SIH 2020
“Security of Soldiers ensure the security of the Nation .It is vital for control units to know the location and health statuses of soldiers whenever they enter remote areas or enemy lines. Wearability of the sensing units and security of the data transmitted are key factors to be taken into consideration while addressing the issue of soldier monitoring . Much of this research , is still underway and we attempt to provide a feasible solution for the same.”
SOLDIER STRAP
Description :
The soldier strap will be given to soldiers and it will have the following functionality.
1) GPS location of the soldier
2) Sensors that monitor and record vital body parameters
3) SoS facility
4) Efficient battery life
5) Location timeline
Security is a key in this technology for prevention of any unauthorized access. The strap should be able to transfer information by using a communication network. In utter case of emergence, where no node is available in the immediate vicinity then the communication must be made through cellular network.
Name of Central Ministry / Industry : Dept of IT & Cyber Security, DRDO
Category : Hardware
Domain Bucket : Security & Surveillance
Abstract of our idea.. !!
1. Sensing Unit
2. Transmission Layer
3. Security Layer
4. Data Analysis (Surveillance)
Hardware Description
Body Temperature Sensor
ECG Sensor
Body Temperature
Sensor
Pulse Oximeter ( SpO2)
ECG Sensor,
Pulse Oximeter
Soldier
Unit
Cuffless Blood Pressure Sensor
Blood Pressure
Sensor
Sink
Node
Accelerometer
Accelerometer
Feature extraction
Preprocessing
Data Compression
Wireless Network
We have chosen a wireless mode of data transmission from the transceiver to the cloud ,as the wireless network covers wider area of transmission and the installation is easy.
CLOUD
Soldier
Unit
Advantage
It eliminates the need for repeater and other infrastructure costs that are synonymous with the long range while significantly improving robustness to interference, noise and jamming,
while in this implementation, we are also personalizing each device with a unique 128 bit AES key, thus also making it a secure mode of transmission with a high rate of accuracy.
Our Network specifications also include dedicated gateways, which are essential in a LoRaWAN while the overall structure is set up by connecting the base stations, in this case, the strap, with the local network of sensors directly.
Security
The crucial aspects are
Specifications
Data Transmission level
Three Level Security Framework
Data management and access level
Sensor Data Collection level
Private LoRaWAN networks comprise of :
Mutual authentication is established between a LoRaWAN end-device and the LoRaWAN network as part of the network join procedure. This ensures that only genuine and authorized devices will be joined to genuine and authentic networks.
Protection is provided by several layers of encryption:
LoRaWAN is one of the few IoT networks implementing end-to-end encryption.
Data is Important...!!
What next?
The proposed idea provides for a comprehensive, hybrid solution model with up-to-date software running on an easily serviceable cloud architecture built on top of a robust wireless network model with a custom security setup alongside an efficient, compatible and cost effective hardware solution, allowing for secure and complete coverage of all vital statistics required to stay more than just a step ahead in every operation.
The impact of security threats can prove to be a major issue.Some of the possible security threats are
C[1] Xiaochen Lai , Quanli Liu,Xin Wei,Wei Wang,Guoqiao Zhou and Guangyi Han. "A Survey of Body Sensor Networks".Sensors.,2013
C[2] Hock Beng Lim, Di Ma, Bang Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer and Kenneth L. Watkin."2010 International Conference on Body Sensor Networks".2010
C[3] Wearable Computing: From Modeling to Implementation of Wearable Systems Based on Body Sensor Networks is a great reference for systems architects, practitioners, and product developers
C[4] "A Soldier Health Monitoring System for Military Applications " by Hock Beng Lim1, Di Ma1, Bang Wang1, Zbigniew Kalbarczyk2, Ravishankar K. Iyer2, Kenneth L. Watkin3
YINGNAN SUN , FRANK P.-W. LO , AND BENNY LO. . "Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey".2019
Thank You for your valuable time