scholarly journals A Survey on Healthcare Systems using Internet of Things

2021 ◽  
Vol 37 ◽  
pp. 01015
Author(s):  
Chitra Ramesh ◽  
Jayalakshmi Sekar

The Internet of Things allows things to become active users, facilitating interaction with things and the sharing of data between them. The most interesting issue in the science world, the public sector and industry in the IoT is unavoidable. It ensures a seamless relationship between doctors and patients that results in medical treatment with high quality results. This is accomplished by constant surveillance of patients through the use of sensors. The collected data is registered for potential uses and used for analytics. The analytical approach offers the opportunity for disease detection in healthcare results. This paper concerns the Internet of Things in healthcare and explores the different algorithms used in it. The system involved in analytics of healthcare and data sources involved in analytics are further clarified. Finally this paper demonstrates the Internet of Things and Big Data survey of healthcare systems with a reference table.

Author(s):  
Yunus Topsakal

The public and private sectors will undergo a significant transformation with the use of blockchain technology, and this potential of blockchain technology will be influential in all areas of life. In addition, blockchain technology can help ease the integration of the Internet of Things, augmented reality, and artificial intelligence applications. The question of how such a technology that is in the process of development will be applied in areas such as taxation, notary operations, and banking, arises simultaneously. Studies related to blockchain technology have mainly been carried out in the fields of finance, logistics, banking, and education. However, there is a paucity of studies on blockchain technology in the tourism industry which has an important role in the global economy. Therefore, the potential of using blockchain technology in the tourism industry is evaluated in this chapter. For this purpose, the features, advantages, and disadvantages of blockchain technology are explained. The potential uses of blockchain technology in the tourism industry are then discussed.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


2021 ◽  
Vol 10 (5) ◽  
pp. 25327-2535
Author(s):  
Dr. K.Nagarathna rajur

It is a modern type of technology that empowers virtual and physical artefacts to interact and provide digitized services for each other, and includes the Internet of Things (IoT). But it has some benefits, but raises problems of single point of failure, anonymity, accountability, and data integrity due to the new structured design. Challenges like these stands in the path of the introduction of all the most interesting Internet of Things technologies. Bringing the Internet of Things through the public ledger might fix these issues. Decentralized ledger systems are comprised of blockchain as well as distributed ledgers. The introduction of the Internet of Things (IoT) to the blockchain will offer tremendous advantages. Blockchain integration in this paper offers a detailed exploration of how to combine the IoT technology with the IoT scheme. It is followed by reviewing the basic framework and addressing the problems inherent in the system's integration, explaining the advantages of it, and describing ways in which the blockchain can help to overcome such problems. Blockchain as a Service for IoT can illustrate how different protocol concepts can be applied using different service types on blockchain. After this, there would be an important section about the integration of artificial intelligence (AI) into the Internet of Things (IoT) and blockchain. Finally, potential study avenues will focus on ways of applying the Internet of Things (IoT) with blockchain are suggested. The open issues and challenges of 5G-enabled IoT for blockchain-based Industrial automation are also analyzed in the text.


Author(s):  
Pranjal Kumar

The growing use of sensor tools and the Internet of Things requires sensors to understand the applications. There are major difficulties in realistic situations, though, that can impact the efficiency of the recognition system. Recently, as the utility of deep learning in many fields has been shown, various deep approaches were researched to tackle the challenges of detection and recognition. We present in this review a sample of specialized deep learning approaches for the identification of sensor-based human behaviour. Next, we present the multi-modal sensory data and include information for the public databases which can be used in different challenge tasks for study. A new taxonomy is then suggested, to organize deep approaches according to challenges. Deep problems and approaches connected to problems are summarized and evaluated to provide an analysis of the ongoing advancement in science. By the conclusion of this research, we are answering unanswered issues and providing perspectives into the future.


2021 ◽  
Vol XXIV (1) ◽  
pp. 97-102
Author(s):  
BÎRLEANU S.

This paper provides a detailed overview of the intelligent health system that uses the concept of the Internet of Things. Various technologies implemented together with their applications are analyzed in this paper. An increasing number of IoT devices are currently available on the market to support patients, each with different technologies are explored into this document. The paper also presents a comparison between different sensors used in the field of healthcare and their types, IoT architecture, tools and technologies used for the development of IoT systems in the field of healthcare.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Sign in / Sign up

Export Citation Format

Share Document