designing user studies for security applications: a case study with wireless network configuration , 2009, Int. J. Secur. Networks.

[15]  Sotiris Pavlopoulos,et al.  A novel emergency telemedicine system based on wireless communication technology-AMBULANCE , 1998, IEEE Transactions on Information Technology in Biomedicine.

[16]  Panayotis G. Cottis,et al.  Overview of satellite communication networks security: introduction of EAP , 2009, Int. J. Secur. Networks.

[17]  Willis J. Tompkins,et al.  A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.

[18]  Robert F. Mills,et al.  Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.

[19]  Kathy J. Liszka A Sensor Network Architecture for Cardiac Health Monitoring , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[20]  Weili Wu,et al.  Handling inheritance violation for secure interoperation of heterogeneous systems , 2009, Int. J. Secur. Networks.

[21]  Shahram Latifi,et al.  An iris and retina multimodal biometric system , 2008, Int. J. Secur. Networks.

[22]  Jim Lansford,et al.  HomeRF: wireless networking for the connected home , 2000, IEEE Wirel. Commun..

[23]  Jie Wu,et al.  An efficient group key management scheme for mobile ad hoc networks , 2009, Int. J. Secur. Networks.

[24]  Paul Rabinovich,et al.  Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.

[25]  Bruce G. Buchanan,et al.  The MYCIN Experiments of the Stanford Heuristic Programming Project , 1985 .

[26]  Xiaoqi Ma,et al.  Verifying security protocols by knowledge analysis , 2008, Int. J. Secur. Networks.

[27]  Simon Kay,et al.  Telemedicine Theory and Practice , 1997 .

[28]  Ren-Junn Hwang,et al.  An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks , 2010, Int. J. Secur. Networks.

[29]  Mooi Choo Chuah,et al.  Syntax vs. semantics: competing approaches to dynamic network intrusion detection , 2008, Int. J. Secur. Networks.

[30]  Ali Movaghar-Rahimabadi,et al.  Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.

[31]  Hsiao-Hwa Chen,et al.  DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.

[32]  David S. Rosenbaum,et al.  Remote Monitoring of a Heterogeneous Sensor Network for Biomedical Research in Space , 2004, International Conference on Wireless Networks.

[33]  Sencun Zhu,et al.  LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network , 2007, Int. J. Secur. Networks.

[34]  Javier Herranz,et al.  Aggregate designated verifier signatures and application to secure routing , 2007, Int. J. Secur. Networks.

[35]  Robert F. Mills,et al.  An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols , 2012, Int. J. Secur. Networks.

[36]  Noureddine Boudriga,et al.  Visibility: a novel concept for characterising provable network digital evidences , 2009, Int. J. Secur. Networks.

[37]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[38]  Pieter H. Hartel,et al.  Secure pairing with biometrics , 2009, Int. J. Secur. Networks.

[39]  Li Xu,et al.  Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks , 2010, Int. J. Secur. Networks.

[40]  Ari T. Adler,et al.  A cost-effective portable telemedicine kit for use in Developing countries , 2000 .

[41]  Ying Li,et al.  Enhancing Intrusion Detection System with proximity information , 2010, Int. J. Secur. Networks.

[42]  Fei Hu,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .

[43]  Riccardo Bettati,et al.  Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.

[44]  Lillykutty Jacob,et al.  Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks , 2008, Int. J. Secur. Networks.

[45]  Francesco Chiti,et al.  An integrated communications framework for context aware continuous monitoring with body sensor networks , 2009, IEEE Journal on Selected Areas in Communications.

[46]  Abdelmadjid Bouabdallah,et al.  TKS: a transition key management scheme for secure application level multicast , 2009, Int. J. Secur. Networks.

[47]  Xukai Zou,et al.  A novel Conference Key Management solution for Secure Dynamic Conferencing , 2008, Int. J. Secur. Networks.

[48]  David W. York,et al.  Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems , 2001 .

[49]  A. Tamilarasi,et al.  A backpressure technique for filtering spoofed traffic at upstream routers , 2010, Int. J. Secur. Networks.

[50]  Djamel Djenouri,et al.  Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks , 2009, Int. J. Secur. Networks.

[51]  Jianping Pan,et al.  Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.

[52]  Sukumar Nandi,et al.  Secure user-identification and key distribution scheme preserving anonymity , 2008, Int. J. Secur. Networks.

[53]  Daisuke Takahashi,et al.  Temperature-Aware Routing for Telemedicine Applications in Embedded Biomedical Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..

[54]  Sunil Kumar,et al.  QoS considerations in wireless sensor networks for telemedicine , 2003, SPIE ITCom.

[55]  R. Wells,et al.  Telemedicine: Explorations in the Use of Telecommunications in Health Care. , 1976 .

[56]  Xiaowen Zhang,et al.  Looking at a class of RFID APs through GNY logic , 2010, Int. J. Secur. Networks.

[57]  R T Turner,et al.  Invited review: what do we know about the effects of spaceflight on bone? , 2000, Journal of applied physiology.

[58]  Ding-Zhu Du,et al.  An one-way function based framework for pairwise key establishment in sensor networks , 2008, Int. J. Secur. Networks.

[59]  Guang Gong,et al.  Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[60]  Dijiang Huang Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[61]  Aleksandar Milenkovic,et al.  Journal of Neuroengineering and Rehabilitation Open Access a Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation , 2005 .

[62]  René Mayrhofer,et al.  Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2 , 2009 .

[63]  Jeffrey C. Bauer,et al.  Telemedicine and the reinvention of healthcare , 1999 .

[64]  Panayiotis Kotzanikolaou,et al.  Multilayer key establishment for large-scale sensor networks , 2008, Int. J. Secur. Networks.

[65]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[66]  Benjamin W. P. Ramsey,et al.  Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.

[67]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[68]  Eric Dishman,et al.  Inventing wellness systems for aging in place , 2004, Computer.

[69]  Li Bai,et al.  A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.

[70]  Krishna M. Sivalingam,et al.  An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.

[71]  Mark Gaynor,et al.  Human Computer Interaction in the Pre-Hospital Setting , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[72]  Tzong-Chen Wu,et al.  Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks , 2010, Int. J. Secur. Networks.

[73]  Kiseon Kim,et al.  Security assessments of IEEE 802.15.4 standard based on X.805 framework , 2010, Int. J. Secur. Networks.

[74]  Mukesh Singhal,et al.  An escrow-less identity-based group-key agreement protocol for dynamic peer groups , 2009, Int. J. Secur. Networks.

[75]  Richard Martin,et al.  Design for wearability , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).

[76]  Constantinos S. Pattichis,et al.  Multipurpose health care telemedicine system , 2001, 2001 Conference Proceedings of the 23rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[77]  Manmeet Mahinderjit Singh,et al.  Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.

[78]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[79]  Carmen C. Y. Poon,et al.  Cuff-less and Noninvasive Measurements of Arterial Blood Pressure by Pulse Transit Time , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[80]  Michaël Rusinowitch,et al.  Efficient decision tree for protocol analysis in intrusion detection , 2010, Int. J. Secur. Networks.

[81]  Sandeep K. S. Gupta,et al.  Energy-efficient protocols for wireless communication in biosensor networks , 2001, 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598).

[82]  Constantinos E. Goutis,et al.  Server side hashing core exceeding 3 Gbps of throughput , 2007, Int. J. Secur. Networks.

[83]  Martin Feldhofer,et al.  On the security of RFID devices against implementation attacks , 2010, Int. J. Secur. Networks.

[84]  Barry E. Mullins,et al.  Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.

[85]  Sven Laur,et al.  User-aided data authentication , 2009, Int. J. Secur. Networks.

[86]  Fei Hu,et al.  Towards a Secure, RFID / Sensor Based Telecardiology System , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[87]  Keith Mayes,et al.  An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing , 2010, Int. J. Secur. Networks.

[88]  Indrajit Ray,et al.  Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents , 2008, Int. J. Secur. Networks.

[89]  Liqun Chen,et al.  On security proof of McCullagh?Barreto's key agreement protocol and its variants , 2007, Int. J. Secur. Networks.

[90]  Yuan-Ting Zhang,et al.  Implementation of a WAP-based telemedicine system for patient monitoring , 2003, IEEE Transactions on Information Technology in Biomedicine.

[91]  Gregory D. Abowd,et al.  The Aware Home: A living laboratory for technologies for successful aging , 2002 .

[92]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[93]  M. W. Raad A ubiquitous mobile telemedicine system for the elderly using RFID , 2010, Int. J. Secur. Networks.

[94]  Ming-Hour Yang,et al.  Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.

[95]  Yuan-Ting Zhang,et al.  Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[96]  Marios S. Pattichis,et al.  Wireless telemedicine systems: an overview , 2002 .

[97]  Yi Pan,et al.  Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs , 2006, Int. J. Wirel. Mob. Comput..

[98]  N. Asokan,et al.  Standards for security associations in personal networks: a comparative analysis , 2009, Int. J. Secur. Networks.

[99]  Mostafa A. Bassiouni,et al.  Energy Efficient Thermal Aware Routing Algorithms for Embedded Biomedical Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[100]  Zhoujun Li,et al.  Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security , 2010, Int. J. Secur. Networks.

[101]  Susana Garrido Azevedo,et al.  Radio frequency identification: a case study of healthcare organisations , 2010, Int. J. Secur. Networks.

[102]  Huaxiong Wang,et al.  Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.

[103]  P. Bonato,et al.  Wearable sensors/systems and their impact on biomedical engineering , 2003, IEEE Engineering in Medicine and Biology Magazine.

[104]  Yang Xiao,et al.  Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.

[105]  Emil Jovanov,et al.  Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.

[106]  Haiping Xu,et al.  Formal modelling and analysis of XML firewall for service-oriented systems , 2008, Int. J. Secur. Networks.

[107]  Adel Bouhoula,et al.  Firewall filtering rules analysis for anomalies detection , 2008, Int. J. Secur. Networks.

[108]  Yang Xiao,et al.  Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access , 2004, IEEE Transactions on Parallel and Distributed Systems.

[109]  Masoud Salehi,et al.  Communication Systems Engineering , 1994 .

[110]  Qijun Gu,et al.  Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.

[111]  Matt Welsh,et al.  CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care , 2004 .

[112]  Sandeep K. S. Gupta,et al.  Towards a propagation model for wireless biomedical applications , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[113]  Sujeet Shenoi,et al.  Forensic analysis of SCADA systems and networks , 2008, Int. J. Secur. Networks.

[114]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[115]  H. Jonathan Chao,et al.  Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.

[116]  Chao Chen,et al.  On the scalability of Delay-Tolerant Botnets , 2010, Int. J. Secur. Networks.

[117]  Cynthia Furse,et al.  An implantable antenna for communication with implantable medical devices , 2000 .

[118]  Ricardo Dahab,et al.  On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.

[119]  Hong Gu,et al.  A review of telemedicine in China , 2009, Journal of telemedicine and telecare.

[120]  Yang Xiao,et al.  Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..

[121]  Yang Xiao,et al.  Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i , 2007 .

[122]  Yang Xiao,et al.  Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..

[123]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[124]  Hhs Office for Civil Rights Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.

[125]  P. Bonato,et al.  Data mining of motor patterns recorded with wearable technology , 2003, IEEE Engineering in Medicine and Biology Magazine.

[126]  Jelena Misic,et al.  On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[127]  Matt Welsh,et al.  Sensor networks for medical care , 2005, SenSys '05.

[128]  Taieb Znati,et al.  End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.

[129]  Raheem A. Beyah,et al.  Using link RTT to passively detect unapproved wireless nodes , 2009, Int. J. Secur. Networks.

[130]  Indrajit Ray,et al.  Origins: an approach to trace fast spreading worms to their roots , 2008, Int. J. Secur. Networks.

[131]  Robert F. Mills,et al.  Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees , 2010, Int. J. Secur. Networks.

[132]  Qi Hao,et al.  Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applications , 2009, IEEE Journal on Selected Areas in Communications.

[133]  Mark J. Rodrigues,et al.  Perceived barriers to the widespread commercial use of Radio Frequency Identification technology , 2010, Int. J. Secur. Networks.

[134]  Sandeep K. S. Gupta,et al.  Research challenges in wireless networks of biomedical sensors , 2001, MobiCom '01.

[135]  Jie Wu,et al.  Clique-based group key assignment in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[136]  Chao Chen,et al.  Deriving a closed-form expression for worm-scanning strategies , 2009, Int. J. Secur. Networks.

[137]  Pei Cao,et al.  Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM.

[138]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[139]  Fahim Sufi,et al.  Novel methods of faster cardiovascular diagnosis in wireless telecardiology , 2009, IEEE Journal on Selected Areas in Communications.

[140]  A. Dutta-Roy,et al.  Networks for homes , 1999 .

[141]  Yi-Bing Lin,et al.  NTP-DownloadT: a conformance test tool for secured mobile download services , 2008, Int. J. Secur. Networks.

[142]  Max E. Stachura,et al.  Delivering Diagnostic Quality Video over Mobile Wireless Networks for Telemedicine , 2009, International journal of telemedicine and applications.

[143]  Sylvie Perreau,et al.  Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.

[144]  Eyal de Lara,et al.  Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.

[145]  David S. Rosenbaum,et al.  Keeping a beat on the heart , 2004, IEEE Pervasive Computing.

[146]  Yacine Challal,et al.  Adaptive clustering for scalable key management in dynamic group communications , 2008, Int. J. Secur. Networks.

[147]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[148]  Georgios Kalogridis,et al.  Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.

[149]  Chuanyi Ji,et al.  Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.

[150]  Josef Hallberg,et al.  Wearable systems in nursing home care: prototyping experience , 2006, IEEE Pervasive Computing.

[151]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[152]  Fei Hu,et al.  Towards a realistic testbed for wireless network reliability and security performance studies , 2008, Int. J. Secur. Networks.

[153]  Thomas Magedanz,et al.  Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.

[154]  Claudio Soriente,et al.  Secure pairing of interface constrained devices , 2009, Int. J. Secur. Networks.

[155]  Bing Wu,et al.  Experimental analysis of application-level intrusion detection algorithms , 2010, Int. J. Secur. Networks.

[156]  Antonio F. Gómez-Skarmeta,et al.  An Ambient Assisted Living System for Telemedicine with Detection of Symptoms , 2009, IWINAC.

[157]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[158]  Robin Berthier,et al.  An evaluation of connection characteristics for separating network attacks , 2009, Int. J. Secur. Networks.

[159]  Hua Wang,et al.  Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .

[160]  Jie Wu,et al.  PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[161]  Bodo Möller,et al.  Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.

[162]  IstepanianR. S.H.,et al.  Guest Editorial Introduction to the Special Section on M-Health , 2004 .

[163]  William C. Mann,et al.  Enabling location-aware pervasive computing applications for the elderly , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[164]  L. Sun,et al.  Security and privacy on low-cost Radio Frequency Identification systems , 2010, Int. J. Secur. Networks.

[165]  Mark A. Shayman,et al.  On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.

[166]  E Krupinski,et al.  Efficiency analysis of a multi-specialty telemedicine service. , 1999, Telemedicine journal : the official journal of the American Telemedicine Association.

[167]  Matt Welsh,et al.  Ad-hoc multicast routing on resource-limited sensor nodes , 2006, REALMAN '06.

[168]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[169]  Daniel W. Jones,et al.  Seventh report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure. , 2003, Hypertension.

[170]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[171]  Claudio Soriente,et al.  Using audio in secure device pairing , 2009, Int. J. Secur. Networks.

[172]  J. Ruskin,et al.  Electrical alternans and vulnerability to ventricular arrhythmias. , 1994, The New England journal of medicine.

[173]  J. Bussmann,et al.  Quantification of physical activities by means of ambulatory accelerometry: a validation study. , 1998, Psychophysiology.

[174]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[175]  Pin-Han Ho,et al.  A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.

[176]  MATIHEW B. LAU GEOPAK : MONITORING CLIMBERS AND CLIMATE ON MOUNT EVEREST , 2006 .

[177]  Merryn J Mathie,et al.  Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement , 2004, Physiological measurement.

[178]  Nirwan Ansari,et al.  Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.

[179]  Yang Xiao,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..

[180]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[181]  Yang Xiao,et al.  Attacks and countermeasures in multi-hop Cognitive Radio Networks , 2009, Int. J. Secur. Networks.

[182]  Micah Sherr,et al.  On the (un)reliability of eavesdropping , 2008, Int. J. Secur. Networks.

[183]  Frances Storlie RAPID INTERPRETATION OF EKGs , 1975 .

[184]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[185]  Loren Schwiebert,et al.  A biomedical smart sensor for the visually impaired , 2002, Proceedings of IEEE Sensors.

[186]  Fagen Li,et al.  ID-based threshold proxy signcryption scheme from bilinear pairings , 2008, Int. J. Secur. Networks.

[187]  Shiuh-Pyng Shieh,et al.  Authentication and secret search mechanisms for RFID-aware wireless sensor networks , 2010, Int. J. Secur. Networks.

[188]  G. R. Schwartz,et al.  Principles and practice of emergency medicine , 1978 .

[189]  Deepa Kundur,et al.  Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.

[190]  Hongyi Wu,et al.  Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006, IEEE Transactions on Mobile Computing.