Elektor Offer: Enjoy 50% off an annual subscription to Elektor GOLD (print + digital) or Elektor GREEN (digital). This offer is available in English, German,...
The Ticket Fairy is tech’s best hope against Ticketmaster
Ticketmaster’s dominance has led to big service fees, scalpers galore and exclusive contracts that some people argue exploit venues and artists. The approval of venue operator and artist management giant Live Nation’s merger with Ticketmaster in 2010 produced an anti-competitive juggernaut. The Department of Justice is reviewing allegations brought by Ticketmaster’s biggest competitor AEG that […]
Ultra Wideband Chipset Market is driven by increasing interest in the ultra wideband technology and growing investments toward the development of the same, the ultra wideband chipset market is expected to reach a value of US$ 31 Mn by 2030
Medium Access Control (MAC) for Wireless Body Area Network (WBAN): Superframe structure, multiple access technique, taxonomy, and challenges - Human-centric Computing and Information Sciences
Health monitoring using biomedical sensors has witnessed significant attention in recent past due to the evolution of a new research area in sensor network known as Wireless Body Area Networks (WBANs). In WBANs, a number of implantable, wearable, and off-body biomedical sensors are utilized to monitor various vital signs of patient’s body for early detection, and medication of grave diseases. In literature, a number of Medium Access Control (MAC) protocols for WBANs have been suggested for addressing the unique challenges related to reliability, delay, collision and energy in the new research area. The design of MAC protocols is based on multiple access techniques. Understanding the basis of MAC protocol designs for identifying their design objectives in broader perspective, is a quite challenging task. In this context, this paper qualitatively reviews MAC protocols for WBANs. Firstly, 802.15.4 and 802.15.6 based MAC Superframe structures are investigated focusing on design objectives. Secondly, different multiple access techniques such as TDMA, CSMA/CA, Slotted Aloha and Hybrid are explored in terms of design goals. Thirdly, a two-layered taxonomy is presented for MAC protocols. First layer classification is based on multiple access techniques, whereas second layer classification is based on design objectives and characteristics of MAC protocols. Critical and qualitative analysis is carried out for each considered MAC protocol. Comparative study of different MAC protocols is also performed. Finally, some open research challenges in the area are identified with initial research directions.
Optimized design and performance analysis of wearable antenna sensors for wireless body area network applications
Over the past decade, the continuous development and the high level of maturity of wireless sensor networks resulted in new networks called wireless body area networks (WBANs), which are an emergin...
Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication
Radiative communication using electro-magnetic (EM) fields amongst the wearable and implantable devices act as the backbone for information exchange around a human body, thereby enabling prime applications in the fields of connected healthcare, electroceuticals, ...
US20150339658A1 - Method of authentication between a mobile terminal and a processing terminal - Google Patents
A method is provided for authentication between a mobile terminal, located less than a predefined distance from the body of a user, and a processing terminal. The mobile terminal includes an antenna constituting a radio interface suitable for transmitting and receiving radio signals through the body of the user, and the processing terminal is suitable for transmitting and receiving radio signals through the body of the user. The method includes: approaching a user interface of the processing terminal with a portion of the body, triggering an activation of the processing terminal and establishing communication between the processing terminal and the mobile terminal; requesting the entering of a piece of personal authentication data; memorizing the authentication data entered; sending the authentication data through the body; receiving a result of a check of the authentication data carried out by the terminal; and checking the result.
US9842329B2 - Body area network for secure payment - Google Patents
Disclosed is a method performed in a system comprising a first Body Area Network (BAN) enabled device and a second BAN enabled device, for performing secure payment at a payment counter by a user of the first and the second BAN enabled devices, the user wearing or carrying the first and the second BAN enabled devices; where the first and the second BAN enabled devices are paired for authorizing the user by the second BAN enabled device; the method comprises: establishing a connection between the payment counter and the first BAN enabled device; sending a BAN signal via BAN from the first BAN enabled device to the second BAN enabled device requiring confirmation from the second BAN enabled device that the second BAN enabled device is in contact with the user's body; receiving a confirmation BAN signal via BAN from the second BAN enabled device to the first BAN enabled device confirming that the second BAN enabled device is in contact with the user's body; receiving a request for payment from the payment counter in the first and/or second BAN enabled device; and confirming the requested payment in the first and/or second BAN enabled device.
Your body is your internet -- and now it can't be hacked
Engineers have tightened security on the 'internet of body.' Now, the network you didn't know you had is only accessible by you and your devices, thanks to technology that keeps communication signals within the body itself.
Purdue Ventures invests in wearable communication chip company Ixana @PurdueRP
Ixana’s patented high-speed Wi-R silicon chip communicates with 100 times more energy efficiency and is more secure than traditional wireless technologies
‘Body internet’ may eliminate the need for smartphones by changing how we use technology
What if the end of the smartphone era is caused by the ability to use your skin — instead of a screen or even voice commands — to interface with the internet? Or by using your mind to control devices without looking at them?
EvoNexus Company, Ixana: ‘Body Internet’ May Eliminate the Need for Smartphones by Changing How We Use Technology
Ixana CTO Shreyas Sen is developing innovations for the post-smartphone era, in which people collaborate with technology rather than simply coexist with devices
What is Impulse-Radio Ultra-Wideband (IR-UWB) Radar Technology? - everything RF
Impulse-Radio Ultra-Wideband (IR-UWB) radar is a type of radar technology that operates by emitting short-duration pulses with very low power across an extremely wide fre
Is winter coming? Quantum computing’s trajectory in the years ahead
Although the path ahead for quantum computing is anything but certain, our analysis suggests companies will have the resources needed to make continued progress.
Accelerating technological breakthroughs, increasing investment flows, start-up proliferation, and promises of capable quantum systems by 2030 signal it’s time for business leaders to begin planning their quantum-computing strategies.