Comparison and overview of Wireless sensor network systems for Medical Applications


Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic


eISSN: 1178-5608



VOLUME 7 , ISSUE 5 (December 2014) > List of articles

Special issue ICST 2014

Comparison and overview of Wireless sensor network systems for Medical Applications

Avijit Mathur / Thomas Newe

Keywords : WSN architecture; WSN security; wireless platform; medical WSN

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 7, Issue 5, Pages 1-6, DOI:

License : (CC BY-NC-ND 4.0)

Published Online: 15-February-2020



The need for technology to assist in medical monitoring applications is becoming more necessary in society as the number of patients in hospital and clinics continues to grow. The demand on staff to monitor every individual consistently becomes necessary. Wireless sensor networks (WSN) are now being used to facilitate this on-demand monitoring both at the patients home and in the hospital/clinic environment. This paper looks at the basic parameters necessary for a medical based WSN with particular focus on communication platforms and their security. These parameters will be compared and contrasted, and the main components necessary to form an ideal medical WSN will be highlighted.

Content not available PDF Share



[1]  Harvard, “CodeBlue: wireless sensors for medical care,” 2008. [Online]. Available: [Accessed 3 January 2014].

[2]  Hopkins interNetworking Research Group, “HealthOS: A platform for pervasive health applications [HOWTOS],” [Online]. Available: [Accessed 17 January 2014].

[3]  S. Stankovic, “Medical applications based on wireless sensor networks,” Transactions on internet research, vol. IV, no. 2, pp. 19-23, 2009. 

[4]  A. A. A. Alkhatib and G. S. Baicher, “Wireless sensor network architecture,” in International Conference on Computer Networks and Communication Systems (CNCS 2012), Singapore, 2012. 

[5]  J. L. Hill, System architecture for wireless sensor networks, Berkeley: unpublished, 2003. 

[6]  J. A. Gutierrez, “On the use of IEEE Std. 802.15.4 to enable wireless sensor networks in building automation,” in Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE International Symposium on, Barcelona, 5-8 Sept. 2004. 

[7]  W. M. Healy and M. Zhou, “Impacts of 2.4-GHz ISM band interference on IEEE 802.15.4 wireless sensor network,” Instrumentation and Measurement, IEEE Transactions on, vol. 61, no. 9, pp. 2533-2544, 2012. 

[8]  S. Ullah, M. Mohaisen and M. A. Alnuem, “A review of IEEE 802.15.6 MAC, PHY and security specifications,” International Journal of Distributed Sensor Networks, vol. 2013, March 2013. 

[9]  K. S. Kwak, S. Ullah and N. Ullah, “An overview of IEEE 802.15.6 standard (invited paper),” in Applied Sciences in Biomedical and Communication Technologies (ISABEL), 3rd International Symposium on, Rome, 7-10 Nov. 2010. 

[10] F. Martelli, C. Buratti and R. Verodone, “On the performance of an IEEE 802.15.6 wireless body area network,” in Sustainable Wireless Technologies (European Wireless), 11th European , 27-29 April 2011. 

[11] N. A. Pantazis, S. A. Nikolidakis and D. D. Verfados, “Energy-efficient routing protocols in wireless sensor networks: A survey,” IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 15, no. 2, pp. 551591, 2013. 

[12] P. Krishnaveni and J. Sutha, “Analysis of routing protocols for wireless sensor networks,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 11, pp. 401-407, November 2012. 

[13] R. Cheour, F. Derbel, O. Kanoun and M. Abid, “Wireless sensor networks with power management for low energy consumption,” in Systems, Signals & Devices (SSD), 2013 10th International MultiConference on , 18-21 March 2013. 

[14] K. Akkaya and M. Younis, “A survey of routing protocols in wireless sensor networks,” Ad Hoc Network (Elsevier), vol. 3, no. 3, pp. 325-349, May 2005. 

[15] M. Kohvakka, M. Kuorilehto, M. Hännikäinen and T. D. Hämäläinen, “Performance analysis of ieee 802.15.4 and zigbee for large-scale wireless sensor network applications,” PE-WASUN ’06: Proc. 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks, pp. 48-57, Oct 6, 2006. 

[16] J. Decuir, “Bluetooth 4.0: Low energy,” 2010.

[17] B. Yu, L. Xu and Y. Li, “Bluetooth Low Energy (BLE) Based Mobile Electrocardiogram Monitoring System,” in Proceeding of the IEEE International Conference on Information and Automation, Shenyang, 2012. 

[18] M. Healy, T. Newe and E. Lewis, “Wireless Sensor Node Hardware,” in Measurement, Instrumentation, and Sensors Handbook, Second Edition, Spatial, Mechanical, Thermal, and Radiation Measurement, CRC Press 2014, 2014, pp. 1-15.

[19] X. Lin, Y. Kwok and H. Wang, “Energy-efficient resource management techniques in wireless sensor networks,” in Guide to wireless sensor networks, S. Misra, I. Woungang and S. C. Misra, Eds., London, Springer-Verlag, 2009, pp. 439-468.

[20] V. Raghunathan, C. Schurgers, S. Park and M. Srivastava, “Energyaware wireless microsensor networks,” Signal processing magazine, IEEE, vol. 19, no. 2, pp. 40-50, 2002.

[21] L. Xing and H. Michel, “Integrated modeling for wireless sensor networks reliability and security,” in Reliability and Maintainability Symposium, 2006. RAMS '06. Annual, 23-26 Jan. 2006. 

[22] H. Tahir and S. Shah, “Wireless sensor networks - a security perspective,” in Multitopic Conference, 2008. INMIC 2008. IEEE International, 23-24 Dec. 2008. 

[23] S. Möller, T. Newe and S. Lochmann, “Prototype of a secure wireless patient monitoring system for the medical community,” Sensors and Actuators A: Physical, vol. 173, no. 1, pp. 55-65, Jan. 2012. 

[24] X. Yang, T. Bin, L. Qi, Z. Jian-yi and H. Zheng-Ming, “A novel framework of defense system against DoS attacks in wireless sensor networks,” in Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, 23-25 Sept. 2011. 

[25] J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil attack in sensor networks: analysis & defenses,” in Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on, 26-27 April 2004. 

[26] V. B. Srinivas and S. Umar, “Spoofing attacks in wireless sensor networks,” International journal of Computer science Engineering and Technology, vol. 3, no. 6, pp. 201-210, 2013. 

[27] T. Newe, V. Cionca and D. Boyle, “Security for wireless sensor networks - configuration aid,” in Advances in wireless sensors and sensor networks, Berlin, Springer-Verlag, 2010, pp. 1-24.

[28] J. Ko, C. Lu, M. Srivastava, J. Stankovic, A. Terzis and M. Welsh, “Wireless sensor networks for healthcare,” Proceedings of the IEEE, vol. 98, no. 11, pp. 1947-1960, 2010.

[29] C. Karlof, N. Sastry and D. Wagner, “TinySec: A link layer security architecture for wireless sensor networks,” in SenSys '04, Baltimore, 2004. 

[30] F. Ullah, M. Ahmad, M. Habib and J. Muhammad, “Analysis of security protocols for wireless sensor networks,” in Computer Research and Development (ICCRD), 2011 3rd International Conference on, 11-13 March 2011. 

[31] T. Park and K. Shin, “LiSP: A lightweight security protocol for wireless sensor networks,” ACM Trans. embedded computing systems, vol. 3, no. 3, Aug. 2004. 

[32] A. Perrig, R. Szewczyk, J. Tygar, V. Wen and D. E. Culler, “SPINS: Security protocols for sensor networks,” ACM Journal of Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.

[33] M. Welsh, D. Malan, B. Duncan, T. Fulford-Jones and S. Moulton, “Wireless sensor networks for emergency medical care,” in GE Global research conference, Boston, 8 Mar. 2004. 

[34] P. Kumar, Y.-D. Lee and H. Lee, “Secure health monitoring using medical wireless sensor networks,” in Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, 16-18 Aug. 2010.