Cryptographic transfer of sensor data from the Amulet to a smartphone

David Harmon ’17 develops and evaluates a novel protocol for secure transfer of sensor data from an Amulet to a smartphone, in this Senior Honors Thesis released as a Dartmouth Computer Science Technical Report.

Abstract. The authenticity, confidentiality, and integrity of data streams from wearable healthcare devices are critical to patients, researchers, physicians, and others who depend on this data to measure the effectiveness of treatment plans and clinical trials. Many forms of mHealth data are highly sensitive; in the hands of unintended parties such data may reveal indicators of a patient’s disorder, disability, or identity. Furthermore, if a malicious party tampers with the data, it can affect the diagnosis or treatment of patients, or the results of a research study. Although existing network protocols leverage encryption for confidentiality and integrity, network-level encryption does not provide end-to-end security from the device, through the smartphone and database, to downstream data consumers. In this thesis we provide a new open protocol that provides end-to-end authentication, confidentiality, and integrity for healthcare data in such a pipeline.

We present and evaluate a prototype implementation to demonstrate this protocol’s feasibility on low-power wearable devices, and present a case for the system’s ability to meet critical security properties under a specific adversary model and trust assumptions.

Advisor: David Kotz.

ActivityAware: Wearable System for Real-Time Physical Activity Monitoring among the Elderly

George Boateng, M.S., reports on new Amulet research in his Master’s thesis, available as a Dartmouth Computer Science Technical Report.

Abstract. Physical activity helps reduce the risk of cardiovascular disease, hypertension and obesity. The ability to monitor a person’s daily activity level can inform self-management of physical activity and related interventions. For older adults with obesity, the importance of regular, physical activity is critical to reduce the risk of long-term disability. In this work, we present ActivityAware, an application on the Amulet wrist-worn device that monitors the daily activity levels (low, moderate and vigorous) of older adults in real-time. The app continuously collects acceleration data on the Amulet, classifies the current activity level, updates the day’s accumulated time spent at that activity level, displays the results on the screen and logs summary data for later analysis.

The app implements an activity-level detection model we developed using a Linear Support Vector Machine (SVM). We trained our model using data from a user study, where subjects performed common physical activities (sit, stand, lay down, walk and run). We obtained accuracies up to 99.2% and 98.5% with 10-fold cross validation and leave-one-subject-out (LOSO) cross-validation respectively. We ran a week-long field study to evaluate the utility, usability and battery life of the ActivityAware system where 5 older adults wore the Amulet as it monitored their activity level. The utility evaluation showed that the app was somewhat useful in achieving the daily physical activity goal. The usability feedback showed that the ActivityAware system has the potential to be used by people for monitoring their activity levels. Our energy-efficiency evaluation revealed a battery life of at least 1 week before needing to recharge. The results are promising, indicating that the app may be used for activity-level monitoring by individuals or researchers for epidemiological studies, and eventually for the development of interventions that could improve the health of older adults.

Advisors: David Kotz, Ryan Halter, John Batsis

Emily Greene wins NCWIT Collegiate Award Honorable Mention

Congratulations to Emily Greene, an undergraduate in the Amulet group, who received Honorable Mention for the NCWIT Collegiate Award from the National Center for Women & Information Technology (NCWIT). Emily is spending this week at the NCWIT Summit on Women and IT in Tucson, Arizona.

Here is her video submission, which describes a cryptographically-supported mechanism for selective sharing of streams of mHealth data, such as those that would be produced by Amulet applications.