ITC560 - IoT in Healthcare: Security, Privacy, and Monitoring Systems

Verified

Added on  2023/06/04

|9
|2470
|133
Report
AI Summary
This report provides a literature review and annotated bibliography focusing on the application of the Internet of Things (IoT) in healthcare, with a significant emphasis on security and patient monitoring systems. It examines various schemes proposed by authors regarding the security of patient data, including Ciphertext Policy Attribute-Based Encryption (CP-ABE) for data encryption and decryption based on access policies. The report also discusses dynamic integrity checking, secret sharing, and the use of Wireless Sensor Networks (WSN) for in-house patient monitoring. Furthermore, it explores mobile health monitoring systems using Body Sensor Networks (BSN) embedded in clothing and Bluetooth-enabled devices for detecting diseases like Alzheimer's. The annotated bibliography provides summaries of key papers discussing security, privacy, and implementation of IoT in healthcare, highlighting their contributions to improving tele-monitoring solutions and patient care.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET OF THINGS IN HEALTHCARE
Internet of Things in Healthcare
[Name of the Student]
[Name of the University]
[Author note]
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INTERNET OF THINGS IN HEALTHCARE
Literature review and annotated bibliography:
Different type of schemes has been provided by many of the authors regarding the
security associated with the patient monitoring system. According to Ibraimi, Asim, and
Petković, (2009), confidentiality is one of the major issues faced during the storing of the
data related to the patients. The authors of this paper has been associated with proposing a
Cipher text Policy Attribute Based Encryption or the CP-ABE. This is associated with the
encryption and decryption of the patient’s data by considering the access policies. Once the
data is encrypted the data would be stored in the servers. This would help everyone to
download the file but the file can only be decrypted if the user satisfies the access policy. For
key generation different algorithms were used which were responsible for the encryption or
decryption of the data.
Fan et al., (2010), were associated with conducting dynamic integrity checking along
with multiple secret sharing so as to make sure about the confidentiality and the
dependability. Usage of the orthogonal vectors helped in the process of dynamic integrity
checking. The main goals of this paper included the confidentiality along with the dynamic
integrity assurance and dependability.
In the paper by Li, Lou, and Ren, (2010), were associated with considering two of the
major security issues and this includes the secure and dependable distributed data storage and
the fine-grained access control. The major requirements of the data storage includes the
confidentiality, integrity and the dependability. The way by which the confidentiality has
been obtained is by making use of the public key encryption, whereas the integrity of the data
has been obtained by making use of the Message Authentication code or the MAC schemes.
Lastly the dependability has been achieved by making use of the SKC or the Symmetric Key
cryptography. For the SKC it is very essential that each of the patient should know about the
Document Page
2INTERNET OF THINGS IN HEALTHCARE
individuals who are authorized to access their data and should also encrypt their data with
each of the authorized users by making use of pair ways keys. However there exists several
drawbacks of this process. The PKC makes use of the attribute based encryption. Finally the
authors of the report concluded to the fact that the usage of the ABE based schemes is the
best way of ensuring security of the data.
Wang et al., (2011), were associated with proposing a data scheme along with the
dynamic integrity assurance and this was based upon the secret sharing and erasure coding.
The data integrity schemes were mostly dependent upon the principles of algebraic
signatures. The verification of the data in this is possible without the presence of the original
form. This is a very secure and efficient way of securing the data from different type of
attacks.
In today’s world the usage of the WSN or the Wireless Sensor Network is very
common which is widely being used for in-house patient monitoring. In the similar fashion
Corchado et al., (2010), were associated with proposing a distributed tele-monitoring system
which was associated with the usage of the SYLPH model or the Service laYers over Light
Physical devices model. This is considered to be a service oriented architecture model which
has the objective of distributing the resources amongst the various WSN so as to make them
executable over various wireless devices in an independent way. This model can also be used
for the purpose of connecting other networks which are present in the other wireless
technologies.
Shin, Lee, and Park, (2011), were associated with the usage of the IR or Infrared
sensor based monitoring system which were installed in the house for the purpose of
collecting data related to motion values of the patients along with other type of values like the
level of activities, level of mobility and many more. Support Vector Data Description or the
Document Page
3INTERNET OF THINGS IN HEALTHCARE
SVDD was used for the purpose of differentiating the normal and the abnormal behaviours.
In addition to this the behaviour pattern classification algorithm was used for the purpose of
classifying the behavioural patterns. This system eliminated the need of PC as the WSN were
installed in the houses. Eventually the nodes were connected with the server of the hospitals
by making use of the internet.
A very important role is played by the Mobile phones while monitoring the patient’s
data. Receiving, processing and transmitting of the patients data is done in details. Barnickel,
Karahan, and Meyer, (2010), was associated with proposing HealthNet mobile monitoring in
which the BSN or the Body Sensor Networks are embedded in the cloths of the patient so as
to collect the various body parameters and communicate those collected data with the mobile
phone of the patients. In the experiment conducted in this paper the sensors as well as the
central hubs were embedded in the shirts of the patients by which the collection of the vital
signals are done by the sensors. This in followed by transmission of the data to the central
hub where the data are communicated with the mobile phones by making use of the
Bluetooth links. The confidentiality in this system is achieved by making use of the AES128
whereas the authentication was achieved by making use of the SHA.
In the paper by Haché, Lemaire, and Baddour, (2011), a novel monitoring Wearable
Mobility Monitoring System was introduced and the major reason lying behind the
establishment of this model in entirely dependent upon the smart phone approach. This
system is easy wearable on the belts of the patients which would be helping in monitoring of
the patients mobility along with taking of photographs in case of any kind of change in the
state of the patient. This photographs are in turn used for analysis.
For in-home patient monitoring the usage of Bluetooth enabled devices has also
increased. One such similar in-house health monitoring system was proposed by Cheng, and
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INTERNET OF THINGS IN HEALTHCARE
Zhuang, (2010), which was used for the purpose of detecting the Alzheimer diseases. The
Bluetooth monitoring device is carried by the patients in their home which consists of an
access point that is placed in one of the rooms which is followed by connection of all this
with the local database. In case of movement of the patient from one room to another, then
the monitoring device is associated with selecting one of the access points that is having the
strongest signal strength. After establishment of the connection is done the location as well as
the movements of the patients are traced and stored by utilizing the Bluetooth
communication. Forwarding of the information is done along with the corresponding
timestamps to the decision engines present in the hospitals.
Annotated Bibliography:
Barnickel, J., Karahan, H., & Meyer, U. (2010, June). Security and privacy for mobile
electronic health monitoring and recording systems. In World of Wireless Mobile
and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on
a (pp. 1-6). IEEE.
This paper is associated with depicting the security and the privacy of the
architecture and implementation of the new system known as the HealthNet mobile
electronic health monitoring and data collection system. In this paper various unique
security as well as the privacy features of the architecture has been depicted in brief.
This paper is mainly used as the system proposed in this paper can help a lot in
improving the various kind of tele-monitoring solutions.
Cheng, H. T., & Zhuang, W. (2010). Bluetooth-enabled in-home patient monitoring
system: Early detection of Alzheimer's disease. IEEE Wireless
Communications, 17(1), 74-79.
This paper is associated with proposing a Bluetooth-enabled in-home patient
monitoring system that helps in detection of the Alzheimer’s diseases. This paper has
Document Page
5INTERNET OF THINGS IN HEALTHCARE
been chosen as this paper proposes a in-home monitoring system which is more
flexible in nature and can be applied very easily. Besides this the proposed system is
also associated proposing solutions which helps in facilitating the treatment process
along with improving the quality of life of the aged peoples as well.
Corchado, J. M., Bajo, J., Tapia, D. I., & Abraham, A. (2010). Using heterogeneous
wireless sensor networks in a telemonitoring system for healthcare. IEEE
transactions on information technology in biomedicine, 14(2), 234-240.
This paper depicted the fact that in recent years the ambient intelligence has
been associated with gaining a lot of importance and besides this there is a
requirement of developing new innovative solutions as well. This paper has been
chosen as this paper helps in understanding one of the distributed tele-monitoring
system which has the aim of improving the healthcare and also provides assistance to
the dependent people staying in homes. This paper is chosen as the approach proposed
in this paper is having the higher capability of recovering from any kind of errors
along with providing a better flexibility for making changes in the behaviour during
the time of execution.
Fan, R., Ping, L. D., Fu, J. Q., & Pan, X. Z. (2010, October). The new secure and
efficient data storage approaches for Wireless Body Area Networks. In Wireless
Communications and Signal Processing (WCSP), 2010 International Conference
on (pp. 1-5). IEEE.
The data of the patient’s acts as a significant factor for performing medical
diagnosis and patient’s health care. So the security of the distributed data storages are
very important. But due to the presence of distributed architecture creating a secure
and efficient storage is very challenging. Another major reason lying behind this
problem is due to the resource-constrained nature that the sensor nodes are having.
Document Page
6INTERNET OF THINGS IN HEALTHCARE
This paper has been chosen as this addresses the challenges that are faced by the
Wireless Body Area Networks along with proposing a novel secure and efficient data
storage scheme which is assisted by the dynamic integrity checking.
Haché, G., Lemaire, E. D., & Baddour, N. (2011). Wearable mobility monitoring using a
multimedia smartphone platform. IEEE transactions on instrumentation and
measurement, 60(9), 3153-3161.
This paper is associated with depicting the fact that mobility plays a vital role
in understanding the effectiveness of clinical decision making. In this paper a novel
wearable mobility monitoring system is introduced which is known as the WMMS so
as to have a ubiquitous measurement of the mobility. The prototype of this has been
created by making use of the smart phone-based approach which is associated with
allowing in having a all-in-one WMMS. This paper is used as the evaluation of the
system helps in providing the capability of detecting the changes of state along with
providing the ability to identify the contexts from the photographs.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INTERNET OF THINGS IN HEALTHCARE
References:
Barnickel, J., Karahan, H., & Meyer, U. (2010, June). Security and privacy for mobile
electronic health monitoring and recording systems. In World of Wireless Mobile and
Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a (pp. 1-
6). IEEE.
Cheng, H. T., & Zhuang, W. (2010). Bluetooth-enabled in-home patient monitoring system:
Early detection of Alzheimer's disease. IEEE Wireless Communications, 17(1), 74-79.
Corchado, J. M., Bajo, J., Tapia, D. I., & Abraham, A. (2010). Using heterogeneous wireless
sensor networks in a telemonitoring system for healthcare. IEEE transactions on
information technology in biomedicine, 14(2), 234-240.
Fan, R., Ping, L. D., Fu, J. Q., & Pan, X. Z. (2010, October). The new secure and efficient
data storage approaches for Wireless Body Area Networks. In Wireless
Communications and Signal Processing (WCSP), 2010 International Conference
on (pp. 1-5). IEEE.
Haché, G., Lemaire, E. D., & Baddour, N. (2011). Wearable mobility monitoring using a
multimedia smartphone platform. IEEE transactions on instrumentation and
measurement, 60(9), 3153-3161.
Ibraimi, L., Asim, M., & Petković, M. (2009, June). Secure management of personal health
records by applying attribute-based encryption. In Wearable Micro and Nano
Technologies for Personalized Health (pHealth), 2009 6th International Workshop
on (pp. 71-74). IEEE.
Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area
networks. IEEE Wireless communications, 17(1).
Document Page
8INTERNET OF THINGS IN HEALTHCARE
Shin, J. H., Lee, B., & Park, K. S. (2011). Detection of abnormal living patterns for elderly
living alone using support vector data description. IEEE Transactions on Information
Technology in Biomedicine, 15(3), 438-448.
Wang, Q., Ren, K., Yu, S., & Lou, W. (2011). Dependable and secure sensor data storage
with dynamic integrity assurance. ACM Transactions on Sensor Networks
(TOSN), 8(1), 9.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]