A secure Ambient Assisted Living (AAL) environment: An implementation view

T Subjects such as knowledge engineering, pervasive computing, unified communication, ubiquitous sensing and actuation and situation awareness are gaining the most critical and crucial attention from information technology (IT) professionals and pundits across the globe these days in order to accomplish the vision of ambient intelligence (AmI). It is all about effective and round-the-clock gleaning of data and information from different and distributed sources. Secondly whatever is gathered, transmitted, and stocked are being subjected to a cornucopia of tasks such as processing, mining, clustering, classification, and analysis for the real-time and elegant extraction of hidden actionable insights. Based on the knowledge extracted and the needs identified, the final tasks is decide and initiate the next course of actions in time. Not only information, interaction and transaction, but also physical services can be conceived, constructed and supplied to human users with the stability and maturity AmI technologies and instrumented, interconnected, and intelligent devices. This paper gives the detailed description of an AmI application which can provide impenetrable and unbreakable security, convenience, care and comfort for the needy. Our focus here is to develop a secure and safety-critical Ambient Assisted Living (AAL) environment which can monitor the patient's situation and give timely updates. In order to fulfill all these needs, a smart environment has been created to effectively and insightfully control patients' needs. The middleware standard preferred for the development and deployment a bevy of ambient and articulate services is Open Service Gateway Initiative (OSGi).

[1]  Venkatesh Veeramuthu,et al.  Healthcare Data Fusion and Presentation using Service- Oriented Architecture (SOA) Orchestration Mechanism , 2011 .

[2]  Ulises Cortés,et al.  Intelligent Healthcare Managing: An Assistive Technology Approach , 2007, IWANN.

[3]  He Jian,et al.  Modeling the Ambient Intelligence Application System: Concept, Software, Data, and Network , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[4]  Antonio Brogi,et al.  Towards Secure Middleware for Embedded Peer-to-Peer Systems : Objectives & Requirements , 2007 .

[5]  Li Xiao,et al.  Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[6]  Feng Zhou,et al.  A Case-Driven Ambient Intelligence System for Elderly in-Home Assistance Applications , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[7]  Alejandro Fernández-Montes,et al.  A Home E-Health System for Dependent People Based on OSGI , 2009, Intelligent Technical Systems.

[8]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[9]  Eric Campo,et al.  A review of smart homes - Present state and future challenges , 2008, Comput. Methods Programs Biomed..

[10]  Venkatesh Veeramuthu,et al.  A Pragmatic Note on Knopflerfish-based Ambient Assisted Living (AAI) Systems Engineering , 2011 .

[11]  Juan Carlos Augusto,et al.  Ambient Intelligence: The Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence , 2007 .

[12]  Antonio Maña,et al.  A Solution Based on Cryptographic Hardware to Protect Agents , 2010, 2010 13th International Conference on Network-Based Information Systems.

[13]  Timothy J. Andersen,et al.  Leveraging Maven 2 for Agility , 2009, 2009 Agile Conference.

[14]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[15]  Dennis Pfisterer,et al.  Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.

[16]  Juan Carlos Augusto,et al.  Ambient Intelligence and Smart Environments: A State of the Art , 2010, Handbook of Ambient Intelligence and Smart Environments.

[17]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .