scholarly journals A Novel Model for Implementing Internet of Things (IoT) in Iranian Hospitals

Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 135-153
Author(s):  
Khadijeh Moulaei ◽  
Shirin Ayani ◽  
Kambiz Bahaadinbeigy ◽  
Rafat Bayat ◽  
Farhad Fatehi ◽  
...  

The Internet of Things (IOT) has led to ground-breaking changes in the healthcare industry as a promising technological solution. Yet, despite its many benefits, its application has always proven to be challenging. Hence, the purpose of this study is to identify the challenges of using the IOT with the intention of proposing a model for implementing Internet of Things in Iranian hospitals. This study was performed in three phases. In the first phase, the challenges of using the IoT were outlined and introduced. In the second phase the challenges of using the Internet of Things in Iranian hospitals (according to experts) was established during the completion of a two-round Delphi. In the last phase, a novel model for implementing the IoT in Iranian hospitals was proposed. The identified primary model consisted of six groups, namely privacy and security, Big data, hardware, network, software, and organizational-cultural and environmental issues with 78 challenges. Out of the 78 identified challenges, 46 were approved by experts as essential elements for providing IoT patterns in Iranian hospitals. The highest and lowest averages were related to the subgroups "Failure to provide regular IoT rules and programs by governments" and "Absence of single, integrated and efficient platforms with high data transfer capacity and fast processing", respectively. The final model for implementing IoT in Iranian hospitals was designed and presented using Edraw Max10.0.4+Portable software. Providing this model can provide a sufficient basis, information and knowledge for policymakers, government authorities and managers of organizations to use the IoT in hospitals of Iran and other countries. Also, the application of the proposed model can result in the improved special capabilities in the realm of system design, and offer grounds for saving time and money as well as reducing failures in the initial design of IoT projects.

2020 ◽  
Vol 43 (338) ◽  
pp. 27-34
Author(s):  
Lasma Licite-Kurbe ◽  
Athul Chandramohan

AbstractThe Internet of Things (IoT) is a computing concept that describes the idea of everyday physical objects being connected to the Internet and being able to identify themselves to other devices, and day by day it becomes popular in everyday life as well as in entrepreneurship. The IoT covers broad areas, including manufacturing, the health sector, agriculture, smart cities, security and emergencies among many others. The market for the industrial IoT is estimated to surpass 107 billion euros by 2021 and reach a compound annual growth rate of 7.3% as of 2020. The IoT makes an impact on all industries and provides benefits for various areas of business; however, business may be faced with some risks as well. The research aim is to analyse the benefits and risks of the IoT in entrepreneurship. The descriptive method, analysis and synthesis, the induction and deduction methods were used to achieve the aim. The research has revealed that the IoT can provide several opportunities for business in all fields of operations – marketing, logistics, accounting and human resource management. However, businesses may be faced with some challenges related to privacy and security, processing, analysis and management of data, as well as monitoring and sensing.


Author(s):  
Sree Naga Raja Sekhar Mallela

Abstract: The most common buzzwords in the world is “The Internet of things” (IoT) and IOT describes the network of physical objects, so known as, "things" those are rooted with sensors in the devices, application software, technologies that is used for the resolution of connecting one end to another end and exchanging information with other devices and systems over the Internet. The IoT 5G technologies can also be used in journalism and the primary focus is to increase M2M interaction of mass communication devices. One way it is “ubiquitous computing” can occur using any device, in any location, and in any format. The Internet of Things (IoT) is all about small cost sensors grabbing data to communicate with one device to another device using cloud solutions. Coming to the 5th generation mobile network. We have already started using 4G networks and as we know that, start with 1G, 2G, 3G, and 4G networks. The 5th generation network is going to enable an upcoming new network that will associate virtually every person globally connected and everything organized including IoT devices, objects and machines. Central communication and Journalism is the activity of gathering right information, evaluating, generating, and presenting broadcast information. It is high time to start using IOT Technology using 5th generation high-speed network connectivity devices to communicate or data transfer in the area of journalism. Keywords: IOT – Internet Of Things, 5G- Fifth Generation in data network, JMC – Journalism and Mass Communications, M2M – Machine to Machine, Cloud , Artificial intelligence and Machine Learning.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


2019 ◽  
Vol 7 (2) ◽  
pp. 21-40 ◽  
Author(s):  
Parthasarathy Panchatcharam ◽  
Vivekanandan S.

Wellbeing is fundament requirement. What's more, it is human appropriate to get quality health care. These days, India is confronting numerous medical problems in light of fewer assets. This survey article displays the idea of solving health issues by utilizing a recent innovation, the Internet of Things (IOT). The Internet of Things with their developing interdisciplinary applications has changed our lives. Smart health care being one such IoT application interfaces brilliant gadgets, machines, patients, specialists, and sensors to the web. At long last, the difficulties and prospects of the improvement of IoT-based medicinal service frameworks are talked about in detail. This review additionally summarizes the security and protection worries of IoT, administrations and application of IoT and smart healthcare services that have changed the customary medicinal services framework by making healthcare administration more proficient through their applications.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Author(s):  
Sébastien Ziegler ◽  
Cédric Crettaz ◽  
Eunah Kim ◽  
Antonio Skarmeta ◽  
Jorge Bernal Bernabe ◽  
...  

2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


Electronics ◽  
2019 ◽  
Vol 8 (4) ◽  
pp. 442 ◽  
Author(s):  
Khudoyberdiev ◽  
Jin ◽  
Kim

The Internet of Things (IoT) is expected to deliver a whole range of new services to all parts of our society, and improve the way we work and live. The challenges within the Internet of Things are often related to interoperability, device resource constraints, a device to device connection and security. One of the essential elements of identification for each Internet of Things devices is the naming system and addresses. With this naming system, Internet of Things devices can be able to be discoverable by users. In this paper, we propose the IoT resource auto-registration and accessing indoor services based on Domain Name System (DNS) in the Open Connectivity Foundation (OCF) environment. We have used the Internet of Things Platform and DNS server for IoT Resource auto-registration and discovery in the Internet Protocol version 4 (IPv4). An existing system called Domain Name Auto-Registration in Internet Protocol version 6 can be used for Internet of Things devices for auto-registration and resource discovery. However, this system is not acceptable in the existing internet networks, because the highest percentage of the networks on the Internet are configured in Internet Protocol version 4. Through the proposed auto-registration system, clients can be able to discover the resources and access the services in the OCF network. Constrained Application Protocol (CoAP) is utilized for the IoT device auto-registration and accessing the services in the OCF network.


Sign in / Sign up

Export Citation Format

Share Document