Группа авторов

Smart Systems for Industrial Applications


Скачать книгу

making it susceptible to challenges of reliability, availability, and soundness. With varying latency and bandwidth, traditional cloud computing architecture needs to be reviewed as the patient is the end-user, and in emergencies, establishing connections could have adverse effects. In remote healthcare monitoring, there is always an increase in the number of connected devices, and with it comes the sensory data, which could cause potential overload on the communication infrastructure. Currently, many types of research are underway to make this architecture effective, enabling layer two to pre-process using computational capabilities and close loop architecture. Allowing this layer creates a system where essential and critical services can be locally controlled and, in turn, reducing the load on IoT communication infrastructure through effective task and resource management.

Schematic illustration of IoT architecture for healthcare.

      The overall objective was to minimize the effects of varying latency and bandwidth between gateways and servers here; it is the traditional cloud computing. It is tested with hierarchical computing architecture where existing machine learning methods can help in a fog-enabled IoT system. At a local level, it explores the feasibility of delivering adaptive transmission of data inside a closed-loop environment [27].

      1.5.3 Developing Autonomous Capability is Key for Remote Healthcare Management

      Remote monitoring is a robust model of healthcare. The advent of wearable devices aided in the smart healthcare application, in turn, enabling quicker clinical diagnosis and ease of disease prediction. The host of sensors is deployed in healthcare, uniquely placed inside the body either as implants or sensing devices over the physical body. Many of these can also communicate with small handheld devices such as smartphones or digital assistants. Dynamic and Interoperable Communication Framework (DICF) is primarily designed [28] to improve efficiency and enhance the decision-making capabilities of these wearable sensors. It optimizes various constraints of a sensor, namely, lifetime, storage capacity, handling multiple communication channels, and decision-making. The radio transmitter is used by sensors to interact with Aggregator Mobile Device (AMD); it can be a mobile platform. Information received is distinguished by the physiological source or based on sensor types. Periodic sensing for the collection of data varies with the kind of sensor and the human body. This periodic sensing is called a session. A session is, in turn, capable of sensing both periodic and event while monitoring is in progress. Pattern and range are clearly defined for transmitting data from AMD to service provider or clinic. So, when their data which does not fall within this range, an abnormality detected. AMD quickly generates an emergency notification and prioritizes transmission. In such events of AMD transmits completed sensed data to the clinic or the service provider without requesting the permission of end-users or patients.

Schematic illustration of AI-based remote healthcare management.

      1.5.4 Enabling Data Privacy and Security in the Field of Remote Healthcare Management

      Internet of Medical Things (IoM) has gained specialization in recent years with growing applications. Both embedded and wearable sensors gather comprehensive information about patients. It is shared with medical professionals for diagnosis. The sensitive nature of this data gives rise to protection and privacy, which is currently a significant challenge of the IoM. It uses anonymity-based authentication to mitigate privacy issues. To ensure the session is secure, upon mutual authentication, both medical professionals and medical sensors utilize private session keys. Research in this area of authenticity and privacy of data is still at the nascent stage. Currently, available authentication features are not suitable to achieve the privacy goals in terms of its features. At this juncture, there is not a credible and efficient authentication program in this segment. One of the key issues in achieving the goal is two-factor security in the event of loss or tampered smart card. Research is deplored to investigate the adversarial model, which is expected to mitigate various redundancies and ambiguities. This paper explores a methodology with 12 independent criteria analyzed using an adversary model for practical use. Broadly, it enables a better understanding of privacy requirements if not successful. In [28], the authors explore the feasibility of smart revocation/reissue and improve security efficiencies using a formal model. Secure-Anonymous Biometric-Based User Authentication Scheme (SAB-UAS) is tested for efficiency and meeting security goals.

      1 (i) Analysis of Packet Delivery Ratio (PDR): With a large number of sensors, efficiency in a PDR of SAB-UAS deteriorates.

      2 (ii) Analysis of End-to-End (ETE) delay: There is a lesser delay compared to other methods. But with the increasing number of communication nodes, the delay in ETE is proportional.

      3 (iii) Analysis of Throughput Transmission Rate (TTE): SABUAS has a better throughput rate compared to other authentication systems, and there are negligible deviations in TTE even when there were increased communication nodes.

      4 (iv) Analysis of Routing Overhead (RTO): SAB-UAS seems to have tactful management of packet routing enhancing network performance and bandwidth usage.