Professional Documents
Culture Documents
Computer Networks
journal homepage: www.elsevier.com/locate/comnet
a r t i c l e i n f o a b s t r a c t
Article history: The promising potential of the emerging Internet of Things (IoT) technologies for intercon-
Received 2 August 2015 nected medical devices and sensors has played an important role in the next-generation
Revised 6 January 2016
healthcare industry for quality patient care. Because of the increasing number of elderly
Accepted 8 January 2016
and disabled people, there is an urgent need for a real-time health monitoring infras-
Available online xxx
tructure for analyzing patients’ healthcare data to avoid preventable deaths. Healthcare
Keywords: Industrial IoT (HealthIIoT) has significant potential for the realization of such monitoring.
ECG monitoring HealthIIoT is a combination of communication technologies, interconnected apps, Things
IoT-driven healthcare (devices and sensors), and people that would function together as one smart system to
Cloud-assisted system monitor, track, and store patients’ healthcare information for ongoing care. This paper
Signal watermarking presents a HealthIIoT-enabled monitoring framework, where ECG and other healthcare data
Healthcare Industrial Internet of Things are collected by mobile devices and sensors and securely sent to the cloud for seamless ac-
(HealthIIoT) cess by healthcare professionals. Signal enhancement, watermarking, and other related an-
alytics will be used to avoid identity theft or clinical error by healthcare professionals. The
suitability of this approach has been validated through both experimental evaluation, and
simulation by deploying an IoT-driven ECG-based health monitoring service in the cloud.
© 2016 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.comnet.2016.01.009
1389-1286/© 2016 Elsevier B.V. All rights reserved.
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
promises patient well-being and safety by coordinating • the introduction of a watermark into the ECG signal on
critical patient information and synchronizing related the client side, to avoid a security breach in the cloud
resources (e.g., healthcare staff, facilities, wearable smart • the introduction of a user identification code to provide
devices to capture real-time patient data such as vital customized protection of data
signs, and patient-related electronic information) instantly • the introduction of a one-class support vector machine
through interconnected devices and sensors. Research classifier in the cloud
reveals that IoT in the healthcare industry can facilitate
better care with reduced costs, reduced direct patient- The rest of this paper is organized as follows. Section 2
healthcare staff interaction, and ubiquitous access to qual- reports some related studies. Section 3 outlines the
ity care [3]. Mohammed et al. developed a remote patient HealthIIoT ecosystem, followed by a high-level data flow
monitoring system using web services and cloud comput- architecture for the HealthIIoT monitoring value chain, and
ing [4]. Hassanalieragh et al. discussed the opportunities the details of a cloud-supported HealthIIoT-enabled mon-
and challenges of health monitoring and management itoring framework. Section 4 describes a proposed health
using IoT [5]. To date, however, no comprehensive study monitoring approach by considering ECG as healthcare
has been published about cloud-assisted IIoT-driven health data. Section 5 presents the experimental results and eval-
monitoring. uations. Section 6 concludes the paper.
Safe and high-quality healthcare service is of
paramount importance to patients. Accordingly, healthcare 2. Related studies
data security and patients’ privacy are important issues
that will have a great impact on the future success of The IIoT is an innovative technology, directly intercon-
HealthIIoT [17]. One of the major issues in the IIoT-based necting a set of sensors and devices (such as smartphones)
healthcare system is the protection of privacy. In gen- to collect, record, transmit, and share data for possible
eral, a healthcare service provider receives data from its analysis. The IoT has a wide range of emerging applications
users (such as patients) and shares them with registered [4–16]. Among them, the most revolutionary potential ap-
clinics or healthcare professionals. The provider may plication is healthcare monitoring, where patient health-
also distribute the data to health insurance companies care data are collected from a number of sensors, analyzed,
and pharmaceutical companies. Moreover, patient data delivered through a network and shared with healthcare
can be vulnerable to hackers during cloud transfer or professionals for evaluation of patient care [4–6,10,11,13]. A
synchronization with interconnected devices. more comprehensive survey of IoT for healthcare applica-
Therefore, we need to protect this information from tions can be found in [7]. IoT-enabled healthcare applica-
unauthorized access, which may result in the posting tions, including IoT-driven ECG monitoring, are discussed
of personal information in the public domain, or in in- in the following studies [6,10]. Li et al. [10]. presents a
terference with essential medical equipment, such as a health monitoring service as a platform for ECG monitoring
pacemaker. A security breach of a patient’s monitoring using adaptive learning analysis model to detect abnormal-
devices and data may cause the patient social embarrass- ities.
ment, mental disorders, or adverse physical effects such as Mohammed et al. developed a remote patient monitor-
a fatal heart attack. Hence, data protection in the form of ing system using web services and cloud computing [4].
watermarking and authentication is very important in an In particular, they designed an Android application for ECG
IIoT-based healthcare system. data monitoring and analysis. Data can be further analyzed
To this end, this paper describes an IIoT-based health by third-party software if needed; however, there is no op-
monitoring framework, where health monitoring signals tion for the cloud server to extract features and classify
are authenticated. As a case study, we have used electro- the signal to assist the health professional at the time the
cardiogram (ECG) monitoring, as ECG is an important as- signal is received. In our proposed framework, the cloud
sessment tool. By continuously monitoring an ECG signal, server extracts features and classifies the signal, so that a
a healthcare professional can diagnose disease and pre- preliminary analysis decision from the cloud can be sent to
scribe medications to avoid preventable death. ECG sig- the healthcare professionals to facilitate good patient care.
nals are recorded via portable ECG recording devices at Hassanalieragh et al. discussed the opportunities and
home or outdoors, and sent to smartphones or desktops challenges of health monitoring and management using IoT
via Bluetooth technology. On the client side, a smartphone [5]. Some challenges include slow processing, handling big
app or desktop software removes unwanted noise from the data, presence of too much heterogeneous data, and data
recorded signal, and embeds a watermark for security and integrity. In our proposed framework, the ECG signal is wa-
authentication purposes; heartbeat is also monitored using termarked on the client side before transmitting through
a simple algorithm. The watermarked ECG signal is then the Internet to authenticate against any attacks. Data pro-
transmitted to a cloud server, where temporal and spectral cessing is also distributed between the client side and the
features are extracted and classified using a one-class sup- cloud side to make the overall processing faster.
port vector machine classifier. The classification decision, Jara et al. [8] present a remote monitoring framework
along with the watermarked ECG, is passed to the desired using IoT by proposing a protocol, called YOAPY, to cre-
healthcare professional for analysis. The professional then ate a secure and scalable fusion of multi-modal sensors to
sends back a decision and prescription to the cloud server. record vital signs. A cloud-based speech and face recogni-
The cloud then notifies the patient. The contributions of tion framework was developed to monitor a patient’s state
the paper are as follows: remotely [26]. Xu et al. [9] developed a ubiquitous data
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
Im = Uw · Sw · VwT
can be expressed by Eq. (1).
Step 3. Multiply Sw by a watermark intensity factor, α .
φ ( ω ) = ω n e −ω , ω≥0
= 0, ω<0
(1) S wα = α · S w
The above equation is obtained by combining a Hilbert Step 4. Store Uw , Vw T , and α for watermark extraction.
transform and a wavelet transform. In Eq. (1), n is the Use Sw α for watermark embedding.
derivative order. The advantage of using the above equa- Step 5. Divide the ECG signal into N number of beats. The
tion is that it combines the time-frequency location of a beat duration is 0.6 s and peak R is located at 40%
wavelet transform with the local slope information of the of the duration.
Hilbert transform. Step 6. Step 6: Apply two-level DWT on each beat. Take
After applying complex AWT, we apply thresholding H2 (detail coefficients at level 2) for watermark
and look for persistent lines. The local maximums are embedding. Store L2 (approximation coefficient)
identified in the wavelet transform signal to find R (see and H1 (detail coefficients at level 1) for recon-
Fig. 6). struction of watermarked ECG signal.
Step 7. Form a matrix G using H2 of all the frames. The
4.3. ECG watermarking number of rows corresponds to the number of
beats of the signal.
The next stage is to watermark the signal to protect it Step 8. Apply SVD on matrix G. The resultant Ss is a
from forgery. Watermarking is a procedure to embed some square matrix of size N × N.
information in a signal without distorting the visibility
G = Us · Ss · VsT
or credibility of the signal for ownership claim. It has
mainly two parts: watermark embedding and watermark Step 9. A new matrix, Snew , of size N × N is formed by
extraction for verification. Embedding watermark in the using matrices Sw α and Ss .
ECG signal will ensure the authenticity of the ECG signal
transmitted over the cloud. We adopt a simple yet effi- Swα (n, n ) + Ss (n, n ), ≤n≤I
Snew =
cient strategy of watermarking that has rarely been used Ss (n, n ), (I + 1 ) ≤ n ≤ N
for ECG signals. The watermarking is based on discrete
Step 10. Using Us , Vs T , and Snew , perform inverse SVD to
wavelet transform (DWT)-singular value decomposition
get matrix G .
(SVD) [25,27]. The study in [25,27] did not use DWT-SVD
watermarking scheme in ECG signals, e-healthcare or G = Us · Snew · VsT
cloud-based systems. DWT is a multi-resolution technique
that decomposes a signal into different levels of time and Step 11. Using L2, G , and H1, perform inverse DWT to get
frequency. In the proposed step, we use a two-level DWT watermarked ECG signal.
that decomposes the signal into three subbands: approx- The watermark image can be reconstructed by using
imation subband L2, second-level detail subband H2, and the following steps.
first-level detail subband H1. SVD is a matrix factorization
technique that decomposes a matrix into three matrices. If Step 1. Subtract Ss from Snew to get Sim . Sim should be
a rectangular matrix A of size I × J is the input, the output equal to Sw if the watermarked speech signal is
will be two orthogonal matrices and one diagonal matrix not under attack.
as follows (Eq. (2)):
Sim = Snew (n, n ) − Ss (n, n ), 1 ≤ n ≤ I
T
AI×J = UI×I SI×JVJ×J (2)
Step 2. Apply inverse SVD to get the normalized water-
where U T U = II×I and V T V = IJ×J , which means that U mark.
and V are orthogonal. S is a diagonal matrix, whose diago-
nal entries are singular values and arranged in descending Im = Uw · Sim · VwT
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
Fig. 8. PSNR (dB) and SNR (dB) using the proposed DWT-SVD based wa-
termarking, which is compared with DWT-DCT based watermarking.
Table 1
Fig. 9. Correlation factor after different types of attack. Storage configurations.
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
5
x 10 calculated using the following model, Eq. (6):
5.5
Without Rep. Access(R ) = f (v, n ) · Dlatency (v, r ) + Gnetwork (v, r ) (6)
5 With Rep.
v∈G
4.5 where, G = (V, L ) is undirected tree structure of the
Data access times (sec)
3.5
professional (v) for an ECG file (n), r is lowest ancestor of v
in R, Dlatency is disk access latency, and Gnetwork is network
3 communication latency.
We compared ECG data access time by integrating
2.5
replication and without considering replication approaches
2
to the proposed framework. Fig. 12 compares the ECG data
Zipf Guassian. Random access times by considering replication and non-replication
ECG data access types strategies for the first storage configuration, as shown in
Fig. 12. ECG data access time using relative storage capacity 80%.
Table 1. In the majority of cases, a storage configuration
with replication resulted in a shorter ECG data access
time than a configuration without replication. Replicated
requests. The objective is to reduce ECG data access time. datasets in several data center locations decrease the
In the simulation, constant data access rate is considered. data access time because healthcare professionals have
The total data access time is a summation of time needed access to the required ECG data for a particular patient
by the disk to find a replica of an ECG file from the replica from a nearby site. Moreover, the storage capacity of the
data center disk and network communication latency for
replica transmission. The data access time, Access(R), is
Fig. 13. ECG data access time comparison for all storage configuration. Fig. 14. Workload for ECG monitoring.
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
data centers favors using the replication approach. With [3] J. Bresnick, Healthcare internet of things driving global market
a reduced storage capacity, the ECG data access times for growth, June 2015, Retrieved from http://healthitanalytics.com/news/
healthcare- internet- of- things- driving- global- market- growth.
both approaches (i.e., with and without replication) are [4] J. Mohammed, A. Thakral, A.F. Ocneanu, C. Jones, C.H. Lung, A. Adler,
increased, but by different magnitudes. Fig. 13 shows the Internet of Things: Remote patient monitoring using web services
execution times for Zipf and Gaussian distributions for all and cloud computing, in: Proceedings of the 2014 IEEE International
Conference on Internet of Things (iThings), and IEEE Green Comput-
the storage configurations listed in Table 1. Shorter access ing and Communications (GreenCom), and IEEE Cyber, Physical and
times for all storage configurations are correlated with Social Computing (CPSCom), Taipei, 1–3 September 2014, pp. 256–
using the replication approach. 263.
[5] M. Hassanalieragh, A. Page, T. Soyata, G. Sharma, M. Aktas, G. Ma-
Fig. 14 shows the workload of the main services used
teos, B. Kantarci, S. Andreescu, Health monitoring and management
for health monitoring of the proposed HealthIIoT frame- using Internet-of-Things (IoT) sensing with cloud-based processing:
work. We have concentrated on three key services: ECG Opportunities and challenges„ in: Proceedings of the IEEE Interna-
tional Conference on Services Computing, 2015, pp. 285–292.
capturing service, transmission service, and extraction or
[6] L. Hu, M. Qiu, J. Song, M.S. Hossain, Software defined healthcare net-
classification service. To understand the features of those works, IEEE Wirel. Commun. Mag. 22 (6) (2015) 67–75.
workloads as they relate to ECG monitoring, the run-time [7] S.M.R. Islam, D. Kwak, M.H. Kabir, M. Hossain, K.S. Kwak, The Inter-
characteristics of those workloads are collected by running net of Things for health care: A comprehensive survey, IEEE Access
3 (2015) 678–708.
the proposed health monitoring prototype on the Ama- [8] J. Jara, M.A. Zamora-Izquierdo, A.F. Skarmeta, Interconnection frame-
zon Elastic Computing Cloud (EC2). For this purpose, we work for mHealth and remote monitoring based on the Internet of
rented a VM with an Intel®CoreTM 2 Duo, DDR3 ECC RAM Things, IEEE J. Sel. Areas Commun. 31 (9) (2013) 47–65.
[9] B. Xu, L.D. Xu, H. Cai, C. Xie, J. Hu, F. Bu, Ubiquitous data access-
at 2.53 GHZ, 1 Gbps bandwidth, and 4.0GB memory, run- ing method in IoT-based information system for emergency medical
ning Windows Server 2010. The performance monitor of services„ IEEE Trans. Ind. Inf. 10 (2) (2014) 1578–1586.
Windows has been used to record the resource consump- [10] P.Y. Li, L. Guo, Y. Guo, Enabling health monitoring as a service in the
cloud, in: Proceedings of the IEEE International Conference on Utility
tions of those workloads for memory, CPU, and network and Cloud Computing, October 2014, pp. 81–84.
bandwidth utilizations. [11] M.S. Hossain, Cloud-supported cyber-physical framework for patients
monitoring, IEEE Syst. J. (2015), doi:10.1109/JSYST.2015.2470644.
[12] K. Zhang, K. Yang, X. Liang, Z. Su, X.S. Shen, H.H. Luo, Security and
6. Conclusion privacy for mobile healthcare networks: From a quality of protection
perspective, IEEE Wirel. Commun. Mag. 22 (4) (2015) 104–112.
IIoT-driven healthcare monitoring is an emerging [13] M.S. Hossain, G. Muhammad, Cloud-based collaborative media ser-
vice framework for health-care, Int. J. Distrib. Sensor Netw. 2014
healthcare service that may potentially revolutionize the (2014) 11. Article 858712.
healthcare industry in terms of improving access to patient [14] J. Granados, A.M. Rahmani, P. Nikander, P. Liljeberg, H. Tenhunen,
information, and offer quality patient care through con- et al., Web-enabled intelligent gateways for eHealth internet-of-
things, in: R. Giaffreda, et al. (Eds.), Internet of Things. User-Centric
tinuous monitoring from anywhere at any time, through IoT, Lecture Notes of the Institute for Computer Sciences, Social
a multitude of devices. With HealthIIoT, healthcare profes- Informatics and Telecommunications Engineering (LNICST), 2015,
sionals may be able to access patient information, store it, pp. 248–254.
[15] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, G. Marrocco, RFID
and analyze it in a real-time manner to monitor and track technology for IoT-based personal healthcare in smart spaces, IEEE
the patient. However, interconnected wearable patient de- Internet Things J. 1 (2) (2014) 144–152.
vices and healthcare data (such as ECG signals) are subject [16] L. Catarinucci, D. De Donno, L. Mainetti, L. Palano, L. Patrono,
M.L. Stefanizzi, L. Tarricone, An IoT-aware architecture for smart
to security breaches. To this end, this paper describes a healthcare systems, IEEE Internet Things J. 2 (6) (2015) 515–526,
cloud-integrated HealthIIoT monitoring framework, where doi:10.1109/JIOT.2015.2417684.
healthcare data are watermarked before being sent to the [17] D. bib17, Securing the industrial Internet of Things, Inf. Syst. Secur.
Assoc. (ISSA) J. (2015) 24–30.
cloud for secure, safe, and high-quality health monitoring.
[18] A. Sawand, S. Djahel, Z. Zhang, F. Naït-Abdesselam, Toward energy-
Future work will involve testing the proposed HealthIIoT efficient and trustworthy eHealth monitoring system, China Com-
monitoring framework for data security and notification mun. 2 (1) (2015) 46–65.
functions, as well as implementing a test trial with real- [19] M. Chen, Y. Zhang, Y. Li, S. Mao, V. Leung, EMC: Emotion-aware mo-
bile cloud computing in 5G, IEEE Netw. 29 (2) (2015) 32–38.
world patients and health professionals. [20] M. Chen, Y. Zhang, Y. Li, M. Hassan, A. Alamri, AIWAC: Affective in-
teraction through wearable computing and cloud technology, IEEE
Wirel. Commun. Mag. 22 (1) (2015) 20–27.
Acknowledgment [21] M. Chen, NDNC-BAN: Supporting rich media healthcare services via
named data networking in cloud-assisted wireless body area net-
The authors extend their appreciation to the Dean- works, Inf. Sci. 284 (10) (2014) 142–156.
[22] M. Chen, J. Wan, S. Gonzalez, L. Xiaofei, V.C.M. Leung, A survey of
ship of Scientific Research at King Saud University, Riyadh, recent developments in home M2M networks, IEEE Commun. Surv.
Saudi Arabia for funding this work through the research Tutor. 16 (1) (2014) 98–114.
group project no. RGP 228. [23] S. Pandeya, W. Voorsluys, S. Niua, A. Khandoker, R. Buyyaa, An au-
tonomic cloud environment for hosting ECG Ecosystem analysis in
the design of open platform-based in-home healthcare terminals
References towards the Internet-of-Things data analysis services, Future Gen.
Comput. Syst. 28 (2012) 147–154.
[1] T. J. McCue, $117 billion market for internet of things in healthcare [24] H. Tam, J. Webster, Minimizing electrode motion artifact by skin
by 2020, forbes, April 2015, Retrieved from http://www.forbes. abrasion, IEEE Trans. Biomed. Eng. 24 (1977) 134–139.
com/sites/tjmccue/2015/04/22/117- billion- market- for- internet- of- [25] V. Batchvarov, M. Malik, A. Camm, Incorrect electrode cable connec-
things- in- healthcare- by- 2020. tion during electrocardiographic recording, Europace 9 (2007) 1081–
[2] S. Schneider, How the industrial internet of things can save 1090.
50,0 0 0 lives a year, January 2015, Industrial Internet Consor- [26] M.S. Hossain, G. Muhammad, Cloud-assisted speech and face recog-
tium, Retrieved from http://blog.iiconsortium.org/2015/01/how-to- nition framework for health monitoring, Mob. Netw. Appl. 20 (3)
industrial- internet- of- things- can- save- 50 0 0 0- lives- a- year.html. (2015) 391–399.
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009
Downloaded form http://iranpaper.ir
JID: COMPNW
ARTICLE IN PRESS [m3Gdc;February 26, 2016;19:24]
[27] M. Ali, C.W. Ahn, An optimized watermarking technique based on Ghulam Muhammad is an Associate Profes-
self-adaptive DE in DWT-SVD transform domain, Signal Process. 94 sor in the department of Computer Engineering,
(2014) 545–556. College of Computer and Information Sciences
[28] H. Zhao, F. Wang, Z. Chen, J. Liu, A robust audio watermarking al- at the King Saud University, Riyadh, KSA. He re-
gorithm based on SVD-DWT, Elektron. Ir Elektrotech. 20 (1) (2014) ceived his Ph.D. in Electrical and Computer En-
75–80. gineering from Toyohashi University and Tech-
[29] J.M. Lilly, S.C. Olhede, On the analytic wavelet transform, IEEE Trans. nology, Japan in 2006. His research interests in-
Inf. Theory 56 (8) (2010) 4135–4156. clude serious games, cloud and multimedia for
[30] G.B. Moody, R.G. Mark, The impact of the MIT-BIH arrhythmia healthcare, resource provisioning for big data
database, IEEE Eng. Med. Biol. Mag. 20 (3) (2001) 45–50. processing on media clouds and biologically in-
[31] J. Grody, L. Brutun, Performance evaluation of digital audio water- spired approach for multimedia and software
marking algorithms, Proceedings of the Forty-third IEEE Midwest system, image and speech processing. He has
Symposium on Circuits and Systems, 20 0 0, pp. 456–459. authored and co- authored more than 120 pub-
[32] M. Shorfuzzaman, A. Alelaiwi, M. Masud, M.M. Hassan, M.S. Hossain, lications including refereed IEEE/ACM/Springer/Elsevier journals, confer-
Usability of a cloud based collaborative learning framework to im- ence papers, books, and book chapters.
prove learner’s experience, Comput. Hum. Behav. 51 (2015) 967–976.
Please cite this article as: M.S. Hossain, G. Muhammad, Cloud-assisted Industrial Internet of Things (IIoT) – Enabled frame-
work for health monitoring, Computer Networks (2016), http://dx.doi.org/10.1016/j.comnet.2016.01.009