Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Application Layer. Service Management Layer and Business Layer

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

Nowadays, society is rapidly developing, and the quality of human life is

continually improving. Since then, there is the birth and development of


technologies to bring advantages to satisfy human needs and one of them is the
Internet of Things (IoT). It is a platform where regular decives are connected to the
Internet, so they can interact, collaborate and exchange data with each other. The
IoT technology has supported a variety of services and applications. These include
smart city, smart home automation, smart traffic control, smart parking, smart
lighting, smart office, and smart vehicle control. And it especially has a significant
role in improving the efficiency of the healthcare system.
First, let's learn about the structure of a system IoT? According to Islam, S.R.;
Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S [1], the basic architecture is a
model consisting of three layers: Object Layer, Object Abstraction Layer and
Application Layer. However, IoT healthcare system is five layers by adding
Service Management Layer and Business Layer . Object Layer is the first layer and
is used to collect and process information between physical objects such as
sensors, actuators and other devices. The Object Abstraction Layer is responsible
for transferring the generated data between the object layers and the service
management layer through a secure mechanism like wi-fi, 4g, bluetooth, etc..
According to Huiyeh, K.A[2] abstraction layer also implements cloud computing
and data management processes.The Application Layer provides the services
required by the user. For example, a researcher, student or client needs data on air
humidity and air temperature. It is the responsibility of the application layer to
format data and present it in a traditional network. The traditional network is based
on HTTP, but HTTP is not suitable due to its higher overhead in resource
constrained conditions. Therefore, other protocols are used in the IoT environment
such as MQTT (Message Queue Remote Transport) and CoAP (Constrained
Application Protocol). The Management Service Layer processes the data received
from the feature layer and then makes decisions on the process database. Finally,
the process data along with the decision is delivered to the desired services over
network wire protocols. And finally the Business layer, which manages the overall
IoT operations and services in the healthcare system. According to Darshan, K.R.;
Anandakumar, K.R. A[3], these layers are also maintaining user policy and
improving services by comparing the output of each layer with the expected
output.
So, smart technologies used in IoT Healthcare system? According to
Abdullah A. Al-Atawi, Faheem Khan and Cheong Ghil Kim [4], there are 6
technologies used. The first is Mobile Health (mHealth) Distributed Computing.
The concept of grid and distributed computing was introduced because clusters
could not handle enough computing power for a single medical sensor. For
example, in a pandemic like COVID-19 with huge volumes of data, it is very
important to integrate IoT with grid computing and distributed computing. Next is
Cloud Computing, The cloud processes the data received from the grid during
Covid-19 and then executes an operation to facilitate the patient and the healthcare
system. Next is Data Analytics and Khan, F.; Tarimer, I.; Taekeun, W. Factor said
in data analysis, the data is extracted from the cloud through the IoT. In the
COVID-19 situation, all the information is stored in the cloud. Therefore, it will be
advantageous to use data analytics for the patient, doctors, and the healthcare
system. Fog Computing where computing resources lie between the cloud and the
data center. The article “In Recent Trends and Advances in Wireless and IoT-
Enabled Networks”, Fog computing offers high security and low latency as
compared to cloud computing. Not only that according to Khan, F.; Ahmad, S.;
Gürüler, H.; Cetin, G.; Whangbo, T.; Kim, C.G[6], it also supports wireless
communication and wired communication. Therefore, it will work effectively with
patients in remote areas. Next is Cognitive Computing, it is the process through
which computerized models simulated the human assumption/idea in a complex
situation, and the results may be undefined. Finally, Big data. It means data of a
huge size, i.e., an extensive collection of data and increases exponentially with
time.
Besides the benefits, the healthcare system challenges are also significant and
need to be improved. As the application development, it needs the help of doctors,
patients, healthcare professionals to ensure the quality of the application.
Furthermore. it must also be regularly changed and updated in the event of a new
pandemic. Besides, the issue of funding is also a challenge. Scalability is also a
challenge as some post-pandemic operations become complex so scalability is
needed to facilitate user convenience. And perhaps the most important challenge is
privacy and security. The article “A Secure IoT-Based Healthcare System With
Body” outlines the following security requirements. First, “A SESSION KEY IS
REQUIRED FOR SECURE COMMUNICATION”. Since even if it could be claimed that
SSL/TLS or other security techniques could be used to achieve strong security
after authentication, the computational cost involved would render such an
approach not ineffective. Therefore, session key agreement is an essential attribute
for entity authentication and secure communication. Second, “INAPPROPRIATE
USAGE OF THE BITWISE EXCLUSIVE-OR MODULE MUST BE
AVOIDED”. You can simply mean that all publicly transmitted text must be
cryptographically unpredictable and computationally excluded, or cannot be
performed simply and directly on the cipher. It is suggested that all exclusive-
operations must be embedded in the computation of a one-way hash function. For
example, the form ''M key'' may be more vulnerable than the form ''H(M key)'' or
''H(M) key'', where the key is the secret and M is notification. Next, “GPS
INFORMATION IS SUGGESTED TO RESIST AGAINST SPOOFING
ATTACK”. Anonymous authentication techniques with a unique legitimate
identity associated with GPS information will assist in the privacy of individuals
and the accuracy of application activity arising from sensor movement. Next,
“THE NEED FOR RESISTANCE TO MAN-IN-THE-MIDDLE”. Resistance to
man-in-the-middle attacks is one of the most important after-authentication
security. An effective solution against man-in-the-middle attacks is to embed the
identities of all communicating entities in the protocol message for entity
authentication. For example, H(IDi||IDi+1|| . . . ) is a form of protocol message that
can be used to perform entity authentication and simultaneously conquer man-in-
the-middle attacks. Finally, “MULTIPLE SECURITY AND PRIVACY
PROPERTIES MUST BE GUARANTEED AT THE SAME TIME”. To ensure
this, you need to do 3 things. First, mutual authentication between communicating
entities is necessary to protect against malicious data access and entity tampering.
Second, the system must achieve anonymity and non-traceability for biosensors in
IoT-based healthcare systems to protect against disclosure of individual health
status. or personal information of an individual. Third, the ability to resist spoofing
and replay attacks during system operation must be embedded in an IoT-based
healthcare system.
In conclusion, in this essays, we discuss the application of IoT healthcare
system. From conceptual definitions, explain the technologies used, benefits, and
challenges that the healthcare system presents. We hope through the above analysis
it will be helpful for people to learn how to build the system, plan the development
and progress in their system.

REFERENCES:
[1] Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The internet of
things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708.
[2] Huiyeh, K. A secure IoT-based healthcare system with body sensor networks.
IEEE Access 2016, 4, 10288–10299.
[3] Darshan, K.R.; Anandakumar, K.R. A comprehensive review on usage of
Internet of Things (IoT) in healthcare system. In Proceedings of the International
Conference on Emerging Research in Electronics, Computer Science and
Technology (ICERECT), Mandya, India, 17–19 December 2015; pp. 132–136.
[4] Abdullah A. Al-Atawi, Faheem Khan and Cheong Ghil Kim Review
Application and Challenges of IoT Healthcare System in COVID-19 .
[5] Khan, F.; Tarimer, I.; Taekeun, W. Factor Model for Online Education during
the COVID-19 Pandemic Using the IoT. Processes 2022, 10, 1419–1436.
[6] Ahmad, S.; Mehmood, F.; Khan, F.; Whangbo, T.K. Architecting Intelligent
Smart Serious Games for Healthcare Applications: A Technical Perspective.
Sensors 2022, 22, 810.

You might also like