scholarly journals Smart IOT Based Healthcare Monitoring and Decision-Making System Using Augmented Data Recognition Algorithm

2021 ◽  
Vol 12 (11) ◽  
pp. 1971-1979
Author(s):  
Annamalai.M, Et. al.

Many medical errors occur because people are in charge of patients or elderly medications by handling large amounts of medications every day. This work consists of designing and establishing a pillbox prototype intended to address this shortcoming in medical areas. It can be used separately from the medication itself and other advanced features provided with this device by the hospital or retirement home. This medication pack aims to take most medications or vitamin supplements or stimulants that deal with over-salting or over-the-counter patients. The proposed smart pillbox contains a program that enables medical caregivers or clients to determine the pill size and timing of pills and service routine each day. In this research work, the Augmented Data Recognition (ADR) algorithm is also used to monitor humans' health conditions. Initially, the UCI dataset is used for training and validation of the proposed ADR algorithm.  The heart rate, blood pressure and temperature of the patient have carried during the testing phase via the Internet of Things (IoT) setup. The testing phase estimates any abnormalities in the health status based on the information obtained by the sensor collected by the population structure. Statistical analysis is based on data obtained from a cumulative cloud from IoT devices to estimate percentage accuracy.

Author(s):  
Suma V

The Internet of Things [IoT] is one of the most recent technologies that has influenced the way people communicate. With its growth, IoT encounters a number of challenges, including device heterogeneity, energy construction, comparability, and security. Energy and security are important considerations when transmitting data via edge networks and IoT. Interference with data in an IoT network might occur unintentionally or on purpose by malicious attackers, and it will have a significant impact in real time. To address the security problems, the suggested solution incorporates software defined networking (SDN) and blockchain. In particular, this research work has introduced an energy efficient and secure blockchain-enabled architecture using SDN controllers that are operating on a novel routing methodology in IoT. To establish communication between the IoT devices, private and public blockchain are used for eliminating Proof of Work (POW). This enables blockchain to be a suitable resource-constrained protocol for establishing an efficient communication. Experimental observation indicates that, an algorithm based on routing protocol will have low energy consumption, lower delay and higher throughput, when compared with other classic routing algorithms.


2021 ◽  
Author(s):  
Sharmila B S ◽  
Rohini Nagapadma

Abstract Research on network security has recently acquired attention in the field of the Internet of Things. In the context of security, most of the IoT devices with the internet are connected directly which results in the exploitation of private data. Nowadays, the fraudster will release novel attacks very frequently especially for IoT devices. As a result, the traditional sophisticated Intrusion Detection System (IDS) model is not suitable for the identification of vulnerabilities in IoT devices. In our research work, we propose MCDNN for IDS. MCDNN is Multi Core DNN with having parallel optimizer. Rather than a traditional dataset, this paper experiment is conducted on the BoTIoT dataset. Since IoT devices generate a huge volume of data, this work focuses on reducing huge datasets using Kernel Principal Component Analysis(KPCA) reduction technique with optimizer parallelly. To decrease false alarm rate and maintaining less computational power multi-core is introduced in our research work. This helps identification of vulnerabilities in IoT devices using deep learning techniques faster. Experimental results indicate that designing MCDNN based IDS with different optimizers parallelly achieved higher performance than those of other techniques.


2020 ◽  
Vol 9 (1) ◽  
pp. 2106-2114

The internet of things concept had infiltrated nearly every field of our life, however, its cutting edge impact in the healthcare industry has been momentous. With tremendous penetration of Mobile health, the functionality of IoT in the healthcare industry had drastically increased. In the research, a systemic literature review was conducted to study the impact of IoT applications in the healthcare industry by analyzing the current and future research work in the field, more focusing on security and privacy in health IoT devices and how it affects different levels of health care employees and consumers’ adoption towards IoT in the health care industry. The study reports research papers, which were included, based on the further filtering process by title, contents, and abstract. A total of 232 primary up-to-date studies were included in the review study. These papers were analyzed according to the research questions defined in the study.


Symmetry ◽  
2019 ◽  
Vol 11 (5) ◽  
pp. 634 ◽  
Author(s):  
Fawad Ali Khan ◽  
Rafidah Md Noor ◽  
Miss Laiha Mat Kiah ◽  
Noorzaily Mohd Noor ◽  
Saleh M. Altowaijri ◽  
...  

The Internet of Things has gained substantial attention over the last few years, because of connecting daily things in a wide range of application and domains. A large number of sensors require bandwidth and network resources to give-and-take queries among a heterogeneous IoT network. Network flooding is a key questioning strategy for successful exchange of queries. However, the risk of the original flooding is prone to unwanted and redundant network queries which may lead to heavy network traffic. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. IoT devices consume more energy and high computational time. More queries leads to consumption of more bandwidth, cost, and miserable QoS. Current existing approaches focused primarily on how to speed up the basic routing for IoT devices. However, solutions for flooding are not being addressed. In this paper, we propose a cluster-based flooding (CBF) as an interoperable solution for network and sensor layer devices which is also capable minimizing the energy consumption, cost, network flooding, identifying, and eliminating of redundant flooding queries using query control mechanisms. The proposed CBF divides the network into different clusters, local queries for information are proactively maintained by the intralayer cluster (IALC), while the interlayer cluster (IELC) is responsible for reactively obtain the routing queries to the destinations outside the cluster. CBF is a hybrid approach, having the potential to be more efficient against traditional schemes in term of query traffic generation. However, in the absence of appropriate redundant query detection and termination techniques, the CBF may generate more control traffic compared to the standard flooding techniques. In this research work, we used Cooja simulator to evaluate the performance of the proposed CBF. According to the simulation results the proposed technique has superiority in term of traffic delay, QoS/throughput, and energy consumption, under various performance metrics compared with traditional flooding and state of the art.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Impact ◽  
2019 ◽  
Vol 2019 (10) ◽  
pp. 61-63 ◽  
Author(s):  
Akihiro Fujii

The Internet of Things (IoT) is a term that describes a system of computing devices, digital machines, objects, animals or people that are interrelated. Each of the interrelated 'things' are given a unique identifier and the ability to transfer data over a network that does not require human-to-human or human-to-computer interaction. Examples of IoT in practice include a human with a heart monitor implant, an animal with a biochip transponder (an electronic device inserted under the skin that gives the animal a unique identification number) and a car that has built-in sensors which can alert the driver about any problems, such as when the type pressure is low. The concept of a network of devices was established as early as 1982, although the term 'Internet of Things' was almost certainly first coined by Kevin Ashton in 1999. Since then, IoT devices have become ubiquitous, certainly in some parts of the world. Although there have been significant developments in the technology associated with IoT, the concept is far from being fully realised. Indeed, the potential for the reach of IoT extends to areas which some would find surprising. Researchers at the Faculty of Science and Engineering, Hosei University in Japan, are exploring using IoT in the agricultural sector, with some specific work on the production of melons. For the advancement of IoT in agriculture, difficult and important issues are implementation of subtle activities into computers procedure. The researchers challenges are going on.


IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 156
Author(s):  
Juntao Zhu ◽  
Hong Ding ◽  
Yuchen Tao ◽  
Zhen Wang ◽  
Lanping Yu

The spread of a computer virus among the Internet of Things (IoT) devices can be modeled as an Epidemic Containment (EC) game, where each owner decides the strategy, e.g., installing anti-virus software, to maximize his utility against the susceptible-infected-susceptible (SIS) model of the epidemics on graphs. The EC game’s canonical solution concepts are the Minimum/Maximum Nash Equilibria (MinNE/MaxNE). However, computing the exact MinNE/MaxNE is NP-hard, and only several heuristic algorithms are proposed to approximate the MinNE/MaxNE. To calculate the exact MinNE/MaxNE, we provide a thorough analysis of some special graphs and propose scalable and exact algorithms for general graphs. Especially, our contributions are four-fold. First, we analytically give the MinNE/MaxNE for EC on special graphs based on spectral radius. Second, we provide an integer linear programming formulation (ILP) to determine MinNE/MaxNE for the general graphs with the small epidemic threshold. Third, we propose a branch-and-bound (BnB) framework to compute the exact MinNE/MaxNE in the general graphs with several heuristic methods to branch the variables. Fourth, we adopt NetShiled (NetS) method to approximate the MinNE to improve the scalability. Extensive experiments demonstrate that our BnB algorithm can outperform the naive enumeration method in scalability, and the NetS can improve the scalability significantly and outperform the previous heuristic method in solution quality.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1339 ◽  
Author(s):  
Hasan Islam ◽  
Dmitrij Lagutin ◽  
Antti Ylä-Jääski ◽  
Nikos Fotiou ◽  
Andrei Gurtov

The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet-of-Things (IoT). However, a full-fledged CoAP-based application may require significant computing capability, power, and storage capacity in IoT devices. To address these challenges, we present the design, implementation, and experimentation with the CoAP handler which provides transparent CoAP services through the ICN core network. In addition, we demonstrate how the CoAP traffic over an ICN network can unleash the full potential of the CoAP, shifting both overhead and complexity from the (constrained) endpoints to the ICN network. The experiments prove that the CoAP Handler helps to decrease the required computation complexity, communication overhead, and state management of the CoAP server.


Sign in / Sign up

Export Citation Format

Share Document