Foreword |
|
xi | |
|
Preface |
|
xv | |
Acknowledgments |
|
xvii | |
|
|
1 | (8) |
|
|
2 | (2) |
|
1.2 Monitoring technologies |
|
|
4 | (3) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (17) |
|
|
10 | (6) |
|
|
10 | (1) |
|
|
11 | (1) |
|
2.1.3 Communication technology |
|
|
12 | (3) |
|
|
15 | (1) |
|
|
15 | (1) |
|
2.1.6 The physical environment |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (6) |
|
2.2.1 Physiological monitoring |
|
|
16 | (4) |
|
2.2.2 The infusion-pump control system |
|
|
20 | (2) |
|
2.3 Middleware for a BAN-based pervasive health-monitoring system |
|
|
22 | (3) |
|
|
25 | (1) |
|
3 BAN models and requirements |
|
|
26 | (10) |
|
3.1 Principal requirements |
|
|
27 | (3) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
3.2 The cyber-physical nature of BANs |
|
|
30 | (3) |
|
|
33 | (3) |
|
3.3.1 Medical-device regulation in the USA |
|
|
33 | (2) |
|
3.3.2 Medical-device regulation in the EU |
|
|
35 | (1) |
|
3.3.3 Medical-device regulation in Asia |
|
|
35 | (1) |
|
|
36 | (27) |
|
|
37 | (3) |
|
4.1.1 Perspectives of BAN safety |
|
|
37 | (2) |
|
4.1.2 Ensuring BAN safety |
|
|
39 | (1) |
|
4.2 Model-based engineering of BANs |
|
|
40 | (2) |
|
4.2.1 Safety-requirements analysis |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
4.3 Modeling cyber-physical systems |
|
|
42 | (2) |
|
4.4 Example: BAND-AiDe - BAN Design and Analysis Tool |
|
|
44 | (9) |
|
4.4.1 The BAND-AiDe modeling framework |
|
|
44 | (5) |
|
4.4.2 The BAND-AiDe analyzer |
|
|
49 | (1) |
|
|
50 | (3) |
|
4.5 Demonstrating design and analysis with BAND-AiDe |
|
|
53 | (7) |
|
4.5.1 Safety verification of a single wearable medical device |
|
|
56 | (2) |
|
4.5.2 Safety verification of a network of devices |
|
|
58 | (2) |
|
4.6 Formal models for BAN safety |
|
|
60 | (1) |
|
4.7 Future research problems |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (21) |
|
5.1 The need for information security in BANs |
|
|
64 | (1) |
|
5.2 Securing a BAN as a cyber-physical system |
|
|
65 | (3) |
|
5.2.1 Securing BAN components |
|
|
66 | (1) |
|
5.2.2 Challenges for CPS-Sec solutions |
|
|
66 | (1) |
|
5.2.3 CPS-Sec solutions for BANs |
|
|
67 | (1) |
|
5.3 Traditional security solutions for BANs |
|
|
68 | (2) |
|
5.3.1 Application of traditional approaches to key distribution |
|
|
68 | (2) |
|
5.4 Physiological-signal-based key agreement (PSKA) |
|
|
70 | (12) |
|
5.4.1 Physiological signals: issues and properties |
|
|
71 | (2) |
|
5.4.2 PSKA protocol execution |
|
|
73 | (3) |
|
|
76 | (2) |
|
5.4.4 PSKA prototype implementation |
|
|
78 | (4) |
|
5.5 Summary and future research problems |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (20) |
|
6.1 The energy perspective |
|
|
84 | (3) |
|
|
85 | (1) |
|
6.1.2 Reducing the energy requirement |
|
|
86 | (1) |
|
6.1.3 Scavenging energy from different sources |
|
|
87 | (1) |
|
6.2 The equipment-recycling perspective |
|
|
87 | (1) |
|
6.3 Ensuring sustainability |
|
|
87 | (2) |
|
6.4 Sustainable BAN software-design methodology |
|
|
89 | (3) |
|
|
90 | (1) |
|
|
91 | (1) |
|
6.4.3 The management plane |
|
|
92 | (1) |
|
|
92 | (1) |
|
6.6 Architectural modeling |
|
|
93 | (2) |
|
6.7 Analysis and design for sustainability |
|
|
95 | (7) |
|
6.7.1 Sustainability analysis |
|
|
98 | (2) |
|
|
100 | (2) |
|
6.8 Future research problems |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (15) |
|
|
104 | (3) |
|
7.1.1 The computation model of a sensor node |
|
|
105 | (1) |
|
7.1.2 The computation model of a base station |
|
|
106 | (1) |
|
7.2 Programming paradigms |
|
|
107 | (1) |
|
7.2.1 Programming a sensor |
|
|
107 | (1) |
|
7.2.2 Programming a base station |
|
|
108 | (1) |
|
7.3 Common implementation issues |
|
|
108 | (5) |
|
7.3.1 Avoid floating-point operations |
|
|
109 | (2) |
|
7.3.2 Variable reuse and concurrency conflicts |
|
|
111 | (1) |
|
|
112 | (1) |
|
7.3.4 Distinction between tasks and event handlers |
|
|
112 | (1) |
|
7.3.5 Real-time considerations |
|
|
112 | (1) |
|
7.3.6 Debugging strategies |
|
|
113 | (1) |
|
7.4 Diverse sensor platforms |
|
|
113 | (1) |
|
7.5 Choosing the best platform |
|
|
114 | (1) |
|
7.6 Automatic code generation |
|
|
115 | (2) |
|
|
117 | (1) |
|
|
117 | (2) |
|
|
119 | (2) |
Glossary |
|
121 | (6) |
Appendix: Publication venues, academic research groups, and funding agencies |
|
127 | (1) |
References |
|
128 | (10) |
Index |
|
138 | |