Skip to main content
Journal of Cardiovascular and Thoracic Research logoLink to Journal of Cardiovascular and Thoracic Research
. 2013 Oct 5;5(3):119–124. doi: 10.5681/jcvtr.2013.025

Home and Clinical Cardiovascular Care Center (H4C): a Framework for Integrating Body Sensor Networks and QTRU Cryptography System

Ali Zakerolhosseini 1, Massoud Sokouti 1,*, Massoud Pezeshkian 2
PMCID: PMC3825399  PMID: 24252988

Abstract

Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.

Keywords: QTRU Cryptography, Body Sensor Network, Personal Digital Access, Heart Attack, Wireless Networks

Introduction

Recent reports show that coronary artery disease (CAD) risk factors have been increased among Iranian people.1 Moreover, cardiovascular diseases are one of the important results of these risk factors which lead to high rate of mortality and disability according to WHO reports on worldwide people.2- 4 Both the Heart rhythmic disorders and the arrhythmia are popular alarm signs in patients who are suffering from heart disease. Although, ECG (Electrocardiogram) can detect myocardial infarctions, however exercising and Holter monitoring tests are more accurate for medical diagnosing than a simple experimental diagnosis. Analysis of ECG with or without exercising tests is being done by a medical doctor and there are challenges over these clinical cases.5

These days, Wireless Sensor Network (WSN) system is being used for cardiac monitoring which transfers ECG signals to Personal Digital Assistant (PDA) by using a cellular network. As a result, the combination of WSN and computer electronic infrastructures can assist the healthcare monitoring era efficiently.6- 9

Some examples of WSN hardware designs are as follows: (i) Berkeley’s Mica2, (ii) ETH’s (iii) BTNodes, (iv) Intel’s iMote, (v) UCC’s DSYS25, (vi) SmartITs, and (vii) MITes.9- 12 The Body Sensor Network (BSN) is a hardware platform that it uses a wide range of bandwidth because of using the IEEE 802.15.4 standard. In the design of this platform, a lot of sensors are used to detect signals easily; the most of them are those which can detect Physiologic signals whereas stress and nervous tensions signals are omitted from the main signals.13

The security of data among medical doctor, patient, and ICU is an important issue which should be well addressed in the implementation of this system. The cryptographic algorithms such as RSA (i.e., stands for Ron Rivest, Adi Shamir and Leonard Adleman) and ECC (i.e. Elliptic Curve Cryptography) have a great security for transferring data through an unsecured channel but they are slow in encrypting and decrypting processes. The NTRU encryption system has a hard and unbreakable core which is standardized by IEEE with the most acceptable cryptography algorithm and because of its high speed and promising security, it can be implemented in WSNs. The most advantage of NTRU system over RSA and ECC is based on its lattice-based architecture which has the complexity of O(n2). This means it is the cheapest, fastest and the most effective cipher algorithm.14,15

In this article, we present a combination of Quaternion algebra with NTRU in WSN for healthcare and cardiovascular disease in order to increase the security of data transferred in WSNs environments. The new system is known as QTRU with the ability of parallel processing and encrypting four vectors at the same time. The complexity orders of encrypting and decrypting in QTRU system is O(4n2) and the dimension of lattice matrix which is needed to attack this cipher is 8N×8N. Having the high speed property in encrypting and decrypting is an advantage of QTRU over NTRU with degree of four, at the same security level. Also, we represent algorithms for energy optimization between WSN nodes and for reducing hops between modes in order to reduce the possible distance rate between WSN nodes.

NTRU

The first version of NTRU cipher algorithm was proposed by Silverman et al. in 1998.14 This system is based on lattice using Multi sentences ring complexity which uses matrices. It uses Shortest Vector Problem (SVP) to reduce its lattices. The basis of NTRU is the ring of Z[x]/(xN-1) and is described by the complexity of the ring, while N is a primitive number. In these rings, complexity order of adding operation is O(n) and the complexity order of multiplying is O(n2).16 Using this ring in the NTRU structure provides high speed and efficiency. According to16,17, we define three following rings: R= Z[x]/(xN-1), Rp=Z/Zp[x]/xN-1, Rq=Z/Zq[x]/xN-1.

Key Generation

Let df, dg, d and dm be constant integer numbers less than N which are known as public parameters, N is a prime number, p and q are two co-prime numbers which are relatively prime and q is a number more greater than p. To create an NTRU key, at first two small polynomials g and f are generated randomly. The polynomial f must be invertible in Rpand Rq. The inverse of f over Rpand Rq are computed using the extended Euclidian algorithm. The two inverses are denoted by fp1 and fp1, respectively. Hence, we have fp1*f1(modp),fq1*f1(modq). While f,g,fp1,fq1 are kept private, the public key h is computed based on formula (1):

h=fq1*g(modq) (1)

Encrypting process: By considering ϕ as ephemeral key and converting the input message to a polynomial m, the cipher text is computed as below [i.e., formula (2)]:

e=p.h*φ+m(modq) (2)

In this step, the number of total multiplications is N2 where that of additions is N mod q.

Decrypting process: After receiving polynomiale, the encrypted message can be decrypted by using the private key f and the formula (3) is used for this calculation:

f*e(modq)=f*(p.h*φ+m)(modq)=p.f*h*φ+f*m(modq)=p.f*fq1*g*φ+f*m(modq)=p.q*φ+f*m(modq) (3)

QTRU

The QTRU cipher system18 uses the Quaternion algebra, so a little information about this algebra is needed to be described. The real quaternion, denoted by H is a vector space of dimension 4 over R.

The two lattice spaces denoted by Lp, Lq are being described in quaternion algebra as below :

Lp:={a+bi+cj+dk|a,b,c,dGF(p)}. (4)
Lq:={a+bi+cj+dk|a,b,c,dGF(q)} (5)

In quaternion algebra, two polynomials Zp[x]/(xN-1), Zq[x]/(xN-1) are described as follows:

A0=(1,1Zp[x]/(xN1))={f0(x)+f1(x).i+f2(x).j+f3(x).k|f0,f1,f2,f3Zp[x]/(xN1),i2=1,j2=1,ij=ji=k} (6)
A1=(1,1Zq[x]/(xN1))={g0(x)+g1(x).i+g2(x).j+g3(x).k|g0,g1,g2,g3Zq[x]/(xN1),i2=1,j2=1,ij=ji=k} (7)

For generating public keys and private keys, two quaternion polynomials are generated randomly based on formula (8):

F=f0+f1.i+f2.j+f3.ksuchthatf0,f1,f2,f3Lf (8)
G=g0+g1.i+g2.j+g3.ksuchthatg0,g1,g2,g3Lg (9)

Where ∘ is used for multiplying in quaternion algebra and is computed as follows:

FG=(f0+f1.i+f2.j+f3.k)(g0+g1.i+g2.j+g3.k)=(f0*g0f1*g1f3*g3f2*g2)+(f0*g1+f1*g0f3*g2+f2*g3).i+(f3*g1+f2*g0+f0*g2f1*g3).j+(f1*g2+f0*g3f2*g1+f3*g0).k. (10)

Where F must be invertible in A0=(1,1Zp[x]/(xN1)) and A1=(1,1Zq[x]/(xN1)).

Fp,Fq are computed as follows:

Fp=(f02+f12+f22+f32)1overZp[x]/(xN1)F*=μ0+μ1.i+μ2.j+μ3.k (11)
Fq=(f02+f12+f22+f32)1overZq[x]/(xN1)F*=η0+η1.i+η2.j+η3.k (12)

The public key will be calculated according to formula (13):

H=FqG=(η0*g0η1*g1η3*g3η2*g2)++(η0*g1+η1*g0η3*g2+η2*g3).i+(η3*g1+η2*g0+η0*g2η1*g3).j+(η1*g2+η0*g3η2*g1+η3*g0).k. (13)

Where F,Fp,Fq are private and can be used in decrypting process. Although, the QTRU cipher system is 16 times slower than NTRU cipher system, however QTRU can work on small dimensions without reducing the system’s security. The message and Blinding Quaternions are shown as below:

M=m0+m1.i+m2.j+m3.k{m0=Δm0(x),m1=Δm1(x),m2=Δm2(x),m3=Δm3(x)}Lm (14)
φ=φ0+φ1.i+φ2.j+φ3.k{φ0=Δφ0(x),φ1=Δφ1(x),φ2=Δφ2(x),φ3=Δφ3(x)}Lφ (15)

The cipher text can be calculated by the following equation and we can decrypt the cipher text by formula (17):

E=p.Hφ+M (16)
FE=(F(p.Hφ+M)(modq)=(Fp.Hφ+FM)(modq)=(p.FFqGφ+FM(modq)=(p.Gφ+FM). (17)

The new system has a parallel processing feature which can encrypt 4 vectors at the same time. The complexity order of encrypting and decrypting of QTRU system is O(4n2) and the dimension of lattice matrix which is needed to attack this cipher is 8N×8N. As mentioned before, the high speed in encrypting and decrypting processes is counted as an advantage of QTRU over NTRU with degree 4, at the same security level.

BSN and its architecture design

BSN13 is a WSN hardware platform which works on a wide range bandwidth using the IEEE 802.15.4 standard. It incorporates the wireless physiological sensors for measuring the status of the patient. In Figure 1 we can see a simple BSN on the human body. To minimize the usage of bandwidth, a BSN and a PDA is used before sending the data to the server. The architecture design of BSN is illustrated in Figure 2.

Figure 1 .


Figure 1

Body Sensor Network

Figure 2 .


Figure 2

Architecture design of BSN

This node uses Texas Instrument (TI) MSP40 16-bit ultra low power RISC processor accompanied by a flash memory 60 KB+256 B, 2 KB RAM, 12-bit ADC and 6 analog channels. The throughput bandwidth is 250 kbps with a range of over fifty meters. The flash memory is used for either storing or buffering the data. The operating system (OS) which is used in BSN is TinyOS by U.C Berkeley. Being small, open source and efficient power usage sensors are the advantages of this OS. It has small files designers that can choose the components they need. Also, the OS manages the hardware and the wireless network, takes sensor measurements, makes sensor routing decisions, and finally reduces the usage of power. Since the TI microcontroller is used, the BSN node only needs 0.01 mA in active mode and 1.3 mA in calculating mode. In the BSN architecture, a lot of wireless biosensors such as 3-lead ECG, 2-lead ECG strip, and context sensors such as accelerometers and also temperature and humidity sensors are being used. The compact flash BSN card in the PDA can gather the sensor signals. Furthermore, the PDA can display, analyze and process the sensor signals as well as working as a router too. The transmission of sensor networks is being done through a Wifi or GPRS network.

Probabilistic distance vector for sensor networks

The probabilistic distance distributions are used for random sensor networks that can calculate the distance and send data with high accuracy.19 The two nodes (X1, Y1) and (X2, Y2) are supposed, the distribution of node distance P(Dd) is needed to be calculated, where D=(X1X2)2+(Y1Y2)2. In grid-based clustering scheme, there are two cases of cluster head communications: between cluster heads in diagonal adjacent grids or parallel grids, such as PQ and RS in Figure 3.

Figure 3 .


Figure 3

Non-uniform griding with size ratio q

We will suppose non-uniform griding with a fixed ratio q is a special case of variable-size griding.

Two random nodes in diagonal neighbor grids

By normalizing the A ×A sensing field to a unit-size square as shown in Figure 3. The grids 1 and 3 are diagonal squares with size of (1-q2) and q2(1-q2) respectively. By using the Heaviside Step Function H(x) we can formulate the coordinate distributions for P and Q as follows:

{fX1(x)=fY1(x)=H(x)H[x(1q)]1qfY2(x)=fY2(x)=H[x+q(1q)]H(x)q(1q) (18)

Where

H(x)={0x<01x0

X 1, Y1U[0, 1-q] and X2, Y2U[-q(1-q),0]

Two random nodes in parallel neighbor grids

The grids 2 and 4 shown in Figure 2 are parallel rectangles with size of (1-qq and q(1-qq2 respectively. For the nodes in these parallel rectangles, the coordinate distribution is formulated as below:

{fX1(x)=H(x+q)H(x)qfY1(x)=H(x)H[x(1q)](1q) (19)
{fX2(x)=H(x+q)H(x+q(1q))q2fY2(x)=H[(x+q(1q)]H(x)q(1q) (20)

Now let V=X1X2 or V=Y1Y2, S=V2, Z= SX+SY and D=Z so we can obtain fD(d). According to BT node Platform we can easily find the Distance distribution.9

Probabilistic energy optimization

It is very important to reduce the usage of energy in wireless sensor networks.19 According to Barroso et al. study10 the energy which is consumed by the radio transmitter is calculated by equation (21):

ETx=λεxafD(x)dx (21)

λ is a data transmitter rate, ε is a constant related to the environment, and a is known as the path loss exponent. The traffic pattern of “many to one” in WSNs is also illustrated in Figure 3.

Let Ei be the energy consumed in the i-th ring:

Ei=λi(ERe+ETe) + λiETx (22)

λ i is the data rate going through the i-th ring. The parameters ERE and ETE are the energies consumed by the receiver and transmitter circuitry, and ETX is used by the transmitter power amplifier. According to Pentland et al. study7 we have ERe=ETe=Ee. so,

Ei=λi(2Ee+ETx) (23)

The aggregated data can be divided into two parts: between parallel rectangles λip, and between diagonal squares λid, i.e., λi = 2λip+λid and ρ is the node density. λip and λid parameters can be calculated as follows:

λip=A2q1+q(1q2i)ρλλid=A2(1q)1+q(1q2i)ρλ (24)

Therefore,

Ei=2λip(2Ee+εxafDPar(x)dx)+λid(2Ee+εxafDDiag(x)dx) (25)

For minimizing the total network energy consumption we have the following equation:

mini=1KEis.t.AqK1>r0Aqkr0

Where r0 is the minimal distance between wireless transceivers, and K is the maximum number of hops from the source node to the sink.

Implementation of framework

Initially assume the patient is stationed in his/her house. The patient is relaxed and the ECG and the body temperature and the blood pressure sensors do not detect any suspicious. Suddenly, the sensors detect heart rhythmic disorders, arrhythmia, and a change in the body temperature and the blood pressure. The alert signals are accordingly sent to the PDA (i.e., mostly ECG signals). The BSN which is located inside the PDA does a processes these signals and makes a decision on whether the occurred condition is life threatening or not. If the condition is life threatening, an appropriate signal is generated and routed to the PDA. As previously indicated, the PDA also performs as a router as initially encrypts the alert data signals. The importance of encrypting these signals lie on protecting patients information. These information regarding patient health is secret and except the doctor no other persons would have access to these information's Also other hospitals can’t decrypt other patients’ data which do not belong to their hospital. The encryption is being done by the QTRU algorithm. We used this cipher system since it is faster in comparison to NTRU in 4 dimensions. In this way, the speed of transferring data will increase. On the other hand, there is a Wifi or GPRS network between the server of the hospital and patient’s PDA which includes lots of sensor networks for receiving data signals and transferring them to the others just as a router. In this part, the best and closest path to the server should be chosen which consumes small amount of power. When the data signal has arrived at the server of the hospital, the server immediately decrypts the data and alerts the emergency. Also, it sends the encrypted data to the doctor who decrypts the data by his PDA and checks the condition of the patient and as a result may make the doctor become ready for the operation if necessary. The implementation of this scenario is shown in Figure 4. Also, this system can work inside the hospitals so the Wifi or GPRS Sensor Network is not needed and transfer of data is done directly between the server of the hospital and the patient’s PDA and doctor’s PDA.

Figure 4 .


Figure 4

Implementation of proposed framework

Discussion

Cardiovascular disease is one of the most important reasons of sudden death in Iran. In this study we present a low consuming power and high speed cryptographic Body Sensor Network architecture which is used to detect arrhythmias in cardiovascular disease patients. Wifi or GPRS Sensor networks are the main related networks that are mainly addressed to BSNs and PDAs and server of hospital by using QTRU cipher system in this paper. It can also be used by patients for self-monitoring or alerting the doctors and ICU healthcare personnel. Generally, usual health care systems perform monitoring and analysis for a variety of cardiac care functions but our presented system can detect arrhythmias in cardiovascular patients with high speed and security. The QTRU cryptosystem can encrypt and decrypt 4 vectors at the same time with the complexity order of O(4n2) while NTRU cryptosystem with 4 dimensions can encrypt and decrypt with the complexity order of O(16n2). Although, they are at the same security level, however QTRU cryptosystem is faster than NTRU cryptosystem in 4 dimensions. Also we used probabilistic distance vector for Sensor Networks in order to reduce the hops between WSN node and increasing the speed of transferring and routing process. For reducing the usage of power, the Probabilistic Energy optimization is used. Energy optimization is very important since most of WSNs use rechargeable batteries.

Conclusion

In this paper a new H4C system is proposed by which the number of human deaths resulted by cardiovascular disease can be reduced. This system is a very fast and low power consumption system that uses the cheap chips in comparison to other healthcare chips. The encryption and decryption algorithm used for securing the insecure channel of communication reduces the calculations. Additionally, the methods used for reducing distances and energy make the overall operations and functions faster.

Footnotes

Ethical issues: The study was approved by the ethics committee of the University.

Competing interests: The authors had no competing interests to declare in relation to this article.

References

  • 1.Hatmi ZN, Tahvildari S, Gafarzadeh Motlag A, Sabouri Kashani A. Prevalence of coronary artery disease risk factors in Iran: a population based survey. BMC Cardiovasc Disord . 2007;7:32. doi: 10.1186/1471-2261-7-32. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2. Braunwald S. Heart disease: a textbook of cardiovascular medicines. 7th ed. Philadelphia: WB Saunders; 2005.
  • 3.Campbell RL, Banner R, Konick-McMahan J, Naylor MD. Discharge planning and home follow-up of the elderly patient with heart failure. Nurs Clin North Am . 1998;33:497–513. [PubMed] [Google Scholar]
  • 4. WHO. Cardiovascular diseases. [cited 2012 Dec]. Available from: http://www.who.int/cardiovascular_diseases/en/.
  • 5.Standing P, Dent M, Craig A, Glenville B. Changes in referral patterns to cardiac out-patient clinics with ambulatory ECG monitoring in general practice. Br J Cardiol . 2001;8:396–8. [Google Scholar]
  • 6.Liszka KJ, Mackin MA, Lichter MJ, York DW, Pillai D, Rosenbaum DS. Keeping a beat on the Heart. IEEE Pervasive Computing . 2004; 3:42–9. [Google Scholar]
  • 7.Pentland A. Healthwear: Medical Technology Becomes Wearable. IEEE Computer . 2004;37:42–9. [Google Scholar]
  • 8.Ross PE. Managing care through the air. IEEE Spectrum. 2004;41:14–9. [Google Scholar]
  • 9. BTnode Platform. [cited 2013 Feb]. Available from: http://www.btnode.ethz.ch.
  • 10. Barroso A, Benson J, Murphy T, Roedig U, Sreenan C, Barton J, et al. The DSYS25 Sensor Platform. Proceedings of the 2nd international conference on Embedded networked sensor systems. New York: ACM, 2004. p. 314-314.
  • 11. Intel Labs. [cited 2013 Feb]. Available from: http://www.intel.com/research/exploratory/motes.htm.
  • 12. TinyOS. [cited 2013 Feb]. Available from: http://www.tinyos.net.
  • 13.Lo BPL, Thiemjarus S, Panousopoulou A, Yang GZ. Bioinspired Design for Body Sensor Networks [Life Sciences] IEEE Signal Processing Magazine . 2013; 30:165–70. [Google Scholar]
  • 14.Hoffstein J, Pipher J, Silverman J. NTRU: A new high speed public key cryptosystemAlgorithmic Mumber Theory (ANTS III) Lecture Notes in Computer Science . 1998;143:267–88. [Google Scholar]
  • 15.Bailey DV, Coffin D, Elbirt A, Silverman JH, Woodbury AD. NTRU in Constrained Devices, Cryptographic Hardware and Embeded Systems, CHES 2001 Lecture Notes in Computer Science, Third International Workshop, Proceedings. Springer-Verlag, Paris . 2001; 2162:262–272. [Google Scholar]
  • 16. Pipher J. NTRU Cryptosystems. Lectures on the NTRU encryption algorithm and digital signature, 2005.
  • 17. Kouzmenko R. Generalizations of the NTRU cryptosystem. [Master’s thesis]. Polytechnique, Montreal, Canada, 2006.
  • 18.Malekian E, Zakerolhosseini A, Mashatan A. Qtru: Quaternionic Version of the NTRU Public-Key Cryprosystems. ISeCure . 2011;3:29. [Google Scholar]
  • 19. Zhuang Y, Pan J, Cai L. Minimizing energy consumption with probabilistic distance models in wireless sensor networks. INFOCOM, 2010 Proceedings IEEE, 14-19 March 2010, p. 1-9.

Articles from Journal of Cardiovascular and Thoracic Research are provided here courtesy of Tabriz University of Medical Sciences

RESOURCES