False alarm detection using dynamic threshold in medical wireless sensor networks
- 11 Downloads
Sensor networks suffer from various sensor faults and false measurements in healthcare application and this vulnerability of the delay should handle efficiently and timely response in various application of WSN. For instance, in healthcare application, the false measurements generate false alarms which require to take unnecessary action from the healthcare department. The quality of the health care service can improve in remote healthcare monitoring system by introducing a new approach to identify the true medical condition and differentiate true and false alarms. In this paper, we proposed a novel approach to analysis past historical data collected from various medical sensors to identify the sensor anomaly. The main goal of this approach is to differentiate between true and false alarms effectively. The proposed system analysis the historical data to predicts the sensor value which compares with real sensed values at a time incident. The dynamically adjust the threshold value by comparing the difference between predicted value and historic value to determine the anomaly of sensor value. This system has been worked on huge real-time healthcare dataset and result shows that the new approach has been applied on real healthcare datasets and result of this system shows the detection rate is high and false positive rate is low which conclude that this approach is very useful in WSN application such as health monitoring system and it will be competitive with others.
KeywordsMedical sensors Healthcare monitoring system Anomaly detection Prediction Sensor fault True alarm Correlation Feature extraction Dynamic threshold
Compliance with ethical standards
Conflict of interest
Authors declares no conflict of interest.
This article does not contain any studies with animals performed by any of the authors.
- 5.Crossbow Technology, Inc. MICAz ZigBee Series (MPR2400). Retrieved August 1, 2014, from http://www.xbow.com/Products/productsdetails.aspx?sid=101.
- 6.Hall, M., Witten, I., & Frank, E. (2011). Data mining: Practical machine learning tools and techniques. Burlington, MA: Morgan Kaufmann Publishers.Google Scholar
- 8.Bahrepour, M., Meratnia, N., Poel, M., Taghikhaki, Z., & Havinga, P. J. M. (2010). Distributed event detection in wireless sensor networks for disaster management. In Proceedings of 2010 2nd international conference on intelligent networking and collaborative systems (INCOS), Thessaloniki, Greece, 24–26 November 2010 (pp. 507–512).Google Scholar
- 9.Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., & Furht, B. (2013). Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In Proceedings of 2013 IEEE international conference on communications (ICC), Budapest, Hungary, 9–13 June 2013 (pp. 4373–4378).Google Scholar
- 11.Sheng, B., Li, Q., Mao, W., & Jin, W. (2007). Outlier detection in sensor networks. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, Montreal, QC, Canada, 9–14 September 2007.Google Scholar
- 15.Grgic, K., Žagar, D., & Križanović, V. (2012). Medical applications of wireless sensor networks—Current status and future directions. MedicinskiGlasnik,9(1), 23–31.Google Scholar
- 16.PhysioNet. Retrieved 5 July, 2014, from http://www.physionet.org/physiobank/database/mimicdb/.
- 17.Miao, X., Song, H., & Biming, T. (2011). Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks. In Proceedings of 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), Changsha, China, 16–18 November 2011 (pp. 564–571).Google Scholar
- 18.Pham, D. M., Aziz, S. M. (2011). FPGA architecture for object extraction in wireless multimedia sensor network. In Proceedings of seventh international conference on intelligent sensors, sensor networks and information processing (ISSNIP2011), Adelaide, Australia, 6–9 December 2011 (pp. 294–299).Google Scholar
- 22.Haque, S. A., & Aziz, S. M. (2013). Storage node based routing protocol for wireless sensor networks. In Proceedings of 2013 seventh international conference on sensing technology (ICST), Wellington, New Zealand, 3–5 December 2013 (pp. 725–729).Google Scholar
- 23.Chipara, O., Lu, C., Bailey, T. C., & Roman, G.-C. (2010). Reliable clinical monitoring using wireless sensor networks: Experiences in a step-down hospital unit. In Proceedings of the 8th ACM conference on embedded networked sensor systems, Zurich, Switzerland, 3–5 November 2010 (pp. 155–168).Google Scholar
- 24.Miao, X., Jiankun, H., & Biming, T. (2012). Histogram-based online anomaly detection in hierarchical wireless sensor networks. In Proceedings of 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (TrustCom), Liverpool, UK, 25–27 June 2012 (pp. 751–759).Google Scholar
- 25.Shaari, F., Bakar, A., & Hamdan, A. (2009). A predictive analysis on medical data based on outlier detection method using non-reduct computation. In Advanced data mining and applications (pp. 603–610). Heidelberg: Springer.Google Scholar
- 26.Aggarwal, C. C., & Yu, P. S. (2001). Outlier detection for high dimensional data. In Proceedings of the 2001 ACM SIGMOD international conference on management of data, Santa Barbara, CA, USA, 21–24 May 2001.Google Scholar
- 28.Chipara, O., Lu, C., Bailey, T. C., & Roman, G. C. (2010). Reliable clinical monitoring using wireless sensor networks: Experiences in a step-down hospital unit. In Proceedings of the 8th ACM conference on embedded networked sensor systems (SenSys’10) (pp. 155–168).Google Scholar
- 30.Vretzakis, G., Georgopoulou, S., Stamoulis, K., Tassoudis, V., Mikroulis, D., Giannoukas, A., et al. (2013). Monitoring of brain oxygen saturation (INVOS) in a protocol to direct blood transfusions during cardiac surgery: A prospective randomized clinical trial. Journal of Cardiothoracic Surgery. https://doi.org/10.1186/1749-8090-8-145.CrossRefGoogle Scholar