Abstract
The uprising of Internet of Things (IoT) has dramatically influenced the world’s technology in terms of interoperability, connectivity and interconnectivity with help of smart sensors, devices, objects, data and applications. General population aging, dearth of healthcare resources and upsurge in healthcare costs makes IoT advancements in healthcare all the more essential in order to confront these challenges. The revolution in IoT healthcare is redeveloping the healthcare sector in every aspect – social, technical and economical. This article presents a comprehensive survey on upcoming technologies helpful in healthcare 4.0 systems where the major focus is on emerging technologies like fog computing, cloud computing, machine learning and Bigdata analytics and that are all based on IoT based healthcare applications. In addition, the authors also provided an exhaustive survey on Wide Body Area Network (WBAN)-based IoT health care systems and discussed their network topology, architecture, platform, services and their applications. In addition, this study analyses IoT healthcare security challenges, possible threats, attack taxonomies and how blockchain technology can be helpful in countering these challenges. Lastly, exhaustive state-of-the-art technologies, challenges identified so far and possible future scope of this domain is also discussed in this survey.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
With the advent of Internet technologies, the healthcare sector has witnessed a lot of changes at a rapid pace. E-health is among the rapidly advancing services in which several automation services such as equipment for heterogeneous ubiquitous healthcare and advance clinical treatments, are being provided to the doctors [1]. From past many years, it has been observed that many patients have been found affected with several chronic diseases, which has overwhelmed our healthcare systems [2]. This has mounted a lot of pressure on our healthcare organizations as to how can healthcare solutions be designed such that they are economic, without maintaining the healthcare (HC) quality. Among the diseases that exist, some diseases such as Vertigo and Parkinson’s disease are some of the critical neurological diseases or NDs that need real time and constant monitoring. IoT is a major advancement in the era of Bigdata, which has been supporting several real-time engineering applications via enhanced services. Data collected from healthcare systems can be transmitted via these IoT devices to be analyzed, in order to discover detailed health information, early diagnosis and decision making over critical health situations in a timely manner. Eventually over the years, Bigdata’s prevalence in healthcare has paved a path for development of health 4.0 applications that are based on machine learning. Moreover, IoT in WBANs (Wireless body Area Networks) has been gaining a lot of focus from researchers in recent years. It has been observed from a study by World Health Organization (WHO) that these NDs contribute to more than 40% of the all the diseases that have affected the world, as can be seen from Fig. 1.
Till now, numerous NDs and associated diseases have been uniquely identified and measured based on a number of different parameters. One such parameter is DALY or disability adjusted life years which is defined as the total healthy life years lost due to disability. Figure 2 indicates that NDs contribute to more than 6% of total DALYs caused by different diseases. This percentage is surprisingly higher than HIV AIDS which contributes to around 5.5% of total DALYs. This highlights the fact that NDs are a major cause of concern in healthcare and need to be discussed better.
To provide some relief in the health sector, IoT’s (Internet of Things) capabilities can be explored. As a matter of fact, healthcare and medical sector together constitute to be a core attractive application area for IoT [3]. IoT has the capability to be of great advantage when it comes to health sector applications such as care for old-aged people, fitness and health programs, management of.
long-term diseases and remote health monitoring (RHM). Another important HC application where IoT can be utilized is, the patient being compliant with the medicinal dosage and other treatment suggestions at home, in accordance with the recommendation provided by the healthcare workers. Hence different sensors in medical devices such as imaging devices and other diagnostic devices are all referred to, as smart devices having IoT as their core principle. Healthcare costs reduction and enhancement of the life quality to enrich user’s experience are the potential assets of these IoT HC services. IoT is also beneficial, according to healthcare workers’ point of view, because it can reduce the downtime of other healthcare devices by using downtime monitoring of those devices, by utilizing the potential capabilities of IoT. IoT can be applied in different ways in the medical sector to be of benefit. For example: it can correctly determine the optimal timeline for inventory replenishment of medical supplies of healthcare devices in hospitals, in order to make ensure their uninterrupted and continuous operation. In another scenario, IoT can be used for optimal scheduling of healthcare resources that are limited in number, thus ensuring a better service to a greater number of patients [4].
A recent important trend has been the ease of cost-effective interactions between the individual patients and the HC clinics and agencies through secure and seamless connectivity. Latest HC networks that are powered via wireless-technologies, are being expected to help deal with the long-term diseases, their timely diagnosis, RHM and other health emergencies. HC servers along with gateways and HC databases are playing a key role in creation and maintenance of HC records and the delivery of health services on-demand, for all legit stakeholders. In recent years, the domain of IoT successively and massively gathered wide attention from research scholars around the world to address its potential in the healthcare sector, by taking into consideration the several practical challenges, that the field poses. As a result of it, there now exist multiple service solutions, applications and prototypes in IoT healthcare. New applications and services, network architectures and platforms, interoperability and security are some of the major research trends in IoT healthcare. Many countries and health organizations around the globe have already formulated some policies for the deployment of IoT in the HC field. Today, an in-depth understanding of existing research works in IoT healthcare is expected and required by various stakeholders to pursue further research in this area. Through this paper, we examine the trends in IoT HC research and inspect several issues that need to be addressed to revolutionize the HC industry using IoT. In upcoming sections, we see how IoT based on fog computing along with cloud solutions is helpful in catering to these critical requirements of the healthcare sector.
1.1 Fog Computing
Development of Cyber Physical Systems (CPS), mobile internet and IoT has led to various objects including people, things and machines to get connected in the information space, as per will [5, 6]. This has led to an unparalleled generation of huge amount of heterogeneous data. Cisco’s estimations claims that by 2020, there will exist around fifty billion devices connected to the internet. Huge volumes of data being continually generated is estimated to hit five-hundred Zettabytes, of which approximately 45% of the IoT data will be stored and processed at the network’s edge by the year 2019[7, 8]. As expected, with the rising growth in volumes of data generation, the pace at which it is being generated has also been rising quickly. An analysis of recent HC data from the IoT apps suggests that only thirty million users generate as high as 25,000 data tuples per second [9]. Our current storage and processing capabilities are not sufficient to satisfy this rapidly rising data volumes [10]. Moreover, apart from that our traditional computing models namely cloud computing and distributing computing also proved to be insufficient, when it comes to satisfying the need of handling this huge data. This led to the development of new technology that is termed as Fog Computing by Cisco.
1.2 Why Fog Computing?
Cloud computing which is a conventional computing paradigm has been utilized ever since, because of its high efficiency in processing data with massive storage and high computability. [12, 13]. However, most of the computation required are computed in the cloud itself because cloud computing (CC) is essentially centralized in nature. So, it requires that the data as well as other requests too, have to be sent over to the CC servers. Though we have seen an appreciable rise in processor speeds over the years, the same cannot be said about our network bandwidths. Network bandwidth has become the bottleneck for CC, thus deterring it from handling vast volumes of data which eventually results in long delays or latency.
In some application scenarios, we strictly require quick response time and support for mobility. Example of such applications are emergency response, smart traffic signals system, smart power-grids, smart HC and other apps sensitive to latency [14,15,16,17,18]. The delay occurring due to data transmissions to and from cloud servers, is unacceptable in these cases. Moreover, depending on.
the situation and kind of data, some decisions can be made locally instead of being transmitted to the cloud. If some decision making is required to be done in the cloud only, then also it’s inefficient transmit complete data to CC servers for processing/storage, as the entire data is rarely needed for analysis or decision making. In other words, the challenges posed in terms of network bandwidth, latencies, reliability challenges and other security issues caused by explosive growth rate of data, cannot be solved by complete dependence on the CC model.
Fog computing or FC, which possesses the capability of seamlessly integrating edge network devices and our CC center, is deemed to be a much effective solution to address the problems left unaddressed by CC model, as highlighted before. FC is a computing architecture, geographically distributed in nature, in which various heterogeneous devices are connected at network’s edge, together providing elastic storage, communication and computation services [19]. Extension of CC services to network’s is the most prominent feature of FC as represented in Fig. 3. FC works by pooling the local resources together, thus bringing the storage, computation resources, communication and control, nearer to the users. Most of the communications and data transfers are now between devices and fog instead of devices and cloud and thus, the data transmission time and volume of network transmissions become reduced [20]. Thus, FC paradigm resolves the network bandwidth bottleneck issue in cloud and is suitable for latency sensitive applications i.e. all applications that need to respond in real time. Table 1 summarizes these differences between FC and CC.
1.3 Advantages/Requirements of Fog Computing in IoT
FC performs storage, communication and computational tasks on network edge devices which are in end user’s vicinity. Its service facilities are in close proximation of its users. This is termed as FC’s basic feature and its most significant advantage compared to the traditional CC model. Apart from this, FC has several other features and merits illustrated in Fig. 4 and listed as follows:
-
(a)
Minimal Latency: The sensory information is gathered from the edge nodes located at the network’s edge then process that data and finally store that data in the LAN. This leads to significant decrease in data transmission over the Internet and premium quality localized services are provided. Thus, latency is reduced and demands of real time applications is fulfilled [21]. Sarkar et al. [22] performed theoretical modelling of FC system architecture and observed that the delays in FC systems were comparatively much higher than that of CC systems. Hu et al. [23] conducted experiments in the domain of face recognition, by deploying both FC systems and CC servers. He observed that the response time was very less in FC as compared to CC.
-
(b)
Interoperability: FC nodes as well as the end devices are usually manufactured by multiple different providers and need to be deployed in several diverse environments. Hence it is required that FC should be capable of inter-operating with different device and node manufacturers, to seamlessly provide support to several devices seeking its service [24]. In the streaming service supported by FC, coordination among several providers is required as the service is federated among several different domains [21]. In FC based smart transport systems, Realtime analysis of data is needed along with dynamic transmission of data between smart vehicles, fog nodes, fog application and traffic lights. To achieve data sharing and collaboration, resource management guided by a set of policies is proposed in order to enable interoperability combined with secure collaboration between the resources requested by user in FC [25, 26]. All policy requirements such as network requirements, operational requirement and security requirements are supported by well-defined policy specifications. It is due to these policy specifications that uniform and secure collaboration is established whenever the communication occurs in the distributed or dynamic environment. Hence in this manner, interworking, interconnection and interoperation of different heterogeneous resources and devices is realized by fog computing.
-
(c)
Mobility: In the particular case of fog computing, we have quite a lot of diverse end devices, traffic cameras for instance, that remain static and many other devices such as smartwatches, vehicles and smartphones that cause frequent spatial mobility at the terminal layer. In the same way FC nodes in our fog environment can either be either static or mobile computing resource platform and accordingly these can be deployed in coffee shops and airport terminals or on mobile trains and buses [27,28,29]. Apart from that, there is direct communication between the various devices as well. The data now need be sent over to the CC servers. Realization of mobile data analysis is achieved by the processing of voluminous data that these IoT devices generate, in the end devices itself or in the intermediate devices. So, service to more extensive nodes can be provided by it. For direct communication with the mobile devices and users, FC apps can use routing, communication and addressing protocols. For example, ID or location separation protocols for mobile nodes (LISP-MN), involves decoupling of location identity and host entity and to support mobility techniques, it requires a distributed directory system [30, 31]. Moreover, the mobile devices’ access depends on physical closeness in some communicational technologies. For instance: NFC (Near Field Communication), Bluetooth and Millimeter Wave Communication. In this manner, any irregularities in the network connection possibly caused due to mobility, can be avoided [32]. Also, by employing the concept of ‘Data Sherpa’, it is possible to transmit data from static sensors on the edge to smartphones (on edge) via Bluetooth, whenever the they are in physical proximity and then the smartphones can send the data to FC or CC servers [27, 33]. FC supports the location-based mobility which empowers the admin to control where the mobile devices and the users can come in and the protocol via which they can access that information [34]. This leads to improvement in both the quality of service and the performance of the system.
-
(d)
Security: The services hosted by fog computing are closer to the end users in terms of physical distance. This in turn is advantageous in terms of both privacy protection and data security. Firstly, data is protected in FC by encryption techniques and measures for isolation. FC nodes also present encryption schemes, access control measures, isolation measures and data integrity checks to ensure the security of private and confidential information. Moreover, FC also eludes the potential risks from an upgrade in the system. Remote upgrading of traditional services has been found to be generally inefficient and there are associated risks such as middleware upgrade may lose contact while upgrading. FC doesn’t require an Over the Air (OTA) middleware upgrade in the system, it just updates the micro applications and algorithms at the fog end.
-
(e)
Geographical Distribution: The applications and services of fog computing involve a geographically distributed deployment as opposed to cloud computing which follows a centralized model. It comprises of many geographically decentralized nodes, which can track and locate the end devices for the mobility support. The FC architecture of distributed nodes ensures the accessibility of the data analytics and statistics with low-latency to the user, rather than storing and processing of data in centralized CC environment, which is far away from the user. This feature of fog supports better location-based services, quicker analysis of Bigdata and powerful capability of decision making in real-time. Interworking and interconnection among ubiquitous things are one of the goals to be achieved in IoT. The things referred to over here, are both voluminous in number plus widely distributed. Decentralized data analytics and geographical distribution are two characteristics which can help satisfy the abovementioned requirements efficiently. For instance, in Internet of vehicles (IoV), FC can present multiple IoV services such as traffic security, infotainment, road and lanes conditions etc., based on interactions between vehicles and between vehicles and access points [24].
The main contributions of this survey are as follows:
-
1.
Highlighting the need of IoT and FC in healthcare and how FC is an utmost requirement in healthcare in contrast to CC.
-
2.
Study of IoT healthcare networks under three different components: Network topology, network architecture and network platform.
-
3.
Study of classification of healthcare IoT into two broad categories: applications and services. Surveys of existing IoT solutions have been conducted in this study. Application of machine learning algorithms such as SVM by different studies in the bigdata analytics environment have been compared in our paper.
-
4.
Provides a detailed insight into the requirements and challenges to be dealt with while developing wearable and products and prototypes designed by new age wearable tech-companies.
-
5.
Consolidated study on security challenges possible in IoT healthcare systems and how blockchain when integrated with IoT can serve as a possible solution to avert such security issues in healthcare
The rest of the paper is organized as follows: Sect. 2 introduces integration of IoT in healthcare and detailed study of IoT networks in healthcare and its composition. In Sect. 3 we discuss about IoT services and applications and survey of various IT solutions working on edge cutting tech-algorithms of machine learning and AI in bigdata IoT environment. In Sect. 4, we talk about wearable technology, its worldwide statistics and various studies conducted to counter challenges faced in building wearables. Section 5 lists out various security issues and blockchain as a viable option to counter those challenges. Lastly, we conclude our study with summarization and future works in Sect. 6.
2 IoT in Healthcare 4.0
As mentioned before, in the medical care sector, IoT performs vital role in several healthcare 4.0 related applications. Automated medical data collection method is used to rule out the possibility of human errors during the process of data collection. This helps in improvement of the quality of diagnosis and eliminates all risks due to human errors which can be a reason for false diagnosis which can eventually be harmful for the patient’s health. The role of IoT in healthcare is widespread, but is most vividly visualized under the following three healthcare paradigms:
-
1.
RHM: It is one the most vital paradigm for real world health applications. Numerous people around the world including the children and elderly, suffer from chronic illnesses that need to be monitored daily [35]. Remote monitoring will reduce patients’ trips to the hospital for daily checkups. Remote access sensors help in early and timely diagnosis of diseases [36]. Thus, patients suffering from critical diseases like cardiopulmonary diseases, heart diseases and asthma, can benefit a lot from RHM. Our real-time monitoring system includes an RHM center and an RHM unit. It performs a real-time analysis on the sensor data and alerts with a warning sign in case of emergencies. The signals collected through the sensors are accumulated and transmitted to the respective health centers via WLANs. Thus, remote monitoring provides precise and real-time monitoring of patients’ data, so that emergency healthcare units are informed timely, in case of patient being in a health emergency and they can provide necessary help.
-
2.
Clinical Care: Every hospital has numerous patients with critical illness that need to be admitted to the ICUs and require constant monitoring can be helped via IoT monitoring systems. These monitoring systems consists of sensors that are deployed to accumulate physiological data about the patient. This data thus gathered, is examined by the IoT system and sent to patient’s family, doctors and nurses for further analysis, if required [37].
-
3.
Context-Awareness: It assesses the patient’s health status in the environment in which he/she resides, that can help doctors and other healthcare staff to comprehend the relationship between the surroundings and the patient’s health. This is done because changes observed in residing environment of the patient can impact his vulnerabilities to diseases and can even lead to deterioration of his health [38]. The use of specialized sensors that capture patient’s physiological and physical information including exercises like weightlifting, cycling and sleep pattern and the environmental set-up in which he is, to give a deeper insight into his/her health status. Further, it will be helpful in locating the patients in case of any emergencies and being better prepared for dealing with such situations. We have covered the brief classification of IoT application areas in healthcare so far. For successfully setting up an IoT healthcare network in any healthcare application, we need to look at how the different IoT Healthcare networks are structured, its architecture and other technical aspects. This is discussed under upcoming headings.
Healthcare Networks in IoT: Multiple sensors along with diverse heterogeneous devices need to work in collaboration in IoT ecosystem, in order to lead to successful functioning and advancement of our healthcare infrastructure [39]. Reception and transmission of healthcare data of healthcare data is achieved by optimization of communication protocols and algorithms which is further based on an efficient WBAN [40].
2.1 IoT Network Topology
It is characterized by an aggregation of different components playing diverse roles in IoT healthcare 4.0 systems. It also describes numerous features of persistent e-healthcare environments [41]. IoT in WBANs is used for remote monitoring of patients. The handy medical IoT instruments and on body sensors connected to patient’s body gather all information related to patient’s vitals and this data is then sent over to the fog nodes for analysis. This helps in building patient’s health profile using IoT and then the health workers can respond accordingly [42]. In Fig. 5, we have represented the healthcare data’s streaming by using interconnected network with WiMAX, the access service networks and the Internet Protocol (IP) network. The topology represents the principle role of gateways. Figure 5 also represents an iMedpack, an IoT devices that manages problems in the pharmaceutical sector by preventing the medicinal misuse [43]. Moreover, various interfaces and sensors of wireless topologies, present gateways that are critical from the healthcare apps’ perspective [44]. The e-healthcare system ensures the detection of health issues by connecting different IoT devices to the e-health gateway where the data collected by sensors is stored, processed, analyzed and the analysis is then presented. Hence every IoT topology and associated clinical equipment are clubbed with good amount of e-healthcare infrastructure. The IoT network topology thus provides the activities related to healthcare system and is there for the perception of the medical staff [45]. The topology thus includes, the health system in semantic e-health monitoring system.
2.2 IoT Network Architecture
The basic IoT healthcare 4.0 architecture is composed of three layers namely: the perception layer followed by fog network layer and finally application layer as show in Fig. 6 [46]. The prime role of perception layer is identification of devices and gather the information. This layer is the first layer and also more frequently contacted layer by other entities in our healthcare system namely patients, devices and nurses. Medical devices and sensors such as tracking devices and heart rate monitors are some of the entities that are responsible for collecting the information. The second layer is the fog network layer that transmits the information collected in the perception layer to application layer. The data collected from the perception layer is transmitted to the network layer via different protocols. The network layer is responsible for creating a permanent connection for the transfer of data from perception layer to application layer and resolving interruptions if any. Third layer is our application layer. This layer consists of fog local network example: localized servers linked to localized Hospital Information System [47,48,49,50]. As we know that IoT requires various heterogeneous devices to be connected, it is important that we develop a configurable and flexible architecture [46, 48,49,50]. Globally, there exists no mutual agreement for the standardization of IoT healthcare architecture and as a result there are different architectures proposed in different research papers [51]. Hence it is inferred that based on the requirements and other factors like infrastructure, various different architectures with different number of layers in them are probable. In Table 2, we have summarized various studies based on the total layers that their model employs along with the communication model used in each of them respectively.
2.3 IoT Network Platform
Fog computing platform along with IoT medical/healthcare network platform are two essential platform systems in the IoT system. As represented in Fig. 7, the service platform model majorly concentrates on resident health information. The network platform depicts the cataloguing of e-healthcare structure and demonstrates the procedure with the help of which the healthcare staff can use foremost application layer to gain access to different databases, as per the ‘support layer’ [69]. It ensures that an automated design methodology platform and the associated interoperability is basically for the rehabilitation method, presented in it. Access layer, business implementation layer along with data persistence layer and the support layers are the four layers included in the framework [38]. One enabling function’s required by the gateway to handle multiple sensors having multiple users. This method makes it possible for the IoT ecosystem to manage several users simultaneously by using numerous sensors while collecting the data for healthcare. The database platform in IoT is exploited in a ‘multi-tenant’ fashion and it is the ‘resource layer’ that is accountable for the interpolation of healthcare data, applying resource control mechanism and data sharing in healthcare systems. Hence, the displayed meticulously organized framework has the capability to provide user environment and semantic potential of IoT in the medical sector.
So far, we have discussed the core underlying IoT principles required for IoT health networks development. In the next section, we would provide a broad classification of IoT healthcare into services and applications.
3 Applications & Services in IoT e-healthcare
IoT e-health solutions are applicable to several diversified fields including but not limited to elderly patients’ care, continuous supervision of long-lasting diseases and also management of people’s personal health and their fitness etc. This paper does a broad categorization of this extensive topic into IoT applications and IoT services. Single conditioned and grouped condition applications are further sub-divisions of the IoT applications. Single condition applications deal with one specific disease whereas a grouped condition application refers to a bunch of medical conditions or diseases. This categorization is illustrated in Fig. 8.
3.1 IoT e-Healthcare 4.0 Services
IoT is expected to support the diversified set of HC services, with each and every service providing a specific bunch of e-health solutions. A service is generally generic and functions as an elementary block to form diverse applications and e-healthcare solutions. Already existing general services needed by IoT frameworks require trivial amendments, to achieve accurate functioning in e-healthcare models. These include services for resource utilization in a shared network environment, notification services, protocols for establishing cross platform connectivity and internet services for devices, which might be heterogeneous. Linking protocols are also included to establish connectivity. Some of the IoT services in healthcare are:
-
1.
Ambient Assisted Living (AAL): It is an artificial intelligence (AI) powered IoT platform that is developed to address the health of the elderly, aged or incapacitated individuals. AAL’s aim is to expand the life span of the elderly in a manner convenient and safe for them, within their residence of living. Various studies have been discussing AAL with IoT for years now. An architecture with security and communication control has been introduced for implementing IoT’s AAL in [70]. The proposed architecture can be considered to be the framework to provide health service for the aged and incapacitated patients. Implementation of this architecture includes underlying technologies that include NFC and RFID for passive communication and 6LoWPAN for active communication.
-
2.
Adverse Drug Reaction (ADR): It refers to a medication induced injury [71]. This can happen owing to many reasons such as only one drug dose, or its consumption over long period of time or as a result of mixing of more than one non compatible drugs. ADR is generally not specific to particular medicines or diseases, but is inherently generic, so there’s a requirement to individually develop some frequently occurring technical faults with their solutions, known as the ADR services. An ADR that’s based on IoT has also been proposed where terminal of the patient detects and determines the drug by using barcode or even NFC enabled devices in [72]. This information is coordinated to an intelligent pharmaceutical information system, that evaluates the drug to be consistent with its e-health informational records and allergy history profile. As a part of iMedBox, iMedPack has been developed, to address ADR by using CDM (controlled delamination material) and EFID technologies [73].
-
3.
Embedded Context Prediction (ECP): These are frameworks that are generally generic and are required by the developers to develop a context-aware healthcare application on the IoT network. A similar framework in ubiquitous healthcare’s context has been developed in [74]. Context-aware ubiquitous healthcare systems in nature have given rise to several sets of challenges and disputes as expressed in [75]. Similar research issues and challenges are required to be considered and resolved for building context-aware e-health apps over the IoT network and the prediction of context is then utilized for IoT based RHM in [76].
-
4.
Internet of Medical Things: m-IoT consists of HC sensors, technology for communication and also mobile computing, all coordinating to provide HC services as shown in [77]. M-IoT is like a novel model for healthcare connectivity that can connect the 6LoWPAN to the evolving 4G networks to provide internet-based health services in the future. Though m-IoT in general is representative of IoT health services, there also exist certain specific features that are intrinsic to the participating entities’ global mobility. This led to the formulation of m-IoT services. The utilization of m-IoT services was analyzed on the basis of its glucose level sensing potential, in a noninvasive manner and its architecture and all the implementation challenges all have been covered in [78]. m-IoT ecosystems and context awareness issues are two challenges that exist in m-IoT [79]. Another system with mobility on the basis of message exchange has been proposed in [80].
3.2 IoT e-Healthcare 4.0 Applications
Apart from e-health services, we also have IoT applications that need to be discussed. IoT services provide help to design and build IoT applications which are then used directly by the users. Hence to differentiate them in a better manner, we say that services are developer centric, but applications are on the other hand user centric. Apart from the IoT applications considered in this section, we have different healthcare devices, gadgets and wearables available in the market by various brands are discussed in the upcoming sections. Some of the IoT healthcare applications are as mentioned:
-
1.
ECG Monitoring: Electrocardiogram Monitoring or ECG Monitoring records the electrical activity of the heart by electrocardiography. It involves measuring the heart rate and determination of its rhythm along with diagnosis of long-lasting intervals of QT, myocardial anemia and multi facet arrhythmias [71]. Using IoT in ECG monitoring can provide maximum possible information and be used to full extent as in [81]. Several studies have discussed ECG monitoring using IoT in detail in [74, 82,83,84,85,86,87]. An ECG system based on IoT consisting of a wireless reception processor and a wireless portable acquisition transmitter has been proposed in [88]. The system detects abnormal data to identify cardiac activity in real-time by integrating a search automated functionality. There also exists a detailed algorithm for detection of these signals of ECG in IoT network’s app layer [89].
-
2.
Monitoring Oxygen Saturation: We use pulse oximetry to continuously and noninvasively supervise the saturation levels of oxygen in blood. IoT’s pulse oximetry’s potential is covered in CoAP based HC service survey in [90]. Wrist OX2 is a wearable that functions as a pulse oximeter whose functionality is discussed in [82]. The device features Bluetooth based health profile along with sensor connectivity to a platform called Monere. Also, a low cost and low power consuming pulse oximeter has been proposed for RHM in [91]. The device is used for constant monitoring of patients’ health status over the developed IoT network. For telemedicine application, a pulse oximetric system is proposed in [92].
-
3.
Medication Management: Around the world there exists financial wastage and threat to the general public health because of noncompliance issues in medication. IoT has some promising solutions to offer in order to resolve this issue. Intelligent packaging methods for medication management driven by IoT has been proposed as in [93]. These methods involve a precursor for iMedBox and performs field trials for verifying the system. Wireless communications-controlled delamination materials are used for controlled sealing deployed in these packaging methods. An e-health architecture which is developed on the basis of radio frequency identification tags for establishing medication control and audit, over an IoT HC network has been proposed in [94].
-
4.
Wheelchair Management: Researches around the globe have been working on creating a fully automated smart wheelchair that would be really helpful for the people who are physically disabled. IoT can prove to beneficial in building this solution. IoT based smart wheelchairs for our healthcare system have been proposed in [85]. This design comprises of WBANs that’s laced with multiple connected sensors, which eventually provide all the functionalities suited for IoT requirements. IoT in combination with P2P i.e. peer to peer network has been implemented to develop a health support system in [95]. This approach supports functionalities including the status detection of the wheelchair user and also the functionality to control the chair’s vibrational levels. Intel also has an IoT department that has developed ‘connected wheelchair’ which is an IoT driven wheelchair [96]. Developments like this only go on to strengthen and emphasize the fact that normal things around us have the budding potential to be evolved into data driven machines that are constantly connected. This device is loaded with useful features like constant measuring and monitoring of the wheelchair patient’s body vitals. It also has the capability to gather data about the surroundings of the user in order to determine the accessibility of the patient’s location. In the forthcoming sub-sections, we are going to be looking at the IoT healthcare services and applications that we have seen so far from different perspectives.
3.3 Sensors and Devices in IoT Healthcare 4.0 Applications
We have already discussed IoT applications and services. In this sub-section, various IoT applications domain along with the sensors involved are discussed. Table 3 can be referred for a brief summarization of these devices and sensors. Some of these application domains along with the sensors used, sensing mechanism, communication protocols used, and challenges faced are described as follows:
-
1.
Health Monitoring (Blood Pressure Sensor): BP measurement is the measurement of the pressure exerted against the walls of the arteries, by the blood that is flowing through it. If the blood is flowing normally through the artery, BP measurement comes out to be normal. However, if there is any kind of restriction in the blood flow, owing to various reasons, the BP measurement goes high. High BP is known to be the cause of various health problems [97]. Sphygmomanometer is the name of the device that helps us to measure the BP. The BP is also of two kinds. One is the systolic blood pressure and the other is known as the diastolic blood pressure. The BP at the time of the heartbeat is systolic BP, while the one that’s measured between the two consecutive heartbeats is known as diastolic BP. There exist various BP measurement techniques.
Mercurial sphygmomanometer is considered to be the standard sphygmomanometer. It comprises of a glass tube and a mercurial reservoir in conjugation. Another device is Aneroid sphygmomanometer, which is quite similar to a Mercurial sphygmomanometer, the only difference being that it utilizes mechanical dial, in lieu of mercury, to show the BP. Oscillometer principle for calculating the BP forms underlying principle, on which the/ digital manometers work. It utilizes the electrical pressure sensor that measures the BP which is then displayed digitally. The drawback in the different methods that have been discussed so far is that these all involve a cuff being used. This is not feasible in a pervasive constant monitoring environment, where the monitoring would be required even when the patient is deep asleep.
To circumvent this drawback, there are other feasible methods that exist for constant BP monitoring. One of them is called PTT or Pulse Transit Time [98, 99]. PTT is defined to be the time latency that exists between the 2 arterial sites. PTT’s estimate is usually determined by the time difference that exists between the distal arterial waveform and proximal arterial waveform. BP and PTT are both related in an inverse proportionate manner. PTT measurements that are measured in milliseconds are then finally calibrated to BP measured in mm of Hg where mm stands for millimeter and Hg is the scientific name for Mercury. BP measurement using these methods is thus without cuffs and also can be connected to smartphones.
-
2.
Medical Care Units (Light sensor): MCUs have a lot of parameters to be taken care of and maintained. Illumination is one such parameter. IES or Illuminating Engineering Society recommends that the light intensity levels in the hospital premises needs to be maintained to be in range of 10 lumens per square foot to 20 lumens per square foot. Heightened light intensity levels can hinder with the nighttime sleep of patients and also leads to unnecessary power wastage. Light sensor or LS is used in the luminaire along with the occupancy sensor or OS [104]. This luminaire functions as our light intensity control system. The sensors involved here are all connected via networking, to the centralized controller. OS is used as it can identify if there are any people present in its vicinity. LS is used to add the daylight illumination and luminaire’s illumination to calculate total light intensity in its proximity. The information thus obtained by LS and OS is sent to the centralized controller. The controller is driven by a light intensity governance and control algorithm, which takes the input from OS and LS, and determines the increment/decrement amount required in the current artificial luminaire’s intensity. The determined calculations are eventually sent back tour artificial luminaires which then use those calculation for light intensity enhancement/reduction.
-
3.
Fitness Devices (Wrist Band): The technical advancement in the domain of healthcare sensors has taken long strides ensuing the production of wristbands that are commercially vended today and worn by masses. Most common ones are the fitness trackers. They have the ability to determine the wearer’s physical activity levels, measure and monitor their health vitals such as heart rate, pulse rate sleep pattern, calories burnt etc. [105]. These devices also offer some health advices to users regarding the physical exercises to be practiced to maintain good health, dietary nutrition etc. [106]. Fitness trackers is perfect example of how healthcare sensors have been used efficiently in noninvasive healthcare monitoring. Moreover, these trackers can be connected to smartphones where data is aggregated over period of usage and data analysis when applied on that data can provide even a more detailed information about the person’s health status and other trends.
3.4 Relevant IoT Healthcare 4.0 Services from Industry
The growth and rapid advancements witnessed in use of IoT in healthcare has given the IoT industry a well-deserved boost. This has led to the established corporates around the world along with new age, edge cutting tech-startups in the direction of developing healthcare products. Table 4 is a brief summarization of these solutions. The table has the services offered, provider company’s name, product developed along with its description.
RHM products are of utmost benefit for the patients who are required to be monitored constantly, but at home and not admitted to some hospital. RHM monitors the patient’s health status constantly, collects that data and then transmits it to the health workers team which can then analyze that data remotely. Pourhomayoun et al. [107] in his approach has suggested that RHM frameworks possess the capability to effectively decrease the patient re-admission rates in the hospitals. EarlySense is an RHM solution that follows a wholesome approach [108]. It continuously measure the heart rate of the patient along with his/her respiration rate. It is well equipped to prevent patient’s fall. It senses deterioration, if any, in patient’s health status and also prevents ulcer formation under pressure. The solution looks promising but comes with a drawback of not being easily available globally, with its offices restricted to the territories of Israel and United States of America.
‘Falling’ has been found to be a major reason for lethal injuries in old-aged people [109]. Fade App has been developed aiming to solve this problem [110]. It’s simplistic in nature, user friendly and addresses this AAL issue in a rather sophisticated manner. A study conducted in 2010 in the USA, it was found that of the total 21,649 fatalities that occurred that year due to people ‘falling’, 5,402 was the figure related to population above the age of 65 [109]. The mushrooming population of the aging people has only stressed the importance of health apps like Fade in AAL. As per Global Health Observatory, in the year 2015, the life expectancy that’s estimated at birth averaged to be 63 years. Some devices have been developed specifically as solutions for AAL. ‘BeClose’ is one such solution that makes use of various sensors in combination with the power of AI, eventually leading to the elderly people getting more freedom [111]. Wearables is another category of healthcare solution that has been trending recently. Wearable fitness trackers and watches are being used by around fifteen percent of its total healthcare consumers. Sale of approximately 110 million such wearables is estimated for the year 2018 [112].
The aim is to provide the patients with quality healthcare service and maintaining their comfort levels simultaneously. Hence, the major factors considered while analyzing and comparing the various wearables are ease of usability, security and patient’s comfort. So, even though ‘MC10’ is good as it puts to use modern sensors, that are capable of collecting user’s physiological data, the smartwatch by Bittium is seen as a better solution [113]113. This smartwatch has the ability to measure user’s health vitals, track his location and monitor body ergonomics. It can also monitor the dosage and timing of medication. Moreover, it also provides security as a key feature as all data communication between the cloud and device sensors are secured using reliable connectivity solutions. Apple watch is another popular wearable, that has seen tremendous commercial growth and popularity [115]. The device has a lot of health-apps associated with it, making it feasible to measure the user’s BMI, estimated glomerular filtration rate (eGFR), body surface area and similar other measures required as a parameter to detect cardiovascular diseases presence. This wearable is so prevalent that in 2016 only, around 6 million units were traded successfully, underlining the importance and popularity of smartphones-based health solutions in recent times.
As per Saúde Business, an estimated 100 million medical health apps are known to exist worldwide [116]. The diabetic population in 2014 has increased drastically up to 422 million, a compared to 1980 when it was 108 million. As per WHO, this trend will probably continue and grow considerably. For diabetics, ‘On Track Diabetes’ solution is considered to be a blessing [117]. It’s an application, developed specifically for diabetics with ‘type-2 diabetes’. This app helps these users to manage the disease in a well-equipped manner, by regularly being able to perform glucose level checks, BP checks, pulse rate check and body weight measurement checks among others.
3.5 Research Work Classification Based on Condition & Services/Application
Islam et al. in their research has stated that IoT based patient monitoring systems can be classified as either services or applications [118]. Services are basically generic in nature and serve in application creation. Applications on the other hand are used directly by the patients and doctors. Table 5 is a summarization of various works in IoT healthcare by different authors, classified for different disease and application/service based.
3.6 Classification Based on IoT implementation with Data Analytics & Machine Learning
In Table 6, we have the classification of various research work by authors how have tried to implement IoT based healthcare models, which can eventually be deployed to be of critical use in the healthcare sector. Research works have been categorized on multiple parameters including if they can be used for emergency aid or not, what all technologies are involved, IEEE or other standards followed, multi-device support available or not and implementation of other critical and useful technologies such as ML and DM.
-
A. Emergency Aid: IoT in healthcare focusses on data and also on extending support in case of crisis and emergency situations. In such cases, the healthcare system should be able to trigger signals such as alarms thus informing the healthcare workers and emergency services.
-
B. Technology: RFID, 4G, 3G etc. are some latest technologies supported by IoT. With the help of these technologies only, can data about the patient’s health status be transmitted to the fog nodes/cloud for storage or further processing [172]. Different health care models developed using IoT can be compared on this basis.
-
C. Standards: IEEE 802.11/b/g/n, IEEE 802.15.4, IEEE 802.15.6, ZigBee, WBAN, and NL 7 etc. are some of the protocols or different standards that can be used for building our IoT health system.
-
D. Multi device support: Efficient systems are those that have the ability to support multiple devices including RFID sensors, smartphone sensors, wearables etc.
3.7 HealthCare 4.0 with Bigdata
Big data has proven to be of great benefit in the health domain by predicting diseases, curing pandemics, saving people’s lives and improving the overall health quality of the population, in general [173]. Bigdata’s role in health sector has been shown in Fig. 9. The heterogenous data or the data that consists of structured and unstructured data, is collected by the system. This kind of data may be generated by IoT devices deployed for healthcare. The data thus collected is further consolidated and visualized in FC. Information is also preprocessed by applying techniques of data cleansing, missing values removal, data extraction, which is followed by analysis, the results of which are then transmitted to the concerned health care workers.
The data thus collected is voluminous in nature which makes it challenging to store it and analyze it in Bigdata environment. Different studies have been conducted in this area to find solutions to this problem. Table 7 lists the proposed work and their outcomes with their use cases. Moreover, the advantages and drawbacks of bigdata with healthcare have been summarized in Table 8. Manogaran et. al. [174] in their research have come up with a novel architecture to process as well as store the data coming in from sensors in healthcare apps. Meta Fog-Redirection with Grouping and Choosing architecture is the name of the developed system. The architecture functions as an ecosystem for IoT bigdata and governs the data against any trespassing activities. IoT devices. The data collected by IoT devices if first sent to FC and analyzed. If there is an emergency detected, doctors are alerted. Data after necessary filtering is sent to CC where Apache HBase and Apache Pig are utilized for storing bigdata.
In RHM, managing bigdata is also a challenge. Another challenge of big data analysis is patient prioritization that exists in the field of telemedicine. Kalid et. al. [175] co-relates the prioritization of patients to RHM by the use of big data. Telemedicine applied in treatment of long-term diseases such as cardiovascular diseases, BP problems etc. requires the patients to be monitored uninterruptedly. Sensors are used for gaining Realtime status updates about patient’s health information, following which telemedicine provides care service with help of healthcare staff. One issue that one might face with telemedicine is its scalability as we witness a surge in patients count. As the count multiplies, the prioritization overhead may become too large to be of practical use. In order to counter with this possibility, the study has taken the age factor of the population as well as disasters into consideration. Prioritization has been designed to happen under three different umbrellas; transplant, operations and operation room. Triage is the technique that determines chronological ordering among patients, depending on complexity of health issue.
Firouzi et. al. [176] in his study reviewed the IoT based healthcare system that consisted of sensors and integration of bigdata ecosystem. The system included (a) BSN that records the patient’s physical and physiological information. (b) FC layer for information pre-processing, transformation of protocols from one to another, data mining and other such tasks. (c) CC and bigdata ecosystem to store the incoming data and perform predictive analysis that might be able to find some trends in patient’s health information status in the long-term.
Soaring number of outpatients in hospitals, requires more man power of health and wellness workers to diagnose and treat them. Hue et. al [177] came with a new system called Simultaneously Aided Diagnostic Model or SADM that can help in reducing the workload on the doctors. The process begins with data collection. In data collection, outpatients’ medical history, treatments taken in the past, related results and costs are all accumulated. This is followed by preprocessing of collected data, feature extraction techniques application, machine learning algorithm execution. Eventually a diagnosis is formulated and shared with the doctors. For instance, with the help of neural networks and support vector machines, SADM can perform classification of hyperlipidemia. Bigdata is generally stored in multi-dimensional arrays known as tensors based on attributes’ hierarchy at the abstraction level.
Sandhu et. al. [178] in their research have come up with a data-mining solution which is based on tensor and granularity computing approach. This solution addresses the problem of abstraction, different data formatting and data privacy. Granularity computing is a technique to solve problems at diverse granularity levels and then extracting important data from them by eliminating unimportant data in the dataset. The approach works in three different phases. Data matrix being the initial phase is responsible for storing raw data including text, audio and video into the health data tensor. In the subsequent phase, the data matrix is spread out on diverse granular levels using attribute hierarchies. In the final phase, the granules are utilized for processing the queries and deriving the results. The results thus gathered are evaluated and were found to provide faster processing and economic when compared with CANDLEINC or PARAFAC2. The dataset can be transformed to tensor format with the help of toolbox in MATLAB [179].
So far, we have seen references to various sensors and wearables in IoT. The next section delves deeper into wearable technology and provides an in-depth insight into it. Wearables are actually a quintessential example to realize how the masses in general are already becoming a part of and contributing to the IoT healthcare ecosystem. Furthermore, the Table 9 presents the outcomes of the proposed work from the references of recent state of-the-art.
4 Wearable Body Area Networks
Wearables are major pervasive devices in IoT that are common to be observed in our daily lives. Smart clothes for an instance, along with smart watches and other wearables are endowed with optimal data processing power, which when integrated with the customer centric services of IoT can be miraculous as far as our healthcare systems are concerned. Health and fitness, tracking and safety are some domains that have been monopolizing the markets of wearables. The confluence between the digital world and our actual real world is being boosted by our wearable devices. This boost naturally brings more population into the IoT domain. The quality of life for human beings cannot be improved by smartphones alone but, is feasible when smartphones are connected with wearables as wearables have the capability to sense and assemble corporeal data. Wearables execute many minuscule jobs including verification of the incoming messages and also urgent computation of important information in a natural & acceptable manner. Wearables provide multiple value-added services. Some examples are psychological and physical health monitoring financial payments indoor localization and sports analytics [180,181,182,183,184,185,186].
As per market statistical analysis, the annual shipment of wearables is expected to hit 0.2 billion by the year 2019 [187, 188]. Wearable technology having a market value of approximately 19.6 billion $ in 2016 is expected to rise rapidly and is estimated to hit 57.6 billion $ by the year 2022, i.e. a 3X growth [189]. The main reason behind this surge in wearables’ popularity is that it has completely revolutionized the manner of interaction between the consumers and their surroundings. As much as 74% of the people accept that the wearables have been helpful in supporting their communication with the physical things surrounding them. Hereafter, it’s expected that 33% of the population will wear at least five wearables from the year 2020. 60% of the people also expect that in the coming five years, wearables will be utilized only for tracking people’s health information.
In the near future, people will be equipped with multiple internet- connected devices, and would facilitate the users to communicate with their surroundings. To enable the users to accomplish this along while receiving information in continuous & secure way would require these wearables to evolve rapidly. Smartwatch segment is estimated to grow exponentially by the year 2021, with approximately 81,000,000 units expected to be sold, constituting 16% of the total sales of wearables. As per Gartner report, wearables’ worldwide shipment is expected to increase by a margin of 25.8% annually. At this rate it would be reaching 0.225 billion $ by the year 2019. Figure 10 shows a graphical representation of the worldwide wearable sales statistics in various regions from the year 2015 to 2017, along with estimates of year 2020–2022.
It’s concluded from the graph that the wearable device count having 4G network connectivity is approximately 217 million in North America. By 2022, it’s being expected that we might see these numbers getting doubled, thus depicting the high demand of these devices across the globe. WBAN stands for wireless body area network that is defined as wireless communication network that’s ideally suited for healthcare and aids the constant monitoring of people’s health [190]. Sensors endowed with wireless connectivity are either embedded to the internals of patients’ body or attached to the externals itself. Data thus collected by the sensor, is sent to the suitable servers, over a wireless network that’s low powered, via a gateway. WBAN popularity continues to soar as the variety and count of these wearables continues to expand and becomes economic. WBANs in healthcare can be used for a variety of purposes such as distribution calculation of a patient’s body temperature or detect his/her fall. Thus, AAL as discusses earlier, is made possible via WBANs [191]. WBANs assist in patient’s rehabilitation by presenting data that indicates an improvement/deterioration in patient’s health status.
WBANs constantly monitor and analyze the data collected from patient’s vitals regularly and publishing emergency notifications in case an anomaly is found. This leads to an early diagnosis of any underlying health issues that the patient might be suffering from. Remote telemedicine is another healthcare field that’s supported by WBANs. All the data that’s congregated via WBANs can be utilized in upcoming researches to design new healthcare solutions and cater to effective information delivery to medical sector stakeholders [192, 193]. The enabling technologies for BAN include: Wearable devices, energy harvesting, ultra-low power wireless communication network protocols [194], Wireless Sensor Networks (WSN), 6LoWPAN.
4.1 Technologies Consideration in WBANs
There are multiple prevalent requirements, design and technology considerations in wireless communications, that can also be applied in WBAN healthcare applications. The requirements are categorized under the following sub-headings and represented in Fig. 11:
A. Security: These days, the smart systems cater to many diverse applications. The speedy reconditioning of the information technology is facilitating the developers to achieve authentication as a common measure for all applications. As the patients’ healthcare data is by default, sensitive and confidential in nature, our smart systems must have access control protocols with stringent measures for data quality and its security in place [195]. Doctors can monitor the health status of their patients, remotely via WBANs. Nonetheless, the major characteristic of any IoT environment is still system’s privacy and security. BSNC or Body Sensor Network Care is an example of healthcare network proposed by Gope and Hwang in their research [196]. The BSNC was proposed to secure patient’s confidential health data. The researchers classified security of the framework overall into 2 components: one being the network security (NS) and other is data security (DS). NS includes authentication protocols and anonymity. DS on the other hand comprises data privacy, integrity and freshness. Hence, all these measures assist the proposed system in accomplishing both goals i.e. data and network security.
This approach eventually covers mutual authentication, anonymity, secure patient information management, countering forgery attacks and decrease computational overhead. Another approach targeted at providing security & uninterrupted connectivity to medical systems for patient’s data, known as CCN or Content Centric Networking was proposed by Lal and Kumar in [197]. The authors aimed at building a healthcare system driven by economic and low power consuming devices, eventually contributing to an improvement in the quality of lives for patients’ ailing from various diseases. The approach provides uninterrupted connectivity, lowered latency, improved data rates, security and improved speed but faced some challenges including signal collisions in network. Boukerche and Renin [198] had also proposed a model known as the Novel Trust Evaluation Model entrusted to grant security that prevented malicious nodes amidst data transmission. Assets in a multicast arrangement were all secured by this proposed approach, followed by system’s overall performance assessment.
(a) Information security: For any smart healthcare system, it is essential that it provides data that is reliable and secure. Novel authentication and key agreement protocol by Iqbal et al. [199] is another security protocol that ensures communication channel’s security, medical devices and remote servers’ security. This protocol employs a lightweight sensor which is resource curbing and is ideally suited to secure the confidential health data. Hence this proposal has an added advantage of the devices being both small sized and cheap, for providing security to health data. Novel Anonymous Authentication is a novel approach proposed by Wu et al. [200] that provides anonymous authentication mechanism as a security aspect for our healthcare application. In addition, it also successfully lowered the processing time and costs for communication. The costs were proven to be reduced as much as 31.58%. Thus, the system performance so achieved, are better than the prevalent methods.
(b) System privacy: System confidentiality and privacy can be viewed as synonymous aspects. Privacy includes both physical privacy as well as the access control rights. It’s about implementing privacy principles on the user’s personal data. While confidentiality compels the doctors to keep the inappropriate private health data of their patients. A secure and privacy assuring data congregation methodology has been proposed by Ara et al. [201]. Portable digital assistants have been used as the intermediate medium to transmit the data collected from the WBAN’s sensors that constantly sense and collect the health data of patients, to the remote servers. Power along with storage and privacy are some of the system’s complexities. Techniques for the aggregation of the data were introduces for the purpose of decreasing the overhead caused due to these complexities. Hence the system is now empowered with improved optimizations, an increase in its efficiency and security in transmission of data. Shen et al. [202] proposed an approach called as Secure sensor association and key management protocol, aimed at providing integrity and confidentiality for patients in the healthcare system. The sensor system was equipped with a hash function and elliptical cryptography for authentication and key-generation. The advantages offered were that the algorithm proposed to offer confidentiality, security and privacy in healthcare were easy and efficient to execute, thus reducing the computational cost as well as the cost incurred due to communications.
B. Energy: The IoT devices in healthcare have limited power. These devices employ a power saving feature to preserve the power. Reading of sensors is not required at the time of device switching. The power consumption and the lifetime of the network have a deep relation between them. A major challenge in healthcare is the quality of patients’ monitoring in WBAN. To deal with this challenge, it becomes necessary to reduce the power consumption levels of the coordinator node, which would eventually lead to an improvement in the system’s quality. Coordinator node’s major responsibility is information packaging and transferring to the base station and congregate the sensor data to the base station. If the battery is not replenished by the patients regularly, it can prove to be hazardous to their health. It is better to charge the coordinator node’s battery regularly in order to enhance the overall system’s lifetime. Hence an energy efficient security protocol is required that’s built keeping the battery constraint property in mind. Wu et al. [203] proposed an optimal self-governing WBAN execution technique in WBAN healthcare systems.
The work concentrates on limited lifetime of WBAN sensor nodes and the idea of exploiting and harvesting the solar energy which can then be utilized as a power source that drives our sensor nodes. In this manner, the nodes’ lifetime gets extended and patient monitoring can be performed in a continual manner. Another approach known as ANT + protocol was proposed in Mehmood et al. research which to lower down the energy drainage in WBANs [204]. The software framework introduced by the author assimilates ANT + protocols with WBANs to provide healthcare services. Hence it can be said that the proposed approach accomplishes increased power storage, extends the life of devices, supports patient’s uninterrupted health monitoring and decreases the battery replacement requirement’s frequency.
Omeni et al. [205] in his work has laid out a medium access method that’s been optimized to save energy drainage issue and decreases the nearby mode’s collisions. The algorithms are dodged via a channel evaluation algorithm that senses whether the channel is clear. The algorithm’s underlying basis is the listen before transmit standard. Wakeup withdrawal time has been introduced on the approach to avoid those timings overlap. Hence the proposed system achieves reduction in power consumption and collisions and reduced complexity in healthcare applications. Hoang et al. [206] has proposed another approach for keeping tabs on power consumption limits. He has advocated the use of thermal energy harvesting to implement the WBAN using warmth from the human body. The author has described the concept of surplus power in the sensor nodes due to gateways and how the WBAN’s life expectancy can be enhanced by recharging the gateways via thermal energy. This approach thus, reduces the energy drainage and complexity of the system while increasing its reliability.
(a) Power: Power is a factor of utmost importance in e-health 4.0 system. In IoT, the devices are expected to deliver diverse functionalities like transmission mode, sleep mode and receive mode. These power requirements can become challenging to the communication layer. Hybrid data compression scheme or HDCS was proposed by Deepu et al. [207]. On the basis of energy requirements, this scheme helps in the categorization of the power. It is meant to reduce power consumption in IoT wireless sensor networks. Data compression was explored in lossy as well as lossless methods. Eventually it allowed the hybrid transmission mode with features like ‘selection of data rates’ and then conserves power in the wireless transmission mode. Hence the hybrid transmission mode in the proposed approach, paves a way for transmission that’s power-aware, enhanced tolerance towards errors and efficient use of local storage. Ultra-low power and traffic adaptive MAC was proposed by Ullah et al. [208]. It aimed at lowering the power consumption needs and reducing the traffic challenges as idle listening or overhearing challenges. This technique reduces costs and power consumption and improves reliability.
C. Ubiquitous Healthcare: The population is getting more mindful for their health than ever and good health is becoming everyone’s main concern these days. The ubiquitous or pervasive healthcare has had a great impact on mobile application with U-telemedicine that were integrated in IoT WBAN in healthcare monitoring. Medical services, information technology and telecom technology when integrated, is capable of providing medical services such as disease diagnosis and its treatment without any constraints of time and distance. Smart e-healthcare gateway proposed by Rahmani et al. [209] introduced intelligence in the existing IoT pervasive healthcare systems. Through this intelligence, it provided multiple hi-tech services that include localized storage along with real-time health status monitoring and embedded data mining. The system proposed decreases ambiguities in data and increases reliability and tenacity of the system. It also enhances the time and space coverage and enhances data quality. To manage the gateway, command set’s expansion generated a complete data. To make diverse nodes having different priorities interoperable, various protocols sockets associated with the transport layer have been listed in a generic library. Wang et al. proposed SNT i.e. Sensor Network Tasking that’s been developed on the basis of pervasive healthcare systems [210]. It gathers patients’ data and provides data-based probabilities. It also provided a relational model between the key indicators for information collection & antecedence in WBAN. Hence the proposed approach achieves better priority management and gain in utility, reduced power loss and sequenced information consolidation. Chung et al. [211] introduced a new approach for ECG systems in pervasive healthcare. It provides a paradigm for the transmission of all the data collected by the sensor nodes by measuring the physical data to the server nodes without any kind of data loss in between. Though the system was proposed at small-scale, its sensing and communication were precise, and it was compact and lowered the power consumption levels.
D. Resource management: Management of resources is a critical aspect in the healthcare system. Only via a proper resource management can good quality healthcare be provided. This is the reason why the domain of resource management in healthcare requires more R&D. The management approaches of healthcare resources require a better output in order to make healthcare accessible for everyone around the globe. Bhatia and Sood [130] have proposed a temporal information analysis technique in their research for a smart ICU monitoring system. It optimizes the process of real time monitoring. The proposed work goes on to accomplish precision monitoring, decrements in fatality rates and real time health status monitoring. But it also suffered from some disadvantages including issues with uninterrupted data transmissions and inefficiencies in network loads among others. Jeong and Shin [212] in their research work have proposed a mobile vehicle implanted with IoT healthcare devices. The vehicle would then serve as healthcare services providing facility for the public. As a result of the proposal, the vehicle functions as a lifesaving utility, capable of carrying the patients to nearest medical facility in case of emergencies and even could call the emergency services automatically.
Wireless sensor network for monitoring and alarming was proposed by Al-Aubidy et al. [213] which catered to patient health status monitoring. As per the criticality of health status, it kicks off the alarms that work in real time. The monitoring is offered using a rich GUI for the users. The work was proposed keeping in view the patients suffering from critical or life-threatening diseases. The system proposed offers several advantages over others such as economic and well-informed decision-making capabilities, live monitoring over patients’ health and data scanning over a reliable communication network.
E. Quality of Services: QoS is another parameter used in healthcare systems that is real-time critical. Various concerns are widespread that create difficulties in achieving high quality in IoT systems in terms of latency, consolidated data quality, resource consumption and optimizing energy requirements. It is the quality of the sensors attached to the patients’ body that is deterministic of the precision and sensitivity of the measurements sensed by these sensors. The parameters against which the quality of BSNs is measured is often fixed based on the data quality that’s provided as a reply to a query. Some of them are:
-
Latency and its variations: It is a reference to latency and possible variation since latency that can occur in the process of data consolidation from the nodes.
-
Throughput & Bandwidth Capacity: It demonstrates a sensor’s network capacity to transmit the information on a link, in a given time constraint.
-
Precision: Precision may vary from one sensor to another and hence so does each of their capability to determine the actual measurements precisely.
-
Trustworthiness: When multiple sensors are providing data for the same area, the data sets thus provided can intersect with each other. Identification of an efficient sensors subset that must be kept continuously active to satisfy the subscription requirements is a decision that needs to be made depending on parameters including sensor precision levels, amount of trustworthiness and current battery capacity. Each of these parameters can be utilized for the quantitative assessment of the healthcare data.
There are many prevalent parameters that help insure our IoT environment, but these measures are applied measures and hence can assist in better results output. Also, it helps in achieving high reliability, security, confidentiality, signal improvement among other advantages. Kisseleffet et al. [214] had proposed ‘Distributed beamforming’ for building a BSN that is based on the concept of magnetic induction. The system offers multiple advantages including an improvement in QoS and data-rates, while simultaneously reducing the susceptibility against signal attenuation. ‘Signal to noise ratio’ was increased by this system. Satija et al. [215] in their research have proposed a quality monitoring framework for signals being generated and transmitted in real-time and have termed the system as ‘ECG telemetry system’. This method was able to classify the gathered ECG signals and is both light-weight and power efficient. Therefore, it can be concluded that this system offers higher reliability and an improved life-expectancy when compared to other existing systems in the same domain of research.
F. Real-time wireless health monitoring: A health monitoring system that’s wireless and works in real-time is a research domain that’s gaining a lot of attention recently. Such a system will assist the health workers to provide timely assistance to the patient, if and when required. Velrani et al. [216] have authored a study which introduces AHS i.e. Automation healthcare System that provides healthcare services to the users comprising health monitoring in real-time and some security protocols as well. It is a model built on WBAN based healthcare system in IoT. The model utilizes wearable tags for monitoring in real time. So, the main advantages of this model can be listed as cost reduction in healthcare, increased security features and small size for easy handling, which makes it a great deal specially when there is a dearth of medical staff. For providing security as well as privacy to the user’s data, P2P protocols have been implemented in this model. Hand hygiene is an important aspect that needs to be monitored, which otherwise can prove to be the cause of various diseases in the patient. Bal et al. [217] in their research have introduced a sensor-based monitoring system for hand hygiene. The system calculates health hygiene of individuals in real-time and check if it is compliant with the health standards being followed at the medical institution where this system has been deployed. This system is not only scalable but also comes with the advantage of easy installation. Compared to other existing studies in this domain, this system looks more promising than others as it offers proper and systematic usage of health facilities.
4.2 IoT Healthcare 4.0 Industry Trends in Wearables
Advancement of IoT in healthcare domain has surged significantly in recent times and his has given a boost to more and more entrepreneurs venturing in this technical space. New age startups are interested in this research area and have developed various wearable solutions that are now available commercially and offer different benefits that can be useful for the users. Some of the popular ones are represented in Fig. 12 and mentioned below:
-
1.
Motiv Ring: This product boasts of bringing fitness together with form and function. Among the fitness trackers available in the market, this product is one of the smallest and still is loaded with multiple features for its size. It is capable of measuring person’s vitals like calories burned off, heartrate, ‘resting heart-rate’, total steps walked every day. It monitors the heartrate patterns and movement patterns of individuals and then determines a metric that shows the person the manner in which the individual’s daily activities are contributing to his/her health in general. Compared to generic wrist worn wearables category, this product is worn as a ring on fingers and thus is proven to be of more comfort to the wearers. Along with it you have a mobile app called as ‘Motiv’, that allows to set-up your own individual goals such as step-count, sleep time and sleep duration. The device along with the app detect and provide you with the accuracy with which you are able to achieve those targets set by you. For every physical activity that a person performs, he/she can see the details associated with that particular activity such as calories burnt in that activity alone or max heart rate achieved in that activity. The app is compatible with all iphones featuring iOS 9.0 and above and all android devices featuring android 6.0 or higher.
-
2.
BloomLife: This product has been built with the pregnant women as their target consumers. It is a wearable that is worn around the stomach with the help of a strap and helps the pregnant ladies to keep a track of all kind of contraction of muscles in the uterus. The wearable is a small sized pod with the sensors built in. The device is comfortable enough to be worn for as long as the individual wants, without any signs of discomfort. As the device has been designed specially to monitor the contractions, it is of specific use when the woman is in her final trimester of pregnancy. The device is helpful as it maintains historical data of the woman’s contractions along with measuring the intensity and frequency of these contractions, eventually guiding the women to get a fair understanding of their pregnancy progress. It also helps them determine if what they are experiencing is not actual but false labor pain also referred to as, ‘Braxton Hicks contractions’ or BHC. These BHC are common and are expected in most pregnancies and they feel quite similar to labor. The difference is that BHC are not as frequent and intense as the actual labor contractions. Bloomlife is there to help the women identify, when it’s gas or HPC or actual labor contractions, thus reducing their stress related to identify these differences themselves.
-
3.
Doppel Wristband: This product is the resultant of application of research work accomplished in the fields of neuroscience and psychology respectively, that present the natural and intuitive manner in which human beings generally react to various diverse rhythms. Research has proven that a positive, relaxed and calm emotional state of mind is associated with a slower rhythm tempo, while other emotions like excitement and joyfulness is associated with a relatively faster rhythm. Doppel produces rhythm similar to our heartbeat rhythm which to us human beings, is the most natural rhythm that we can relate to. Our brain in turn, feels this rhythm and responds to it in the same manner in which it reacts to music. The only difference is that unlike music which can be distracting at times, Doppel’s rhythm does not produce any sound. One is able to just feel the rhythmic vibrations thus generated and feel calm and composed with an improvement in focusing power.
-
4.
iThermonitor: This product makes use of ‘ambient compensation technology’, is worn on the person’s axilla and is used to measure the temperature of the core accurately. Monitoring is constant and the data is transmitted with a periodicity of 4 s. Bluetooth is used for the data transmission. The product features wireless adaptors that are compatible to be installed with the existing patient monitors. It is capable to monitor the patient’s body temperature in real-time without causing any disruptions in the ongoing workflow, neither does it require any changes to be made to the existing infrastructure. This product’s precision to measure the temperature is at par with the invasive options available. Hence it can be considered to be used in oust the need for spot-checks and complex probation for positioning of invasive options. And unlike other alternatives, this product has an added advantage that the patient can wear it to his/her home after being discharged from the hospital and sill be monitored for body temperature checks. All these wearables have been summarized in the Table 10.
So far in this study, we have discussed that how the fog systems have been largely successful to process huge chunks of datasets locally, are portable in nature and are easily installable even if the hardware is heterogeneous. These are the features that are responsible for making fog systems as developer’s choice when it comes to deploying latency sensitive applications. For instance, IoT devices are devices that are generally required to process huge datasets within given time constraints. Such a varying functionality range in applications exposes the security threats to data, virtualization and the network in general. In the next section, we determine the impact of these security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.
5 System Security and its Importance in Healthcare 4.0
The computational framework and the data storage ability, both are centralized in nature in cloud computing paradigm and hence, vulnerable to be hacked by invaders. Amazon and Google – two of the largest cloud vendors in the market, have reported unfortunate instances of massive data leaks from their respective companies. Hence security is one of the major obstructions, that’s been blocking the growth of cloud computing adaption over the years. Fog computing, which is termed as cloud computing’s significant extension, is lauded as a better architecture than cloud, in terms of security. This is mainly due to two reasons. One is that the data that’s collected is briefly maintained on the fog nodes, that are nearest to the data generation sources. This reduces the reliance on web connectivity. Data’s analysis, transfer and storage when localized, makes it challenging for intruders to be able to access user’s personal data.
Secondly, data transfer between the cloud and the end devices is not occurring in real-time anymore. This makes it challenging for the intruders to detect any kind of confidential data related to some particular user. But fog computing is not certified as fully secure facility, since it is an inheritor from cloud and thus, some security risks are also inherited by fog computing in its hierarchy. There are multiple services deployed on the fog nodes for the benefit of the users, as per contract. The vendors are in a position where it’s a possibility that might be snooping on the personal information and the other data stored by the fog tenant. Fog vendors’ employees might go against the company policy and gain access to the sensitive and confidential user data and data leak can occur. Apart from this, attackers or intruders from outside may also try to target the fog nodes, for their own malicious goals. This might lead to the fog nodes themselves turning malicious, thus making the other nodes in the network, also susceptible to getting compromised. As most healthcare networks make use of FC, it makes our valuable and confidential healthcare data vulnerable to thefts and manipulations. Following is a comprehensive consolidation of the various possible attacks in the fog healthcare network [218]. Some of these security issues are highlighted in Fig. 13.
-
Forgery: The attackers might malevolently impersonate the identity of the victims, produce and propagate fake data about those victims in order to misguide other bodies existing in the network. As this fake information adds to the already existing data transfers in the network, the overall data might become bulky, thus affecting the limited network resources including energy, bandwidth and storage. Bottlenecks thus produced in bandwidths can be critical in healthcare as discussed in Sect. 1.
-
Tampering: The tampering attack includes data packets drop, latencies and modification of the healthcare data being transmitted in fog networks, thus leading to a disruption in services and deterioration of efficiency. Service disruptions can prove to be fatal in any healthcare system, thus tampering is a major threat to fog healthcare networks. Detection of tampering is a difficult task as some other factors such as wireless transmission channel’s current state and mobility of the users may also lead to similar transmission latencies and failures.
-
Spam: It includes generation and broadcasting of undesirable and useless data like redundant information and fake data collected from the users. Spam attacks usually result in wastage of network resources, duping victim’s friends and social circles and even confidential data leakage. Spamming in healthcare networks again constricts bandwidth which is a critical challenge as health applications are time sensitive in nature.
-
Sybil: The attackers carrying out a sybil attack, create fake identities or take undue advantage of pseudonyms, so that they can manipulate and compromise with fog’s effectiveness. For instance, they might be generating inaccurate crowdsensing documents such that any results derived from the docs are not trustworthy. Moreover, sybil attacks can also lead to invasion of legit user’s personal healthcare data.
-
Jamming: In this type of attack, the attacker intentionally generates vast volumes of fraudulent messages so as to throttle the computational and other resources such as communication channel’s capacity. This attack renders the normal operations and computations infeasible for the legitimate users. If the attacker is successful in jamming the network, it might lead to a lot of causalities and fatalities of the patients in our e-healthcare network.
-
Eavesdropping: The attackers tap into the communication channels to seize the data packets under transmission and capture its contents. Leakage of patient’s healthcare data is critical as that is classified information as per the law in many countries. Patients become more susceptible to such attacks if there are no data encryption systems being used in the e-health network.
-
DOS attack: The attackers make the fog nodes unavailable to legitimate users. This is done by overwhelming the fog nodes with huge superficial requests. This disrupts the fog nodes e-health services and hence users find them unavailable when required. Compared to CC servers, FC nodes are considered to be more susceptible to this DOS attack, as this attack modulus operandi is to overwhelm the healthcare network resources which are already very limited in a FC e-health network.
-
MITM: An attacker with malicious intents plays the middleman by meddling with the data exchange occurring between two parties and tries to relay or even modify that data. While this happens, both the communicating parties are still under misapprehension that they are communicating between themselves only. This is a major hurdle in the private & confidential communication over the e-health network, that is supposed to be between the doctor and his/her patients and the intruder performs an MITM attack.
All the above security challenges are supposed to be dealt with, to make our fog network secure. But of these, MITM attack is of particular concern and needs to be looked into detail. Section 5.1 is dedicated to discussing the MITM attack:
5.1 Man-in-the-Middle Attack:
MITM is one of the most critical potential attack likely against our fog networks. This subsection is devoted to describe the threats posed to our fog networks due to these MITM attacks. The modulus operandi for this attack is that the gateways that have been functioning as our fog nodes are jeopardized or are replaced with malicious nodes [219]. For instance, patients who want to have an online consultation with their doctor might try to connect to some public access points that might have been maligned to function deceitfully, by falsely using the authentic identifiers. Once the gateways have been compromised by the attackers, all the confidential communications made by the patients will be stolen. MITM works in a very subtle manner in fog networks. One more peculiarity related to MITM attack is that it consumes only negligible amount of memory and processor utilization. This in turn leads to the failure of our aberration detection mechanisms, which generally detect attacks based on CPU and memory usage patterns. To highlight the stealth level of MITM in fog, the attack has been demonstrated using an environment depicted in Fig. 14. In this case study, we have patient on 3G network who tries video calling with another WLAN user which is a doctor in our case. MITM attack focusses on compromising the two users’ communication in the middle. This is carried out by compromising the fog nodes which are gateways in this case. The implementation of this attack relies on two major steps.
In the first step, the gateways are compromised and in the second step, a malicious piece of code is inserted into that compromised gateway. For compromising the gateways, a duplicate access point can be placed in the environment. Another method includes a ROM refresh of the existing normally functioning gateways. These methods are easy to implement in any real-world environment, where the attack is being deliberated to be carried out. The former approach is adapted in our example and for gateways, Broadcom BCM5354 have been utilized [220]. BCM5354 consists of a MIPS32 processor for delivering high performance, a USB controller and IEEE 802.11 b/g Media Access Controller/physical layer. The end points in our case: 3G cellphone and WIFI connected laptop are supposed to engage in a video communication with our gateway BCM5354 in between. We perform a ROM refresh and a system upgrade on our gateway so that it now runs on a Linux Kernel. We make changes to the TCP/IP stack in our gateways, by embedding a hook program onto it. Hook programming refers to an alteration in the system calls, by the insertion of a pieces of code into those system calls [221]. Commonly, hook’s mechanism is to swap a function pointer that points to the system call, with the hook’s pointer. The processing is then carried out and when it’s complete, the real function pointer is called. The architecture of the system can be seen in Fig. 15. Further, the gateway’s controlling requires the deployment of relevant data structures and APIs. Some examples are initialization and bootstrapping code. WLAN’s data packets are going to be sent to the associated 3G modules and processed. A 3G USB modem is plugged on our gateway. H.324 M is also implemented on the gateway for audio–video tunnel with a 3G circuit switched call setup. Adaptive Multi Rate and H.263 protocols have also been executed for the audio, video coding and decoding functionality.
Workflow of MITM attack: The gateway between the WLAN user and 3G user acts as an intermediate in order to standardize the incoming communication generated by diverse protocols. Hence, the data will be received by the gateway first, before forwarding it to the destination. MITM comprises of four steps as illustrated in Fig. 15. Beginning two steps involves the redirection of the data packets sent by the 3G user, using the hook process that’s embedded in the gateway. The data is redirected to the attacker. The attacker can then modify that data using his computer. The data is then transmitted by the attacker back to where it came from i.e. the gateway. During the last step, the data transmitted by the attacker towards the gateway, is forwarded to a WLAN user. This process goes both ways i.e. data sent by WLAN user is also first sent to the attacker and he process continues.
5.2 Security Solutions for FC e-Health 4.0 Network:
As discussed earlier, the fog network introduced between the cloud servers and users, is particularly vulnerable to various security risks. Moreover, in fog computing, standard security measures or state of the art security mechanisms do not exist, unlike cloud computing. Also:
-
Fog platforms have a comparatively smaller set of available computational resources. This puts a constraint on the implementation limits of complete security solutions. Without these full security solutions, it’s difficult to identify and prevent the malicious attacks.
-
Fog platforms are the favored targets by the cyber attackers. This is because fog node data throughput is in high volumes. Moreover, the probability of capturing confidential data is more in fog nodes, as they are the intermediaries between the cloud and IoT end devices.
-
Based on the configuration of the network as well as the physical location, fog platforms are in general highly accessible when compared to cloud platforms. Due to this, there is a much higher possibility of attacks.
Table 11 is a brief summarization of the security challenges looming over the respective application domains, how these challenges pose a threat and their possible solutions. The table highlights the security issues in fog with respect to availability, integrity and confidentiality. As the healthcare networks use FC necessarily, for the advantages mentioned in Sect. 1, any vulnerabilities in FC, makes the patient’s confidential data and e-health service sin general at risk.
So far, we have seen the major security risks associated with fog, its negative repercussions and some solutions to deal with them. Apart from the techniques mentioned so far, Blockchain is an emerging technical field that can be particularly helpful in FC health network as it can protect the confidential data. In the next sub section, we will be focusing on blockchain and how it can be beneficial in solving some of the security threats to fog.
5.3 Blockchain Technology as a Security Technique in e-healthcare 4.0
People these days can connect in many diverse manners through hypermedia. These hypermedia communications are said to be quite multifaceted, as they contain several different data formats, sources and data resolutions all combined [222]. Multimedia communication also has medical sector – a rapidly and significantly rowing field as its key component. Multimedia is responsible for providing a mechanism to enhance the communication quality between the health workers and the patients. This enhancement in interaction quality is proving to be a step forward as far as the advancements in the recovery and remedial processes are concerned [223, 224]. Multimedia usage in healthcare has started the paradigm of storage, transmission and processing of patient’s sensitive health data over to the health workers through online services. This data can be in different forms like pictures, videos, text etc. Healthcare organizations these days are striving to become more and more user-centric and efficient. Technology has been playing a vital role in today’s era, by increasing the patient’s healthcare quality standards. It also decrements its cost as it allocates all the required medical resources in a very efficient manner. IoT brings into picture thousands of devices and storage services networked together, with well-defined cooperation mechanism between them to communicate. In this bigdata can be analyzed for making well informed decisions [225]. In the present day, IoT based health service systems that comprise of multiple devices networked together so they are able to together record and share with each other important information are gaining a lot of attention. These devices communicate via a service layer that is secure and connected to central control server in CC. Moreover, IoT smart devices and sensors are coordinating together to eventually reach the goal of pervasiveness [226, 227]. These devices being interconnected provide us with various kinds of data including energy consumption patterns, current status of the devices and environmental information which can then be aggregated and finally distributed further in a secure and efficient manner. Moreover, as the devices are connected to Internet, it is easy to reach and control them remotely irrespective of the time or location constraint. Data related to healthcare is classified information that can be an attractive attack prospect for the cyber-criminals. Edward Snowden inside information leak incident has raised trust issues for the IoT development companies to trust their employees with the health data of their clientele [228]. Hence security and privacy needs special attention and needs to be put on.
the pedestal, especially when it comes to development decision related to healthcare IoT. For increasing the security for our systems, there is an urgent need of come up with some transparent approaches to develop the upcoming IoT solutions [229]. Security should be at the center or heart of our IoT network and in order to secure our patients’ health data, transparency has a key role to play.
Furthermore, in our IoT health systems as the healthcare data is recorded, produced and shared in an electronic format and also storage of this crucial data online, puts the patients’ confidential health data at high risk of potential security/privacy breach [230, 231]. Multimedia devices provided by the vendors can also be compromised by the vendor in order to take undue advantage of those devices by intentionally introducing security loopholes in them, which can later be exploited to take control of user’s sensitive information. Recently, blockchain is becoming a great topic of interest across organizations belonging to different sectors such as finance, real estate and particularly the healthcare sector [232, 233]. Blockchain technology has been witnessing a steep surge in popularity as it grants complete transparency among all individuals in the organization. Moreover, it is also capable of ensuring security as well as transparency among all the users and this stands true even in the case of IoT devices getting hacked by intruders. It is also able to bear out, organize and track the communications. It is able to do so by storing the information coming in large volumes from different devices and helping the parties to be formulated without a central cloud.
It confines all the activities and tracks the data from different IoT devices as the consignment moves between different places. For instance, if there’s a pharmaceutical firm that produces medicines, it can track its medicines starting the point of shipping to the point of delivery to medicinal stores, all with the help of blockchain. Blockchain when applied in healthcare industry in general, as shown in Fig. 16, will capture and track the intermediate activates if any, patient records and patient’s information accessibility. Moreover, the shipment of medicines in an IoT system where the products keep moving different places, can be tracked by both the receiver party and the sender party. Blockchain technology in combination with healthcare IoT in general is going to be beneficial for the society in numerous ways as it ensures the security of patient’s health data and also ensures transparency by providing the patients the rights to view their heath documents and also the power to decide who else can have access to them. Blockchain is thus an exciting approach for developing the security solutions for IoT but is still in a rather nascent stage [287,288,289,290,291,292,293,294,295,296].
One rather interesting prospect to be considered in IoT security solution is its scalability as the devices in our IoT health network are going to increase rapidly and continuously. So, considering this thing into the picture, strategizing a scalable security solution without any compromises in the system’s security is a challenging task in itself. Some of the undertakings in this direction have been summarized in Table 12. The table shows how different approaches use a variety of hardware platforms like Arduino or Raspberry Pi along with the security mechanism implemented.
6 Concluding Remarks
Researches throughout the globe, have all been exploring diverse technical solutions to improve the healthcare sector. These solutions should also be integration-compatible with the pre-existing services, something that can be achieved by taking advantage of IoT’s potential. This survey discusses the need of FC in e-healthcare 4.0 and its advantages over CC. This survey further explores the niche aspects of healthcare networks based on IoT and how different IoT network topologies, IoT platform and IoT architectures can be helpful in information being transmitted and received. Researches and developers will both benefit from the e-healthcare 4.0 architectures discussed in the paper as it would facilitate the readers as the initial research to venture into novel IoT health architecture development. Detailed R&D is being carried out in healthcare IoT domain, leading to its broad categorization into IoT applications & IoT services which complement each other and can be a boon for humanity. Machine Learning, AI, data mining are the technologies that are being explored to be of use in the e-healthcare 4.0 domain and serve as an interesting research area. The authors further debates how IoT is transforming the e-healthcare as we perceive it, through wearables. This survey, thereafter, takes at another essential aspect of healthcare networks in IoT and how security threats like MITM attacks can be a matter of concern. Blockchain can be helpful in dealing with these security challenges, especially those related to maintaining the confidentiality of patient’s records that are shared over the IoT network and also for medical shipment tracking. Thus, this comprehensive and exhaustive survey captures IoT healthcare in a broad horizon and would thus facilitate for further research in this domain by engineers, scientists, researchers and industry experts. The benefits that the new IoT healthcare paradigm would bring in, are going to far outweigh the issues that it brings along, which can always be dealt with, with more research going into it.
Availability of data and material
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Kuroda, T., Sasaki, H., Suenaga, T., Masuda, Y., Yasumuro, Y., Hori, K., Ohboshi, T., Takemura, K. C., & Yoshihara, H. (2012). Embedded ubiquitous services on hospital information systems. IEEE Transactions on Information Technology in Biomedicine, 16(6), 12161223.
Jeong, S., Youn, C.-H., Shim, E. B., Kim, M., Cho, Y. M., & Peng, L. (2012). An integrated healthcare system for personalized chronic disease care in home-hospital environments. IEEE Transactions on Information Technology in Biomedicine, 16(4), 572585.
Pang, Z. (2013) Technologies and architectures of the Internet-of-Things (IoT) for health and well-being. M.S. thesis, Dept. Electron. Comput. Syst., KTH-Roy. Inst. Technol
Vasanth, K., Sbert, J. (2014) Creating solutions for health through technology innovation. Texas Instruments. [Online]. Available: http://www.ti.com/lit/wp/sszy006/sszy006.pdf, Accessed Dec. 7.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.
Ning, H., Liu, H., Ma, J., Yang, L. T., & Huang, R. (2016). Cybermatics: Cyber-physical social thinking hyperspace-based science and technology. Future Generation Computer Systems, 56, 504–522.
Evans, D. (2011). The internet of things: How the next evolution of the internet is changing everything. CISCO White Paper, 1, 1–11.
Cisco global cloud index: Forecast and methodology, 2014–2019 white paper.
Cortes, R., Bonnaire, X., Marin, O., & Sens, P. (2015). Stream processing of healthcare sensor data: Studying user traces to identify challenges from a big data perspective. Procedia Computer Science, 52(1), 1004–1009.
He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., & Li, Y. (2017). Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Transactions on Vehicular Technology, 66(3), 2789–2800.
Market research report. Retrieved March 2017 from http://www.grandviewresearch.com/industry-analysis/fog-computing-market .
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A view of cloud computing. Communications of the Acm, 53(4), 50–58.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), 84106.
Qiu, T., Zheng, K., Song, H., Han, M., & Kantarci, B. (2017). A local-optimization emergency scheduling scheme with self-recovery for smart grid. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2017.2715844
Cao, Y., Chen, S., Hou, P., Brown, D. (2015). Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation In IEEE International Conference on Networking, Architecture and Storage, pp. 2–11.
Stantchev, V., Barnawi, A., Ghulam, S., Schubert, J., & Tamm, G. (2015). Smart items, fog and cloud computing as enablers of servitization in healthcare. Sensors & Transducers, 185(2), 121–128.
T. Qiu, R. Qiao, D. Wu, Eabs: An event-aware backpressure scheduling scheme for emergency internet of things, IEEE Transactions on Mobile Computing PP (99) (2017) 1–1. doi:https://doi.org/10.1109/TMC.2017.2702670.
Arkian, H. R., Diyanat, A., & Pourkhalili, A. (2017). Mist: Fog-based data analytics scheme with cost efficient resource provisioning for IoT crowdsensing applications. Journal of Network & Computer Applications, 82, 152–165.
Yi, S., Hao, Z., Qin, Z., & Li, Q. (2015). Fog computing: Platform and applications, in. Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015, 73–78.
Datta, S. K., Bonnet, Haerri, J. (2015). Fog computing architecture to enable consumer centric internet of things services. In International Symposium on Consumer Electronics, pp. 1–2.
Bonomi, F., Milito, R., Zhu, J., Addepalli, S. (2012). Fog computing and its role in the internet of things, in: Edition of the Mcc Workshop on Mobile Cloud Computing, pp. 13–16.
Sarkar, S., & Misra, S. (2016). Theoretical modelling of fog computing: A green computing paradigm to support IoT applications. IET Networks, 5(2), 23–29.
Hu, P., Ning, H., Qiu, T., Zhang, Y., & Luo, X. (2017). Fog computing based face identification and resolution scheme in internet of things. IEEE Transactions on Industrial Informatics, 13(4), 1910–1920.
Kang, K., Wang, C., & Luo, T. (2016). Fog computing for vehicular ad-hoc networks: Paradigms, scenarios, and issues. Journal of China Universities of Posts & Telecommunications, 23(2), 56–96.
Bonomi, F. Milito, R., Natarajan, P., Zhu, J. (2014) Fog computing: A platform for internet of things and analytics, Springer International Publishing.
Dsouza, C., Ahn, G. J., Taguinod, M. (2015). Policy-driven security management for fog computing: Preliminary framework and a case study, In IEEE International Conference on Information Reuse and Integration, pp. 16–23
Varshney, P., Simmhan, Y. (2017). Demystifying fog computing: Characterizing architectures, applications and abstractions, arXiv preprint arXiv:1702.06331 pp. 1–23.
Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., Sun, L. (2015). Fog computing: Focusing on mobile users at the edge, Computer Science pp. 1–11.
Hossain, M. S., & Atiquzzaman, M. (2013). Cost analysis of mobility protocols. Telecommunication Systems, 52(4), 2271–2285.
Natal, A. R., Jakab, L., Portols, M., Ermagan, V., Natarajan, P., Maino, F., Meyer, D., & Aparicio, A. C. (2013). Lispmn: Mobile networking through lisp. Wireless Personal Communications, 70(1), 253–266.
Natraj, A. (2016). fog computing focusing on users at the edge of internet of things. International Journal of Engineering Research, 5(5), 1004–1008.
Vaquero, M. L., & RoderoMerino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing. Acm Sigcomm Computer Communication Review, 44(5), 27–32.
Shi, C., Lakafosis, V., Ammar, M. H., Zegura, E. W. (2012) Serendipity: Enabling remote computing among intermittently connected mobile devices, in: ACM MOBIHOC, pp. 145–154.
Hassan, M. A., Xiao, M., Wei, Q., Chen, S. (2015) Help your mobile applications with fog computing, In IEEE International Conference on Sensing, Communication, and Networking - Workshops, pp. 1–6.
Chiuchisan, I., Costin, H.N., Geman, O. (2014). Adopting the Internet of things technolo- gies in health care systems, In Proceedings of the International Conference and Exposition on IEEE Electrical and Power Engineering, Iasi, Romania, pp. 532–535.
Luo, J., Chen, Y., Tang, K., Luo, J. (2009). Remote monitoring information system and its applications based on the Internet of Things, in: Proceedings of the Biomedical Information Engineering. FBIE 2009, pp. 482–485.
Gustafson, D.H., DuBenske, L.L., Atwood, A.K., Chih, M.Y., Johnson, R.A., Mc- Tavish, F., Quanbeck, A., Brown, R.L., Cleary, J.F., Shah, D. (2017). Reducing symptom dis- tress in patients with advanced cancer using an e-alert system for caregivers: pooled analysis of two randomized clinical trials, Journal of Medical Internet Research 19 (11) e354.
Wang, W., Li, J., Wang, L., Zhao, W. (2011). The Internet of Things for resident health information service platform research, In Proceedings of the IET International Conference on Communication Technology and Application, pp. 631–635.
Kiran, M.S., Rajalakshmi, P., Bharadwaj, K., Acharyya, A. (2014). Adaptive rule engine based IoT enabled remote health care data acquisition and smart transmission system, In Proceedings of the IEEE World Forum on Internet of Things, pp. 253–258.
Chiuchisan, I., Costin, H.N., Geman, O. (2014) Adopting the Internet of things technologies in health care systems, In Proceedings of the International Conference and Exposition on IEEE Electrical and Power Engineering, pp. 532–535.
Yuce, M. R. (2010). Implementation of wireless body area networks for healthcare systems. Sensors and Actuators, A: Physical, 162(1), 116–129.
Ko, J., Lu, C., Srivastava, M. B., Stankovic, J. A., Terzis, A., & Welsh, M. (2010). Wireless sensor networks for healthcare. Proceedings of the IEEE, 98(11), 1947–1960.
Viswanathan, H., Lee, E.K., Pompili, D. (2012). Mobile grid computing for data- and patient-centric ubiquitous healthcare, In Proceedings of the 1st IEEE Workshop Enabling Technologies for Smartphone Internet Things, pp. 36–41.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
Zhang, X.M., Zhang, N. (2011) An open, secure and flexible platform based on internet of things and cloud computing for ambient aiding living and telemedicine, In Proceedings of the International Conference on IEEE Computer and Management, pp. 1–4.
Firdausi, A.: Overview the internet of things (IOT) system security, applications, architecture and businessmodels.https://s3.amazonaws.com/academia.edu.documents/46880206/Overview_The_Internet_Of_Things_IOT_System_Security_Applications_Architecture_And_Business_Models.pdf?AWSAccessKeyId=AKIAI WOWYY GZ2Y5 3UL3A &Expires=1524848582&Signature=rMY546kXEi3ekA%2BbZb8HFAxL9Bw%3D&response-content disposition=inline%3B%20filename %3DOverview The_Internet_Of_Things_IOT_Syst.pdf. Accessed 15 June 2017
Uckelmann, D., Harrison, M., & Michahelles, F. (2011). An architectural approach towards the future internet of things. In D. Uckelmann, M. Harrison, & F. Michahelles (Eds.), Architecting the internet of things (pp. 1–24). Springer.
Mieronkoski, R., Azimi, I., Rahmani, A. M., Aantaa, R., Terävä, V., Liljeberg, P., et al. (2017). The internet of things for basic nursing care—a scoping review. International Journal of Nursing Studies, 69, 78–90.
Fox, G.C., Kamburugamuve, S., Hartman, R.D. (eds.) (2012). Architecture and measured characteristics of a cloud based internet of things. In Collaboration technologies and systems (CTS), 2012 international conference on. IEEE
Ashraf, Q.M., Habaebi, M.H., Sinniah, G.R., Ahmed, M.M., Khan, S., Hameed, S. (eds.) (2014). Autonomic protocol and architecture for devices in Internet of Things. Innovative Smart Grid Technologies-Asia (ISGT Asia), 2014 IEEE. IEEE.
Hemalatha, D., & Afreen, B. E. (2015). Development in RFID (radio frequency identification) technology in internet of things (IOT). International Journal of Advanced Research in Computer Engineering and Technology, 4(11), 4030–4038.
Krco, S., Pokric, B., Carrez, F. (eds.) (2014). Designing IoT architecture (s): a European perspective. Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE.
Ivascu, T., Manate, B., Negru, V. (eds.) (2015). A multi-agent architecture for ontology-based diagnosis of mental disorders. In: Symbolic and numeric algorithms for scientific computing (SYNASC), 2015 17th international symposium on. IEEE.
Gupta, P. K., Maharaj, B., & Malekian, R. (2016). A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres. Multimedia Tools and Applications, 76(18), 18489–18512.
Zgheib, R., Bastide, R., Conchon, E. (eds.) (2015) A semantic web of-things architecture for monitoring the risk of bedsores. In Computational science and computational intelligence (CSCI), 2015 international conference on. IEEE.
Bazzani, M., Conzon, D., Scalera, A., Spirito, M.A., Trainito, C.I. (eds.) (2012). Enabling the IoT paradigm in e-health solutions through the VIRTUS middleware. In Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on. IEEE
Moosavi, S. R., Gia, T. N., Nigussie, E., Rahmani, A. M., Virtanen, S., Tenhunen, H., et al. (2016). End-to-end security scheme for mobility enabled healthcare internet of things. Future Generation Computer System, 64, 108–124.
Fazio, M., Celesti, A., Márquez, F.G., Glikson, A., Villari, M. (eds.) (2015). Exploiting the fiware cloud platform to develop a remote patient monitoring system. In Computers and communication (ISCC), 2015 IEEE symposium on. IEEE
Ray, P.P. (ed.) (2014) Home Health Hub Internet of Things (H 3 IoT): an architectural framework for monitoring health of elderly people. In Science engineering and management research (ICSEMR), 2014 international conference on. IEEE.
Gelogo, Y.E., Oh, J.-W., Park, J.W., Kim, H.-K. (eds.) (2015) Internet of things (IoT) driven U-Healthcare system architecture. In bio-science and bio-technology (BSBT), 2015 8th International Conference on. IEEE.
Fan, Y. J., Yin, Y. H., Da Xu, L., Zeng, Y., & Wu, F. (2014). IoT-based smart rehabilitation system. IEEE Transactions of Industrial Informatics, 10(2), 1568–1577.
Spanò, E., Di Pascoli, S., & Iannaccone, G. (2016). Low-power wearable ECG monitoring system for multiple-patient remote monitoring. IEEE Sensors Journal, 16(13), 5452–5462.
Gómez, J., Oviedo, B., & Zhuma, E. (2016). Patient monitoring system based on internet of things. Procedia Computer Science, 83, 90–97.
Moosavi, S.R., Rahmani, A.-M., Westerlund, T., Yang, G., Liljeberg, P., Tenhunen, H. (2014). Pervasive health monitoring based on Internet of Things: two case studies. In Wireless mobile communication and healthcare (Mobihealth), 2014 EAI 4th international conference on. IEEE.
Rahmani, A.-M., Thanigaivelan, N.K., Gia, T.N., Granados, J., Negash, B., Liljeberg, P., et al. (eds.) (2015). Smart e-health gateway: bringing intelligence to internet-of-things based ubiquitous healthcare systems. In Consumer communications and networking conference (CCNC), 2015 12th annual IEEE. IEEE.
Ullah, K., Shah, M.A., Zhang, S. (eds.) (2016). Effective ways to use internet of things in the field of medical and smart health care. In Intelligent systems engineering (ICISE), 2016 international conference on. IEEE.
Lee, J. D., Yoon, T. S., Chung, S. H., & Cha, H. S. (2015). Service-oriented security framework for remote medical services in the internet of things environment. Healthcare Informatics Research, 21(4), 271–282.
Monteiro, A., Dubey, H., Mahler, L., Yang, Q., Mankodiya, K. (eds.) (2016). Fit: a fog computing device for speech tele-treatments. In 2016 IEEE International Conference on Smart computing (SMARTCOMP). IEEE, St. Louis, MO.
Cao, Y., Hou, P., Brown, D., Wang, J., Chen, S. (eds.) (2015). Distributed analytics and edge intelligence: pervasive health monitoring at the era of fog computing. In Proceedings of the 2015 workshop on mobile big data. ACM.
Yang, L., Ge, Y., Li, W., Rao, W., Shen, W. (2014). A home mobile healthcare system for wheelchair users, In Proceedings of the IEEE International Conference on Computer Supported Cooperative Work in Design, Hsinchu, pp. 609–614.
Shahamabadi, M. S., Ali, B. B. M., Varahram, P., Jara, A. J. (2013). A network mobility solution based on 6LoWPAN hospital wireless sensor network (NEMO-HWSN),'' In Proc. 7th Int. Conf. Innov. Mobile Internet Services Ubiquitous Comput. (IMIS), pp. 433_438.
ICH Expert Working Group, (1996) Guidance for industry-E6 good clinical practice: Consolidated guidance,. U.S. Dept. Health Human Services, Food Drug Admin., Silver Spring, MD, USA
Jara, A. J., Belchi, F. J., Alcolea, A. F., Santa, J., Zamora-Izquierdo, M. A., Gomez-Skarmeta, A. F. (2010) A pharmaceutical intelligent information system to detect allergies and adverse drugs reactions based on Internet of Things,'' In Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PERCOM Workshops), Mar., pp. 809_812.
Yang, G., et al. (2014) A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2180_2191.
Mantas, G., Lymberopoulos, D., Komninos, N. (2010) A new framework for ubiquitous context-aware healthcare applications, In Proc. 10th IEEE Int. Conf. Inf. Technol. Appl. Biomed. (ITAB), Nov. 2010, pp. 1_4.
Viswanathan, H., Chen, B., Pompili, D. (2012) Research challenges in computation, communication, and context awareness for ubiquitous healthcare,. IEEE Commun. Mag., vol. 50, no. 5, pp. 92_99.
Sai Kiran, M. P. R., Rajalakshmi, P., Acharyya, A. (2014) Context predictor based sparse sensing technique and smart transmission architecture for IoT enabled remote health monitoring applications. In Proc. IEEE Int. Conf. Eng. Med. Biol. Soc. (EMBC), pp. 4151_4154.
Istepanian, R. S. H., Jovanov, E., Zhang, Y. T. (2004) Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed., vol. 8, no. 4, pp. 405_414.
Istepanian, R. S. H., Hu, S., Philip, N. Y., Sungoor, A. (2011). The potential of Internet of m-health Things `m-IoT' for non-invasive glucose level sensing,'' In Proc. IEEE Annu. Int. Conf. Eng. Med. Biol. Soc. (EMBC), pp. 5264_5266.
Istepanian, R. S. H. (2011). The potential of Internet of Things (IoT) for assisted living applications. In Proc. IET Seminar Assist. Living, Apr., pp. 1_40
Drew, B. J. et al. (2004). Practice standards for electrocardiographic monitoring in hospital settings, Circulation, vol. 110, no. 17, pp. 2721_2746.
Jara, A. J., Zamora-Izquierdo, M. A., Skarmeta, A. F. (2013). Interconnection framework for mHealth and remote monitoring based on the Internet of Things,'' IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 47_65.
Rasid, M. F. A. et al. (2014). Embedded gateway services for Internet of Things applications in ubiquitous healthcare,'' In Proc. 2nd Int. Conf. Inf. Commun. Technol. (ICoICT), May 2014, pp. 145_148.
You, L., Liu, C., S. Tong, (2011). Community medical network (CMN): Architecture and implementation,'' In Proc. Global Mobile Congr. (GMC), pp. 1_6
Yang, L., Ge, Y., Li, W., Rao, W., Shen, W. (2014) A home mobile healthcare system for wheelchair users,'' In Proc. IEEE Int. Conf. Comput. Supported Cooperat. Work Design (CSCWD) pp. 609_614.
Castillejo, P., Martinez, J.-F., Rodriguez-Molina, J., Cuerva, A. (2013). Integration of wearable devices in a wireless sensor network for an e-health application. IEEE Wireless Commun., vol. 20, no. 4, pp. 38_49.
Agu, E. et al. (2013) The smartphone as a medical device: Assessing enablers, benefits and challenges. In Proc. IEEE Int. Workshop Internet-Things Netw. Control (IoT-NC), pp. 48_52.
Liu, M.-L., Tao, L., Yan, Z. (2012) Internet of Things-based electrocardiogram monitoring system. Chinese Patent 102 764 118 A, Nov. 7
Xiaogang, Y., Hongjiang, L., Jiaqing, W., Wentao, T. (2011) Realization of comprehensive detection algorithm of electrocardiogram signal at application layer electrocardiogram monitoring Internet of Thing. Chinese Patent 101 947 112 A.
Khattak, H. A., Ruta, M., Di Sciascio, E. (2014) CoAP-based healthcare sensor networks: A survey In Proc. 11th Int. Bhurban Conf. Appl. Sci. Technol. (IBCAST), pp. 499_503.
Larson, E. C., Goel, M., Boriello, G., Heltshe, S., Rosenfeld, M., Patel, S. N. (2012). SpiroSmart: Using a microphone to measure lung function on a mobile phone. In Proc. ACM Int. Conf. Ubiquitous Comput., pp. 280_289.
Larson, E. C., Goel, M., Red_eld, M., Boriello, G., Rosenfeld, M., Patel, S. N. (2013) Tracking lung function on any phone. In Proc. ACM Symp. Comput. Develop. Art. ID 29.
Pang, Z., Tian, J., Chen, Q. (2014). Intelligent packaging and intelligent medicine box for medication management towards the Internet-of-Things. In Proc. 16th Int. Conf. Adv. Commun. Technol. (ICACT), pp. 352_360.
Laranjo, I., Macedo, J., Santos A. (2013). Internet of Things for medication control: E-health architecture and service implementation. Int. J. Rel. Quality E-Healthcare, vol. 2, no. 3, pp. 1_15
Kolici, V., Spaho, E., Matsuo, K., Caballe, S., Barolli, L. Xhafa, F. (2014). Implementation of a medical support system considering P2P and IoT technologies. In Proc. 8th Int. Conf. Complex, Intell. Softw. Intensive Syst. (CISIS), pp. 101_106.
Dr. Hawking's Connected Wheelchair Project. [Online]. (2014) Available: http://www.intel.co.kr/content/www/kr/ko/internet-of-things/videos/drhawkings-connected wheelchair-video.html, Accessed Dec. 8
Beevers, G., Lip, G. Y. H., & O’Brien, E. (2001). ABC of hypertension: The pathophysiology of hypertension. BMJ, 322(7291), 912–916.
Mukkamala, R., Hahn, J.-O., Inan, O. T., Mestha, L. K., Kim, C.-S., T€oreyin, H., & Kyal, S. (2015). Towards ubiquitous blood pressure monitoring via pulse transit time: Theory and practice. IEEE Transactions of Biomedicine Engineering, 62, 1879–1901.
Jeong, G.-Y., Yu, K.-H., Kim, N.-G. (2005). In Continuous blood pressure monitoring using pulse wave transit time, International Conference on Control, Automation and Systems
Kong, K., Bae, J., Jeon, D., Tomizuka, M. (2008) In: Design of smart shoes for measurement of ground contact forces, IEEE International Conference on Robotics and Automation
Khan, Y., Ostfeld, A. E., Lochner, C. M., Pierre, A., & Arias, A. C. (2016). Monitoring of vital signs with flexible and wearable medical devices. Advanced Materials, 28(22), 4373–4395.
Nemati, E., Deen, M. J., & Mondal, T. (2012). A wireless wearable ECG sensor for long-term applications. IEEE Communications Magazine, 50(1), 36–43.
Chi, Y.M., Cauwenberghs G. (2010) In: Wireless non-contact EEG/ECG electrodes for body sensor networks, International Conference on Body Sensor Networks (BSN)
Caicedo, D., & Pandharipande, A. (2015). Sensor-driven lighting control with illumination and dimming constraints. IEEE Sensor J., 99, 5169–5176.
Wikipedia (2017) Activity Tracker, Wikipedia, 23 August. Available from: https://en.wikipedia.org/wiki/Activity_tracker.
Wareable (2017) Fitness Trackers, Wareable. Available from: https://www.wareable.com/fitness-trackers. Accessed August 2017.
Pourhomayoun, M., Alshurafa, N., Dabiri, F., Ardestani, E., Samiee, A., Ghasemzadeh H., Sarrafzadeh, M. (2017) Why do we need a remote health monitoring system? A study on predictive analytics for heart failure patients”. 11th International Conference on Body Area Networks
EarlySense “Early Sense One”. (2017). Retrieved from http://www.earlysense.com/earlysense-one/,
Stevens, J. A., & Rudd, R. A. (2014). Circumstances and contributing causes of fall deaths among persons aged 65 and older. Journal of the American Geriatrics Society, 62, 470–475.
Fade, “Fade: Fall Detector”. (2017). Retrieved from: http://fade.iter.es/
Assisted Living Technologies (2017). BeClose Remote Monitoring System”. Retrieved from: http://www.assistedlivingtechnologies.com/remote-monitoringelderly/11-beclose.html
Piwek, L., Ellis, D. A., Andrew, S., & Joinson, A. (2016). The rise of consumer health wearables: Promises and barriers. PloS Medicine, 13, e1001953.
MC10, “BioStampMD”. (2017). Retrieved from https://www.mc10inc.com/our-products#BioStampMD
Bittium, “IoT and Wearable Solutions”. (2017) Retrieved from https://www.bittium.com/products__services/iot_and_wearable_solutions/healthcare_market#concept_examples
Apple, “Apple Watch Series 2”. (2017). Retrieved from: https://www.apple.com/br/watch/
Saúde Business, “O que é Mobile Health” (2017).. http://saudebusiness.com/noticias/o-que-e-mobile-healthinfografico/
OnTrack, “OnTrack Diabetes App (2017). Retrieved from https://www.ontrack.org.au/diabetes/
Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K.-S. (2015). The internet of things for health care: A comprehensive survey. IEEE Access, 3, 678–708.
Yang, L., Ge, Y., Li, W., Rao, W., Shen, W. (eds.) (2014). A home mobile healthcare system for wheelchair users. In Computer supported cooperative work in design (CSCWD), proceedings of the 2014 IEEE 18th international conference on. IEEE
Woznowski, P., Burrows, A., Diethe, T., Fafoutis, X., Hall, J., Hannuna, S., et al. (2017). SPHERE: a sensor platform for healthcare in a residential environment, designing, developing, pp. 315–333. Springer
Mainetti, L., Manco, L., Patrono, L., Secco, A., Sergi, I., Vergallo, R. (eds.) (2016). An ambient assisted living system for elderly assistance applications. In Personal, indoor, and mobile radio communications (PIMRC), 2016 IEEE 27th annual international symposium on. IEEE
Khoi, N.M., Saguna, S., Mitra, K., Ǻhlund, C. (eds.) (2015). Irehmo: an efficient IOT-based remote health monitoring system for smart regions. In E-health Networking, Application & Services (HealthCom), 2015, 17th International Conference on. IEEE
Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M. L., et al. (2015). An IoT-aware architecture for smart healthcare systems. IEEE Internet of Things Journal, 2(6), 515–526.
Al-Adhab, A., Altmimi, H., Alhawashi, M., Alabduljabbar, H., Harrathi, F., ALmubarek, H. (eds.) (2016). IoT for remote elderly patient care based on Fuzzy logic. In Networks, computers and communications (ISNCC), 2016 international symposium on. IEEE.
Jara, A.J., Zamora, M.A., Skarmeta, A.F. (eds.) (2012). Knowledge acquisition and management architecture for mobile and personal health environments based on the internet of things. In Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on. IEEE.
Istepanian, R.S., Hu, S., Philip, N.Y., Sungoor, A. (eds.) (2011). The potential of internet of m-health Things “m-IoT” for non-invasive glucose level sensing. In Engineering in medicine and biology society, EMBC, 2011 annual international conference of the IEEE.
Hossain, M. S., & Muhammad, G. (2016). Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Computer Networks, 101, 192–202.
Sung, W.-T., & Chang, K.-Y. (2013). Evidence-based multi-sensor information fusion for remote health care systems. Sensors and Actuators, A: Physical, 204, 1–19.
Jara, A. J., Zamora, M. A., & Skarmeta, A. F. (2014). Drug identification and interaction checker based on IoT to minimize adverse drug reactions and improve drug compliance. Pers. Ubiquitous Computer, 18(1), 5–17.
Bhatia, M., & Sood, S. K. (2016). Temporal informative analysis in smart-ICU Monitoring: M-HealthCare perspective. Journal of Medical Systems, 40(8), 1–15.
Pang, Z., Tian, J., Chen, Q. (eds.) (2014) Intelligent packaging and intelligent medicine box for medication management towards the Internet-of-Things. In Advanced communication technology (ICACT), 2014 16th international conference on. IEEE
Ji, Z., Anwen, Q. (eds.) (2010) The application of internet of things (IoT) in emergency management system in China. In: Technologies for homeland security (HST), 2010 IEEE international conference on. IEEE
Ray, P.P. (2014) Internet of things based physical activity monitoring (PAMIoT): an architectural framework to monitor human physical activity. In Proceeding of IEEE CALCON, Kolkata, pp. 32–34
Qi, J., Yang, P., Fan, D., Deng, Z. (eds.) (2015). A survey of physical activity monitoring and assessment using internet of things technology. In Computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing (CIT/IUCC/DASC/PICOM), 2015 IEEE international conference on IEEE
Rathore, M. M., Ahmad, A., Paul, A., Wan, J., & Zhang, D. (2016). Real time medical emergency response system: Exploiting IoT and big data for public health. Journal of Medical Systems, 40(12), 283.
Al-Taee, M.A., Al-Nuaimy, W., Al-Ataby, A., Muhsin, Z.J., Abood, S.N. (eds.) (2015). Mobile health platform for diabetes management based on the Internet-of-Things. In Applied electrical engineering and computing technologies (AEECT), 2015 IEEE Jordan conference on. IEEE.
Valera, AJJ, Zamora, M.A., Skarmeta, A.F. (eds.) (2010). An architecture based on internet of things to support mobility and security in medical environments. In Consumer communications and networking conference (CCNC), 2010 7th IEEE. IEEE.
Coelho, C., Coelho, D., Wolf, M. (eds.) (2015). An IoT smart home architecture for long-term care of people with special needs. In Internet of things (WF-IoT), 2015 IEEE 2nd world forum on.IEEE.
Pir, A., Akram, M.U., Khan, M.A. (eds.) (2015). Internet of things based context awareness architectural framework for HMIS. In: E-health networking, application & services (HealthCom), 2015 17th international conference on. IEEE
Mohammed, J., Lung, C.-H., Ocneanu, A., Thakral, A., Jones, C., Adler, A. (eds.) (2014). Internet of things: remote patient monitoring using web services and cloud computing. In Internet of things (iThings), 2014 IEEE international conference on, and green computing and communications (GreenCom), IEEE and cyber, physical and social computing (CPSCom), IEEE
Santos, J., Rodrigues, J. J., Silva, B. M., Casal, J., Saleem, K., & Denisov, V. (2016). An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. Journal of Network and Computer Applications, 71, 194–204.
Blazek, P., Krejcar, O., Jun, D., & Kuca, K. (2016). Device security implementation model based on internet of things for a laboratory environment. IFAC PapersOnLine, 49(25), 419–424.
Hussain, A., Wenbi, R., da Silva, A. L., Nadher, M., & Mudhish, M. (2015). Health and emergency-care platform for the elderly and disabled people in the Smart City. Journal of Systems and Software, 110, 253–263.
Distefano, S., Bruneo, D., Longo, F., Merlino, G., & Puliafito, A. (2016). Hospitalized patient monitoring and early treatment using IoT and cloud. BioNanoScience, 7(2), 1–4.
Roy, S., Bhattacharya, U. (eds.) (2015) Smart mom: an architecture to monitor children at home. In Proceedings of the third international symposium on women in computing and informatics. ACM
Stefanov, D. H., Bien, Z., & Bang, W.-C. (2004). The smart house for older persons and persons with physical disabilities: Structure, technology arrangements, and perspectives. IEEE Transactions Neural System Rehabilition Engineering, 12(2), 228–250.
Jara, A.J., Alcolea, A.F., Zamora, M., Skarmeta, A.G., Alsaedy, M. (eds.) (2017) Drugs interaction checker based on IoT. In Internet of Things (IOT), 2010. IEEE (2010). https ://www.resea rchga te.net/profile/Antonio_Skarm eta/publication/22420 8800_Drugs interaction_checker_based on_IoT/links /546dd ed70c f2193 b94c5 d9f3.pdf. Accessed July 2017
Thang, T.C., Pham, A.T., Cheng, Z., Ngoc, N.P. (eds.) (2011) Towards a full-duplex emergency alert system based on IPTV platform. In Awareness science and technology (iCAST), 2011 3rd international conference on. IEEE
Jara, A.J., Belchi, F.J., Alcolea, A.F., Santa, J., Zamora-Izquierdo, M.A., Gómez-Skarmeta, A.F. (eds.) (2010) A Pharmaceutical Intelligent Information System to detect allergies and Adverse Drugs Reactions based on internet of things. In Pervasive computing and communications workshops (PERCOM Workshops), 2010 8th IEEE international conference on. IEEE
Zhang, H., Liu, K., Kong, W., Tian, F., Yang, Y., Feng, C., et al. (eds.) (2016) A mobile health solution for chronic disease management at retail pharmacy. In e-Health networking, applications and services (Healthcom), 2016 IEEE 18th international conference on. IEEE
F. Yuan Jie, Y. Yue Hong, X. Li Da, Z. Yan, and W. Fan (2014) IoT-Based Smart Rehabilitation System. Industrial Informatics, IEEE Transactions on, vol. 10, pp. 1568–1577
Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework for creating a smart city through Internet of Things. IEEE Internet of Things Journal, 1, 112–121.
Jara, A. J., Zamora-Izquierdo, M. A., & Skarmeta, A. F. (2013). Interconnection framework for mHealth and remote monitoring based on the internet of things. Selected Areas in Communications, IEEE Journal on, 31, 47–65.
Wei, Z., Chaowei, W., & Nakahira, Y. (2011). "Medical application on internet of things. In communication technology and application (ICCTA. IET International Conference on, 2011, 660–665.
Castillejo, P., Martinez, J. F., Rodriguez-Molina, J., & Cuerva, A. (2013). Integration of wearable devices in a wireless sensor network for an Ehealth application. Wireless Communications, IEEE, 20, 38–49.
Yang, G., Xie, L., Mantysalo, M., Zhou, X., Pang, Z., Xu, L. D., et al. (2014). A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box. Industrial Informatics, IEEE Transactions on, 10, 2180–2191.
Istepanian, R. S. H., Hu, S., Philip, N. Y., & Sungoor, A. (2011). "The potential of Internet of m-health Things & #x201C;m-IoT” for noninvasive glucose level sensing," in Engineering in Medicine and Biology Society, EMBC. Annual International Conference of the IEEE, 2011, 5264–5266.
Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID Technology for IoT-based personal healthcare in smart spaces. Internet of Things Journal, IEEE, 1, 144–152.
Turcu, C. E., Turcu, C. O. (2013). Internet of Things as Key Enabler for Sustainable Healthcare Delivery. Procedia - Social and Behavioral Sciences, vol. 73, pp. 251–256, 2/27/
Boric-Lubecke, O., Xiaomeng, G., Yavari, E., Baboli, M., Singh, A., & Lubecke, V. M. (2014). “E-healthcare: Remote monitoring, privacy, and security,” in Microwave Symposium (IMS). IEEE MTT-S International, 2014, 1–3.
Sebestyen, G., Hangan, A., Oniga, S., & Gal, Z. (2014). "eHealth solutions in the context of internet of things. In automation, quality and testing, robotics. IEEE International Conference on, 2014, 1–6.
Boyi, X., Li, X., Da., Hongming, C., Cheng, X., Jingyuan, H., Fenglin, B. (2014). Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services. Industrial Informatics, IEEE Transactions on, vol. 10, pp. 1578–1586
Fang, H., Dan, X., Shaowu S. (2013). On the application of the internet of things in the field of medical and health care. In Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, pp. 2053-2058
Weihua, W., Jiangong, L., Ling, W., & Wendong, Z. (2011). The internet of things for resident health information service platform research. In Communication Technology and Application (ICCTA. IET International Conference on, 2011, 631–635.
Swiatek, P., Rucinski, A. (2013). IoT as a service system for eHealth. In e-Health Networking, Applications & Services (Healthcom), 2013 IEEE 5th International Conference on, pp. 81–84.
Min, C., Gonzalez, S., Leung, V., Qian, Z., & Ming, L. (2010). A 2G-RFID based e-healthcare system. Wireless Communications, IEEE, 17, 37–43.
Xu, L., Rongxing, L., Xiaohui, L., Xuemin, S., Jiming, C., & Xiaodong, L. (2011). Smart community: An internet of things application. Communications Magazine, IEEE, 49, 68–75.
Tabish, R., Ghaleb, A. M., Hussein, R., Touati, F., Ben Mnaouer, A., Khriji, L. et al. (2014) A 3G/WiFi-enabled 6LoWPAN-based U-healthcare system for ubiquitous real-time monitoring and data logging. In Biomedical Engineering (MECBME), 2014 Middle East Conference on, pp. 277–280
Dongxin, L., Tao L. (2011). The application of IOT in medical system. In IT in Medicine and Education (ITME), 2011 International Symposium on, pp. 272–275.
Jingran, L., Yulu, C., Kai, T., Junwen, L. (2009) Remote monitoring information system and its applications based on the Internet of Things. In BioMedical Information Engineering, 2009. FBIE 2009. International Conference on Future, pp. 482-485.
Atzori, L., Iera, A., Morabito, G. (2010) The Internet of Things: A survey," Computer Networks, vol. 54, pp. 2787–2805, 10/28/2010.
Chen, S., Zhu, X., Zhang, S., Wang, J. (2012). A framework for massive data transmission in a remote real-time health monitoring system. In Automation and Computing (ICAC), 2012 18th International Conference on, pp. 1–5.
Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health Information and Science System, 2, 3.
Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2018). A new architecture of Internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generations Computer System, 82, 375–387.
Kalid, N., Zaidan, A. A., Zaidan, B. B., Salman, O. H., Hashim, M., & Muzammil, H. (2018). Based real time remote health monitoring systems: A review on patients prioritization and related ‘Big Data’ using body sensors information and communication technology. Journal of Medical Systems, 42, 2.
Firouzi, F., et al. (2018). Internet-of-Things and Big Data for smarter healthcare: From device to architecture, applications and analytics. Future Gen Comput Syst., 78, 583–586.
Hu, Y., Duan, K., Zhang, Y., Hossain, M. S., Mizanur-Rahman, S. M., & Alelaiwi, A. (2018). Simultaneously aided diagnosis model for outpatient departments via healthcare big data analytics. Multimed Tools Applications, 77(3), 3729–3743.
Sandhu, R., Kaur, N., Sood, S. K., & Buyya, R. (2017). TDRM: Tensor-based data representation and mining for healthcare data in cloud computing environments. The Journal of Supercomputing, 74(2), 592–614.
Saleh, N., Kassem, A., & Haidar, A. M. (2018). Energy-efficient architecture for wireless sensor networks in healthcare applications. IEEE Access., 6, 6478–6486.
Vidal, M., Turner, J., Bulling, A., & Gellersen, H. (2012). Wearable eye tracking for mental health monitoring. Computer Communications, 35(11), 1306–1311.
Wijsman, J., Grundlehner, B., Liu, H., Hermens, H., Penders, J. (2011). Towards mental stress detection using wearable physiological sensors. In Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE, pp. 1798–1801. IEEE
Yang, Z.,Wang, Z., Zhang, J., Huang, C., Zhang, Q. (2015) Wearables can afford: light-weight indoor positioning with visible light. In: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 317–330. ACM
Lee, Y. H., & Medioni, G. (2016). RGB-D camera based wearable navigation system for the visually impaired. Computer Vision and Image Understanding, 149, 3–20.
Anzaldo, D. (2015) Wearable sports technology—market landscape and compute SoC trends. In: 2015 International SoC Design Conference (ISOCC), pp. 217–218. IEEE.
Apple Inc. (2016). Apple Pay: simple, secure and private. https://www.apple.com/apple-pay/
Visa Inc. (2016). Payment technology. https://www.visa.com.au/visa-everywhere/future-ofpayments.html
IDC Research, Inc. (2016). IDC forecasts worldwide shipments of wearables to surpass 200 million in 2019, driven by strong smartwatch growth and the emergence of smarter watches. https://www.idc.com
Gartner Inc. (2016) Gartner says worldwide wearable devices sales to grow 18.4% in 2016. http://www.gartner.com
Wearable technology market (2017) Global opportunity analysis and industry forecast, 2014–2022. http://www.prnewswire.com/news-releases/
Gravina, R., Alinia, P., Ghasemzadeh, H., & Fortino, G. (2016). Multi-sensor fusion in body sensor networks: State of-the-art and research challenges. Inf. Fusion, 35, 68–80. https://doi.org/10.1016/j.inffus.2016.09.005
He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine, 53(1), 71–77. https://doi.org/10.1109/MCOM.2015.7010518
Wu, T., Wu, F., Redouté, J. M., & Yuce, M. R. (2017). An autonomous wireless body area network implementation towards IoT connected healthcare applications. IEEE Access Journal, 5, 11413–11422. https://doi.org/10.1109/ACCESS.2017.2716344
Barakah, D.M., Ammad-uddin, M. (2012) A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture, In Proceedings of the 3rd IEEE Intelligent Systems Modelling and Simulation (ISMS), pp. 214–219, doi: https://doi.org/10.1109/ISMS.2012.
Antonescu, B., Basagni, S. (2013) Wireless body area Networks: challenges, trends and emerging technologies. In Proceedings of the 8th International Confer- ence on Body Area Networks (BodyNets), doi: https://doi.org/10.4108/icst.bodynets.2013.253722.
Sicari, S., Rizzardi, A., Grieco, L. A., Piro, G., & Coen-Porisini, A. (2017). A policy enforce- ment framework for internet of things applications in the smart health. Smart Health, 3, 39–74.
Gope, P., & Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sensors Journal, 16(5), 1368–1376.
La, A., Kumar, K.N. (2017). E-health application over 5G using content-centric net- working, In Proceedings of the International Conference on IEEE IoT and Ap- plication, pp. 1–5.
Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.
Iqbal, M.A., Bayoumi, M. (2016). A novel authentication and key agreement protocol for internet of things based resource-constrained body area sensors. In Proceedings of the IEEE International Conference on IEEE Future Internet of Things and Cloud Workshops, pp. 315–320 .
Wu, L., Zhang, Y., Li, L., & Shen, J. (2016). Efficient and anonymous authentication scheme for wireless body area networks. Journal of Medical Systems, 40(6), 134.
Ara, A., Al-Rodhaan, M., Tian, Y., & Al-Dhelaan, A. (2017). A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access, 5, 12601–12617.
Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal of the Communications Network, 17(5), 453–462.
Wu, T., Wu, F., Redouté, J. M., & Yuce, M. R. (2017). An autonomous wireless body area net- work implementation towards IoT connected healthcare applications. IEEE Access, 5, 11413–11422.
Mehmood, N.Q., Culmone, R. (2015) An ANT + protocol based health care system. In Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, pp. 193–198 .
Omeni, O., Wong, A. C., Burdett, A. J., & Toumazou, C. (2008). Energy efficient medium access protocol for wireless medical body area sensor networks. IEEE Transactions on Biomedical Circuits and Systems, 2(4), 251–259.
Hoang, D.C., Tan, Y.K., Chng, H.B., Panda, S.K. (2009). Thermal energy harvesting from human warmth for wireless body area network in medical healthcare system, In Proceedings of the International Conference on IEEE Power Electronics and Drive Systems, PEDS 20 09, pp. 1277–1282
Deepu, C. J., Heng, C. H., & Lian, Y. (2017). A hybrid data compression scheme for power reduction in wireless sensors for IoT. IEEE Transactions on Biomedical Circuits and Systems, 11(2), 245–254.
Ullah, S., & Kwak, K. S. (2012). An ultra-low-power and traffic-adaptive medium access control protocol for wireless body area network. Journal of Medical Systems, 36(3), 1021–1030.
Rahmani, A.M., Thanigaivelan, N.K., Gia, T.N., Granados, J., Negash, B., Lilje- berg, P., Tenhunen, H. (2015) Smart e-health gateway: bringing intelligence to inter- net-of-things based ubiquitous healthcare systems. In Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, Las Vegas, pp. 826–834
Wang, H., Choi, H.S., Agoulmine, N., Deen M.J., Hong, J.W. (2010) Information-based sensor tasking wireless body area networks in U-health systems. In Proceed- ings of the International Conference on IEEE Network and Service Management, Niagara Falls, 2010, pp. 517–522 .
Chung, W.Y., Lee, Y.D., Jung, S.J. (2008). A wireless sensor network compatible wear- able u-healthcare monitoring system using integrated ECG, accelerometer and SpO 2, In Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2008, pp. 1529–1532.
Jeong, Y. S., & Shin, S. S. (2016). An IoT healthcare service model of a vehicle using implantable devices. Cluster Computer, 21, 1059–1068.
Al-Aubidy, K.M., Derbas, A.M., Al-Mutairi, A.W. (2016) Real-time patient health monitoring and alarming using wireless-sensor-network, In Proceedings of the 13thInternational Multi-Conference on IEEE Systems, Signals & Devices, pp. 416–423.
Kisseleff, S., Akyildiz, I.F., Gerstacker, W. (2016) Distributed beamforming for magnetic induction based body area sensor networks, in: Proceedings of the Global Communications Conference, IEEE Washington, DC, USA, 2016, pp. 1–7.
Satija, U., Ramkumar, B., & Manikandan, M. S. (2017). Real-time signal quality-aware ecg telemetry system for IoT-based health care monitoring. IEEE Internet of Things Journal, 4(3), 815–823.
Velrani, K.S., Geetha, G. (2016). Sensor based healthcare information system, In Proceedings of the Technological Innovations in ICT for Agriculture and Rural Development, IEEE, pp. 86–92.
Bal, M., Abrishambaf, R. (2017). A system for monitoring hand hygiene compliance based-on Internet-of-Things, in: Proceedings of the IEEE International Conference on IEEE Industrial Technology, pp. 1348–1353
Aljumah, A., Ahanger T. A. (2018) Fog computing and security issues: A review. 2018 7th International Conference on Computers Communications and Control (ICCCC), pp. 237–239
Zhang L, Jia W, Wen S, Yao D. A man-in-the-middle attack on 3G-WLAN interworking. International Conference on Communications and Mobile Computing (CMC), Vol. 1, Zhangjiajie, China, April 2010; 121–125.
Broadcom BCM 5354. (Available from: http://www.broadcom.com.) [Accessed on 2 April 2015].
Wikipedia. Hooking, what is hooking? 2014. (Available from: http://en.wikipedia.org/wiki/Hooking) [Accessed on 2 April 2015].
Greer N, Blank B, Depew B (2018) Impact engine Inc, Multimedia Communication System And Method. U.S. Patent Application 16/119,915
Ackerman, M. J. (2007). Next generation networking: Distributed multimedia information for healthcare. Multimed Tools Applications, 33(1), 5–11.
Cheung, S. C. S. (2015). Integrating multimedia into autism intervention. IEEE Multimedia, 22(4), 4–10.
AlhamidMF (2017) Investigation of mammograms in the cloud for smart healthcare.Multimed Tools Appl: pp. 1–13
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Survey Tutor, 17(4), 2347–2376.
Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.
Scheuerman, W. E. (2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philo Social Crit, 40(7), 609–628.
Alassaf, N, Gutub, A., Parah, S.A., Ghamdi, M. (2018). Enhancing speed of SIMON: a light weight cryptographic algorithm for IoT applications, Multimed Tools Appl: pp. 1–25
Mayron, L. M. (2010). Secure multimedia communications. IEEE Sec Privacy, 8(6), 76–79.
Wu, L., Du, X., & Fu, X. (2014). Security threats to mobile multimedia applications: Camera-based attacks on mobile phones. IEEE Communications Magazine, 52(3), 80–87.
Fernandez-Carames TM, Fraga-Lamas P (2018) A review on the use of Blockchain for the internet of things. IEEE Access
Praveena D, Rangarajan P (2018). A machine learning application for reducing the security risks in hybrid cloud networks. Multimed Tools Appl: pp. 1–13
Al-Taee, M.A., Al-Nuaimy, W., Al-Ataby, A., Muhsin, Z.J., Abood S.N. (2015) Mobile health platform for Diabetes management based on the Internet-of-things. IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies
Gomes, B., Muniz, L., Silva, F., Rios, L.T., Endler M. (2015) A Comprehensive Cloud-based IoT Software Infrastructure for Ambient Assisted Living, International Conference on Cloud Computing Technologies and Applications,
Ray P.P. (2014) Home Health Hub Internet of Things (H3IoT): An architectural framework for monitoring health of elderly people”. International Conference on Science, Engineering and Management Research.
Murakami, A., Kobayashi, L.O.M.A U. Tachinardi, M.A. Gutierrez, S.S. Furuie and F.A. Pires (2004) Acesso a informações médicas através do uso de sistemas de computação móvel. Congresso Brasileiro deInformática na Saúde
Matar, G., Lina, J., Carrier, J., Riley, A., Kaddoum, G. (2016). Internet of things in sleep monitoring: an application for posture recognition using supervised learning. 18th International Conference on e-Health Networking, Applications and Services
Mano, L., Funes, M., Volpato, T., & Neto, J. (2016). Explorando tecnologias de IoT no contexto de Health Smart Home: Uma abordagem para detecção de quedas em pessoas idosas. Journal on Advances in Theoretical and Applied Informatics, 2, 46–57. [in Portuguese].
Mainetti, L., Patrono, L., Secco, A., Sergi, I. (2016) An IoT-aware AAL System for Elderly People.. International Multidisciplinary Conference on Computer and Energy Science
Maia, P., Batista, T., Cavalcante, E., Baffa, A., Delicato, F. C., Pires, P. F., & Zomaya, A. (2014). A web platform for interconnecting body sensors and improving health care. Procedia Computer Science, 40, 135–142.
Machado, F.M., Koehler, I.M., Ferreira, M.S., Sovierzoski, M.A. (2016) An mHealth remote monitor system approach applied to MCC Using ECG Signal in an Android Application. In: Rocha Á., Correia A., Adeli H., Reis L., Mendonça Teixeira M. (Eds). New Advances in Information Systems and Technologies: Advances in Intelligent Systems and Computing, pp. 43–49.
Ma, Y., Wang, Y., Yang, J., Miao, Y., & Li, W. (2016). Big health application system based on health Internet of things and big data. IEEE Access, 5, 7885–7897.
Kumar, P. D., Kumar, R. S., Sujatha, K., Ponmagal, R. S., Rajavarman, V. N. (2016) Big data analytics of IoT based health care monitoring system. In Proc. IEEE Uttar Pradesh Section Int. Conf. Elect. Comput. Electron. Eng. (UPCON), pp. 55–60.
Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2018). A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Generations Computer System, 82, 375–387.
Ukil, S. Bandyoapdhyay, C. Puri, and A. Pal (2016) IoT healthcare analytics: The importance of anomaly detection. In: Proc. IEEE 30th Int. Conf. Adv. Inf. Netw. Appl (AINA), pp. 994–997.
Plageras, A. P. et al. (2017). Efficient large-scale medical data (eHealth big data) analytics in Internet of Things,” in Proc. IEEE 19th Conf. Bus. Informat. (CBI) pp. 21–27
Elhoseny, M., et al. (2018). Secure medical data transmission model for IoTbased healthcare systems. IEEE Access, 6, 20596–20608.
Chen, M., Yang, J., Zhou, J., Hao, Y., Zhang, J., & Youn, C. H. (2018). 5Gsmart diabetes: Toward personalized diabetes diagnosis with healthcare big data clouds. IEEE Communications Magazine, 56(4), 16–23.
Luo, E., Bhuiyan, M. Z. A., Wang, G., Rahman, M. A., Wu, J., & Atiquzzaman, M. (2018). PrivacyProtector: Privacy-protected patient data collection in IoT-based healthcare systems. IEEE Communications Magazine, 56(2), 163–168.
Alamri, A. (2019). Big data with integrated cloud computing for prediction of health conditions. In Proc. Int. Conf. Platform Technol. Service (PlatCon), pp. 1–6.
Sharma, S., Chen, K., & Sheth, A. (2018). Toward practical privacypreserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Computing, 22(2), 42–51.
Vuppalapati, A., Ilapakurti, A., Kedari, S. (2016) The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wearable data driven electronic health record (EHR),” In Proc. IEEE 2nd Int. Conf. Big Data Comput. Service Appl. (BigDataService), pp. 293–296.
Yang, Y., Zheng, X., Guo, W., Liu, X., & Chang, V. (2019). Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Information Sciences, 479, 567–592.
Sahoo, P. K., Mohapatra, S. K., & Wu, S. (2016). Analyzing healthcare big data with prediction for future health condition. IEEE Access, 4, 9786–9799.
Malek, Y. N., et al. (2017). On the use of IoT and big data technologies for real-time monitoring and data processing. Procedia Comput. Sci., 113, 429–434.
Yacchirema, A. C., Sarabia-Jácome, D., Palau, C. E., & Esteve, M. (2018). A smart system for sleep monitoring by integrating IoT with big data analytics. IEEE Access, 6, 35988–36001.
Hossain, M. S., & Muhammad, G. (2016). Healthcare big data voice pathology assessment framework. IEEE Access, 4, 7806–7815.
Yassine, S. Singh, and A. Alamri (2017) Mining human activity patterns from smart home big data for health care applications. IEEE Access, vol. 5, pp. 13131–13141.
Arruda, de D., Hancke, G. P. (2016). Wearable device localisation using machine learning techniques. In Proc. IEEE 25th Int. Symp. Ind. Electron. (ISIE), pp. 1110–1115.
Walinjkar, A., Woods, J. (2017). Personalized wearable systems for realtime ECG classification and healthcare interoperability: Real-time ECG classification and FHIR interoperability. In Proc. Internet Technol. Appl. (ITA), Wrexham, U.K., pp. 9–14.
Savazzi, S., Kianoush, S., Rampa, R., Spagnolini U (2018). Cellular data analytics for detection and discrimination of body movements. IEEE Access, vol. 6, Art. no. 51484.
Satija, U., Ramkumar, B., & Manikandan, M. S. (2017). Real-time signal quality-aware ECG telemetry system for IoT-based health care monitoring. IEEE Internet of Things Journal, 4(3), 815–823.
Kiani, F. (2017) Reinforcement learning based routing protocol for wireless body sensor networks. In Proc. IEEE 7th Int. Symp. Cloud Service Comput. (SC2), pp. 71–78.
Yang, G., et al. (2018). An IoT-enabled stroke rehabilitation system based on smart wearable armband and machine learning. IEEE J. Transl. Eng. Health Med., 6, 1–10.
Ghate, V. V., & Vijayakumar, V. (2018). Machine learning for data aggregation in WSN: A survey. Int. J. Pure Appl. Math., 118(24), 1–12.
Hsu, C. C., Wang, M. Y., Shen, H. C. H.., Chiang, R. H., Wen, C. H. P. (2017) FallCare+: An IoT surveillance system for fall detection. In Proc. Int. Conf. Appl. Syst. Innov. (ICASI), pp. 921–922.
Firouzi, F. Farahani, B., Ibrahim, M., Chakrabarty, K. (2018). From EDA to IoT eHealth: Promises, challenges, and solutions. IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 37, no. 12, pp. 2965–2978
Anupama, K. R., Adarsh, R., Pahwa, P., Ramachandran, A. (2018) Machine learning-based techniques for fall detection in geriatric healthcare systems, In Proc. 9th Int. Conf. Inf. Technol. Med. Educ. (ITME), pp. 232–237.
Ara, A., Ara, A. (2017) Case study: Integrating IoT, streaming analytics and machine learning to improve intelligent diabetes management system. In Proc. Int. Conf. Energy Commun. Data Anal. Soft Comput. (ICECDS), pp. 3179–3182.
Hong, J., Yoon, J. (2017). Multivariate time-series classification of sleep patterns using a hybrid deep learning architecture. In Proc. IEEE 19th Int. Conf. e-Health Netw. Appl. Services (Healthcom), pp. 1–6.
Kanagasabai, P. S., Gautam, R., Rathna, G. N. (2016). Brain–computer interface learning system for quadriplegics. In Proc. IEEE 4th Int. Conf. MOOCs Innov. Technol. Educ. (MITE), pp. 258–262.
Matar, G., Lina, J., Carrier, J., Riley, J., Kaddoum, G. (2016). Internet of Things in sleep monitoring: An application for posture recognition using supervised learning. In Proc. IEEE 18th Int. Conf.e-Health Netw. Appl. Services (Healthcom), pp. 1–6.
Shrivastwa, R. R., Pudi, V., Chattopadhyay, A. (2018) An FPGA-based brain computer interfacing using compressive sensing and machine learning. In Proc. IEEE Comput. Soc. Annu. Symp. VLSI (ISVLSI), Hong Kong, pp. 726–731.
Fafoutis, X., Marchegiani, L., Elsts, A., Pope, J., Piechocki, R., Craddock, I. (2018) Extending the battery lifetime of wearable sensors with embedded machine learning,” In Proc. IEEE 4th World Forum Internet Things (WF-IoT), Singapore, 2018, pp. 269–274.
Ravì, D., Wong, C., Lo, B., & Yang, G. (2017). A deep learning approach to on-node sensor data analytics for mobile or wearable devices. IEEE J. Biomed. Health Informat., 21(1), 56–64.
Psychoula et al. (2018) A deep learning approach for privacy preservation in assisted living,” in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom Workshops), Athens, Greece, pp. 710–715.
Knickerbocker et al (2018) Heterogeneous integration technology demonstrations for future healthcare, IoT, and AI computing solutions,” In Proc. IEEE 68th Electron. Compon. Technol. Conf. (ECTC), San Diego, CA, USA, 2018, pp. 1308–1313.
Ahmed, T. Ahmed, F., Le Moullec, Y. (2016) Optimization of channel allocation in wireless body area networks by means of reinforcement learning,” In Proc. IEEE Asia–Pac. Conf. Wireless Mobile (APWiMob), Bandung, Indonesia, pp. 120–123.
Verner, A., Butvinik, D. (2017). A machine learning approach to detecting sensor data modification intrusions in WBANs,” In Proc. 16th IEEE Int. Conf. Mach. Learn. Appl. (ICMLA), pp. 161–169.
Negra, R., Jemili, I., Zemmari, A., Mosbah, M., Belghith, A. (2018). WBAN path loss based approach for human activity recognition with machine learning techniques. In Proc. 14th Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), pp. 470–475.
Shanthamallu, U. S., Spanias, A., Tepedelenlioglu, C., Stanley, M. (2017). A brief survey of machine learning methods and their sensor and IoT applications,” In Proc. 8th Int. Conf. Inf. Intell. Syst. Appl. (IISA), Larnaca, Cyprus, pp. 1–8.
Asthana, S., Megahed, A., Strong, R. (2017). A recommendation system for proactive health monitoring using IoT and wearable technologies,” In Proc. IEEE Int. Conf. AI Mobile Services (AIMS), Honolulu, HI, USA, pp. 14–21.
Jagadish, B., Kiran, M. P. R. S., Rajalakshmi R. (2017). A novel system architecture for brain controlled IoT enabled environments. In Proc. IEEE 19th Int. Conf. e-Health Netw. Appl. Services (Healthcom), pp. 1–5.
Yang, Y., et al. (2019). GAN-based semi-supervised learning approach for clinical decision support in health-IoT platform. IEEE Access, 7, 8048–8057.
Zhang, X., Yao, L., Zhang, S., Kanhere, S., Sheng, M., & Liu, Y. (2019). Internet of things meets brain–computer interface: A unified deep learning framework for enabling human-thing cognitive interactivity. IEEE Internet of Things Journal, 6(2), 2084–2092.
Ahmadi, H., Arji, G., Shahmoradi, L., Safdari, R., Nilashi, M., & Alizadeh, M. (2019). The application of internet of things in healthcare: A systematic literature review and classification. Universal Access in the Information Society, 18(4), 837–869.
Tanwar, S, Tanwar (2021) Fog computing for Healthcare 4.0 environments. Springer International Publishing
Ketu, S., & Mishra, P. K. (2021). Internet of Healthcare Things: A contemporary survey.". Journal of Network and Computer Applications, 192, 103179.
Dhanvijay, M. M., & Patil, S. C. (2019). Internet of things: A survey of enabling technologies in healthcare and its applications. Computer Networks, 153, 113–131.
Qadri, Y. A., Nauman, A., Zikria, Y. B., Vasilakos, A. V., & Kim, S. W. (2020). The future of healthcare internet of things: a survey of emerging technologies. IEEE Communications Surveys & Tutorials, 22, 1121–1167.
Zeadally, S., & Bello, O. (2021). Harnessing the power of Internet of Things based connectivity to improve healthcare. Internet of Things, 14, 100074.
Pramanik, P. K. D., Bijoy Kumar, U., Saurabh, P., Tanmoy, P (2019) Internet of things, smart sensors, and pervasive systems: Enabling connected and pervasive healthcare." In Healthcare data analytics and management, pp. 1–58. Academic Press
Ghosh, U., Chinmay, C., Lalit, G., Gautam, S (2022). Intelligent Internet of Things for Healthcare and Industry.
Bhuiyan, M. N., Md Mahbubur Rahman, Md Masum B., Dipanita, S. (2021). Internet of Things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security and market opportunities. IEEE Internet of Things Journal
Nauman, A., Yazdan Ahmad, Q., Rashid, A., Sung Won, K. (2021) Machine learning-enabled Internet of Things for medical informatics. In Machine Learning, Big Data, and IoT for Medical Informatics, pp. 111–126. Academic Press.
Funding
None.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Code availability
No code is available as no coding was done for this review article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Arora, D., Gupta, S. & Anpalagan, A. Evolution and Adoption of Next Generation IoT-Driven Health Care 4.0 Systems. Wireless Pers Commun 127, 3533–3613 (2022). https://doi.org/10.1007/s11277-022-09932-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09932-3