logo

Internet of Things in Healthcare: A Comprehensive Study on Data Transmission, Security, and Future Applications

   

Added on  2024-06-21

6 Pages5268 Words383 Views
 | 
 | 
 | 
ITC595 Research Project (Title)
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT Internet of things Technology has attracted many
researchers due to the scope of benefits it provides. In the
healthcare industry, it turns out to be a game-changer with amazing
aspects gaining strengths with time. The requirement of such
technology can be very fruitful for healthcare. The study of data
transmission in IoT technology and hence the scope of increasing
the security of the data transmission. The data collection, data
cleaning and data estimation are discussed in the detail. The data
flow in the IoT environment plays a key role to enhance the security
and encryption of the data. In-depth study of cryptography and it’s
benefits. The applications of IoT technology in the healthcare
industry with their vital role in the industry. The applications such
as the ingestible pills, AAL (Ambient assisting living) and IoT
controlled quarantine centres. The security and privacy in IoT
devices connected to the cloud. Security of the healthcare data. The
solution offered for the secure cloud data transmissions.
Authentication of the data and measures to secure the data from
the attackers. Future outcomes of IoT technology in healthcare. The
Wireless body area network is also studying for the future
reference, use of machine learning in IoT and communication in the
IoT technology. The IoT devices which could be available in the
future solving the problems monitoring the data. The smartphone
with medical sensors for providing vital data directly to the network
and hence help in monitoring the patients. In future use of the IoT
technology in the management of the healthcare centre and also in
the data management. The Scope of the smart healthcare system I
also discussed in the report. The communication techniques are also
discussed such as the long-range and short-range communication
with the scope of improvement. The use of BLE in short-range
communication being a lightweight technique. The use of the 5G
and cellular network for long-range communication. The secure
encryption of the data using the ABE and FHB schemes in the cloud
however, they cannot be used in lightweight communication.
Keywords Data transmission, Applications, Cryptography,
Security and privacy, IoT, Future outcomes of IoT.
INTRODUCTION
In the healthcare industry, the internet of things technology
has been a game-changer. The structure of the report
showcases the following step according to the purpose of this
report and stand on the topic. The use of sensors and
actuators provide an enormous amount of help to the health
works and patients to recover shortly. The IoT is also
responsible for alerts and notifications based on the data
provided to the machines by the sensors. As the Internet of
things useful in the healthcare industry is exponentially
growing. According to the recorded data 161million IoT
devices are used in the healthcare industry and by the year
2025, it is expected to reach 188 million devices. The huge
numbers signify the need for IoT in the healthcare industry
and its growth.
Data collection and interoperability are the ability to manage
the data with the help of proper functioning and processing.
The report offers knowledge based on the use of IoT in the
healthcare industry, data transmissions by the devices in
healthcare facilities and their applications. Moreover, Security
and privacy measures in the healthcare systems and their
work mechanism. The applications of the IoT in the healthcare
industries are also discussed in the report. Moreover, the
report gets the futuristic approach towards the outcomes of
IoT in the healthcare industry.
LITERATURE REVIEW
Data management in IoT
According to M. Elhoseny [10] the data management in IoT
technology consists of a certain path, this path is followed to
achieve a certain flow pattern. The steps include data
collection, data cleaning, Data quality estimation and data
inoperability.
Data Collection
The human body provides certain data to the sensors, this
data is then processed by the devices. The data devices such
as the heart rate monitoring system, oxygen meter, CGM
(continuous glucose monitoring) and activity trackers etc. This
data is collected and stored so that they can be sent for the
analysis. These studies help the doctors to provide vital
information regarding the condition of the patients. The
mechanism of these sensor devices which extract this vital
information regarding the patient is blended with the
Bluetooth interface for better connectivity.
The Bluetooth light interface helps provide communication
with the other devices. This helps the communication channel
to build up between the interconnected devices. When the
devices make communication between the other devices, it
authenticates the connection and hence makes it viable for
the other connected devices to extract the data for the
connection. After the connection mechanism identifies
Application programming interface (API), the next step
involves the data acquisition which starts at a high rate of
exchange. The extracted data is then acquired for further
processing.
Data Cleaning: The data cleaning is the process of removing
unnecessary data and checking for the errors in the vital data.
This process is carried out in three stages known as data
validation, data cleaning and data completion.
Data Validation: Data The data validation process constitutes
the quality of the received data. The conformance of the
specific data type, value representation and conformance to
the range and pre-defined values.
Data cleaning: The process is important to abstain the flow
with any kind of errors arising. Thus, the cleaning of the data
plays a key role to abstain the unsettling of the data in the
flow chart.
Internet of Things in Healthcare: A Comprehensive Study on Data Transmission, Security, and Future Applications_1

Data completion: The data completion ensures the missing
data is filled using the analytics, providing data in that voids
safeguarding the data availability.
Data Quality estimation
As mentioned by A. Mavrogiorgou[11] data which is
received from the sensors and the devices can’t be relied on.
This is due to the false data which a device may produce if
they are a faulty device. The data measurements and
evaluation are carried on so that it may be cross-checked with
the values obtained by the devices. This offers a piece of
secure information regarding the data and hence helps in the
clean data to be assured. There are 3 sub-processes which are
very important for the data quality estimation.
Data Availability: Devices calculation regarding the quality
assurance regarding the quality levels of the device. The
metric data from the device provide quality levels of the
devices. hence, it helps the data quality estimation to be more
accurate regarding the data. The ratio of operational uptime of
the device to the overall operation cycle time represents the
data metric of availability.
Availabilty=Uptime /(Overall operation Cycle)
Data reliability: The data reliability is the next step for
ensuring the data quality estimation and hence, it is focused.
The TRR (Test-retest reliability) consists of the patients who
test with the device in a similar situation and under a
particular period. Moreover, the reliability of the data is
achieved from the connected devices.
Overall data Quality: Overall data quality defines the final step
of the data quality estimation process. The combined results
from the data reliability and data availability are then
showcased with the datasets. This results in the quality of the
obtained data from the devices and approved according to
quality.
Applications of IoT technology in
healthcare
As mentioned by the Y.B. Zikria [1] the applications of IoT in
the healthcare industry has been offering great results as they
provide benefits for the data analysis. The internet of thing
provides a connective medium to the healthcare industry
devices making the data analysis more prominent in the field.
Ingestible Sensors
The ingestible sensors are also known as smart pills. The pills
provide vital data adherence and patterns regarding the
patients. Such useful data provide a better perspective
regarding the mechanics of the patient. They do add up to the
health monitoring of the patients as well. These pills ingested
and hence transmit the data from inside the patient’s body.
Such pills are embedded to the monitoring devices such as a
tablet which showcase the received data.
As mentioned by G.J. Joyia [5] after the pill reaches the
stomach it transmits the signals to the sensor patch attached
to the patient. Such signals are then transfigured into digital
form. The digital form can be accessed to the cloud and hence
this data can be accessed using the cloud.
The pill has three important components consisting of the
active layer, integrated circuit and the insulation skirt disk. The
active layer is build using the microfabrication steps where a
layer is deposited directly on the IC. There is a prominent use
of elements such as the magnesium, silicon, gold and copper.
Thus, the sensors are then dyed on the IC with the
pharmaceutical powder applied to them. The active layer on
the pill with the gastric fluids turns up a charge and provide
power to the pill. The transmission of the signals is in the form
of binary codes which provides vital information regarding the
patients.
Ambient Assisting Living
The system assistance for a healthier, better and independent
life for the older people. The automatic system provides
situational information such as the ubiquity, portability and
automatic detection of hazardous situations. Such systems are
necessary to keep the older generation counter the challenges
and hazards. The connective devices provide this information
irrespective of the location of the people. The system may use
wearable devices such as a band. However, the sensor devices
are kept shocked and water-resistant to tackle harsh
conditions.
Internet of Things in Healthcare: A Comprehensive Study on Data Transmission, Security, and Future Applications_2

Since the system requires some of the vital information, it may
or may not ask for permission in emergency cases. The request
related to the voluntary in habitat, automatic request in
emergency and request for the caregiver.
Healthcare system for quarantine centres
The requests for the quarantine raised with the pandemic
caused by air transmission. Hence, the use of IoT devices
provided a solution towards the monitoring of the infected
patients and hence, helped the spread of the disease to a
larger extent. The smart technology provides an alternative
towards the routine monitoring of the patients. The use of
LED-based PPG sensors and Nasal sensors for the respiratory
rate count provide vital data regarding the patients. This data
can be easily accessed by the doctors and nurses for regular
monitoring. Moreover, the smart bands with the sensors
monitoring the pulse provide the ECG rate accurately to the
medical caretakers. Thus, IoT devices help in the patients
monitoring and offer a well connective network.
The Body sensor network is a network of the wearable sensors
connected to the patient’s body during the quarantine to keep
an eye on body mechanics and behaviour. This data is
analyzed by the doctors for the monitoring of the patients.
Security and privacy in the cloud (IoT)
As mentioned by S.B. Baker [2] the security is the primary
issue in the cloud-based systems. Moreover, the risk of
identity theft hovers above the cloud-based IoT environment.
Patient security is important and hence any kind of breach in
the privacy may lead to destructive actions such as identity
theft. Such malicious attacks on the data from the IoT devices
may result in false practices performed by the attackers. They
may fraud the patient’s data and take out the insurance with
the fake identity or even smuggle the data to the third party
for money. Moreover, the attackers may make changes in the
patient’s health record which may have devastating effects on
the patient.
The data encryption[9] and policies meant to control the
authentication are the effects to gain a secure IoT cloud
healthcare process. Thus, this policy keeps an eye on the
authorities who had accessed the patient’s data a certain limit
until which they are allowed to gain access to the data.
Another attempt to provide a secure authentication channel.
This would define a person’s identity and check the other
components which if matched to the personal data will gain
access to it. Moreover, the access logs data will keep a record
of the number of times data was accessed and for what
particular reason. The data encryption is a process to make the
data unreadable even if the attacker gets access to the
database. The heath data which is stored in the storage is an
encrypted data hard to read for the attacker. In term of the
health care applications, there are some of the robust physical
techniques developed to secure the data.
The mechanism works as a guard for the patients’ healthcare
data. The safety policy asks the patients to provide the
credentials to access the data. The patients may provide the
access defined to their selected persons or healthcare
providers to access a limited amount of data. The
authorization credentials are always checked before the
healthcare data can be accessed. Moreover, there are
certainly positive attributes of this kind of system as even if
the healthcare personalities tried to copy data without the
permission of the patients, the alarm notification is received
by the patients immediately warning them that their data is
under an attack[15].
The secure cloud data environment would be a benefit to the
patients and hence the data may be accessed from anywhere
if the credentials and permissions of the data owner are
available. This will be also beneficial for the old age people
who can be taken care of with the healthcare data being
monitored by the loved ones.
The biometrics data pins are another authorization choice for
the secure cloud environment. Healthcare data management
and security increase to a certain extent with the use of the
biometric identity keys as the data can be only accessed by the
persons with permission. Since the healthcare data for the
patients are stored into the servers, the servers are then
prone to the attackers. Hence, to secure the server data, signal
scrubbing is considered. In the signal scrubbing, there is a
special authorization key shared to the patients and the
authorized persons to access data. These key small partitions
of the data called the tiny data are used as a scrabbing key.
Cryptography in IoT
Internet of Things in Healthcare: A Comprehensive Study on Data Transmission, Security, and Future Applications_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Lightweight Encryption Algorithm for Secure IOT
|53
|14901
|228

Network and Security
|15
|3266
|22

IoT Security and Privacy Challenges
|9
|1402
|116

Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication
|11
|10056
|476

Significance of IoT in Communication System and Importance of Big Data and Cloud Computing
|11
|3013
|282

IoT Security & Privacy: Literature Review
|8
|1987
|72