scholarly journals The Rise of Internet of Things (IoT) in Big Healthcare Data: Review and Open Research Issues

Author(s):  
Zainab Alansari ◽  
Safeeullah Soomro ◽  
Mohammad Riyaz Belgaum ◽  
Shahaboddin Shamshirband
2020 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF’s ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node’s resources and degrade the network’s performance. In this paper, we present a study on</div><div>various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</div>


Author(s):  
Sandhya M.K ◽  
Sathya Priya S ◽  
Prasidh S

: Obstructive Sleep Apnea is a kind of sleep syndrome, which has an adverse effect on both the health, and quality of life of an individual. It results in severe health problems like hypertension, stroke and many cardiovascular issues. Only a very less percentage of persons with Obstructive Sleep Apnea are diagnosed and treated. This is due to the lack of available devices and technology. Detection of this sleep disorder is extremely important, as the negligence can prove fatal. Hence, the critical need in healthcare is the instantaneous monitoring of this disorder. The current approaches for detecting this disorder are very expensive, bulky and intrusive which in turn will affect the sleep quality of patients. So there is a necessity to design less expensive, light-weight non-intrusive systems to diagnose these sleep-related issues. In this paper, the various non-invasive schemes using sensors and Internet-of-Things to detect Obstructive Sleep Apnea are reviewed. Further, the open research issues and challenges in detecting Obstructive Sleep Apnea are presented.


2020 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF’s ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node’s resources and degrade the network’s performance. In this paper, we present a study on</div><div>various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</div>


Electronics ◽  
2018 ◽  
Vol 7 (12) ◽  
pp. 379 ◽  
Author(s):  
Alfredo Perez ◽  
Sherali Zeadally ◽  
Luis Matos Garcia ◽  
Jaouad Mouloud ◽  
Scott Griffith

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the bystanders’ trust in these systems to protect his/her facial privacy. To address these limitations, we propose FacePET (Facial Privacy Enhancing Technology), a wearable system worn by bystanders and designed to enhance facial privacy. We present the design, implementation, and evaluation of the FacePET and discuss some open research issues.


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 676 ◽  
Author(s):  
Jonathan Silva ◽  
Joel Rodrigues ◽  
Jalal Al-Muhtadi ◽  
Ricardo Rabêlo ◽  
Vasco Furtado

Internet of Things (IoT) management systems require scalability, standardized communication, and context-awareness to achieve the management of connected devices with security and accuracy in real environments. Interoperability and heterogeneity between hardware and application layers are also critical issues. To attend to the network requirements and different functionalities, a dynamic and context-sensitive configuration management system is required. Thus, reference architectures (RAs) represent a basic architecture and the definition of key characteristics for the construction of IoT environments. Therefore, choosing the best technologies of the IoT management platforms and protocols through comparison and evaluation is a hard task, since they are difficult to compare due to their lack of standardization. However, in the literature, there are no management platforms focused on addressing all IoT issues. For this purpose, this paper surveys the available policies and solutions for IoT Network Management and devices. Among the available technologies, an evaluation was performed using features such as heterogeneity, scalability, supported technologies, and security. Based on this evaluation, the most promising technologies were chosen for a detailed performance evaluation study (through simulation and deployment in real environments). In terms of contributions, these protocols and platforms were studied in detail, the main features of each approach are highlighted and discussed, open research issues are identified as well as the lessons learned on the topic.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 2634-2641 ◽  

A large quantity of terabytes of data is produced each day from present day information structures and automated advances. For instance, Internet of Things and cloud computing. Analysis of these huge data takes a remarkable deal of endeavors at specific degrees to extricate understanding for primary leadership. In this way, large information evaluation is a go with the flow territory of revolutionary paintings. The essential goal of this paper is to explore the capability impact of large facts challenges, open research problems, and specific gadgets associated with it. Therefore, this text offers a stage to explore bigdata at various degrees. Also, it opens another skyline for specialists to execute the arrangement, in view of the demanding situations and open studies troubles.


Sign in / Sign up

Export Citation Format

Share Document