scholarly journals A Systematic Analysis of Internet of Things in Healthcare Applications : A Review

2021 ◽  
Vol 23 (09) ◽  
pp. 112-125
Author(s):  
Shagun Arora ◽  
◽  
Gurvinder Singh ◽  

The Internet of Things (IoT) is a network of physical devices, software, and hardware that communicate with one another. As the population ages, healthcare resources become scarce, and medical expenses rise, IoT-based solutions must be adapted to meet these issues in healthcare. To enhance the monitoring efficiency of the IoT-based healthcare system, several studies have been conducted. In this paper, the architecture utilized in the IoT, particularly cloud-integrated systems and security in IoT devices is explored. Factors like accuracy and power consumption are major concerns in the Internet of Things, therefore research projects aimed at enhancing the performance of IoT-based healthcare systems are highlighted. In this work, data management strategies in an IoT-based healthcare system with cloud capabilities are thoroughly examined. The performance of the IoT-based healthcare system is examined, as well as its benefits and drawbacks. Moreover, a comparative analysis is also done on some existing technologies that are utilized in healthcare. It has been observed from past studies that IoT protocol such as 6LoWPAN is mostly utilized in the domain of health care. The majority of research studies are effective in detecting many symptoms and accurately predicting illnesses. The IoT-based healthcare system built specifically for the elderly is an effective way to keep track of their medical concerns. High power consumption, a scarcity of resources, and security concerns major drawbacks of current systems are included in the proposed study.

Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 407 ◽  
Author(s):  
Omar A. Saraereh ◽  
Amer Alsaraira ◽  
Imran Khan ◽  
Bong Jun Choi

The Internet-of-things (IoT) has been gradually paving the way for the pervasive connectivity of wireless networks. Due to the ability to connect a number of devices to the Internet, many applications of IoT networks have recently been proposed. Though these applications range from industrial automation to smart homes, healthcare applications are the most critical. Providing reliable connectivity among wearables and other monitoring devices is one of the major tasks of such healthcare networks. The main source of power for such low-powered IoT devices is the batteries, which have a limited lifetime and need to be replaced or recharged periodically. In order to improve their lifecycle, one of the most promising proposals is to harvest energy from the ambient resources in the environment. For this purpose, we designed an energy harvesting protocol that harvests energy from two ambient energy sources, namely radio frequency (RF) at 2.4 GHz and thermal energy. A rectenna is used to harvest RF energy, while the thermoelectric generator (TEG) is employed to harvest human thermal energy. To verify the proposed design, extensive simulations are performed in Green Castalia, which is a framework that is used with the Castalia simulator in OMNeT++. The results show significant improvements in terms of the harvested energy and lifecycle improvement of IoT devices.


2019 ◽  
Vol 17 (2) ◽  
pp. 39-48 ◽  
Author(s):  
Mohammad S. Jalali ◽  
Jessica P. Kaiser ◽  
Michael Siegel ◽  
Stuart Madnick

2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


Sign in / Sign up

Export Citation Format

Share Document