Internet of Things Smart Healthcare:Technologies, Challenges and Opportunities
Internet of Things Smart Healthcare:Technologies, Challenges and Opportunities
Internet of Things Smart Healthcare:Technologies, Challenges and Opportunities
HEALTHCARE:TECHNOLOGIES,CHALLENGES
AND OPPORTUNITIES
SEMINAR REPORT
Submitted by
ABHINSYAM M K
2018-2019
Semiar Report
CERTIFICATE
2
Semiar Report
DECLARATION
I undersigned hereby declare that the seminar report Internet of Things Smart
Healthcare:Technologies,Challenges and Opportunities , submitted for partial
fulfillment of the requirements for the award of degree of Bachelor of
Technology of the APJ Abdul Kalam Technological University, Kerala is a
bonafide work done by me . This submission represents my ideas in my own
words and where ideas or words of others have been included, I have
adequately and accurately cited and referenced the original sources. I also
declare that I have adhered to ethics of academic honesty and integrity and
have not misrepresented or fabricated any data or idea or fact or source in my
submission. I understand that any violation of the above will be a cause for
disciplinary action by the institute and/or the University and can also evoke
penal action from the sources which have thus not been properly cited or from
whom proper permission has not been obtained. This report has not been
previously formed the basis for the award of any degree, diploma or similar
title of any other University
ii
3
Semiar Report
ABSTRACT
iii
4
Semiar Report
ACKNOWLEDGEMENT
Abhinsyam M K
iv
5
Semiar Report
CONTENTS
Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .i
Declaration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Acknowledgement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iv
1.Introduction 7
4.Communication Standards 14
4.2.1 Sigfox…………………………………………………………………………… 18
4.2.2 LoRa & LoRaWAN ……………………………………………………….. 19
4.2.3 NB-IoT ………………………………………………………………………… 20
6
Semiar Report
6.Conclusion 26
7.References 27
7
Semiar Report
1.Introduction
8
Semiar Report
SECTION II
ill patients to live in the comfort of their own homes, while their health continues
to be monitored. This allows for intervention by caretakers and doctors if any
issues arise.
10
Semiar Report
11
Semiar Report
SECTION III
FitBit PurePulse
12
Semiar Report
HRM-Tri by Garmin
Changes in the amount of light can be recorded and a pulse rate can thus be
determined.
13
Semiar Report
SECTION IV
14
Semiar Report
4.Communications Standards
BLE was developed by the Bluetooth Special Interest Group (SIG) to provide an
energy-efficient standard that could be used by coin-cell battery operated
devices, including wearables. It also aimed to enable IoT, connecting small
peripheral devices to processing devices such as smartphones.
15
Semiar Report
BLE is used in a star topology, which is suitable for healthcare applications. The
central node would act as the center of the star topology, with sensors linked
to it. The sensors will have no need to communicate with each other directly,
The range for BLE is 150m in an open field. The range is clearly sufficient for
use in a healthcare WBAN where nodes are physically proximal, and the
extremely low latency is ideal for applications such as emergency health.
Power consumption in BLE is extremely low. In [77], it is shown that a 180 mAH
coin cell battery could run a BLE chip for 18 continuous hours, making 21.6
million transactions. However, if the chip was powered off when not needed,
battery would last much longer. If a health sensor transmitted its data every 30
seconds (or 2,880 times per day), then the battery could theoretically run the
BLE chip for around 20.5 years if not for the fact that it would die from self-
depletion well before then. With careful hardware design and low-energy
programming, BLE would clearly be suitable for healthcare applications
4.1.2) ZigBee
The ZigBee standard was designed by the ZigBee Alliance, specifically for
providing low-cost, low-power networks for M2M communications. It builds on
the IEEE 802.15.4 physical standard.
It is commonly known as the standard for mesh networks, but it can also be
used in the star topology required of a WBAN with one central node and many
sensing nodes.
Different ZigBee modules provide different characteristics in terms of
range, data rate, and power consumption. The simplest XBee has a range of up
to 30m in an urban environment, and outputs only 1mW of power for
transmission,
ZigBee can operate at a range of frequencies, including 868MHz, 900MHz, and
2.4GHz bands, depending on the module chosen. Each of these bands faces
interference. The 2.4GHz band is shared by Bluetooth and WiFi, while many
long-range communications systems utilize the unlicensed 868MHz and
900MHz bands in Europe and America respectively. ZigBee uses CSMA-CA to
reduce collisions, and implements re-transmission if messages sent are not
acknowledged.
Several security features are provided by ZigBee, though most are
optional and must be enabled by the network developer. ZigBee’s security
model is largely based on 128-AES encryption, and offers types of security keys
- a link key, a network key, and a master key. The network key is mandatory. It
is shared by all devices on the network, and is a network-layer security
mechanism that cyphers all transmissions within the network. The link key is
optional, and is used to secure communications at the application layer.
Master keys are also optional, and are used to secure the creation and sharing
of link keys.
16
Semiar Report
The most prominent standards for LPWANs are Sigfox and LoRaWAN. While
these standards are well-established, they face competition from emerging
standards including NB-IoT.
17
Semiar Report
4.2.1) Sigfox
Sigfox uses a star topology, and nodes are designed to be uplink only to
improve battery efficiency. It is possible for a node to receive downlink, but it
must explicitly request it. As acknowledgement of receipt is important for
health data, downlink would have to be requested. Unfortunately, a limitation
of Sigfox is that downlink can only be requested 4 times per day.
In rural areas, Sigfox can reach a range of up to 50km . The high latency of
Sigfox is a drawback for its use in healthcare applications, as it is important for
messages to be delivered quickly in this critical context.
Sigfox operates in the unlicensed bands of 868MHz in Europe and 915MHz in
the US. As with other LPWAN technologies operating in the sub-GHz spectrum,
no globally available band exists for Sigfox’s use. Operating in an unlicensed
band allows Sigfox to occupy a wider bandwidth, but comes with the
disadvantage of increased interference, which may be an issue in healthcare.
To increase resistance to interference, Sigfox sends payloads in three
consecutive frames, each in different pseudo-random sub-carriers and over
different propagation paths. This improves the likelihood that the message will
be received intact, and thus reduces the disadvantages of increased
interference in the unlicensed bands.
Sigfox has a high network capacity and can support approximately 50,000
nodes with a single gateway.
Security is implemented in Sigfox by signing each message with the
device’s private key . This reduces the risk of spoofing attacks or interception,
but does not eliminate it. A sophisticated attack targeting the node hardware
18
Semiar Report
or service provider could still reveal the unique keys, compromising a patient’s
healthcare system.
However, in healthcare, successfully transmitting messages with relative speed
is essential. Any compromise of security could be detrimental for an
individual’s health, or could affect the integrity of medical databases. For this
reason, we recommend that Sigfox not be used for critical healthcare
applications. It is therefore strongly recommended that system designers
instead consider alternative LPWANs for critical healthcare applications.
LoRa is a physical layer protocol that utilizes chirp spread spectrum techniques
over a wide bandwidth of at least 125kHz. This provides low-power, long-range
communications with high resilience to intentional or environmental
interference.
LoRaWAN is built on top of the LoRa standard, in the network layer. It utilizes a
star topology, and nodes are asynchronous; they only communicate when they
need to, such as after an event or scheduled measurement. Scheduled
messages from nodes would suit long-term monitoring applications, while
event-driven messages from nodes would suit emergency monitoring.
LoRaWAN also has a high network capacity, ensuring many messages can be
passed over the network at the same time. Each gateway can support
approximately 40,000 nodes .
Unfortunately, a node’s unique key could become a single point of failure for
the whole system should the key be discovered through sophisticated
hardware hacking of the node, or through an attack on the network server. If a
key was illicitly obtained, then the attacker could use it to decipher all future
messages from the node, or could send false messages to the base station
whilst pretending to be the node.
4.2.3) NB-IoT
Standardized in the recent 3GPP Release 13, NB-IoT operates in the licensed
bands of GSM or LTE and provides long-range, low-power communications. As
NB-IoT has been developed based on LTE, much of the existing LTE hardware
can be used to deploy it rapidly and effectively NB-IoT utilizes the bandwidth of
an existing LTE carrier’s guard-band. Finally, in stand-alone mode, GSM carriers
can be re-farmed and used for NB-IoT, or NB-IoT can exist in entirely new
bandwidth.
Operating within licensed bands has the significant advantage of reduced risk
of interference. One potential disadvantage is that there will likely be a higher
cost to use NB-IoT than there is for unlicensed standards. Just as mobile phone
users pay a fee to be able to use LTE, NB-IoT device users will likely have to pay
a connection fee for the use of NB-IoT. The exact magnitude of these costs is
not yet known as NB-IoT is yet to be widely deployed. Nonetheless, a decrease
in interference is likely to be worth the additional cost when considering
healthcare systems, as QoS in these applications is critical.
NB-IoT can also support a minimum of 52,547 nodes per base station. Overall,
NB-IoT is suitable for healthcare applications. It is secure, supports
20
Semiar Report
communications over a long range, has high energy efficiency, and can support
many devices. The most significant drawback is the current lack of deployment,
though this is expected to occur rapidly due to the reusability of existing LTE
infrastructure. This lack of deployment limits the immediate usefulness of NB-
IoT, but the standard will likely be deployed rapidly on a large scale due to the
ability to reuse existing 3G hardware. When this happens, NB-IoT is highly
recommended for use, as it offers many favourable characteristics that make it
the most suitable standard for use in healthcare systems.
SECTION V
Cloud technologies have been widely researched due to their usefulness in big
data management, processing and analytics. Several related works have
surveyed the literature on using cloud technologies for IoT purposes such as
smart grid and mobile cloud computing for smartphones , where complex
computations are offloaded from low-resource mobile devices to the high-
power environment of the cloud, before the result is returned to the mobile
device. These works consider data storage and data processing as key
advantages of cloud technologies.
Much research has been conducted in recent years regarding the benefits of
cloud for healthcare applications. These benefits stem from the three primary
services that can be provided by cloud technologies in healthcare
environments:
21
Semiar Report
The challenge in big data management lies in designing a system that can
handle the characteristics of a specific big data set. In healthcare, each of the
characteristic 5 V’s are important to consider, as a wide variety of data from
patient name, age and gender to vital sign values as taken at regular intervals
would need to be stored for many systems.
Regularly measured data would create significant velocity, and lead to an
increased volume of total data rapidly. Additionally, new kinds of data may be
added regularly as new sensors are developed to measure previously
unmonitored health signs. Finally, machine learning to perform diagnostics or
provide treatment plans would be extremely valuable in a healthcare context,
so a cloud storage framework for healthcare would need to enable value.
Big data management is crucial in this system, as they aim to draw links
between emotional responses and physiological changes. Large amounts of
physiological data are stored in the cloud module, organized sufficiently to
enable data mining techniques for the extraction of important information. To
maximize storage space, algorithms have been applied to remove redundant or
non-useful data from the database.
The primary focus of cloud storage in this system is not to maintain a health
record, but rather to amass a big data set that machine learning could be
applied to. The authors have placed significant focus on managing all the
characteristic Vs of big data, but there are still some improvements that could
be made. While health data is stored, it appears that patients and doctors
cannot easily access a patient’s complete medical history.
22
Semiar Report
It allows for virtually unlimited storage space, the provision of many useful
services, and enables accessibility for patients and doctors. This gives patients
more control over their own healthcare, and simultaneously enables doctors to
provide more suitable treatments without having to even meet with their
patient in person. Additionally, big data management schemes that are
designed to meet all 5 characteristics of big data will enable data mining,
machine learning, and other forms of detailed analysis. This could lead to new
medical discoveries by identifying previously unknown trends in patient
progression through an illness, finding new links between symptoms and
conditions, determining new treatments that may be suitable for various
conditions, and much more. Big data management is essential for the IoT
healthcare system of the future.
There are several types of data processing that can be performed using cloud
technologies, but the most relevant are computational offloading and machine
learning. Computational offloading involves using the cloud to perform
complex data processing beyond the capabilities of low-resource wearable
devices. By sending raw or partially processed sensor data to the cloud, the
computing resources of many machines can be utilized for processing. Using
this high-powered computing environment over processing on the standalone
mobile device offers many advantages; more complex algorithms can be
executed, results can be obtained significantly faster, and battery life will be
extended in mobile devices due to less processing occurring internally.
Complicated sensor nodes such as those measuring ECG data, blood pressure,
or accelerometers for fall detection would benefit greatly from computational
offloading. For example, ECGs have a standard shape, and different deviations
from this shape can indicate several different heart problems including
arrhythmia, heart inflammation, and even cardiac arrest. Machine learning can
also be applied to large datasets so as to obtain meaningful information from
them, including identifying previously unknown links between symptoms and
diseases, determining possible diagnoses based on those given to previous
patients, developing suitable treatment plans for individual patients based on
what has worked for similar patients in the past, and much more. Each of these
applications reduces human uncertainty and thus would help patients receive
23
Semiar Report
Data processing techniques may also aid in the organized storage of health
data, as it can generate meaningful information such as a standard ECG from
many different types of ECG sensors. This is extremely useful in standardizing
health records, and would enable machine learning techniques to be applied to
a big data set with more ease. Due to these benefits, computational offloading
is vital for IoT healthcare systems to ensure that even the most complicated
physiological parameters can be monitored, enabling the highest possible
standard of healthcare for the patient.
If data is requested by an authorized user, the key authority system can use a
secure channel to provide them with the secret key required to decrypt the
data. This is a promising approach to combining security with machine
learning, but it is not yet ready to be implemented into IoT-based healthcare
systems. In this work, it is shown that significant computational resources are
required for FHE to be successful. Additionally, only limited arithmetic can be
performed on the encrypted data. Whilst this work shows improvement on
previous FHE schemes, improving the speed and computational capabilities of
FHE schemes remains an active field of research.
25
Semiar Report
SECTION VI
6.Conclusion
In this work, we have proposed a unique model for future IoT-based
healthcare systems, which can be applied to both general systems and systems
that monitor specific conditions. Several wearable, non-intrusive sensors were
presented and analyzed, with particular focus on those monitoring vital signs,
blood pressure, and blood oxygen levels. Short-range and long-range
communications standards were then compared in terms of suitability for
healthcare applications. BLE and NB-IoT emerged as the most suitable
standards for short-range and long-range communications in healthcare
respectively.
Recent works utilizing cloud technologies for data storage were presented, and
showed that cloud is the best means for storing and organizing big data in
healthcare. It is also shown by several works that significantly better data
processing can be performed in the cloud than can be performed by wearable
devices with their limited resources. The most significant drawback of using
cloud is that it introduces security risks, and as such we presented several
works focused on improving security in the cloud. It was found that access
control policies and encryption can significantly enhance security, but that no
known standard is suitable for immediate application into a wearable, IoT-
based healthcare system.
26
Semiar Report
7.References
28