134 results on '"IoMT"'
Search Results
2. SECANT: Cyberthreat Intelligence in IoMT Ecosystems
- Author
-
Spyros, Arnolnt, Kavallieros, Dimitrios, Tsikrika, Theodora, Vrochidis, Stefanos, Kompatsiaris, Ioannis, Akhgar, Babak, Series Editor, Gkotsis, Ilias, editor, Kavallieros, Dimitrios, editor, Stoianov, Nikolai, editor, Vrochidis, Stefanos, editor, and Diagourtas, Dimitrios, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM).
- Author
-
Marchang, Jims, McDonald, Jade, Keishing, Solan, Zoughalian, Kavyan, Mawanda, Raymond, Delhon-Bugard, Corentin, Bouillet, Nicolas, and Sanders, Ben
- Subjects
COMPUTER network traffic ,INTERNET of things ,TRUST ,PATIENT monitoring ,USER experience - Abstract
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices' security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices' overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system's performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user's experience and trust level of such a system will be tested. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. The role of blockchain to secure internet of medical things
- Author
-
Yazeed Yasin Ghadi, Tehseen Mazhar, Tariq Shahzad, Muhammad Amir khan, Alaa Abd-Alrazaq, Arfan Ahmed, and Habib Hamam
- Subjects
IoMT ,Blockchain ,IoT ,Challenges ,Integration ,Solutions ,Medicine ,Science - Abstract
Abstract This study explores integrating blockchain technology into the Internet of Medical Things (IoMT) to address security and privacy challenges. Blockchain’s transparency, confidentiality, and decentralization offer significant potential benefits in the healthcare domain. The research examines various blockchain components, layers, and protocols, highlighting their role in IoMT. It also explores IoMT applications, security challenges, and methods for integrating blockchain to enhance security. Blockchain integration can be vital in securing and managing this data while preserving patient privacy. It also opens up new possibilities in healthcare, medical research, and data management. The results provide a practical approach to handling a large amount of data from IoMT devices. This strategy makes effective use of data resource fragmentation and encryption techniques. It is essential to have well-defined standards and norms, especially in the healthcare sector, where upholding safety and protecting the confidentiality of information are critical. These results illustrate that it is essential to follow standards like HIPAA, and blockchain technology can help ensure these criteria are met. Furthermore, the study explores the potential benefits of blockchain technology for enhancing inter-system communication in the healthcare industry while maintaining patient privacy protection. The results highlight the effectiveness of blockchain’s consistency and cryptographic techniques in combining identity management and healthcare data protection, protecting patient privacy and data integrity. Blockchain is an unchangeable distributed ledger system. In short, the paper provides important insights into how blockchain technology may transform the healthcare industry by effectively addressing significant challenges and generating legal, safe, and interoperable solutions. Researchers, doctors, and graduate students are the audience for our paper.
- Published
- 2024
- Full Text
- View/download PDF
5. Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)
- Author
-
Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet, and Ben Sanders
- Subjects
IoMT ,IoT ,patient health monitoring ,secure monitoring ,secure healthcare ,RTPM ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices’ overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system’s performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user’s experience and trust level of such a system will be tested.
- Published
- 2024
- Full Text
- View/download PDF
6. The role of blockchain to secure internet of medical things.
- Author
-
Ghadi, Yazeed Yasin, Mazhar, Tehseen, Shahzad, Tariq, Amir khan, Muhammad, Abd-Alrazaq, Alaa, Ahmed, Arfan, and Hamam, Habib
- Subjects
- *
DATA privacy , *DATA protection , *HEALTH care industry , *COMMUNICATIONS industries , *MEDICAL technology , *BLOCKCHAINS - Abstract
This study explores integrating blockchain technology into the Internet of Medical Things (IoMT) to address security and privacy challenges. Blockchain's transparency, confidentiality, and decentralization offer significant potential benefits in the healthcare domain. The research examines various blockchain components, layers, and protocols, highlighting their role in IoMT. It also explores IoMT applications, security challenges, and methods for integrating blockchain to enhance security. Blockchain integration can be vital in securing and managing this data while preserving patient privacy. It also opens up new possibilities in healthcare, medical research, and data management. The results provide a practical approach to handling a large amount of data from IoMT devices. This strategy makes effective use of data resource fragmentation and encryption techniques. It is essential to have well-defined standards and norms, especially in the healthcare sector, where upholding safety and protecting the confidentiality of information are critical. These results illustrate that it is essential to follow standards like HIPAA, and blockchain technology can help ensure these criteria are met. Furthermore, the study explores the potential benefits of blockchain technology for enhancing inter-system communication in the healthcare industry while maintaining patient privacy protection. The results highlight the effectiveness of blockchain's consistency and cryptographic techniques in combining identity management and healthcare data protection, protecting patient privacy and data integrity. Blockchain is an unchangeable distributed ledger system. In short, the paper provides important insights into how blockchain technology may transform the healthcare industry by effectively addressing significant challenges and generating legal, safe, and interoperable solutions. Researchers, doctors, and graduate students are the audience for our paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Trusted Composition of Internet of Medical Things over Imperfect Networks.
- Author
-
Ahmad, Ehsan, Larson, Brian, and Banga, Abdulbasid
- Subjects
VERBAL behavior ,INTERNET of things ,TRUST ,ARCHITECTURAL design ,SYSTEMS software ,MEDICAL equipment - Abstract
The Internet of Medical Things (IoMT) represents a specialized domain within the Internet of Things, focusing on medical devices that require regulatory approval to ensure patient safety. Trusted composition of IoMT systems aims to ensure high assurance of the entire composed system, despite potential variability in the assurance levels of individual components. Achieving this trustworthiness in IoMT systems, especially when using less-assured, commercial, off-the-shelf networks like Ethernet and WiFi, presents a significant challenge. To address this challenge, this paper advocates a systematic approach that leverages the Architecture Analysis & Design Language (AADL) along with Behavior Language for Embedded Systems with Software (BLESS) specification and implementation. This approach aims to provide high assurance on critical components through formal verification, while using less-assured components in a manner that maintains overall system determinism and reliability. A clinical case study involving an automated opioid infusion monitoring IoMT system is presented to illustrate the application of the proposed approach. Through this case study, the effectiveness of the systemic approach in achieving trusted composition of heterogeneous medical devices over less-assured networks is demonstrated. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. An empirical study on rising application of (IoT+ medical solution= IoMTS) with integration of wearable devices and disease monitoring
- Author
-
Ashokrao, Patil Rahul, Radhakrishna, Derle Deepak, Burje, Shrikant, Sinha, Anurag, Yazdani, Ghulam, Raj, Neeraj, Alkhayyat, Ahmad, Ojha, Rajat, Chan, Albert P. C., Series Editor, Hong, Wei-Chiang, Series Editor, Mellal, Mohamed Arezki, Series Editor, Narayanan, Ramadas, Series Editor, Nguyen, Quang Ngoc, Series Editor, Ong, Hwai Chyuan, Series Editor, Sachsenmeier, Peter, Series Editor, Sun, Zaicheng, Series Editor, Ullah, Sharif, Series Editor, Wu, Junwei, Series Editor, Zhang, Wei, Series Editor, Murugan, R, editor, Karsh, Ram Kumar, editor, Goel, Tripti, editor, and Laskar, Rabul Hussain, editor
- Published
- 2024
- Full Text
- View/download PDF
9. An End-to-End Secure Solution for IoMT Data Exchange
- Author
-
El Jaouhari, Saad, Tamani, Nouredine, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, van Leeuwen, Jan, Series Editor, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Kobsa, Alfred, Series Editor, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Nierstrasz, Oscar, Series Editor, Pandu Rangan, C., Editorial Board Member, Sudan, Madhu, Series Editor, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Weikum, Gerhard, Series Editor, Vardi, Moshe Y, Series Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, and Andreoni, Martin, editor
- Published
- 2024
- Full Text
- View/download PDF
10. IoT-Based Patient Monitoring System
- Author
-
Yew, Hoe Tung, Wong, Guang Xing, Wong, Farrah, Mamat, Mazlina, Chung, Seng Kheau, Fortino, Giancarlo, Series Editor, Liotta, Antonio, Series Editor, Yew, Hoe Tung, editor, Mamat, Mazlina, editor, Dargham, Jamal Ahmad, editor, Seng Kheau, Chung, editor, and Moung, Ervin Gubin, editor
- Published
- 2024
- Full Text
- View/download PDF
11. Decentralized Pub/Sub Architecture for Real-Time Remote Patient Monitoring: A Feasibility Study
- Author
-
Haque, Kazi Nymul, Islam, Johirul, Ahmad, Ijaz, Harjula, Erkki, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Särestöniemi, Mariella, editor, Keikhosrokiani, Pantea, editor, Singh, Daljeet, editor, Harjula, Erkki, editor, Tiulpin, Aleksei, editor, Jansson, Miia, editor, Isomursu, Minna, editor, van Gils, Mark, editor, Saarakkala, Simo, editor, and Reponen, Jarmo, editor
- Published
- 2024
- Full Text
- View/download PDF
12. A Systematic Analysis Based on Blockchain and IoT Are Leading the Way for Effective Data Management
- Author
-
Kanhere, Satwik, Pandey, Shivam Kumar, Kaur, Amanpreet, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Pandit, Manjaree, editor, Gaur, M. K., editor, and Kumar, Sandeep, editor
- Published
- 2024
- Full Text
- View/download PDF
13. IoT-Enabled Patient Assisting Device Using Ubidots Webserver
- Author
-
Santhosh, Chella, Kanakaraja, P., Kumar, M. Ravi, Sravani, C. H. Sai, Ramjee, V., Asish, Y., Fortino, Giancarlo, Series Editor, Liotta, Antonio, Series Editor, Gunjan, Vinit Kumar, editor, Ansari, Mohd Dilshad, editor, Usman, Mohammed, editor, and Nguyen, ThiDieuLinh, editor
- Published
- 2024
- Full Text
- View/download PDF
14. Secure and Energy-Efficient Framework for Internet of Medical Things (IoMT)-Based Healthcare System
- Author
-
Dewan, Ritu, Nagpal, Tapsi, Ahmad, Sharik, Rana, Arun Kumar, Islam, Sardar M. N., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Namasudra, Suyel, editor, Trivedi, Munesh Chandra, editor, Crespo, Ruben Gonzalez, editor, and Lorenz, Pascal, editor
- Published
- 2024
- Full Text
- View/download PDF
15. Internet of Medical Things Security Frameworks for Risk Assessment and Management: A Scoping Review
- Author
-
Svandova K and Smutny Z
- Subjects
cybersecurity ,healthcare ,information systems ,iomt ,internet of things ,iot ,threat ,sensors. ,Medicine (General) ,R5-920 - Abstract
Katerina Svandova,* Zdenek Smutny* Faculty of Informatics and Statistics, Prague University of Economics and Business, Prague, Czech Republic*These authors contributed equally to this workCorrespondence: Zdenek Smutny, Faculty of Informatics and Statistics, Prague University of Economics and Business, W. Churchill Sq. 1938/4, 130 67 Prague 3, Prague, Czech Republic, Email zdenek.smutny@vse.czBackground: The massive expansion of the Internet of medical things (IoMT) technology brings many opportunities for improving healthcare. At the same time, their use increases security risks, brings security and privacy concerns, and threatens the functioning of healthcare facilities or healthcare provision.Purpose: This scoping review aims to identify progress in designing risk assessment and management frameworks for IoMT security. The frameworks found are divided into two groups according to whether frameworks address the technological design of risk management or assess technological measures to ensure the security of the IoMT environment. Furthermore, the article intends to find out whether frameworks also include an assessment of organisational measures related to IoMT security.Methods: This review was prepared using PRISMA ScR guidelines. Relevant studies were searched in the citation databases Web of Science and Scopus. The search was limited to articles published in English between 2018 and 17 September 2023. The initial search yielded 1341 articles, of which 44 (3.3%) were included in the scoping review. A qualitative content analysis focused on selected security perspectives and progress in the given area was carried out.Results: Thirty-two articles describe the design of risk assessment and management frameworks. Twelve articles describe the design of frameworks for assessing the security of IoMT devices and possibly offer a comparison of different IoMT alternatives. A description of the included articles was prepared from the selected security perspectives.Conclusion: The review shows the need to create comprehensive or holistic frameworks for operational security and privacy risk management at all layers of the IoMT architecture. It includes the design of specific technological solutions and frameworks for continuously assessing the overall level of information security and privacy of the IoMT environment. Unfortunately, none of the found frameworks offer an assessment of organizational measures even though the importance of the organization measures was highlighted in articles. Another area of interest for researchers could be the design of a general risk management database for IoMT, which would include potential IoMT-related risks connected to a particular device.Keywords: cybersecurity, healthcare, information systems, IoMT, internet of things, IoT, threat, sensors
- Published
- 2024
16. Machine learning based intrusion detection system for IoMT.
- Author
-
Kulshrestha, Priyesh and Vijay Kumar, T. V.
- Abstract
Millennials have the advantage of accessing readily available modern scientific advancements, particularly in technology. One of these technologies that encompasses varied functionalities is the Internet of Things (IoT). In the midst of the Covid-19 pandemic, IoT, specifically Internet of Medical Things (IoMT), had pivotal significance in monitoring and tracking different health parameters. It autonomously manages an individual's health data and stores the same as Electronic Health Records (EHRs). However, the networking protocols used by IoMT are not adequate enough to ensure the security and privacy of EHRs. Consequently, such technology is susceptible to cyber-attacks, which have become more prevalent over time and have taken various forms, that generally the stakeholders are not aware of. This paper introduces machine learning-driven intrusion detection systems as a solution to tackle this issue. The focus of this study is on devising a Machine Learning (ML) oriented Intrusion Detection System (IDS) designed to identify cyber-attacks targeting IoMT based systems. Several classification based ML techniques such as Multinomial Naive Bayes, Logistic Regression, Logistic Regression with Stochastic Gradient Descent, Linear Support Vector Classification, Decision Tree, Ensemble Voting Classifier, Bagging, Random Forest, Adaptive Boosting, Gradient Boosting and Extreme Gradient Boosting were used, whereupon the Adaptive Boosting was experimentally found to perform the best on performance metrics such as accuracy, precision, recall, F1-score, False Detection Rate (FDR) and False Positive Rate (FPR). Further, it was found that Adaptive boosting based IDS for IoMT performed comparatively better than the existing ToN_IoT based IDS models on performance metrics such as accuracy, F1-score, FPR and FDR. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Enabling blockchain for Saudi Arabia drug supply chain using Internet of Things (IoT).
- Author
-
Alshahrani, Saeed M.
- Subjects
DRUG accessibility ,INTERNET of things ,SUPPLY chains ,BLOCKCHAINS ,DATA integrity - Abstract
The availability of drugs across the country is a direct measure for fairer public health. Several issues have been reported drastically related to various organizations that fail to provide quality medicines on time. There has been a consistent increase in cases where the treatment, as well as exempted drugs, were supplied due to the unavailability of proper traceability of the supply chain. Several parties are involved in the supply and have similar interests that may defer the adequate shareability of the drugs. The existing system for managing the drug supply chain suffers from several backlogs. The loss of information, unavailability of resources to track the proper medicinal storage, transparency of information sharing between various stakeholders and sequential access. The applicability of the decentralized model emerging from the blockchain can apply to one of the perfect solutions in this case. The drug traceability chain can be deployed to a Ledger-based blockchain that may result in decentralized information. Continuous supply from the Internet of Things (IoT) based devices might be handy as the middleware for providing a trustworthy, safe, and proper transaction-oriented system. The data integrity, along with the provenance resulting from the IoT-connected devices, is an effective solution towards managing the supply chain and drug traceability. This study presents a model that can provide a token-based blockchain that will help provide a cost-efficient and secure system for a reliable drug supply chain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications.
- Author
-
Alrubayyi, Hadeel, Alshareef, Moudy Sharaf, Nadeem, Zunaira, Abdelmoniem, Ahmed M., and Jaber, Mona
- Subjects
DATA privacy ,ARTIFICIAL intelligence ,INTERNET of things ,DATA protection ,QUALITY of service ,INTERNET privacy - Abstract
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. A secure data transmission framework for IoT enabled healthcare
- Author
-
Sohail Saif, Priya Das, Suparna Biswas, Shakir Khan, Mohd Anul Haq, and Viacheslav Kovtun
- Subjects
IoT ,Encryption ,Security ,Healthcare ,IoMT ,Science (General) ,Q1-390 ,Social sciences (General) ,H1-99 - Abstract
The Internet of Medical Things (IoMT) has transformed healthcare by connecting medical devices, sensors, and patients, significantly improving patient care. However, the sensitive data exchanged through IoMT is vulnerable to security attacks, raising serious privacy concerns. Traditional key sharing mechanisms are susceptible to compromise, posing risks to data integrity. This paper proposes a Timestamp-based Secret Key Generation (T-SKG) scheme for resource-constrained devices, generating a secret key at the patient's device and regenerating it at the doctor's device, thus eliminating direct key sharing and minimizing key compromise risks. Simulation results using MATLAB and Java demonstrate the T-SKG scheme's resilience against guessing, birthday, and brute force attacks. Specifically, there is only a 9 % chance of key compromise in a guessing attack if the attacker knows the key sequence pattern, while the scheme remains secure against brute force and birthday attacks within a specified timeframe. The T-SKG scheme is integrated into a healthcare framework to securely transmit health vitals collected using the MySignals sensor kit. For confidentiality, the Data Encryption Standard (DES) with various Cipher Block modes (ECB, CBC, CTR) is employed.
- Published
- 2024
- Full Text
- View/download PDF
20. Revolutionizing Healthcare through the Internet of Things: Current State and Future Implications.
- Author
-
Shantinath, Barwade Rohit, Sabnis, Vikrant, and Jain, Jay Kumar
- Subjects
INTERNET of things ,MEDICAL care costs ,MEDICAL personnel ,PATIENT participation ,MEDICAL care ,PATIENT monitoring - Abstract
The Internet of Things (IoT) has the potential to completely transform healthcare by allowing medical professionals to remotely monitor patients, gather data on their activity and health in real-time, and create more efficient treatment regimens. IoT technologies have the potential to save healthcare expenditures while also enhancing patient involvement and improving patient outcomes. However, the adoption of IoMT has been slow, and To ensure that the advantages of IoT are realised while reducing the hazards connected with its use, a number of hurdles must be overcome. The purpose of this research paper is to examine the current state of IoT implementation in healthcare, identify the benefits and challenges of IoMT, and explore the future implications of IoMT. The study starts off with a survey of the literature that has already been written on the use of IoT technology in healthcare, highlighting both the potential advantages and difficulties of doing so. The paper then presents the results of a survey of healthcare providers on the use of IoT technologies in healthcare, providing insights into the current state of IoT implementation in healthcare and the challenges that must be addressed to facilitate its adoption. [ABSTRACT FROM AUTHOR]
- Published
- 2024
21. Enabling blockchain for Saudi Arabia drug supply chain using Internet of Things (IoT)
- Author
-
Saeed M. Alshahrani
- Subjects
IoMT ,Blockchain ,Medical ,IoT ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The availability of drugs across the country is a direct measure for fairer public health. Several issues have been reported drastically related to various organizations that fail to provide quality medicines on time. There has been a consistent increase in cases where the treatment, as well as exempted drugs, were supplied due to the unavailability of proper traceability of the supply chain. Several parties are involved in the supply and have similar interests that may defer the adequate shareability of the drugs. The existing system for managing the drug supply chain suffers from several backlogs. The loss of information, unavailability of resources to track the proper medicinal storage, transparency of information sharing between various stakeholders and sequential access. The applicability of the decentralized model emerging from the blockchain can apply to one of the perfect solutions in this case. The drug traceability chain can be deployed to a Ledger-based blockchain that may result in decentralized information. Continuous supply from the Internet of Things (IoT) based devices might be handy as the middleware for providing a trustworthy, safe, and proper transaction-oriented system. The data integrity, along with the provenance resulting from the IoT-connected devices, is an effective solution towards managing the supply chain and drug traceability. This study presents a model that can provide a token-based blockchain that will help provide a cost-efficient and secure system for a reliable drug supply chain.
- Published
- 2024
- Full Text
- View/download PDF
22. Trusted Composition of Internet of Medical Things over Imperfect Networks
- Author
-
Ehsan Ahmad, Brian Larson, and Abdulbasid Banga
- Subjects
Architecture Analysis & Design Language ,AADL ,Behavior Language for Embedded Systems with Software ,BLESS ,IoT ,IoMT ,Information technology ,T58.5-58.64 - Abstract
The Internet of Medical Things (IoMT) represents a specialized domain within the Internet of Things, focusing on medical devices that require regulatory approval to ensure patient safety. Trusted composition of IoMT systems aims to ensure high assurance of the entire composed system, despite potential variability in the assurance levels of individual components. Achieving this trustworthiness in IoMT systems, especially when using less-assured, commercial, off-the-shelf networks like Ethernet and WiFi, presents a significant challenge. To address this challenge, this paper advocates a systematic approach that leverages the Architecture Analysis & Design Language (AADL) along with Behavior Language for Embedded Systems with Software (BLESS) specification and implementation. This approach aims to provide high assurance on critical components through formal verification, while using less-assured components in a manner that maintains overall system determinism and reliability. A clinical case study involving an automated opioid infusion monitoring IoMT system is presented to illustrate the application of the proposed approach. Through this case study, the effectiveness of the systemic approach in achieving trusted composition of heterogeneous medical devices over less-assured networks is demonstrated.
- Published
- 2024
- Full Text
- View/download PDF
23. Intrusion Detection System for Internet of Medical Things
- Author
-
Kulshrestha, Priyesh, Vijay Kumar, T. V., Khari, Manju, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Mishra, Anurag, editor, Gupta, Deepak, editor, and Chetty, Girija, editor
- Published
- 2023
- Full Text
- View/download PDF
24. Performance Evaluation of Internet of Medical Things (IoMT) in Digital Health
- Author
-
Sharma, Amit, Singh, Pradeep Kumar, Nikashina, Polina, Gavrilenko, Vadim, Tselykh, Alexey, Bozhenyuk, Alexander, Kacprzyk, Janusz, Series Editor, Singh, Pradeep Kumar, editor, Wierzchoń, Sławomir T., editor, Pawłowski, Wiesław, editor, Kar, Arpan Kumar, editor, and Kumar, Yugal, editor
- Published
- 2023
- Full Text
- View/download PDF
25. Anomaly Detection in Medical IoT Devices Using Federated Learning
- Author
-
Namratha, M., Anusree, Manoj K., Niha, Pooja, Srinivasan, Arpana, M. Ramaswamy, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Senjyu, Tomonobu, editor, So–In, Chakchai, editor, and Joshi, Amit, editor
- Published
- 2023
- Full Text
- View/download PDF
26. An Intrusion Detection System Using Machine Learning for Internet of Medical Things
- Author
-
Idrissi, Idriss, Boukabous, Mohammed, Grari, Mounir, Azizi, Mostafa, Moussaoui, Omar, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Bekkay, Hajji, editor, Mellit, Adel, editor, Gagliano, Antonio, editor, Rabhi, Abdelhamid, editor, and Amine Koulali, Mohammed, editor
- Published
- 2023
- Full Text
- View/download PDF
27. An Effective Diagnostic Framework for COVID-19 Using an Integrated Approach
- Author
-
Agarwal, Parul, Idrees, Sheikh Mohammad, Obaid, Ahmed J., Abdulbaqi, Azmi Shawkat, Mahmood, Sawsan Dheyaa, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Kumar, Raghvendra, editor, Pattnaik, Prasant Kumar, editor, and R. S. Tavares, João Manuel, editor
- Published
- 2023
- Full Text
- View/download PDF
28. Design and Implementation of IoT-Based Medicine Dispensary Box
- Author
-
Agarwal, Disha, Agarwal, Rajat, Choubey, Dilip Kumar, Shukla, Vaibhav, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Nath, Vijay, editor, and Mandal, Jyotsna Kumar, editor
- Published
- 2023
- Full Text
- View/download PDF
29. Blockchain-Based Secure Smart Health IoT solution Using RBAC Architecture.
- Author
-
Abushmmala, Faten F. and AbuSamra, Aiman
- Subjects
- *
BLOCKCHAINS , *ACCESS control , *INTERNET of things , *DATA integrity , *HUMAN services - Abstract
The revolution of Internet technology, which led to connecting everything through the World Wide Web, the Internet of Things (IoT) emerged to serve this need. IoT technology connects different devices, hardware, and software together, which are created to provide services and facilitate human life. The most critical application is in the health sector, where data privacy, security, and accessibility are demanding and agonizing challenges. In this paper, we use a block chain (BC) model that enforces the Role-Based Access Control (RBAC) model to address privacy and security concerns as well as the limited nature of IoT devices. The paper's concept is to divide the network according to the assigned role, and authentication and data transfer are thoroughly discussed. The Architecture of the proposed system is shown and displayed in flowcharts, where each node has different permissions and privileges. In the experimental part, two scenarios are applied; one where the network (IoT devices) is connected through an MQTT broker as an intermediary, and the second with BC that controls the IoT, which uses proof of assignment as a consensus model. The data flow shows that with BC, the network is much more secure and holds the privacy and integrity of the data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Towards an Effective Service Allocation in Fog Computing.
- Author
-
Alsemmeari, Rayan A., Dahab, Mohamed Yehia, Alturki, Badraddin, Alsulami, Abdulaziz A., and Alsini, Raed
- Subjects
- *
TELECOMMUNICATION systems , *DATA transmission systems , *INTERNET of things , *5G networks , *DATA quality , *FOG - Abstract
The Internet of Things (IoT) generates a large volume of data whenever devices are interconnected and exchange data across a network. Consequently, a variety of services with diverse needs arises, including capacity requirements, data quality, and latency demands. These services operate on fog computing devices, which are limited in power and bandwidth compared to the cloud. The primary challenge lies in determining the optimal location for service implementation: in the fog, in the cloud, or in a hybrid setup. This paper introduces an efficient allocation technique that moves processing closer to the network's fog side. It explores the optimal allocation of devices and services while maintaining resource utilization within an IoT architecture. The paper also examines the significance of allocating services to devices and optimizing resource utilization in fog computing. In IoT scenarios, where a wide range of services and devices coexist, it becomes crucial to effectively assign services to devices. We propose priority-based service allocation (PSA) and sort-based service allocation (SSA) techniques, which are employed to determine the optimal order for the utilizing devices to perform different services. Experimental results demonstrate that our proposed technique reduces data communication over the network by 88%, which is achieved by allocating most services locally in the fog. We increased the distribution of services to fog devices by 96%, while simultaneously minimizing the wastage of fog resources. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things.
- Author
-
Badri, Sahar, Jan, Sana Ullah, Alghazzawi, Daniyal, Aldhaheri, Sahar, and Pitropakis, Nikolaos
- Subjects
BLOCKCHAINS ,INTERNET of things ,TECHNOLOGICAL innovations ,CLOUD computing ,DATA encryption - Abstract
Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospitalmanagement systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating an attributebased encryption scheme. Furthermore, an IoT-friendly consensus algorithm is deployed to ensure fast block validation and high scalability in the IoMT network. The proposed framework can perform multiple healthcare-related services in a secure and trustworthy manner. The performance of blockchain read/write operations is evaluated in terms of transaction throughput and latency. Experimental outcomes indicate that the proposed scheme achieved an average throughput of 857 TPS and 151 TPS for read and write operations. The average latency is 61 ms and 16 ms for read and write operations, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. A Systematic Review of Machine Learning and IoT Applied to the Prediction and Monitoring of Cardiovascular Diseases.
- Author
-
Cuevas-Chávez, Alejandra, Hernández, Yasmín, Ortiz-Hernandez, Javier, Sánchez-Jiménez, Eduardo, Ochoa-Ruiz, Gilberto, Pérez, Joaquín, and González-Serna, Gabriel
- Subjects
CARDIOVASCULAR disease diagnosis ,ONLINE information services ,SYSTEMATIC reviews ,MACHINE learning ,INTERNET of things ,WEARABLE technology ,MEDLINE - Abstract
According to the Pan American Health Organization, cardiovascular disease is the leading cause of death worldwide, claiming an estimated 17.9 million lives each year. This paper presents a systematic review to highlight the use of IoT, IoMT, and machine learning to detect, predict, or monitor cardiovascular disease. We had a final sample of 164 high-impact journal papers, focusing on two categories: cardiovascular disease detection using IoT/IoMT technologies and cardiovascular disease using machine learning techniques. For the first category, we found 82 proposals, while for the second, we found 85 proposals. The research highlights list of IoT/IoMT technologies, machine learning techniques, datasets, and the most discussed cardiovascular diseases. Neural networks have been popularly used, achieving an accuracy of over 90%, followed by random forest, XGBoost, k-NN, and SVM. Based on the results, we conclude that IoT/IoMT technologies can predict cardiovascular diseases in real time, ensemble techniques obtained one of the best performances in the accuracy metric, and hypertension and arrhythmia were the most discussed diseases. Finally, we identified the lack of public data as one of the main obstacles for machine learning approaches for cardiovascular disease prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Monitoring System for Operating Variables in Incubators in the Neonatology Service of a Highly Complex Hospital through the Internet of Things (IoT).
- Author
-
Aya-Parra, Pedro Antonio, Rodriguez-Orjuela, Andres Jacob, Rodriguez Torres, Viviana, Cordoba Hernandez, Nidia Patricia, Martinez Castellanos, Natalia, and Sarmiento-Rojas, Jefferson
- Subjects
- *
INTERNET of things , *ENGINEERING laboratories , *INCUBATORS , *WEB-based user interfaces , *DATABASES - Abstract
Background: Around 15 million premature babies are born annually, requiring specialized care. Incubators are vital for maintaining their body temperature, which is crucial for their well-being. Ensuring optimal conditions in incubators, including constant temperature, oxygen control, and comfort, is essential for improving the care and survival rates of these infants. Methods: To address this, an IoT-based monitoring system was developed in a hospital setting. The system comprised hardware components such as sensors and a microcontroller, along with software components including a database and a web application. The microcontroller collected data from the sensors, which was then transmitted to a broker via WiFi using the MQTT protocol. The broker validated and stored the data in the database, while the web application provided real-time access, alerts, and event recording. Results: Two certified devices were created, employing high quality components. The system was successfully implemented and tested in both the biomedical engineering laboratory and the neonatology service of the hospital. The results of the pilot test supported the concept of IoT-based technology, demonstrating satisfactory responses in temperature, humidity, and sound variables within the incubators. Conclusions: The monitoring system facilitated efficient record traceability, allowing access to data over various timeframes. It also captured event records (alerts) related to variable problems, providing information on duration, date, hour, and minutes. Overall, the system offered valuable insights and enhanced monitoring capabilities for neonatal care. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Realizing contact-less applications with Multi-Access Edge Computing
- Author
-
Pasika Ranaweera, Chamitha de Alwis, Anca D. Jurcut, and Madhusanka Liyanage
- Subjects
Contact-less ,COVID-19 ,MEC ,IoT ,IoMT ,Low-latency ,Information technology ,T58.5-58.64 - Abstract
The entire world progression has ceased with the unexpected outbreak of the COVID-19 pandemic, and urges the requirement for contact-less and autonomous services and applications. Realizing these predominantly Internet of Things (IoT) based applications demands a holistic pervasive computing infrastructure. In this paper, we conduct a survey to determine the possible pervasive approaches for utilizing the Multi-Access Edge Computing (MEC) infrastructure in realizing the requirements of emerging IoT applications. We have formalized specific architectural layouts for the considered IoT applications, while specifying network-level requirements to realize such approaches; and conducted a simulation to test the feasibility of proposed MEC approaches.
- Published
- 2022
- Full Text
- View/download PDF
35. Towards a Low-Cost Companion Robot for Helping Elderly Well-Being
- Author
-
Rincon, J. A., Marco-Detchart, C., Julian, V., Carrascosa, C., Novais, P., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Yin, Hujun, editor, Camacho, David, editor, and Tino, Peter, editor
- Published
- 2022
- Full Text
- View/download PDF
36. Secure Data Transfer and Provenance for Distributed Healthcare
- Author
-
Michala, Anna Lito, Attar, Hani, Vourganas, Ioannis, Chakraborty, Chinmay, editor, and Khosravi, Mohammad R., editor
- Published
- 2022
- Full Text
- View/download PDF
37. Fault Tolerance and Security Management in IoMT
- Author
-
Hireche, Rachida, Mansouri, Houssem, Pathan, Al-Sakib Khan, and Pathan, Al-Sakib Khan, editor
- Published
- 2022
- Full Text
- View/download PDF
38. Internet of Medical Things: Applications and Research Issues in Healthcare Monitoring
- Author
-
Mohapatra, Sulagna, Sahoo, Prasan Kumar, Chlamtac, Imrich, Series Editor, Kher, Rahul K., editor, Paunwala, Chirag, editor, Thakkar, Falgun, editor, Kher, Heena, editor, Paunwala, Mita, editor, Sahoo, Prasan Kumar, editor, and Ladid, Larif, editor
- Published
- 2022
- Full Text
- View/download PDF
39. Using Association Rules to Mine Actionable Knowledge from Internet of Medical Thinks Data
- Author
-
Agapito, Giuseppe, Fortino, Giancarlo, Series Editor, Liotta, Antonio, Series Editor, Comito, Carmela, editor, Forestiero, Agostino, editor, and Zumpano, Ester, editor
- Published
- 2022
- Full Text
- View/download PDF
40. A Multi-component-Based Zero Trust Model to Mitigate the Threats in Internet of Medical Things
- Author
-
Bevish Jinila, Y., Prayla Shyry, S., Christy, A., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Nanda, Priyadarsi, editor, Verma, Vivek Kumar, editor, Srivastava, Sumit, editor, Gupta, Rohit Kumar, editor, and Mazumdar, Arka Prokash, editor
- Published
- 2022
- Full Text
- View/download PDF
41. Resilient Security Framework Using TNN and Blockchain for IoMT.
- Author
-
Alsemmeari, Rayan A., Dahab, Mohamed Yehia, Alsulami, Abdulaziz A., Alturki, Badraddin, and Algarni, Sultan
- Subjects
CYBERTERRORISM ,DATA privacy ,ELECTRONIC data processing ,BLOCKCHAINS ,EMAIL security ,INTERNET of things ,MACHINE learning - Abstract
The growth of the Internet of Things (IoT) devices in the healthcare sector enables the new era of the Internet of Medical Things (IoMT). However, IoT devices are susceptible to various cybersecurity attacks and threats, which lead to negative consequences. Cyberattacks can damage not just the IoMT devices in use but also human life. Currently, several security solutions have been proposed to enhance the security of the IoMT, employing machine learning (ML) and blockchain. ML can be used to develop detection and classification methods to identify cyberattacks targeting IoMT devices in the healthcare sector. Furthermore, blockchain technology enables a decentralized approach to the healthcare system, eliminating some disadvantages of a centralized system, such as a single point of failure. This paper proposes a resilient security framework integrating a Tri-layered Neural Network (TNN) and blockchain technology in the healthcare domain. The TNN detects malicious data measured by medical sensors to find fraudulent data. As a result, cyberattacks are detected and discarded from the IoMT system before data is processed at the fog layer. Additionally, a blockchain network is used in the fog layer to ensure that the data is not altered, enhancing the integrity and privacy of the medical data. The experimental results show that the TNN and blockchain models produce the expected result. Furthermore, the accuracy of the TNN model reached 99.99% based on the F1-score accuracy metric. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Yoga Meets Intelligent Internet of Things: Recent Challenges and Future Directions.
- Author
-
Pal, Rishi, Adhikari, Deepak, Heyat, Md Belal Bin, Ullah, Inam, and You, Zili
- Subjects
- *
YOGA , *INTERNET of things , *YOGA postures , *ORGANS (Anatomy) , *SAFETY , *MACHINE learning , *MENTAL health - Abstract
The physical and mental health of people can be enhanced through yoga, an excellent form of exercise. As part of the breathing procedure, yoga involves stretching the body organs. The guidance and monitoring of yoga are crucial to ripe the full benefits of it, as wrong postures possess multiple antagonistic effects, including physical hazards and stroke. The detection and monitoring of the yoga postures are possible with the Intelligent Internet of Things (IIoT), which is the integration of intelligent approaches (machine learning) and the Internet of Things (IoT). Considering the increment in yoga practitioners in recent years, the integration of IIoT and yoga has led to the successful implementation of IIoT-based yoga training systems. This paper provides a comprehensive survey on integrating yoga with IIoT. The paper also discusses the multiple types of yoga and the procedure for the detection of yoga using IIoT. Additionally, this paper highlights various applications of yoga, safety measures, various challenges, and future directions. This survey provides the latest developments and findings on yoga and its integration with IIoT. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. 5G Technology in Healthcare and Wearable Devices: A Review.
- Author
-
Devi, Delshi Howsalya, Duraisamy, Kumutha, Armghan, Ammar, Alsharari, Meshari, Aliqab, Khaled, Sorathiya, Vishal, Das, Sudipta, and Rashid, Nasr
- Subjects
- *
SURGICAL robots , *5G networks , *WEARABLE technology , *OLDER people , *REHABILITATION centers , *PHYSICAL activity - Abstract
Wearable devices with 5G technology are currently more ingrained in our daily lives, and they will now be a part of our bodies too. The requirement for personal health monitoring and preventive disease is increasing due to the predictable dramatic increase in the number of aging people. Technologies with 5G in wearables and healthcare can intensely reduce the cost of diagnosing and preventing diseases and saving patient lives. This paper reviewed the benefits of 5G technologies, which are implemented in healthcare and wearable devices such as patient health monitoring using 5G, continuous monitoring of chronic diseases using 5G, management of preventing infectious diseases using 5G, robotic surgery using 5G, and 5G with future of wearables. It has the potential to have a direct effect on clinical decision making. This technology could improve patient rehabilitation outside of hospitals and monitor human physical activity continuously. This paper draws the conclusion that the widespread adoption of 5G technology by healthcare systems enables sick people to access specialists who would be unavailable and receive correct care more conveniently. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
- Author
-
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem, and Mona Jaber
- Subjects
IoT ,ML/AI ,security threat ,IoMT ,energy ,artificial immune system ,Information technology ,T58.5-58.64 - Abstract
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, which are empowered by artificial intelligence, need to be investigated with cognisance of security threats and mitigation schemes that are tailored to their specific constraints and requirements. In this work, we present a comprehensive review of security threats in IoT and emerging countermeasures with a particular focus on malware and man-in-the-middle attacks. Next, we elaborate on two use cases: the Internet of Energy Things and the Internet of Medical Things. Innovative artificial intelligence methods for automating energy theft detection and stress levels are first detailed, followed by an examination of contextual security threats and privacy breach concerns. An artificial immune system is employed to mitigate the risk of malware attacks, differential privacy is proposed for data protection, and federated learning is harnessed to reduce data exposure.
- Published
- 2024
- Full Text
- View/download PDF
45. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
- Author
-
Rachida Hireche, Houssem Mansouri, and Al-Sakib Khan Pathan
- Subjects
authentication ,healthcare ,IoMT ,IoT ,internet ,privacy ,Technology (General) ,T1-995 - Abstract
The Internet of Medical Things (IoMT) has become a strategic priority for future e-healthcare because of its ability to improve patient care and its scope of providing more reliable clinical data, increasing efficiency, and reducing costs. It is no wonder that many healthcare institutions nowadays like to harness the benefits offered by the IoMT. In fact, it is an infrastructure with connected medical devices, software applications, and care systems and services. However, the accelerated adoption of connected devices also has a serious side effect: it obscures the broader need to meet the requirements of standard security for modern converged environments (even beyond connected medical devices). Adding up different types and numbers of devices risks creating significant security vulnerabilities. In this paper, we have undertaken a study of various security techniques dedicated to this environment during recent years. This study enables us to classify these techniques and to characterize them in order to benefit from their positive aspects.
- Published
- 2022
- Full Text
- View/download PDF
46. A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach.
- Author
-
Ksibi, Sondes, Jaidi, Faouzi, and Bouhoula, Adel
- Subjects
- *
TRUST , *INTERNET of things , *RISK assessment , *SECURITY management , *DECISION making , *HUMAN activity recognition - Abstract
Internet of Things (IoT) applications are among the major trends of nowadays. Billions of connected devices are creating great business profits and performing a multitude of automated tasks in many daily human activities. In healthcare service delivery, IoT capabilities are difficult to overestimate, they are progressively becoming entangled and commonly coined Internet of Medical Things (IoMT). The participating nodes in IoMT networks generate, collect and exchange huge amounts of extremely private and sensitive data. Numerous security vulnerabilities arise due to the complexity and the heterogeneity of the technology. New risks, born out of IoMT systems, cannot easily be supported by existing risk management frameworks. The existing cyber-security risk assessment methods and approaches, deployed in several organizations, will not address the IoMT inherent risks properly. This study includes a comprehensive review of IoMT systems. Popular risk assessment methods are discussed and their suitability to IoMT is dealt with in detail. Based on this study, we propose a framework to enhance trust and help with decision making in e-healthcare environments given its high-risk exposure. The proposal is based on a quantified risk assessment approach. Our aim is to define a novel approach/model for improving trust and risk management in an e-health context. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Blockchain-Based Internet of Medical Things.
- Author
-
Taherdoost, Hamed
- Subjects
INTERNET of things ,INSURANCE companies ,RESEARCH questions ,SCHOLARLY periodicals ,BLOCKCHAINS ,MEDICAL equipment ,ELECTRONIC journals - Abstract
IoMT sensor nodes, Internet of Things (IoT) wearable medical equipment, healthcare facilities, patients, and insurance firms are all increasingly being included in IoMT systems. Therefore, it is difficult to create a blockchain design for such systems, since scalability is among the most important aspects of blockchain technology. This realization prompted us to comprehensively analyze blockchain-based IoMT solutions developed in English between 2017 and 2022. This review incorporates the theoretical underpinnings of a large body of work published in highly regarded academic journals over the past decade, to standardize evaluation methods and fully capture the rapidly developing blockchain space. This study categorizes blockchain-enabled applications across various industries such as information management, privacy, healthcare, business, and supply chains according to a structured, systematic evaluation, and thematic content analysis of the literature that is already identified. The gaps in the literature on the topic have also been highlighted, with a special focus on the restrictions posed by blockchain technology and the knock-on effects that such restrictions have in other fields. Based on these results, several open research questions and potential avenues for further investigation that are likely to be useful to academics and professionals alike are pinpointed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Iomt supported covid care - technologies and challenges
- Author
-
Martin, R. John
- Published
- 2022
- Full Text
- View/download PDF
49. A Simulator for the Internet of Moving Things
- Author
-
Mouatacim, Mohamed, Kotowicz, Jean-Philippe, Zanni-Merk, Cecilia, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Jezic, G., editor, Chen-Burger, J., editor, Kusek, M., editor, Sperka, R., editor, and Howlett, R. J., editor
- Published
- 2021
- Full Text
- View/download PDF
50. Internet of Things in Healthcare: A Review
- Author
-
Omarov, Batyrkhan, Baiganova, Altynzer, Sapakova, Saya, Yessengaliyeva, Zhanna, Issayev, Sapar, Baitenova, Saltanat, Maxutova, Bota, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Luhach, Ashish Kumar, editor, Jat, Dharm Singh, editor, Bin Ghazali, Kamarul Hawari, editor, Gao, Xiao-Zhi, editor, and Lingras, Pawan, editor
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.