Professional Documents
Culture Documents
6, NOVEMBER 2008
history. Therefore, security mechanisms must be incorporated chip, the protocol was able to generate a pair of 163-bit private
to build a secure BSN ensuring data confidentiality, integrity, and public keys and a piece of a shared secret between two nodes
and freshness, as well as nonrepudiation of origin, delivery, and within 34 s. Because asymmetric cryptography requires compu-
receipt. It is however a nontrivial task because limited by the tationally expensive or energy-intensive operations, it is often
targeted size and cost, most sensor nodes are subject to stringent ruled out as the infrastructure for authentication, integrity, and
resource constraints. security in sensor networks [12], [13], particularly in wireless
To address the security issue in BSN, we proposed in [6] BSNs.
that since the body itself can form an inherently secure com-
munication pathway, a novel biometrics method, which uses A. Key Predistribution Solutions
the intrinsic characteristics of the human body to generate the
As wireless BSN works within the body area, using a base
entity identifier (EI) of each BSN node for identifying nodes
station to distribute a network-wide initial key to each sensor
and protecting the transmission of keying materials, can be used
before deployment is a straightforward scheme. The process of
to secure intra-BSN communications. Since the interpulse in-
distribution of initial keys must be carried out in a secure envi-
terval (IPI) of heartbeats can be readily available in various
ronment, which the intruders cannot access by any means. The
cardiovascular signals, it was used as an example of the in-
main disadvantage of this scheme is that whenever there is a
trinsic characteristic to illustrate the feasibility of the proposed
need to add or change a body sensor, the user has to configure
biometrics method. Preliminary experimental results of the IPI
a new initial key to ensure that the new sensor can securely
based system performance was presented in [6].
communicate with the existing sensors. This obviously discour-
In this paper, the performance of IPIs as a biometric trait
ages people, such as family members, to share sensors (mainly
for such security purposes will be evaluated. Furthermore, a
wearable sensors) between themselves. Furthermore, thorough
lightweight scheme for generating EI from IPI information is
key updates are also discouraged.
proposed and analyzed.
Recently, a family of random-key predistribution protocols
The rest of this paper is organized as follows. Section II in-
was developed for large-scale sensor networks [14], [15]. The
troduces existing solutions of authenticated key distribution that
basic idea of random-key predistributions was first proposed by
may be applicable to BSNs, with an emphasis on the newly pro-
Eschenauer et al. [16], in which a large pool of symmetric keys
posed biometrics method. The performance of IPIs calculated
S is generated and a random subset m is distributed to each node.
from different cardiovascular signals is studied in terms of indi-
The number of keys in the key-pool, i.e., |S|, is chosen such that
vidual randomness and group similarity in Section III. Then, the
two random subsets, each of size |m|, will share at least one key
lightweight generation scheme of EI based on IPI information is
with certain probability. After the deployment, a network-wide
proposed in Section IV. In Section V, the performance analysis
key-setup phase is performed. Each node first performs a key-
of such generated EIs is elaborated in terms of individual ran-
discovery procedure to find out with which of its neighbors it
domness, group similarity, as well as false acceptance/rejection
shares at least a key. A mutual verification is then carried out
evaluation. Finally, conclusions are given in Section VI.
through a challenge-response protocol. The shared key becomes
the key for that link.
II. BACKGROUND AND RELATED WORKS To further improve the performance, other key predistribution
techniques have also been proposed, including the threshold-
Since wireless BSN nodes are usually subjected to severely
based key predistribution [17], [18] that aimed to improve
constrained resources, asymmetric cryptography is too expen-
the resilience of sensor networks against node compromises
sive in terms of system overhead. Thus, a promising approach
and the group-based key pre-distribution [19] that aimed to re-
is to use more efficient symmetric cryptographic alternatives.
move the dependency on expected sensor locations, and thus,
Nevertheless, symmetric cryptography is not as versatile as
simplify the deployment.
asymmetric cryptographic techniques, and thus, complicates
A major disadvantage of applying the aforementioned tech-
the design of secure applications. Prior to using any encryp-
niques in wireless BSNs is that if there is a need to add any
tion, communicating parties must possess a shared secret key,
new sensor, the same key pool must be used to generate a key
which theoretically requires a secure channel for distribution.
subset, and the key predistribution for the new sensor must be
Such a secure channel is, however, often not available in most
taken place in a secure environment. As mentioned before, the
cases, and thus, key distribution is always vulnerable to man-in-
predistribution process will unavoidably cause inconvenience to
the-middle attacks. To prevent such attacks, a variety of authen-
BSN users. To this end, a new family of solutions without an
ticated key distribution protocols have been developed, as the
initial deployment is desirable for wireless BSNs.
means of gaining confidence that an entity is what it claims to
be and at the same time distributing a shared secret key between
communicating entities [7]–[10]. B. Biometric Security Model
Typically, authenticated key distribution protocols can be de- Conventionally, biometrics refers to the automatic recogni-
signed using symmetric or asymmetric cryptography. Regarding tion of individuals based on their physiological and/or behav-
the use of asymmetric cryptography to secure sensor networks, ioral characteristics [20], [21]. The biometrics method discussed
Malan et al. [11] implemented the elliptic curve cryptography in this study is, however, different from the conventional one.
on MICA2 mote with TinyOS. When tested on a fully loaded The concept behind this new approach to use biometrics is to
774 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 12, NO. 6, NOVEMBER 2008
make use of the communication channels already available on in the security model, can be regarded as an initial key generated
or in the human body, i.e., the biochannels, for securing wireless by any BSN node that wants to initiate a secure conversion with
communications in BSN. Cherukuri et al. [22] proposed using other nodes.
a group of similar random numbers generated from properties Before the protocol is initiated, each BSN node has to gen-
obtained from different human body parts to protect the trans- erate a binary sequence b from a biometric trait. As the binary
mission of symmetric keys between communicating parties. The biometric sequence is used for a BSN node to judge whether a re-
transmitting node binds a cryptographic key with a locally cap- questing node is in the same BSN as itself, we name the binary
tured biometric trait. At the receiving node, a binding-off pro- biometric sequence EI to emphasize its outstanding commit-
cess is preceded using the biometric trait captured by its own to ment. Let EIT = {ITi ∈ {0, 1}n |1 ≤ i ≤ N } represent a set of
recovery the cryptographic key. EIs, where N is the size of the network and T is a synchronized
Since the biometric trait captured at different locations of the time period during which the binary biometric sequence is gen-
body should have slight variations, a fuzzy commitment scheme erated. Similar to the biometric traits, EIT should satisfy the
[23] is employed to ensure that differences between biometric following requirements: 1) each EI (ITi ) should possess a sig-
values captured at different locations are tolerable to a certain nificant degree of randomness and 2) any pair of EIs (ITi , ITj )
degree. The cryptographic key used in the fuzzy commitment should have high similarity. The first property implies that each
scheme needs to be constructed as an error-correcting code. bit of ITi should theoretically contain one bit of entropy. On
Let the function g : M → C represent a one-to-one mapping the other hand, the distance between any pair should be small
of messages to codewords, where M = {0, 1}k represent the enough for any two nodes in the same BSN to accept each other.
space of messages and C = {0, 1}n represent the corresponding After sharing the initial key K among BSN nodes by using
error-correcting codeword. Conversely, g −1 is used to retrieve the fuzzy similar EIs, session keys can be subsequently estab-
the transmitted message from a reconstructed codeword. The lished. Besides, it is noted that a practical protocol should be
error-correcting function f : {0, 1}n → C ∪ {φ} is used to map robust against a variety of potential threats, including tampering
arbitrary n-bit strings to codewords. When successful, f maps attacks, replay attacks, and reflection attacks.
a given n-bit string to the nearest codeword in C. Otherwise, f
fails and outputs φ. We say that f has a correction threshold of III. ANALYSIS ON TIMING INFORMATION OF HEARTBEATS
size t if it can correct any set of up to t bit errors.
Let K ∈ {0, 1}k and K̂ ∈ {0, 1}n represent a cryptographic A. Experimental Data
key and the corresponding error-correcting codeword, respec- We used data collected from two experiments, the original
tively, b ∈ {0, 1}n represent the biometric value (also called purpose of which was to simultaneously capture ECG and pho-
the original encrypting witness) used to protect cryptographic toplethysmogram (PPG) for the estimation of blood pressure.
keys, and h : {0, 1}n → {0, 1}l be a one-way hash func- In one experiment (Exp. I), 14 healthy subjects were recruited.
tion. The fuzzy commitment scheme is defined as F (K̂, b) = ECG was captured from the three fingers of the subjects and
(h(K̂), K̂ ⊕ b), where ⊕ is the bitwise XOR operation. To de- two channels of PPG were captured from the index fingers of
commit F (K̂, b) using a witness b , the receiver computes the two hands, respectively. For each subject, the three signals
K̂ = f (b ⊕ (K̂ ⊕ b)) = f (K̂ ⊕ (b ⊕ b)). If h(K̂ ) = h(K̂), were captured simultaneously for 2–3 min. In another experi-
then the decommitment is successful and the result of g −1 (K̂) ment (Exp. II), 85 clinical subjects were recruited, and within a
is the correct key K. Otherwise, b is an incorrect witness that is two-month period, a PPG and ECG were captured for 40 s on
not close enough to the original encrypting witness in a suitable three or four days. A 12-bit A/D converter sampling at 1 kHz
metric. was deployed to get the digital signals. Fig. 2 depicts a segment
It was discussed in [6] that biometric traits used in such a of simultaneously captured ECG and PPG. Peak-to-peak inter-
security model must be: 1) distinctive, i.e., the trait should be vals of ECG and foot-to-foot intervals of PPG were calculated.
sufficiently different on any two individuals when copies of it In order not to extend effects of detection errors in bad signal
are captured simultaneously, even if the copies are captured by segments, a segmentation mechanism was introduced to divide
different types of sensors and at different locations of the body the signals into segments consisting of consecutive 16 IPIs.
and 2) time-variant but invulnerable, i.e., the trait should change
with time and have a high degree of randomness so that copies
B. Multi-IPI Versus Individual IPI
of it captured at different times would not match even if they are
obtained from the same individual. More importantly, from a As mentioned earlier, EIs generated from time-variable bio-
cryptographic perspective, devices outside of a particular BSN metric traits should meet two requirements, i.e., individual ran-
have neither access to, nor can they reliably predict a particular domness and group similarity. To achieve better performances
period record of such a biometric trait. of EIs from a given number of IPIs, multi-IPI is examined as
compared to individual IPI for its capability of EI generation.
Given L = 16 consecutive individual IPIs, a series of multi-IPIs
C. Protocol Design Based on the Biometric Security Model can be obtained as follows:
Based on the biometric security model, an authenticated key
i
distribution protocol can be carefully designed for BSN nodes to mIPIi = IPIl |1 ≤ i ≤ L . (1)
securely share session keys for later uses. The key K, described l=1
BAO et al.: USING THE TIMING INFORMATION OF HEARTBEATS AS AN ENTITY IDENTIFIER TO SECURE BODY SENSOR NETWORK 775
TABLE I
NUMERIC RESULTS OF SAMPEN (3, 0.2, M)
TABLE II
ERROR RATES ASSOCIATED WITH IPI BIOMETRIC SYSTEMS
(p = 8; q = 2, 3, 4, 5; L = 16)
including the lowest FRR for FAR ≤ 0.1% as well as the min-
imum half total error rate (HTER) that equals (FRR+FAR)/2.
It can be seen from Table II that although larger q values result
in EIs with longer bit lengths, the minimum HTERs are also
generally higher. The parameter δ is the corresponding decision
threshold while the minimum HTER is achieved. Besides, an ef-
ficiency parameter, i.e., η = (n − δ)/n, where n is the bit length
of EI, is used to evaluate the efficiency of the generated EIs. In
practical use, the threshold δ can be set to a smaller value com-
pared to the one corresponding to the minimum HTER, because
a lower FAR is desirable for a more secure system at the expense
of a higher FRR. Moreover, consider the error-correcting coding
Fig. 7. FA–FR curves of EIs under different q values (p = 8, L = 16). (a) q = scheme (n, k, t) of secret keys described in Section II, where n
5. (b) q = 4. (c) q = 3 and (d) q = 2. is the bit length of codewords, k is the number of information
bits, and t is the error-correcting ability. Since t is often set
evaluation, including frequency (monobit) test, frequency test
equal to the decision-making threshold of the EI, a smaller
within a block, cumulative sums test, runs test, and discrete
threshold is also desirable to get a higher coding rate, i.e., k/n.
Fourier transform test [29]. All bit streams passed the selected
As long as the EIs of sensor nodes in the same BSN are
tests, and thus, showed an acceptable degree of randomness.
similar enough, the identification process will succeed with a
B. Similarity Analysis high probability. Although there are diseases that can cause
abnormal heartbeat signals, all cardiovascular signals captured
The similarity between any pair of EIs generated by sensors by nodes of the same BSN will be undergoing the same kind
on the same individual can be analyzed with the Hamming of changes in the heart functions. Therefore, the EIs generated
distance. Fig. 6 depicts the Hamming distance distribution of from IPI information by nodes of the same BSN will still have
EIs under different mapping parameters. a high similarity and the proposed method still holds. In fact, in
Exp. II, over two-thirds of subjects were old unhealthy people
C. False Acceptance–False Rejection Performance with various kinds of cardiovascular diseases. Nevertheless, the
False acceptance (FA, also known as false match) and false re- results still show a good FA–FR performance compared with
jection (FR, also known as false nonmatch) were used to charac- Exp. I where only young healthy subjects were involved. We
terize the two aspects of EIs. Fig. 7 depicts the FA-FR curves of found that the quality of the ECG and PPG signals of Exp.
EIs generated with different q values, where false rejection rate II were not as good as those recorded in Exp. I, resulting in
(FRR) was the rate at which two EIs generated from the same higher FRRs. In the future, more tests should be carried out on
person during the same period of time were unmatched, and false specific kinds of patients to study whether the proposed trait and
acceptance rate (FAR) was the rate at which two EIs generated biometric method are applicable to them.
from a different person or at a different time were matched. Compared to one of our previous studies [6] that used the
Table II shows the error rates of the IPI based biometric system, same set of raw data, this study was able to achieve a lower
778 IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 12, NO. 6, NOVEMBER 2008
minimum HTER with fewer IPIs. For example, the error rate [11] D. J. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for
with 64-bit EIs generated from 16 IPIs is 2.83%, while the key distribution in TinyOS based on elliptic curve cryptography,” in Proc.
1st IEEE Int. Conf. Sens. Ad Hoc Commun. Netw., Oct. 2004, pp. 71–80.
previous one was 6.98% using 34 IPIs. In consideration of [12] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS:
resource efficiency, the improved algorithm can use fewer IPIs Security protocols for sensor networks,” Wireless Netw., vol. 8, no. 5,
to generate EIs of the same bit length, and at the same time, pp. 521–534, Sep. 2002.
[13] C. Karlof, N. Sastry, and D. Wagner, “TinySec: A link layer security archi-
yield a better FA–FR performance. tecture for wireless sensor networks,” in Proc. 2nd Int. Conf. Embedded
On the other hand, the FA–FR performance of conventional Netw. Sens. Syst., Baltimore, MD, 2004, pp. 162–175.
biometric systems can be used as a reference while not a [14] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes
for sensor networks,” in Proc. IEEE Symp. Sec. Privacy, Oakland, CA,
benchmark for this specific biometric system because of quite May 2003, pp. 197–213.
different application scenarios. At the Fingerprint Verification [15] O. G. Morchon, H. Baldus, and D. S. Sanchez, “Resource-efficient security
Competition 2006, state-of-art fingerprint technologies were for medical body sensor networks,” in Proc. Int. Workshop Wearable
Implantable Body Sens. Netw., Cambridge, MA, Apr. 2006, pp. 80–83.
able to achieve an averaged equal error rate (i.e., when [16] L. Eschenauer and V. Gligor, “A key-management scheme for distributed
FAR = FRR) of 2.16% and lowest averaged FRR for FAR sensor networks,” in Proc. 9th ACM Conf. Comput. Commun. Sec.,
≤ 0.1% of 4.22% on four databases, each consisting of 150 Washington, DC, Nov. 2002, pp. 41–47.
[17] D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed
subjects (http://bias.csr.unibo.it/fvc2006/, 2008). Our system sensor networks,” ACM Trans. Inf. Syst. Sec., vol. 8, no. 1, pp. 41–77,
can achieve minimum HTERs of less than 1.46% and 3.19% Feb. 2005.
on 14 and 85 subjects, respectively. Moreover, as shown in [18] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A
pairwise key predistribution scheme for wireless sensor networks,” ACM
Table II, the lowest FRR for FAR ≤ 0.1% that our proposed Trans. Inf. Syst. Sec., vol. 8, no. 2, pp. 228–258, May 2005.
system can achieve were 1.65% and 5.03% for 14 and 85 [19] D. Liu, P. Ning, and W. Du, “Group-based key pre-distribution in wireless
subjects, respectively. The results indicate that the proposed sensor networks,” in Proc. 4th ACM Workshop Wireless Sec., Cologne,
Germany, Sep. 2005, pp. 11–20.
technology is a promising technique. [20] A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric
recognition,” IEEE Trans. Circ. Syst. Video Technol., vol. 14, no. 1,
VI. CONCLUSION pp. 4–20, Jan. 2004.
[21] P. Reid, Biometrics for Network Security. Englewood Cliffs, NJ:
In this study, we have demonstrated the performance of using Prentice-Hall, 2004, pp. 4–5.
IPIs of heartbeats to generate binary EIs, which allow sensor [22] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “BioSec:
A biometric based approach for securing communication in wireless net-
nodes on the same person to recognize each other. The proposed works of biosensors implanted in the human body,” in Proc. IEEE Int.
generation scheme of binary EIs based on IPI information is Conf. Parallel Process. Workshops, 2003, pp. 432–439.
applicable to any biometric trait that satisfies the requirements [23] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proc. 6th
ACM Conf. Comput. Commum. Sec., 1999, pp. 28–36.
for securing wireless BSNs; however, the modulo parameter and [24] J. S. Richman and J. R. Moorman, “Physiological time-series analysis
mapping parameter may vary according to the characteristics of using approximate entropy and sample entropy,” Am. J. Physiol., vol. 278,
the underlying biometric trait. no. 6, pp. H2039–H2049, 2000.
[25] A. L. Rukhin, “Approximate entropy for testing randomness,” J. Appl.
Probab., vol. 37, no. 1, pp. 88–100, Mar. 2000.
REFERENCES [26] D. E. Lake, J. S. Richman, M. P. Griffin, and J. R. Moorman, “Sample
entropy analysis of neonatal heart rate variability,” Am. J. Physiol. Regul.
[1] R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang, “Guest editorial in- Integr. Comp. Physiol., vol. 283, no. 3, pp. R789–R797, 2002.
troduction to the special section on m-health: Beyond seamless mobility [27] M. G. Signorini, F. Marchetti, and S. Cerutti, “Applying nonlinear noise
and global wireless health-care connectivity,” IEEE Trans. Inf. Technol. reduction in the analysis of heart rate variability,” IEEE Eng. Med. Biol.
Biomed., vol. 8, no. 4, pp. 405–414, Dec. 2004. Mag., vol. 20, no. 2, pp. 59–68, Mar./Apr. 2001.
[2] G. Z. Yang, Body Sensor Networks. London: Springer-Verlag, 2006, [28] R. Yulmetyev, P. Hanggi, and F. Gafarov, “Quantification of heart rate vari-
pp. 4–13. ability by discrete nonstationary non-Markov stochastic process,” Phys.
[3] Food and Drug Administration (FDA). (2007, Jan.) Radio frequency wire- Rev. E, vol. 65, pp. 046107-1–046107-15, 2002.
less technology in medical devices—Draft guidance for industry and [29] A. Rukhin et al., “A statistical test suite for random and pseudoran-
FDA staff. [Online]. Available: http://www.fda.gov/cdrh/osel/guidance/ dom number generators for cryptographic applications,” Nat. Inst. Stand.
1618.html Technol., NIST Special Publication 800-22, Gaithersburg, MD, 2001.
[4] J. Hash, P. Bowen, A. Johnson, C. D. Smith, and D. I. Steinberg, “An intro-
ductory resource guide for implementing the health insurance portability
and accountability act (HIPAA) security rule,” Nat. Inst. Stand. Technol., Shu-Di Bao (S’03–M’08) received the B.S. degree
NIST Spec. Publ. 800-66, Gaithersburg, MD, Mar. 2005. from Ningbo University, Ningbo, China, in 1999,
[5] The European Parliament and the Council of The European Union, “Di- and the M.S. and Ph.D. degrees from the Southeast
rective 2002/58/EC concerning the processing of personal data and the University, Nanjing, China, in 2003 and 2007,
protection of privacy in the electronic communications sector,” Official respectively, all in communications and information
J. Eur. Communities, pp. L201/37–47, Jul. 2002. systems.
[6] C. Poon, Y. T. Zhang, and S. D. Bao, “A novel biometrics method to secure She was a Research Assistant at the Joint Research
wireless body area sensor networks for telemedicine and m-health,” IEEE Centre for Biomedical Engineering, Chinese Univer-
Commun. Mag., vol. 44, no. 4, pp. 73–81, Apr. 2006. sity of Hong Kong, Shatin N.T., Hong Kong. She is
[7] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” currently an R&D Engineer at Agilent Technologies
in Proc. 13th Annu. Int. Cryptol. Conf., Santa Barbara, CA, pp. 232– 249, Singapore, Singapore. Her previous research interests
Aug. 1993. included information retrieval, security and fault tolerance, efficient communi-
[8] Information Technology—Security Techniques—Entity Authentication— cations for body sensor networks, and telemedicine systems.
Part 1: General, ISO/IEC Standard 9798-1:1997. Dr. Bao won the Young Investigator Award (YIA) and the YIA Best Pre-
[9] Information Technology—Security Techniques—Key Management— sentation Award at the 6th Asian-Pacific Conference on Medical and Biological
Part 1: Framework, ISO/IEC Standard 11770-1:1996. Engineering in 2005 and the Second Prize of the International Federation for
[10] Information Technology—Security Techniques—Key Management—Part Medical and Biological Engineering (IFMBE) Outstanding Chinese Student
1: Mechanisms Using Symmetric Techniques, ISO/IEC Standard 11770- Award at the 27th Annual International Conference of the IEEE Engineering in
2:1996. Medicine and Biology Society in 2005.
BAO et al.: USING THE TIMING INFORMATION OF HEARTBEATS AS AN ENTITY IDENTIFIER TO SECURE BODY SENSOR NETWORK 779
Carmen C. Y. Poon (S’05–M’08) received the Dr. Zhang has been active in the IEEE Engineering in Medicine and Biology
B.A.Sc. degree in engineering science (Biomedical Society (EMBS). He was the Technical Program Chair of the 20th Annual In-
Option) and the M.A.Sc. degree in biomedical engi- ternational Conference in 1998 and the General Conference Chair of the 27th
neering from the University of Toronto, ON, Canada, Annual International Conference in 2005. He was the Technical Programme
and the Ph.D. degree from Chinese University of Committee (TPC) Chair of the IEEE-EMBS Summer School and Symposium
Hong Kong, Shatin N.T., Hong Kong. on Medical Devices and Biosensors (ISSS-MDBS) in 2006. He was elected as
She was a Postdoctoral Fellow at Chinese Uni- an AdCom member in 1999 and served as the Vice President (Conferences)
versity of Hong Kong. She is currently with the in 2000. He was also an Associate Editor for the IEEE TRANSACTIONS ON
Joint Research Centre for Biomedical Engineering, BIOMEDICAL ENGINEERING and the IEEE TRANSACTIONS ON MOBILE COMPUT-
Chinese University of Hong Kong. Her current re- ING. He was also the Guest Editor of the IEEE COMMUNICATION MAGAZINE
search interests include biosignal processing, biosys- and IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE. He
tem modeling, and development of wearable medical devices for telemedicine has been selected as the Editor-in-Chief of the IEEE TRANSACTIONS ON IN-
and m-Health. FORMATION TECHNOLOGY IN BIOMEDICINE. He is currently a member of the
Dr. Poon was awarded the First Prize of the International Federation for Editorial Board of the Book Series of Biomedical Engineering (IEEE Press),
Medical and Biological Engineering (IFMBE) Outstanding Chinese Student the IEEE-EMBS Technical Committee of Wearable Systems and Sensors, the
Award at the 27th Annual International Conference of the IEEE Engineering in Editorial Committee of China Medical Device Information, and an Associate
Medicine and Biology Society in 2005. Editor of the International Journal of NeuroEngineering and Rehabilitation.
He is an honorary advisor of the Hong Kong Medical and Healthcare Device
Manufacture Association. He has received numerous awards and recognitions
that include the Fellow of the International Academy of Medical and Biological
Engineering, the Fellow of the American Institute for Medical and Biological
Engineering, and the 2006 recipient of the IEEE-EMBS Service Award.
Yuan-Ting Zhang (M’90–SM’93–F’06) received
the Master’s degree from Shandong University, Jinan,
China, and the Ph.D. degree from the University of
New Brunswick, Fredericton, NB, Canada, in 1990.
From 1989 to 1994, he was a Research Associate
and an Adjunct Assistant Professor at the University
of Calgary, Calgary, AB, Canada. During 1996–1997
and 2000–2001, he was the Chair of the Biomedical Lian-Feng Shen received the B.S. degree in radio
Division, Hong Kong Institution of Engineers. He technology and the M.S. degree in radio communica-
is currently the Head of the Division of Biomedical tions from the Southeast University, Nanjing, China,
Engineering and the Director of the Joint Research in 1978 and 1982, respectively.
Centre for Biomedical Engineering, Chinese University of Hong Kong, Shatin Since 1997, he has been a Professor at the Na-
N.T., Hong Kong. He is also the Director of the Key Laboratory of Biomedical tional Mobile Communications Research Laboratory,
Informatics and Health Engineering, Chinese Academy of Sciences, and the Southeast University. His current research interests
Chairman (Adjunct) of the Department of Biomedical Engineering, Sun Yat- include information theory and technologies, coding
sen Medical School, Sun Yat-Sen University, Guangzhou, China. His current theory, and wireless and mobile communications. He
research interests include neural engineering, terahertz (THz) imaging, wearable has been recently focusing on the broadband mobile
medical devices, and body sensor networks particularly for mobile health and communications including wireless Internet technol-
telemedicine. He is the author or coauthor of more than 300 scientific articles ogy, broadband wireless access systems, intelligent home networks, wireless
in the area of biomedical engineering. sensor networks, and broadband wireless multimedia communications.