Skip to main content
Top
Published in: Wireless Personal Communications 3/2019

17-12-2018

Context Aware Trust Management Scheme for Pervasive Healthcare

Authors: N. Karthik, V. S. Ananthanarayana

Published in: Wireless Personal Communications | Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Medical sensor nodes are used in pervasive healthcare applications like remote patient monitoring, elderly care to collect patients vital signs for identifying medical emergency. These resource restricted sensor nodes are prone to various malicious attacks, data faults and data losses. Presence of faulty data, data loss in collected patient data may lead to incorrect analysis of patient condition, which decreases the reliability of pervasive healthcare system. The aim of this work is to alert the caregiver and raise the alarm only when the patient enters into medical emergency situation. The proposed scheme also reduces the false alarms and alerts caused by data fault and misbehaving sensor nodes. To achieve this, we introduce a context aware trust management scheme for data fault detection, data reconstruction and event detection in pervasive healthcare systems. It employs heuristic functions, data correlation and contextual information based algorithms to identify the data faults and events. It also reconstructs the data faults and data loss for identifying patient condition. Performance of this approach is evaluated with the help of real data samples collected by medical sensor network prototype of remote patient monitoring application. The experimental results show that the proposed trust scheme outperforms state-of-the-art techniques and achieves good detection accuracy in data fault detection and event detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.MathSciNetCrossRef He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.MathSciNetCrossRef
2.
go back to reference Yu, H., Shen, Z., & Leung, C. (2010). Towards trust-aware health monitoring body area sensor networks. International Journal of Information Technology, 16(2), 1–20. Yu, H., Shen, Z., & Leung, C. (2010). Towards trust-aware health monitoring body area sensor networks. International Journal of Information Technology, 16(2), 1–20.
3.
go back to reference Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.CrossRef Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.CrossRef
4.
go back to reference Gao, Y., & Liu, W. (2015). A security routing model based on trust for medical sensor networks. In 2015 IEEE international conference on communication software and networks (ICCSN). IEEE. Gao, Y., & Liu, W. (2015). A security routing model based on trust for medical sensor networks. In 2015 IEEE international conference on communication software and networks (ICCSN). IEEE.
5.
go back to reference Dondio, P., Manzo, E., & Barrett, S. (2007). Applied computational trust in utilities management: A case study on the town council of Cava deTirreni. In IFIP international conference on trust management. Boston, MA: Springer. Dondio, P., Manzo, E., & Barrett, S. (2007). Applied computational trust in utilities management: A case study on the town council of Cava deTirreni. In IFIP international conference on trust management. Boston, MA: Springer.
6.
go back to reference Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.CrossRef Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.CrossRef
7.
go back to reference Gwadera, R., Riahi, M., & Aberer, K. (2014). Pattern-wise trust assessment of sensor data. In 2014 IEEE 15th international conference on mobile data management (MDM) (Vol. 1). IEEE. Gwadera, R., Riahi, M., & Aberer, K. (2014). Pattern-wise trust assessment of sensor data. In 2014 IEEE 15th international conference on mobile data management (MDM) (Vol. 1). IEEE.
8.
go back to reference Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137–5170.CrossRef Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(4), 5137–5170.CrossRef
9.
go back to reference Karthik, N., & Ananthanarayana, V. S. (2016). Data trustworthiness in wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/I SPA. IEEE Karthik, N., & Ananthanarayana, V. S. (2016). Data trustworthiness in wireless sensor networks. In 2016 IEEE Trustcom/BigDataSE/I SPA. IEEE
10.
go back to reference Karthik, N., Ananthanarayana, V. S. (2017). Data trust model for event detection in wireless sensor networks using data correlation techniques. In 2017 fourth international conference on signal processing, communication and networking (ICSCN) . IEEE. Karthik, N., Ananthanarayana, V. S. (2017). Data trust model for event detection in wireless sensor networks using data correlation techniques. In 2017 fourth international conference on signal processing, communication and networking (ICSCN) . IEEE.
11.
go back to reference Han, G., et al. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80.3, 602–617.CrossRefMATH Han, G., et al. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80.3, 602–617.CrossRefMATH
12.
go back to reference Gilbert, E. P. K., et al. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.CrossRef Gilbert, E. P. K., et al. (2018). Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks. Computers & Electrical Engineering, 72, 894–909.CrossRef
13.
go back to reference Chen, H., et al. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage, NAS’08, 2008. IEEE. Chen, H., et al. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage, NAS’08, 2008. IEEE.
14.
go back to reference Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in event detection wireless sensor networks. IEEE Transactions on Network and Service Management, 12(3), 496–510.CrossRef Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in event detection wireless sensor networks. IEEE Transactions on Network and Service Management, 12(3), 496–510.CrossRef
15.
go back to reference Salem, O., et al. (2013). Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In 2013 IEEE international conference on communications (ICC). IEEE. Salem, O., et al. (2013). Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In 2013 IEEE international conference on communications (ICC). IEEE.
16.
go back to reference Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.CrossRef Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.CrossRef
17.
go back to reference Zhang, L., Wu, X., & Luo, D. (2015). Improving activity recognition with context information. In 2015 IEEE international conference on mechatronics and automation (ICMA). IEEE. Zhang, L., Wu, X., & Luo, D. (2015). Improving activity recognition with context information. In 2015 IEEE international conference on mechatronics and automation (ICMA). IEEE.
18.
go back to reference Mannini, A., et al. (2013). Activity recognition using a single accelerometer placed at the wrist or ankle. Medicine and Science in Sports and Exercise, 45(11), 2193.CrossRef Mannini, A., et al. (2013). Activity recognition using a single accelerometer placed at the wrist or ankle. Medicine and Science in Sports and Exercise, 45(11), 2193.CrossRef
19.
go back to reference Guestrin, C., Bodik, P., Thibaux, R., Paskin, M., & Madden, S. (2004). Distributed regression: An efficient framework for modeling sensor network data. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 1–10). IEEE. Guestrin, C., Bodik, P., Thibaux, R., Paskin, M., & Madden, S. (2004). Distributed regression: An efficient framework for modeling sensor network data. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 1–10). IEEE.
20.
go back to reference Zhang, H., et al. (2016). A data reconstruction model addressing loss and faults in medical body sensor networks. In Global communications conference (GLOBECOM), 2016 IEEE. IEEE. Zhang, H., et al. (2016). A data reconstruction model addressing loss and faults in medical body sensor networks. In Global communications conference (GLOBECOM), 2016 IEEE. IEEE.
21.
go back to reference Sharma, A. B., Golubchik, L., & Govindan, R. (2010). Sensor faults: Detection methods and prevalence in real-world datasets. ACM Transactions on Sensor Networks (TOSN), 6(3), 23.CrossRef Sharma, A. B., Golubchik, L., & Govindan, R. (2010). Sensor faults: Detection methods and prevalence in real-world datasets. ACM Transactions on Sensor Networks (TOSN), 6(3), 23.CrossRef
23.
go back to reference Tolle, G., Polastre, J., Szewczyk, R., Culler, D., Turner, N., Tu, K., & Hong, W. (2005). A macroscope in the redwoods. In Proceedings of the 3rd international conference on embedded networked sensor systems (pp. 51–63). ACM Tolle, G., Polastre, J., Szewczyk, R., Culler, D., Turner, N., Tu, K., & Hong, W. (2005). A macroscope in the redwoods. In Proceedings of the 3rd international conference on embedded networked sensor systems (pp. 51–63). ACM
24.
go back to reference Li, W., & Zhu, X. (2014). Recommendation-based trust management in body area networks for mobile healthcare. In 2014 IEEE 11th international conference on mobile ad hoc and sensor systems (MASS). IEEE. Li, W., & Zhu, X. (2014). Recommendation-based trust management in body area networks for mobile healthcare. In 2014 IEEE 11th international conference on mobile ad hoc and sensor systems (MASS). IEEE.
25.
go back to reference Bui, V. T. (2011). A trust management model for body sensor networks. In 2011 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM). IEEE. Bui, V. T. (2011). A trust management model for body sensor networks. In 2011 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM). IEEE.
26.
go back to reference Chitra, A., & Kanagachidambaresan, G. R. (2018). Fault aware trust determination algorithm for wireless body sensor network (WBSN). In Proceedings of first international conference on smart system, innovations and computing. Singapore: Springer. Chitra, A., & Kanagachidambaresan, G. R. (2018). Fault aware trust determination algorithm for wireless body sensor network (WBSN). In Proceedings of first international conference on smart system, innovations and computing. Singapore: Springer.
27.
go back to reference Kanagachidambaresan, G. R. (2018). Trustworthy architecture for wireless body sensor network. In Information Resources Management Association. Wearable technologies: Concepts, methodologies, tools, and applications (pp. 333–362). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-5225-5484-4. Kanagachidambaresan, G. R. (2018). Trustworthy architecture for wireless body sensor network. In Information Resources Management Association. Wearable technologies: Concepts, methodologies, tools, and applications (pp. 333–362). Hershey, PA: IGI Global. https://​doi.​org/​10.​4018/​978-1-5225-5484-4.
29.
go back to reference Wu, G. W., Liu, Z. S., & Pirozmand, P. (2014). A fuzzy trust model for public key distribution in body area networks. In Advanced materials research (Vol. 989, pp. 4837–4840). Trans Tech Publications. Wu, G. W., Liu, Z. S., & Pirozmand, P. (2014). A fuzzy trust model for public key distribution in body area networks. In Advanced materials research (Vol. 989, pp. 4837–4840). Trans Tech Publications.
30.
go back to reference Bui, V., et al. (2013). A trust evaluation framework for sensor readings in body area sensor networks. In Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). Bui, V., et al. (2013). A trust evaluation framework for sensor readings in body area sensor networks. In Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
31.
go back to reference Bui, V. T., Lukkien, J. J., Verhoeven, R. (2011). Toward a trust management model for a configurable body sensor platform. In Proceedings of the 6th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). Bui, V. T., Lukkien, J. J., Verhoeven, R. (2011). Toward a trust management model for a configurable body sensor platform. In Proceedings of the 6th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
32.
go back to reference Ye, J., Stevenson, G., & Dobson, S. (2016). Detecting abnormal events on binary sensors in smart home environments. Pervasive and Mobile Computing, 33, 32–49.CrossRef Ye, J., Stevenson, G., & Dobson, S. (2016). Detecting abnormal events on binary sensors in smart home environments. Pervasive and Mobile Computing, 33, 32–49.CrossRef
33.
go back to reference Paschalidis, I. C., & Chen, Y. (2010). Statistical anomaly detection with sensor networks. ACM Transactions on Sensor Networks, 7(2), 17.CrossRef Paschalidis, I. C., & Chen, Y. (2010). Statistical anomaly detection with sensor networks. ACM Transactions on Sensor Networks, 7(2), 17.CrossRef
34.
go back to reference Dereszynski, E. W., & Dietterich, T. G. (2011). Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns. ACM Transactions on Sensor Networks, 8(1), 3:1–3:36.CrossRef Dereszynski, E. W., & Dietterich, T. G. (2011). Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns. ACM Transactions on Sensor Networks, 8(1), 3:1–3:36.CrossRef
35.
go back to reference Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.CrossRef Salem, O., Liu, Y., & Mehaoua, A. (2013). Anomaly detection in medical wireless sensor networks. JCSE, 7(4), 272–284.CrossRef
36.
go back to reference Salem, O., et al. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE Journal of Biomedical and Health Informatics, 18(5), 1541–1551.CrossRef Salem, O., et al. (2014). Online anomaly detection in wireless body area networks for reliable healthcare monitoring. IEEE Journal of Biomedical and Health Informatics, 18(5), 1541–1551.CrossRef
37.
go back to reference Cover, T., & Hart, P. (1967). Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT, 13(1), 21–27.CrossRefMATH Cover, T., & Hart, P. (1967). Nearest neighbor pattern classification. IEEE Transactions on Information Theory, IT, 13(1), 21–27.CrossRefMATH
38.
go back to reference Rajasegarar, S., Leckie, C., Palaniswami, M., & Bezdek, J. C. (2006). Distributed anomaly detection in wireless sensor networks. In Proceedings of IEEE ICCS. Rajasegarar, S., Leckie, C., Palaniswami, M., & Bezdek, J. C. (2006). Distributed anomaly detection in wireless sensor networks. In Proceedings of IEEE ICCS.
39.
go back to reference Kong, L., Xia, M., Liu, X.-Y., Wu, M.-Y., & Liu, X. (2013). Data loss and reconstruction in sensor networks. INFOCOM, 13, 1654–1662. Kong, L., Xia, M., Liu, X.-Y., Wu, M.-Y., & Liu, X. (2013). Data loss and reconstruction in sensor networks. INFOCOM, 13, 1654–1662.
40.
go back to reference Nasridinov, A., et al. (2014). Event detection in wireless sensor networks: Survey and challenges. Mobile, ubiquitous, and intelligent computing (pp. 585–590). Berlin: Springer. Nasridinov, A., et al. (2014). Event detection in wireless sensor networks: Survey and challenges. Mobile, ubiquitous, and intelligent computing (pp. 585–590). Berlin: Springer.
41.
go back to reference Wittenburg, G., Dziengel, N., Adler, S., Kasmi, Z., Ziegert, M., & Schiller, J. (2012). Cooperative event detection in wireless sensor networks. IEEE Communications Magazine, 50(12), 124–131.CrossRef Wittenburg, G., Dziengel, N., Adler, S., Kasmi, Z., Ziegert, M., & Schiller, J. (2012). Cooperative event detection in wireless sensor networks. IEEE Communications Magazine, 50(12), 124–131.CrossRef
42.
go back to reference Duarte, M. F., & Hu, Y. H. (2004). Vehicle classification in distributed sensor networks. Journal of Parallel and Distributed Computing, 64(7), 826–838.CrossRef Duarte, M. F., & Hu, Y. H. (2004). Vehicle classification in distributed sensor networks. Journal of Parallel and Distributed Computing, 64(7), 826–838.CrossRef
43.
go back to reference Ghasemzadeh, H., Loseu, V., & Jafari, R. (2010). Collaborative signal processing for action recognition in body sensor networks: A distributed classification algorithm using motion transcripts. In Proceedings of the ninth ACM/IEEE international conference on information processing in sensor networks (IPSN 10), Stockholm, Sweden. Ghasemzadeh, H., Loseu, V., & Jafari, R. (2010). Collaborative signal processing for action recognition in body sensor networks: A distributed classification algorithm using motion transcripts. In Proceedings of the ninth ACM/IEEE international conference on information processing in sensor networks (IPSN 10), Stockholm, Sweden.
44.
go back to reference Walchli, M., Skoczylas, P., Meer, M., & Braun, T. (2007). Distributed event localization and tracking with wireless sensors. In Proceedings of the fifth international conference on wired/wireless internet communications (WWIC 07), Coimbra, Portugal. Walchli, M., Skoczylas, P., Meer, M., & Braun, T. (2007). Distributed event localization and tracking with wireless sensors. In Proceedings of the fifth international conference on wired/wireless internet communications (WWIC 07), Coimbra, Portugal.
45.
go back to reference Haron, N., Jaafar, J., Aziz, I. A., Hassan, M. H., & Shapiai, M. I. (2017). Data trustworthiness in internet of things: A taxonomy and future directions. In 2017 IEEE conference on big data and analytics (ICBDA) (pp. 25–30). Kuching. Haron, N., Jaafar, J., Aziz, I. A., Hassan, M. H., & Shapiai, M. I. (2017). Data trustworthiness in internet of things: A taxonomy and future directions. In 2017 IEEE conference on big data and analytics (ICBDA) (pp. 25–30). Kuching.
46.
go back to reference Jadidoleslamy, H., Aref, M. R., & Bahramgiri, H. (2016). A fuzzy fully distributed trust management system in wireless sensor networks. AEU-International Journal of Electronics and Communications, 70(1), 40–49.CrossRef Jadidoleslamy, H., Aref, M. R., & Bahramgiri, H. (2016). A fuzzy fully distributed trust management system in wireless sensor networks. AEU-International Journal of Electronics and Communications, 70(1), 40–49.CrossRef
47.
go back to reference Attal, F., et al. (2015). Physical human activity recognition using wearable sensors. Sensors, 15(12), 31314–31338.CrossRef Attal, F., et al. (2015). Physical human activity recognition using wearable sensors. Sensors, 15(12), 31314–31338.CrossRef
48.
go back to reference Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of third IEEE international conference on mobile ad-hoc and sensor systems (MASS 06) (pp. 437–446). Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of third IEEE international conference on mobile ad-hoc and sensor systems (MASS 06) (pp. 437–446).
49.
go back to reference Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. M. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.CrossRef Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. M. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.CrossRef
50.
go back to reference Cho, J.-H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRef Cho, J.-H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRef
51.
go back to reference Yu, T., et al. (2015). Temporal and spatial correlation based distributed fault detection in wireless sensor networks. In 2015 IEEE 28th Canadian conference on electrical and computer engineering (CCECE). IEEE. Yu, T., et al. (2015). Temporal and spatial correlation based distributed fault detection in wireless sensor networks. In 2015 IEEE 28th Canadian conference on electrical and computer engineering (CCECE). IEEE.
52.
go back to reference Karthik, N., & Sarma Dhulipala, V. R. (2011). Trust calculation in wireless sensor networks. In 2011 3rd international conference on electronics computer technology (ICECT) (Vol. 4). IEEE. Karthik, N., & Sarma Dhulipala, V. R. (2011). Trust calculation in wireless sensor networks. In 2011 3rd international conference on electronics computer technology (ICECT) (Vol. 4). IEEE.
53.
go back to reference Li, Z., Zhu, Y., Zhu, H., & Li, M. (2011). Compressive sensing approach to urban traffic sensing. In Proceedings of IEEE ICDCS, Minneapolis, MN, USA. Li, Z., Zhu, Y., Zhu, H., & Li, M. (2011). Compressive sensing approach to urban traffic sensing. In Proceedings of IEEE ICDCS, Minneapolis, MN, USA.
54.
go back to reference Zhu, H., Zhu, Y., Li, M., & Ni, L. (2009). Seer: Metropolitan-scale traffic perception based on lossy sensory data. In Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil. Zhu, H., Zhu, Y., Li, M., & Ni, L. (2009). Seer: Metropolitan-scale traffic perception based on lossy sensory data. In Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil.
55.
go back to reference Kong, L., et al. (2014). Data loss and reconstruction in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2818–2828.CrossRef Kong, L., et al. (2014). Data loss and reconstruction in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(11), 2818–2828.CrossRef
56.
go back to reference Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1228–1237.CrossRef Jiang, J., Han, G., Wang, F., Shu, L., & Guizani, M. (2015). An efficient distributed trust model for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1228–1237.CrossRef
57.
go back to reference Ni, K., et al. (2009). Sensor network data fault types. ACM Transactions on Sensor Networks (TOSN), 5(3), 25.CrossRef Ni, K., et al. (2009). Sensor network data fault types. ACM Transactions on Sensor Networks (TOSN), 5(3), 25.CrossRef
58.
go back to reference Kelly, G. (2006). Body temperature variability (part 1): A review of the history of body temperature and its variability due to site selection, biological rhythms, fitness, and aging. Alternative Medicine Review, 11(4), 278. Kelly, G. (2006). Body temperature variability (part 1): A review of the history of body temperature and its variability due to site selection, biological rhythms, fitness, and aging. Alternative Medicine Review, 11(4), 278.
59.
go back to reference Berger, A., et al. (2016). Exercise systolic blood pressure variability is associated with increased risk for new-onset hypertension among normotensive adults. Journal of the American Society of Hypertension, 10(6), 527–535.CrossRef Berger, A., et al. (2016). Exercise systolic blood pressure variability is associated with increased risk for new-onset hypertension among normotensive adults. Journal of the American Society of Hypertension, 10(6), 527–535.CrossRef
60.
go back to reference Sunita, A. S. M., et al. (2013). Heart rate and blood pressure response to exercise and recovery in subclinical hypothyroid patients. International Journal of Applied and Basic Medical Research, 3(2), 106.CrossRef Sunita, A. S. M., et al. (2013). Heart rate and blood pressure response to exercise and recovery in subclinical hypothyroid patients. International Journal of Applied and Basic Medical Research, 3(2), 106.CrossRef
61.
go back to reference Schnbrodt, F. D., & Perugini, M. (2013). At what sample size do correlations stabilize? Journal of Research in Personality, 47(5), 609–612.CrossRef Schnbrodt, F. D., & Perugini, M. (2013). At what sample size do correlations stabilize? Journal of Research in Personality, 47(5), 609–612.CrossRef
62.
go back to reference Oh, D.-J., Hong, H.-O., & Lee, B.-A. (2016). The effects of strenuous exercises on resting heart rate, blood pressure, and maximal oxygen uptake. Journal of Exercise Rehabilitation, 12(1), 42.CrossRef Oh, D.-J., Hong, H.-O., & Lee, B.-A. (2016). The effects of strenuous exercises on resting heart rate, blood pressure, and maximal oxygen uptake. Journal of Exercise Rehabilitation, 12(1), 42.CrossRef
63.
go back to reference Ravichandran, J., & Arulappan, A. I. (2013). Data validation algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 9(12), 634278.CrossRef Ravichandran, J., & Arulappan, A. I. (2013). Data validation algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 9(12), 634278.CrossRef
64.
go back to reference Burton, D. A., Stokes, K., & Hall, G. M. (2004). Physiological effects of exercise. Continuing Education in Anaesthesia Critical Care & Pain, 4(6), 185–188.CrossRef Burton, D. A., Stokes, K., & Hall, G. M. (2004). Physiological effects of exercise. Continuing Education in Anaesthesia Critical Care & Pain, 4(6), 185–188.CrossRef
65.
go back to reference Karthik, N., & Ananthanarayana, V. S. (2017). Sensor data modeling for data trustworthiness. In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE. Karthik, N., & Ananthanarayana, V. S. (2017). Sensor data modeling for data trustworthiness. In 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE.
66.
go back to reference Zhang, Y., Cheng, H., Chen, D. (2016). Data reconstruction with spatial and temporal correlation in wireless sensor networks. In Proceedings of the 3rd ACM workshop on mobile sensing, computing and communication. ACM. Zhang, Y., Cheng, H., Chen, D. (2016). Data reconstruction with spatial and temporal correlation in wireless sensor networks. In Proceedings of the 3rd ACM workshop on mobile sensing, computing and communication. ACM.
67.
go back to reference Zhang, H., Liu, J., & Pang, A.-C. (2018). A Bayesian network model for data losses and faults in medical body sensor networks. Computer Networks, 143, 166–175.CrossRef Zhang, H., Liu, J., & Pang, A.-C. (2018). A Bayesian network model for data losses and faults in medical body sensor networks. Computer Networks, 143, 166–175.CrossRef
68.
go back to reference Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in wireless sensor networks: A survey. ACM Computing Surveys (CSUR), 48(2), 24.CrossRef Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in wireless sensor networks: A survey. ACM Computing Surveys (CSUR), 48(2), 24.CrossRef
Metadata
Title
Context Aware Trust Management Scheme for Pervasive Healthcare
Authors
N. Karthik
V. S. Ananthanarayana
Publication date
17-12-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6091-9

Other articles of this Issue 3/2019

Wireless Personal Communications 3/2019 Go to the issue