Enabling multiple health security threats detection using mobile edge computing

被引:20
|
作者
Al-Zinati, Mohammad [1 ]
Almasri, Taha [1 ]
Alsmirat, Mohammad [1 ]
Jararweh, Yaser [1 ]
机构
[1] Jordan Univ Sci & Technol, Sch Comp & Informat Technol, Irbid, Jordan
关键词
Mobile edge computing; Cloud computing; Biosurveillance systems; Edge cloud data management; Multi-Agent systems; SYNDROMIC SURVEILLANCE; BIOTERRORISM; FRAMEWORK; SYSTEMS; NOTIFICATION; NETWORK; MODEL; FOG;
D O I
10.1016/j.simpat.2019.101957
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The purposeful acts of bioterrorism and the emergence of new pathogens call for developing efficient biosurveillance systems that are capable of detecting health security threats and localizing their origins. For this sake, several biosurveillance systems have been developed and deployed in different regions around the world. The objectives of these systems are to efficiently detect threats and effectively manage responses. Although modern biosurveillance systems start to leverage recent advances in internet-of-things and communication technologies to detect natural biological outbreaks, it is not evident whether these systems can be generalized to detect threats related to purposeful biological attacks. As opposed to natural disease outbreaks, biological attacks can be triggered concurrently at different locations and in vital areas that are traversed by a large number of humans. In this paper, we propose an efficient framework to detect multiple concurrent threats and localize their origins based on real-time information and mobile-edge computing support. The proposed framework is organized into a hierarchical architecture. At the micro-level, monitored humans are equipped with wearable sensors that periodically capture the monitored human vital signs. To process the captured information efficiently, the monitored environment is partitioned into cells. Each cell is assigned a mobile-edge computing (MEC) component that is responsible for processing the monitoring information within its cell. The MEC components then send the processed information to a super component for final processing and to detect possible threats. The experimental results show that the proposed framework accurately detects multiple concurrent health security threats and localize their origins.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Mobile Cloud Computing: Security Threats
    Vikas, Solanke S.
    Gurudatt, Kulkarni A.
    Pawan, Katgaonkar
    Shyam, Gupta
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [2] Smart Health Monitoring for Seizure Detection using Mobile Edge Computing
    Ali, Zien Sheikh
    Subramanian, Nandhini
    Erbad, Aiman
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1903 - 1908
  • [3] Enabling Campus Edge Computing using GENI Racks and Mobile Resources
    Gosain, Abhimanyu
    Berman, Mark
    Brinn, Marshall
    Mitchell, Thomas
    Li, Chuan
    Wang, Yuehua
    Jin, Hai
    Hua, Jing
    Zhang, Hongwei
    2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016), 2016, : 41 - 50
  • [4] ENABLING EFFECTIVE MOBILE EDGE COMPUTING USING MILLIMETER WAVE LINKS
    Barbarossa, Sergio
    Ceci, Elena
    Merluzzi, Mattia
    Calvanese-Strinati, Emilio
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 367 - 372
  • [5] Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
    Roman, Rodrigo
    Lopez, Javier
    Mambo, Masahiro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 680 - 698
  • [6] Assessment of Different Security Issues, Threats with Their Detection and Prevention Security Models in Mobile Cloud Computing (MCC)
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 322 - 333
  • [7] Enabling Balanced Data Deduplication in Mobile Edge Computing
    Luo, Ruikun
    Jin, Hai
    He, Qiang
    Wu, Song
    Xia, Xiaoyu
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (05) : 1420 - 1431
  • [8] Enabling real-time road anomaly detection via mobile edge computing
    Zheng, Zengwei
    Zhou, Mingxuan
    Chen, Yuanyi
    Huo, Meimei
    Chen, Dan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [9] Security Threats in 5G Edge Computing Environments
    Kim, Youngsoo
    Park, Jong Geun
    Lee, Jong-Hoon
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 905 - 907
  • [10] Security threats and their countermeasures of mobile portable computing devices in ubiquitous computing environments
    Kim, SH
    Leem, CS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 79 - 85