A Comparative Study in The Application of IoT in Health Care Data Security in Telemedicine
A Comparative Study in The Application of IoT in Health Care Data Security in Telemedicine
A Comparative Study in The Application of IoT in Health Care Data Security in Telemedicine
Abstract Internet of Things (IoT) is the backbone of telemedicine and its data
security has become a significant concern that requires further attention. Therefore,
this study was conducted with the aim of analyzing telemedicine systems, focusing
on data security measures. Thirty peer-reviewed research studies published in 2018
were reviewed and compared according to certain parameters, viz., algorithms, IoT
sensors, data encryption ability, communication mechanisms, mobile accessibility,
protocols, software, and platforms. The results illustrate that transmitting sensitive
medical data over the Internet has been identified as a major threat, and solutions such
as ciphertext-policy attribute-based encryption and Secure Better Portable Graphics
(SBPG) architecture have been developed to authenticate and protect data by con-
current encryption and watermarking. Furthermore, the comparison reveals that data
encryption is the most frequently used secure data transmission method and 32% of
the reviewed studies have focused on this. Regarding the most frequently used tech-
nologies, Raspberry Pi3 Edge platform (with the usage percentage of 60), TCP/IP
protocol (with usage of 38%), and ECG and temperature sensors (with usage of 20%)
have been discussed. Additionally, telemedicine has focused on standalone systems,
and, in this context, integrated systems with micro-services are yet to be improved.
Therefore, this study compares and analyzes the significant technical trends, secu-
rity trends, widely used IoT sensors, platforms, and protocols; the aim is to help the
researchers to gain a better insight into telemedicine to improve healthcare services
by maximizing the capabilities of Internet of Things.
9.1 Introduction
IoT cloud-based network for anesthesia online monitoring [7] is another applica-
tion of IoT in telemedicine. Through an Android app, the proposed system lets the
doctors remain connected to the patients all the time, and the medical data of patients
can be shared on the cloud via a web application allowing teleconsulting. Using this
method [8], the doctors can check the data shared from any location at any time. It
provides three drugs monitoring, body temperature, and pH level monitoring.
PillSense [9] is another system designed to monitor patients. It is capable of
reminding patients to take medicines when an unusual health condition is detected,
and the messages are sent via emails or SMS (Short Messaging Service). It can moni-
tor health indicators such as blood pressure, body temperature, heart rate, respiration
rate, and movements of the body. Also, this system has a set of different sensors
and interfaces to detect changes and abnormalities. Finally, the system decreases the
human errors and makes the process of providing medications more efficient and
effective while tracking the health conditions seamlessly.
Researches have also introduced a cloud-based heart rate variability (HRV) remote
monitoring system [10, 11]. It is low cost, easy to apply, and accurate, and ensures the
security of data, while the system is acting as the interface between health care and
the patient. This novel health monitoring system analyzes the HRV by extracting
data from wearable sensors attached to the user. The system has been tested, and
all the tests have shown positive and successful results. Also, the proposed method
enables warning messages to the patients as well as to the doctors.
IoT in telemedicine has also been used in systems that consist of wireless sensor
networks and diaphragmatic electromyogram (EMGdi) [12] for respiratory diseases
by introducing a norm-based method where the network collects physiological data
(EMGdi), performs compression, and sends signals to a smartphone in a low-cost,
reduced-energy consumption way. Also, a novel architecture called BodyEdge [13]
has been designed to boost healthcare applications. This has reduced bandwidth and
low processing time. It has been tested on different hardware platforms. This system
can run on low-cost and data loading, and processing delay can be very low due to
network conditions.
Another application of IoT in telemedicine is an experiment focused on SBPG
architecture using data protection and authentication with concurrent encryption and
watermarking in smart health care [14]. It discusses the requirements of having
an automated analysis of biomedical images, and secure communication using IoT
infrastructure. This research has been conducted to develop the energy-efficient real-
time architecture to validate the security of medical images where the medical data
can be stored securely, and integrity can be verified. Further researches should be
carried out on nonimage biomedical data as future work.
As discussed above, since the security of medical data becomes more challeng-
ing, the researchers have introduced a system which can translate text data into the
form of images. This system [15] has been developed using 2-D discrete wavelet
transform 1-level, and 2-D discrete wavelet transforms 2-level steganography with
hybrid encryption. The proposed system hides the confidential and sensitive medical
data by transmitting them into a cover image. As a result of this technique, even
when the system has been hacked, the data will not be visible to the hackers.
184 G. A. Pramesha Chandrasiri et al.
Fig. 9.1 Analysis of peer-reviewed studies and determination of significant and most frequently
used features of IoT in telemedicine
9 A Comparative Study in the Application of IoT … 185
9.2 Methodology
The present research was conducted using 30 peer-reviewed research studies pub-
lished in 2018 and the required data collected from these articles. During the study,
13 IoT sensor devices, 5 platforms, and 7 types of protocols were recognized for
further analysis. For the extraction of data, the following data inclusion criteria were
used.
Data Inclusion Criteria
A system consists of two major parts: software and hardware. For the software
component of a system, we considered the algorithms, the software, and the platforms
used in the research papers. The aim was to investigate the encryption mechanisms
for security. To study the hardware side of the systems, we considered the IoT devices,
mentioned in these studies, as the core components. As IoT requires a communication
element to connect with other devices, communication mechanism, protocol, and
mobile accessibility were considered for discussion. Therefore, altogether, collected
data from the articles were further analyzed according to eight identified criteria in
telemedicine and security measures as follows:
• Algorithms,
• IoT devices,
• encryption mechanisms,
• communication mechanisms,
• mobile accessibility,
• protocols,
• software, and
• platforms.
Table 9.1 presents the extracted data according to the criteria as defined above.
The results were generated after conducting a further analysis of data gathered under
each criterion (as mentioned above) from the tabled information (as presented in
Table 9.1). The results were in terms of the same eight criteria as were used for the
extraction of relevant data (as presented in Table 9.1). Results are presented in the
following subsections.
Table 9.1 Comparison of features available in IoT devices in telemedicine
186
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Albalawi Secure Com- IOT sensor Yes. Radio Yes TCP/IP IOT hub Big data
and Joshi [1] munication IOT adapter Ciphertext- frequency/bi platform
Algorithm contextual sensor policy communications
CP-ABE and attribute-
AES based
algorithm encryption
(CP-ABE)
Alelyani and Machine IOT sensors, HIS, No – Yes – – –
Ibrahim [2] learning self-quantification
deep
learning
algorithms
Bharath and Diagnostically – No WebRTC Yes Session initiation – –
Rajalakshmi driven peer-to-peer protocol/jingle
[3] compression communication
algorithm
ultrasound
video
validation
algorithm
Foo et al. [4] Simple IOT sensor No – Yes Internet protocol Service Tomcat
algorithm FBG-based optical application- platform
using fiber sensors programming
variance polysomnography interfaces
devices, IoT
thermometer
BCG sensor mat
G. A. Pramesha Chandrasiri et al.
(continued)
Table 9.1 (continued)
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Kuusik et al. Data Motion sensor No – Yes Internet protocol PIP platform
[5] visualization units (IMUs) (IP)
algorithm IoT sensor
Wireless sensors
Aldeer et al. PillSense Motion sensors No – Yes – – –
[6] operation Weight sensors
algorithm Magnetic switch
sensor
Accelerometer
Hussein Pan- IOT sensor Yes Two-way Yes – – Cloud
et al. [7] Tompkins Homomorphic wireless computing
QRS encryption communication along with
9 A Comparative Study in the Application of IoT …
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Zagan et al. – Temperature No Modbus Poll Yes GSM/GPRS/3G/TCP- Microcontroller MCBSTM32
[11] sensor IP software kit and Keil
development
platform
hSensor
platform
Aloi et al. Stress Body sensors No Multi-radio and Yes IoT device – Azure cloud
[12] detection Communication multi- management platform
algorithm engine technology protocol Raspberry
Client–server Application protocol Pi3 edge
communication CoAP, MQTT, platform
BE-GTW LwM2M
interface
management
Saha et al. – Heartbeat sensor No – Yes – Putty Raspberry Pi
[13] Blood pressure software
sensor
Respiration sensor
Temperature
sensor
Accelerometer
sensor
(continued)
G. A. Pramesha Chandrasiri et al.
Table 9.1 (continued)
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Mohanty BPG CMOS sensors, Yes, two – Yes – – –
et al. [14] compression digital signal layer
algorithm., routing and a encryption
novel complex system seamless
algorithm CPU, SDC (Secure integration
called the digital camera) of water-
scale BPG encoder, marking,
adaptive BPG decoder, encryption
object Javascript decoder, facility is
tracking and BPG viewer secure better
(SAOT) portable
graphics
(SBPG)
9 A Comparative Study in the Application of IoT …
LTE/5G
(continued)
Table 9.1 (continued)
190
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Wu et al. Compressed WBAN sensors No Wireless body Yes – – –
[17] sensing area network
algorithm (WBANs)
Diaphragmatic
electromyogram
(EMGdi),
Hussein Pan- WBAN sensors Yes. Using ZigBee wireless Yes – – Cloud
et al. [7] Tompkins advanced communication computing
QRS encryption system platform
detection standard along with
algorithm (AES) the BSN
Data stream
middleware
Guo et al. – WBAN sensors No On-the-go Yes – – The medical
[19] (OTG) wire to network
keep platform
communication
Stradolini – WBAN sensors No. But uses Bidirectional Yes TCP/IP Qt Creator Therapeutic
et al. [10] pre-shared communication 3.2 software drug
access with Qt 5.3 monitoring
feature, to libraries. (TDM)
secure platforms
transfer data
(continued)
G. A. Pramesha Chandrasiri et al.
Table 9.1 (continued)
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Islam et al. – WBAN sensors No Short-range Yes Standard protocol – –
[20] communications
technology
Saha et al. – WBAN sensors No. But uses – Yes – Raspbian Raspberry Pi
[13] a role-based
user authen-
tication
Santos et al. Sliding WBAN sensors No Physiologically- Yes Communication – –
[21] window aware protocol
algorithm communication
architecture
Hamici et al. Novel WBAN sensors No – Yes TCP/IP – –
9 A Comparative Study in the Application of IoT …
[22] genetic
algorithm
Genetic
cryptography
algorithm
(continued)
191
Table 9.1 (continued)
192
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Nadrag et al. Pulse WBAN sensors No – Yes – – Android and
[23] detection Raspberry Pi
algorithm
Video-based
heart rate
Detection
algorithm
AdaBoost
learning
algorithm
Hamici et al. Novel WBAN sensors Yes – – TCP/IP protocol – –
[22] genetic
algorithm
End-to-end
node-server
security
algorithms
Cryptographic
algorithms
Rajagopalan AES and WBAN sensors Yes Image Yes – – –
et al. [24] gold code symmetric communication
algorithm block cipher mechanism
AES
algorithm
(continued)
G. A. Pramesha Chandrasiri et al.
Table 9.1 (continued)
Articles Algorithms IOT devices Encryption Communication Mobile Protocols Software Platforms
enabled? mechanism access
allowed?
Galletta Nonlinear WBAN sensors No Video Yes – – MyGene
et al. [25] regression communication Friends Web
algorithm platform
Satyanarayana A K-NN WBAN sensors No Cellular IoT Yes – – Raspberry Pi
et al. [26] (K-Nearest communication
Neighbor)
based
algorithm
Chakravorty – WBAN sensors No – Yes – – Raspberry Pi
et al. [18]
Lavanya Signature WBAN sensors Yes – Yes – – PREDIX
et al. [27] verifying iFOGSIM
9 A Comparative Study in the Application of IoT …
algorithm
Enciso- – WBAN sensors No – Yes – – DHIS2
Quispe et al.
[8]
193
194 G. A. Pramesha Chandrasiri et al.
According to the analysis on algorithm, only 66.67% of the reported studies have
discussed these and 50% of them have used data analysis algorithms once the data
were collected from sensors. The rest have only displayed detected data without
analyzing. Moreover, the algorithms are specific to the purpose and the output of
the system and therefore, we were unable to compare algorithms to find the most
suitable algorithms for the development of integrated systems.
As for the communication mechanisms, it is noted that a variety of 16 different
mechanisms have been considered. However, the most common mechanisms have
been: Radio frequency, two-way wireless communication, ZigBee wireless com-
munication system, and image communication mechanism for the enablement of
encryption. Considering the mobile accessibility of the system, it is noted that all the
systems allowed mobile accessibility. Moreover, only 23% of the reviewed studies
have discussed the used software; and these were of seven different varieties. Out of
these, only IoT hub and MATLAB R2015a were the software systems that enabled
encryption.
As for the analysis of the remaining four criteria (usage of IoT sensors, encryption
ability, used platforms, and used protocols), and for the possibility of their application
to a generic integrated system, results are presented in the following four subsections.
Figure 9.2 shows that the frequently used sensor types in 2018 have been ECG
sensors and the temperature sensors: their usages being 20% each. Blood pressure
sensors and motion sensors were used moderately, and the sensing devices such as
fiber sensors, motion sensors, and contextual sensors were used less frequently.
Figure 9.3 shows the Encryption Usage of Data Transmission in the IoT in
telemedicine. 32% of the conducted research has enabled encryption as an extra
feature in the application of IoT in telemedicine, while the majority of remaining
68% have enabled encryption in earnest.
9 A Comparative Study in the Application of IoT … 195
Considering the platform usage of IoT in telemedicine, Fig. 9.4 shows that the major-
ity of 60% of the research used Raspberry Pi and the platforms such as PIP, hSensor,
Tomcat, and big data are equally and moderately common in the telemedicine field
showing approximately 10% of the usage in each case.
196 G. A. Pramesha Chandrasiri et al.
Figure 9.5 presents the usage of IoT protocols in telemedicine. It is found that most
used protocol is TCP/IP where the contribution is 38% of the total usage. The sec-
ond most used protocols have been Internet protocol and communication protocol
where its contribution is around 15%. Moreover, protocols such as session initiation,
standard, IPSec, and Application contributed only 8% each, of the total.
9 A Comparative Study in the Application of IoT … 197
9.4 Discussion
The current study focuses on comparing and analyzing the IoT-based applications in
the telemedicine sector as reported in the literature published during the year 2018.
Telemedicine and IoT technologies are typically dealing with an extensive number of
connected devices and health data stores and exchange data between those devices.
Thus, the security and privacy are the utmost important factors in such telemedicine
application and related applications. Also, the platforms must be able to fulfill the data
security requirements in every aspect. During the study, we have explored various
IoT-based sensors used in telemedicine. Further, we have examined 30 peer-reviewed
articles and analyzed the proportion of the use of encryption features for data trans-
mission in different telemedicine applications. Moreover, we have also investigated
related platforms and protocols used in telemedicine in the 2018 publication year.
Many research articles related to IoT in telemedicine published in the year 2018
[1, 14] have focused on general security issues [1] and have proposed algorithms to
overcome the problems. There is no detailed discussion on specific telemedicine ser-
vices related issues, which can be generally applied as “Security data transmission”
[13]. Most of the proposed systems [9] have not been tested in the real environment,
and further experiments and observations should be carried out to test and prove their
accuracy and reliability.
Another drawback in the research is that most of the proposed architectures [2] can
detect only one disease, although these could have been applied to detect multiple
diseases simultaneously as well as increasing the accuracy of determination. For
instance, the studies conducted to validate videos in the telemedicine sector [3] have
only 96.5% accuracy in identifying a representative frame in the ultrasound video.
There is a risk of 3.5% where it is not able to locate representative frames. Since
there still is a risk of not recognizing a disease accurately, further researches should
be conducted to increase the probability closer to 100%. Moreover, the systems are
generally based on the data that are collected by sensors only [4]. If there are faulty
sensors that can harm the patient, there is no method to identify them in advance.
Although there are machine learning algorithms [5] that can be helpful to analyze
data, still, there is a possible risk of converting collected data into a visual form.
However, systems should be further developed to be more intelligent with fault
detection in advance and alert the necessary authorities.
Developing “Integrated” systems is another area that should be addressed in IoT-
based telemedicine. For instance, Pill sensing system [6] which can only be used in
pill-based medication systems can be improved for non-pill used monitoring systems
as a part of IoT-based patient monitoring systems. A lot of other sensors could
be connected to monitor various body conditions enabling the “Integrated” system
features. A system designed for IoT for telemedicine practices enabled by AndroidTM
Application with Cloud System Integration [7] has been proposed as an application
to alert about critical patients one at a time. This can be further developed to alert
about multiple critical patients simultaneously.
198 G. A. Pramesha Chandrasiri et al.
Another research reported in [9] has proposed a system to change the room envi-
ronment depending on the data collected by the sensors. There is still a risk to rely
on a few sensors as the measurements can be limited and a patient can have more
complex and complicated health situations which cannot be detected by the available
sensors. Furthermore, the research article [12] targeting low-cost and energy-saving
communication capacity has not focused on the quality of the signals. This is a very
important area which required attention, as the data transmitting plays a significant
role in IoT in telemedicine.
Considering the quality of experiments, there is a study [13] conducted using
100 participants. This sample size is too small—if there was possibility of using
data from a large number of participants, the quality of the research would have
been increased. Also, efficiency is another area that should be discussed although
there are systems that give less attention to that [14]. A proposed “Model-based
Approach” as reported in [15] translates text data into the form of images. It is a
unique way of transmitting medical data over the Internet. In the system, encryption
mechanisms and other security mechanisms have been used. However, it requires to
focus on high capacity, unpredictable, high deterioration steganography techniques
where even though the system is been hacked, the data will not be visible to hackers.
The most effective method to anchor Electronic Medical Records (EMR), Elec-
tronic Health Records (HER), and Personal Health Records (PHR) is for the bio-
logical community to guarantee the privacy and integrity of the information. This is
a functioning examination region where methodologies incorporate utilizing cryp-
tographic natives, for example, those dependent upon basic public foundation and
public clouds to guarantee information confidentiality and privacy [28]. In this sce-
nario, data are encrypted before redistributing to the cloud. Nonetheless, this restrains
the accessibility of the data, as for healthcare suppliers, we need to unscramble the
(conceivably noteworthy) data [29]. Moreover, exploring diverse techniques for big
data databases [30, 31] and accurate estimation of sensor power consumption would
be another critical aspect of the IoT platform [32, 33].
Another exciting method as discussed in [34] provides multilevel security mecha-
nism by exploiting the watermarking and chaotic encryption technique for telehealth
applications. A delicate watermarking strategy which depends on singular value
decomposition (SVD) and Arnold change for giving secure medical image trans-
mission is presented in a study in [35]. Examining the proposed approach against
different attacks demonstrated its enhanced execution. It concerns the peak-signal-
to-noise ratio (PSNR) and accuracy of altering recognition in contrast with a portion
of the ongoing methods [36–39]. The other comparable medical image watermarking
procedures are introduced in many more studies as well [40–45].
In this research, we have investigated the IoT sensor usage in IoT-based
telemedicine context as addressed in recent studies. We have explored different types
of sensors and found that the ECG and temperature sensors are the most commonly
used sensors. Besides, we have studied and analyzed the encryption facility usage
in IoT telemedicine applications and found that most studies were not able to fulfill
the encryption facility in data transmission. Consequently, we have seen that big
data platforms, tomcat platforms, pip, hSensor platforms, and Raspberry Pi3 edge
9 A Comparative Study in the Application of IoT … 199
platform are the most common types of platforms that allow the data encryption
feature.
Our research demonstrates that the significant research areas including IoT sensor
usage, platforms, and protocols used in IoT telemedicine segment have also been used
by previous similar research studies. During the survey, we found that investigations
have only focused on one disease or two at a time. Thus, we can see that the future
researches should be focusing on inventing a system that detects several disorders
together as an integrated system. Moreover, future research in telemedicine context
could consider implementing an integrated system that can remotely monitor patients.
9.5 Conclusion
This study compares and analyzes the applications of IoT in telemedicine sector in
the research publication year 2018 showing that the data security in telemedicine is
a significant concern. Having the ability to collect data, analyze, and distribute it fast
has become the main reason for this concern although it facilitates the medical field
to work more efficiently. However, according to our study, the available algorithms
can be used to minimize the risk of security and privacy of data. Moreover, big
data platforms, Tomcat platforms, pip, hSensor platforms, Raspberry Pi3, and Edge
platform are the most common types of platforms that allow data encryption. The
research also shows that the communication mechanisms such as two-way wireless
communication and ZigBee wireless communication system enable the data security.
Therefore, we can conclude that a combination of an underlying software that enables
encryption along with a communication mechanism that ensures the privacy of data
over transmission can provide a more secure system for IoT systems in telemedicine.
Furthermore, we also conclude that the researchers have been focused on a single
disease or health condition or a few at a time in the recent past. Hence, the future
researchers should ideally focus on inventing systems that detect several illnesses
together as an integrated system to make the maximum use of IoT technology to help
the medical field. Considering the vast number of available sensors to detect different
symptoms, robust algorithms to analyze, and finally transmit to different channels,
it opens the possibilities for integrated systems. Furthermore, future research in
telemedicine could consider an integrated system that can remotely monitor patients
without direct human interactions. This automation process can be helpful to increase
accuracy and also to alert the doctors and care workers whenever the sensors detect an
anomality in a patient’s body. With the end goal of accomplishing a unified structure,
our current study hopefully provides critical technical and security trends with the
most frequently utilized IoT sensors, platforms, software, and protocols in 2018.
In conclusion, it will hopefully also guide the researchers and related authorities to
improve telemedicine sector by expanding the capabilities of the Internet of Things
in this field.
200 G. A. Pramesha Chandrasiri et al.
References
1. Albalawi U, Joshi S (2018) Secure and trusted telemedicine in internet of things IoT. In: IEEE
4th world forum on internet of things (WF-IoT)
2. Alelyani S, Ibrahim A (2018) Internet-of-things in telemedicine for diabetes management. In:
2018 15th learning and technology conference (L&T)
3. Bharath R, Rajalakshmi P (2018) WebRTC based invariant scattering convolution network for
automated validation of ultrasonic videos for IoT enabled tele-sonography. In: 2018 IEEE 4th
world forum on internet of things (WF-IoT)
4. Fook V, Jayachandran M, Jiliang E, Yongwei Z, Jianzhong E (2018) Fiber Bragg grating-based
monitoring and alert system for care of residents in nursing homes. In: 2018 IEEE 4th world
forum on internet of things (WF-IoT)
5. Kuusik A, Alam M, Kask T, Gross-Paju K (2018) Wearable m-assessment system for neuro-
logical disease patients. In: 2018 IEEE 4th world forum on internet of things (WF-IoT)
6. Aldeer M, Martin R, Howard R (2018) PillSense: designing a medication adherence monitoring
system using pill bottle-mounted wireless sensors. In: 2018 IEEE international conference on
communications workshops (ICC work-shops)
7. Hussein A, Kumar M, Burbano-Fernandez G, Ramirez-Gonzalez E, Abdulhay E, De Albu-
querque V (2018) An automated remote cloud-based heart rate variability monitoring system.
IEEE Access
8. Enciso-Quispe L, Sarmiento S, Zelaya-Policarpo E (2018) Personalized medical alert system
based on internet of things with DHIS2. In: 2018 13th Iberian conference on information
systems and technologies (CISTI)
9. Elhoseny M, Ramirez-Gonzalez G, Abu-Elnasr O, Shawkat S, Farouk A (2018) Secure medical
data transmission model for IoT-based healthcare systems. IEEE Access
10. Stradolini F, Tamburrano N, Modoux T, Tuoheti A, Demarchi D, Carrara S (2018) IoT for
telemedicine practices enabled by an Android™ application with cloud system integration. In:
2018 IEEE international symposium on circuits and systems (ISCAS)
11. Zagan I, Gaitan V, Iuga N, Brezulianu A (2018) m-Green CARDIO embedded system designed
for out-of-hospital cardiac patients. In: 2018 international conference on development and
application systems (DAS)
12. Aloi G, Fortino G, Gravina R, Pace P, Caliciuri G (2018) Edge computing-enabled body area
networks. In: 2018 32nd international conference on advanced information networking and
applications workshops (WAINA)
13. Saha J, Saha A, Chatterjee A, Agrawal S, Saha A, Kar A, Saha H (2018) Advanced IOT based
combined remote health monitoring, home automation and alarm system. In: 2018 IEEE 8th
annual computing and communication workshop and conference (CCWC)
14. Mohanty S, Kougianos E, Guturu P (2018) SBPG: secure better portable graphics for trust-
worthy media communications in the IoT. IEEE Access
15. Kotronis C, Nikolaidou M, Dimitrakopoulos G, Anagnostopoulos D, Amira A, Bensaali F
(2018) A model-based approach for managing criticality requirements in e-Health IoT systems.
In: 2018 13th annual conference on system of systems engineering (SoSE)
16. Perez Z, Memeti S, Pllana S (2018) A simulation study of a smart living IoT solution for
remote elderly care. In: 2018 third international conference on fog and mobile edge computing
(FMEC)
17. Wu F, Yang K, Yang Z (2018) Compressed acquisition and denoising recovery of EMGdi signal
in WSNs and IoT. IEEE Trans Ind Inform 14:2210–2219
18. Chakravorty D, Islam S, Rana T (2018) IoT based patient guidance system using Raspberrypi.
In: 2018 2nd international conference on electronics, materials engineering & nano-technology
(IEMENTech)
19. Guo J (2018) Smartphone-powered electrochemical biosensing dongle for emerging medical
IoT applications. IEEE Trans Ind Inform 14:2592–2597
9 A Comparative Study in the Application of IoT … 201
20. Islam S, Hossain M, Hasan R, Duong T (2018) A conceptual framework for an IoT-based health
assistant and its authorization model. In: 2018 IEEE 8th annual computing and communication
workshop and conference (CCWC)
21. Santos J, Peng D, Hempel M, Sharif H (2018) Towards a physiologically-aware architecture
for transmission of biomedical signals in BASNs/IoT. In: 2018 IEEE international conference
on communications (ICC)
22. Hamici Z (2018) Towards data-centric genetic cryptography for telemonitoring and ambient
assisted living systems. In: 2018 13th annual conference on system of systems engineering
(SoSE)
23. Nadrag V, Poenaru, Suciu G (2018) Heart rate measurement using face detection in
video—IEEE conference publication. In: 2018 international conference on communications
(COMM)
24. Rajagopalan S, Janakiraman S, Rengarajan A, Rethinam S, Arumugham S, Saravanan G (2018)
IoT framework for secure medical image transmission. In: 2018 international conference on
computer communication and informatics (ICCCI)
25. Galletta A, Carnevale L, Bramanti A, Fazio M (2018) An innovative methodology for big data
visualization for telemedicine. IEEE Trans Ind Inform 15:490–497
26. Satyanarayana P, Sujitha K, Kiron V, Reddy P, Ganesh M (2018) Assistance vision for blind
people using k-NN algorithm and Raspberry Pi. In: Proceedings of 2nd international conference
on micro-electronics, electromagnetics and telecommunications
27. Lavanya R, Nivetha M, Revasree K, Sandhiya K (2018) Smart chair-a telemedicine based health
monitoring system. In: 2018 second international conference on electronics, communication
and aerospace technology (ICECA)
28. Hammami S, Moungla H, Afifi H (2018) Proactive anomaly detection model for eHealth-
enabled data in next generation cellular networks. In: 2018 IEEE international conference on
communications (ICC)
29. Nepal S, Ranjan R, Choo K (2015) Trustworthy processing of healthcare big data in hybrid
clouds. IEEE Cloud Comput 2:78–84. https://doi.org/10.1109/mcc.2015.36. Poh G, Chin J,
Yau W, Choo K, Mohamad M (2017) Searchable symmetric encryption. ACM Comput Surv
50:1–37. https://doi.org/10.1145/3064005
30. Halgamuge M, Guru S, Jennings A (2018) Centralised strategies for cluster formation in sen-
sor networks. In: Classification and clustering for knowledge discovery. Springer, Berlin, pp
315–331
31. Halgamuge M, Kotagiri R, Zukerman M (2006) High powered cluster heads for extending sen-
sor network lifetime. In: Proceedings of 6th IEEE international symposium on signal processing
and information technology (ISSPIT’06)
32. Parra V, Syed A, Mohammad A, Halgamuge M (2016) Pentaho and Jaspersoft: a comparative
study of business intelligence open source tools processing big data to evaluate performances.
Int J Adv Comput Sci Appl. https://doi.org/10.14569/ijacsa.2016.071003
33. Kalid S, Syed A, Mohammad A, Halgamuge M (2017) Big-data NoSQL databases: compari-
son and analysis of “Big-Table”, “DynamoDB”, and “Cassandra”. In: IEEE 2nd international
conference on big data analysis (ICBDA’17), pp 89–93
34. Thakur S, Singh A, Ghrera S, Elhoseny M (2018) Multi-layer security of medical data through
watermarking and chaotic encryption for tele-health applications. In: Multimedia tools and
applications. Springer, Berlin, pp 1–14
35. Shehab A, Elhoseny M, Muhammad K, Sangaiah A, Yang P, Huang H, Hou G (2018) Secure
and robust fragile watermarking scheme for medical images. IEEE Access
36. Dhole V, Patil N (2015) Self embedding fragile watermarking for image tampering detection
and image recovery using self-recovery blocks. In: Proceedings of international conference on
computing communication control and automation (ICCUBEA), pp 752–757
37. El’arbi M, Ben Amar C (2014) Image authentication algorithm with recovery capabilities based
on neural networks in the DCT domain. IET Image Proc 8:619–626. https://doi.org/10.1049/
iet-ipr.2013.0646
202 G. A. Pramesha Chandrasiri et al.
38. Patra B, Patra J (2012) CRT-based fragile self-recovery watermarking scheme for image authen-
tication and recovery. In: 2012 international symposium on intelligent signal processing and
communications systems
39. Preda R (2014) Self-recovery of unauthentic images using a new digital watermarking approach
in the wavelet domain. In: 2014 10th international conference on communications (COMM)
40. Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper
localization. J Digit Imaging 27:737–750. https://doi.org/10.1007/s10278-014-9709-9
41. Al-Haj A, Mohammad A, Amer A (2016) Crypto-watermarking of transmitted medical images.
J Digit Imaging 30:26–38. https://doi.org/10.1007/s10278-016-9901-1
42. Kannammal A, Subha Rani S (2014) Two level security for medical images using watermark-
ing/encryption algorithms. Int J Imaging Syst Technol 24:111–120. https://doi.org/10.1002/
ima.22086
43. Parah S, Ahad F, Sheikh J, Bhat G (2017) Hiding clinical information in medical images: a
new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230. https://
doi.org/10.1016/j.jbi.2017.01.006
44. Singh A, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image
watermarking in DWT–DCT–SVD domain. Natl Acad Sci Lett 37(4):351–358
45. Singh A, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking
for telemedicine applications. Wirel Pers Commun 80(4):1415–1433
Additional References
46. Marjani M, Nasaruddin F, Gani A, Karim A, Hashem IAT, Siddiqa A, Yaqoob I (2017) Big
IoT data analytics: architecture, opportunities, and open research challenges. IEEE Access
5:5247–5261
47. Hashem IAT, Chang V, Anuar NB, Adewole K, Yaqoob I, Gani A, Ahmed E, Chiroma H (2016)
The role of big data in smart city. Int J Inf Manage 36(5):748–758
48. Elhoseny M, Abdelaziz A, Salama AS, Riad AM, Muhammad K, Sangaiah AK (2018) A
hybrid model of internet of things and cloud computing to manage big data in health services
applications. Futur Gener Comput Syst 86:1383–1394
49. Gardašević G, Veletić M, Maletić N, Vasiljević D, Radusinović I, Tomović S, Radonjić M
(2017) The IoT architectural framework, design issues and application domains. Wireless Pers
Commun 92(1):127–148
50. Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principles,
architectures, and applications. In: Internet of things, pp 61–75