Professional Documents
Culture Documents
net/publication/343620867
CITATIONS READS
3 5,802
3 authors, including:
Some of the authors of this publication are also working on these related projects:
User Interface for Managing Services using Linux Containers in OpenStack & Reduce Reschedule time for failed services View project
All content following this page was uploaded by Anil Kumar Gupta on 10 September 2020.
F
O
O
1 Introduction 3
PR
Healthcare industry has actively started to incorporate Internet of Things (IoT) 4
to improve the quality of healthcare services for the patient’s overall health. For 5
of insulin into the system [1]. Another example is connected inhalers; it has a sensor 8
attached to the inhaler and is connected to the app on the mobile phone, and it aids 9
patients to self-manage their health condition better [2]. It clearly shows that IoT 10
EC
process [3]. IoT can significantly/effectively address the issue of the rising cost of 12
to the Allied Market Research group, the worldwide market for IoT healthcare will 15
R
reach $136.8 billion by 2021 [4]. It exhibits IoT’s potential in the healthcare sector. 16
errors in data collection, faster diagnosis, efficient patient care, and better resource 18
management in hospitals. 19
C
Despite the advantages of the use of IoT in the healthcare sector, there are some 20
challenges and are depicted in Fig. 1. Data are essential parts of the decision-making
N
21
process for the patient’s care. According to the International Data Corporation 22
U
(IDC) by 2025, there will be 41.6 billion IoT devices, which will generate 79.4 23
F
O
O
PR
D
ZB (Zettabytes) of data [5]. This enormous unstructured data need to be processed 24
TE
results require huge resources in terms of storage, compute, and network. Critical 26
data related to monitoring has to be synchronized and analyzed in time to take the 27
EC
Security is one of the major challenges to the IoT in general [6]. When it comes 29
to healthcare, security becomes even more critical as the patient’s sensitive data 30
are flowing in the network without any encryption and can be used for medical
R
31
identity theft, blackmailing, etc. Patient’s data can be altered by the hacker, and 32
R
these modified data could be used to take life and death decisions for the patient. 33
IoT is on the verge to become pervasive in our lives, and it has already started to 34
O
enter into our personal spaces like a home, car, and so on. There were incidences 35
where the car brakes were hacked; doors were locked and opened wirelessly, which 36
C
shows the lack of security and privacy into the existing IoT systems [7]. 37
N
IoT devices are heterogeneous in nature. Earlier IoT systems were considered 38
for small enterprises or home usage. Now, it has been envisioned that it will 39
U
be used for large-scale projects like smart city, and almost everything will be 40
and frequencies on which the device operates. This could be the bottleneck for the 44
the healthcare industry. Various stakeholders, like healthcare service providers and 47
businesses, have to work together to create valuable services for the patients, which 48
Challenges of IoT in Healthcare
automation, in the healthcare sector, there is a huge part that is dependent on the 50
human resource involved in diagnosis, educating the patient about the usage of the 51
IoT devices/sensors and taking the critical decisions. It clearly indicates that actual 52
The remaining chapter is divided into four sections. It discusses the challenges 54
F
O
2 Data Handling and Resource Management 58
O
All the IoT applications like remote monitoring, clinical operations, etc. are data- 59
PR
centric. Data are collected, processed based on the application-specific algorithm, 60
and finally, a decision is made. In the whole process, data play a vital role, and 61
extreme importance. There are different types of sensors in healthcare from which 63
D
data are collected, like implantable sensors, wearable sensors, and others. There are 64
3.7 million devices in use today to monitor the various parts of the body, and this is 65
TE
going to exponentially increase with time [9]. Different applications have different 66
factor. Processing and response time should be extremely low, e.g., monitoring 69
after the major surgery, cardiac arrest, and so on. Workflow optimization is the IoT 70
application in which the workflow, i.e., recording the patient’s data (from patient’s 71
R
IoT device to the hospital’s database), registering at the hospital, and diagnosis, 72
is optimized. It significantly reduces the diagnosis time and can bypass all the 73
R
can be improved. If there is any issue with the healthcare services, it can be
O
75
detected and corrected in time. With the help of the sensors, medical supplies, 76
C
the supplies and devices. Fitness measurement and preventive care are of relatively 79
AQ2
F
O
O
PR
Data collected from different IoT devices are enormous and are of unstructured
type which adds to the processing time further. These unstructured big data require
81
82
D
a high-performance computing (HPC) systems to process the humongous amount of 83
data, which will drastically increase the infrastructure cost. Initial implementation
TE
84
providers and business partners. Patients also have to invest in wireless setup at 86
home, sensors, bands, etc. But it will be minimal due to the reduced cost of sensors.
EC
87
R
pressure, heart rate, temperature, etc. Security challenges related to IoT in general 90
are directly applicable and critical to IoT in healthcare. Security of the IoT systems 91
C
is the biggest reason behind the IoT systems not being adopted at a larger scale 92
[10]. Mirai is a malware used in a large-scale network attack. It turns the Linux 93
N
systems connected to the network into the remotely controlled bots. Mirai Botnet 94
is the example of the exploitation of the security loopholes in the IoT systems and
U
95
how severely it can affect the IoT systems and networks [11]. Security was never a 96
focus in the initial development phase of IoT systems, and there was a competition 97
It is evident that IoT devices will be ubiquitous. IoT is going to change our daily 101
lives in a way that is unimaginable at this point of time. According to the Cisco 102
reports, the number of IoT devices has already surpassed the world population [12]. 103
Challenges of IoT in Healthcare
IoT devices have already entered into our private spaces like home, car, and so on. 104
This indicates that IoT devices/network will have personal information like illness 105
information, medical reports, bank data, and social security numbers and raises the 106
There are several factors that cause security issues as shown in Fig. 3. They are 108
• Architecture: Initially, the market focus was on IoT functionality rather than on 110
the security as there was a competition between the businesses to launch the IoT 111
products to catch up the market. Security was considered an add-on component 112
F
• Lack of encryption: Data flowing in the IoT ecosystem are naked. Communi- 114
O
cation from the sensors to the gateway, from the gateway to the cloud, is not 115
encrypted. Hacker can eavesdrop the communication or can hack the systems. 116
O
• Access control: Access to the IoT data is relatively easier because of the weak 117
PR
importance in the healthcare industry to protect the patient’s sensitive data from 119
• Limited resources: IoT devices have limited processing power, memory, and 121
power (mostly, sensors are battery operated), making the implementation of 122
devices such as bracelets, cars, people, home appliances, medical appliances, 125
and many others. Each device sends and receives data in different formats, which 126
• Lack of experience: IoT security is a relatively new field. Expertise related to 128
cybersecurity has to be applied to the IoT systems by taking into account the 129
F
• Physical security: Not much attention has been paid to the actual hardware; 131
hardware may also have backdoors. Safety of the IoT hardware is of extreme 132
O
importance; intruders can just access the data or change the configuration from 133
O
134
PR
and cloud. These sensors can be incorporated with home appliances, cars, fitness 136
bands, etc. It is difficult to secure the system having several components, which 137
• Port communication: Open ports are the readily available point of attack for 141
cybercriminals. No ports should be left open, and after the communication, 142
• Use of encryption: Data exchange in the IoT systems should be encrypted to 144
ensure the security of the patient’s sensitive data. It can help in preventing 145
the unauthorized access of the patient’s data, as well as eavesdropping of the 146
• Use of authentication: IoT web portals should be protected with strong pass- 148
• Access control to the hardware and software: Role-based access should be 150
designed to the IoT devices and data. So that only the authorized person should 151
get the patient’s sensitive data like treating physician pane, which is responsible 152
F
• Hardware and middleware security: By ensuring the physical security of the 154
device, various threats like tampering of the device, data theft through USB, or 155
O
stealing of the storage media, etc. can be prevented. Middleware connects the 156
O
157
PR
4 Interoperability D 158
Interoperability is the ability of systems to communicate with each other. Interoper- 159
ability is the critical factor for the success of the IoT. According to McKinsey and 160
TE
Company predictions, IoT interoperability will create almost 40% of its value [13]. 161
Healthcare industry makes use of various sensors to monitor patient’s health 162
remotely and in the hospital for medical supplies, etc. Wearable sensor devices used 163
EC
by patients can be from different vendors; there may be the case where a patient has 164
to use more than one wearable sensor device. All these sensor devices are supposed 165
to communicate with each other, but sensor devices from different vendors cannot 166
R
communicate with each as they have different communication protocols. Because 167
of this problem, sensors have to be used from the same vendor so that sensors 168
R
could communicate with each other; it is a potential bottleneck for the large-scale 169
170
issue even affects the development of the IoT applications exposing cross-platform. 171
C
IoT is an evolving field, and it is evident that new type of sensor devices 172
in the different forms will be available in the market in the near future, and 173
N
interoperability between already available devices and new devices is of extreme 174
• Heterogeneous devices: IoT consists of devices starting from bracelets to home 178
cate with each other, and it has to be agreed upon collectively [15]. 180
• No open standard: There is no open standard to follow for the manufacturers. 181
Efforts have been made by the IEEE P2413 – Standard for an Architectural 182
Infrastructure for the Internet of Things [16], Iot-A created to develop architec- 183
S. Anmulwar et al.
F
O
O
PR
tures that can be applied in different domains [17], IoTivity [18], and Industrial
D
184
Internet Reference Architecture (IIRA) [19], but nothing has been formalized as 185
TE
and communication protocol. Only IoT devices from the same vendor can 188
EC
communicate with each other, and these devices cannot communicate with 189
the IoT devices from different vendors, which is the barrier to the large-scale 190
Although security is perceived as the biggest challenge for the successful imple- 193
C
importance for the IoT implementation. Value creation is a collaborative process 195
[21], and all the stakeholders must come together to improve the quality of 196
U
healthcare by means of IoT. Figure 2 depicts the various challenges pertaining to 197
ernment authority, businesses, insurance agencies, and IoT application developers 200
are the stakeholders for the IoT implementation in healthcare. Healthcare service 201
providers and businesses have to work together to create value for all stakeholders 202
through innovative IoT services. Understanding the needs of the patients, doctor, and 203
hospital staff is of importance to create services. Data collection through interviews 204
and workshops has to be done. Further, these data have to be analyzed to get the 205
Challenges of IoT in Healthcare
Fig. 6 Stakeholder
collaboration challenges
F
O
O
IoT and healthcare can be built. PR
insights/ideas for the creation of the IoT services. In this way, businesses around 206
207
D
Lower level implementation is crucial to the success of IoT in the healthcare 208
industry [22]. Everything cannot be automated in the healthcare sector, and there
TE
209
is still a lot of human intervention in the healthcare industry. All the hospital staff 210
has to be professionally trained to make use of the IoT devices and the ecosystem. 211
Patients have to be educated for the use of IoT devices by the hospital staff. It is
EC
212
going to take some time to get used to the new IoT ecosystem (Fig. 6). 213
R
6 Conclusion 214
R
O
IoT is going to be an integral part of the patient’s diagnosis, treatment, and 215
recovery process. IoT data collection mechanism coupled with predictive ana- 216
C
lytics will improve healthcare and reduce human errors. IoT in healthcare has 217
several challenges such as data handling, resource management, security, privacy, 218
N
security is the biggest barrier to the success of IoT. Considering the enormous
U
220
number of devices generating huge unstructured data, data handling and resource 221
management are also going to be a challenge in the near future. Interoperability 222
between IoT devices and creating values through stakeholder collaboration will 223
decide the success or failure of the IoT systems in healthcare industry. 224
S. Anmulwar et al.
References 225
F
ment) – Global Opportunity Analysis and Industry Forecast, 2014–2021 (2016), https:// 235
www.alliedmarketresearch.com/iot-healthcare-market. Accessed 23 Sept 2019 236
O
5. The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, 237
According to a New IDC Forecast (2019), https://www.telecomtv.com/content/iot/the-growth- 238
O
in-connected-iot-devices-is-expected-to-generate-79-4zb-of-data-in-2025-according-to-a- 239
new-idc-forecast-35522/. Accessed 23 Sept 2019 240
6. T. Xu, J.B. Wendt, M. Potkonjak, Security of IoT systems: Design challenges and
PR
241
opportunities, in 2014 IEEE/ACM International Conference on Computer-Aided Design 242
(ICCAD), San Jose, CA, (IEEE, Piscataway, 2014), pp. 417–423. https://doi.org/10.1109/ 243
ICCAD.2014.7001385 244
7. N. Lu, N. Cheng, N. Zhang, X. Shen, J.W. Mark, Connected vehicles: Solutions and challenges. 245
D
IEEE Internet Things J. 1(4), 289–299 (2014). https://doi.org/10.1109/JIOT.2014.2327587 246
8. Z. Song, A.A. Cardenas, R. Masuoka, Semantic middleware for the Internet of Things, in 2010 247
TE
12. D. Evans, The Internet of Things-How the Next Evolution of the Internet Is Changing 256
Everything, Cisco Internet Business Solutions Group (IBSG), April 2011 257
R
13. The Internet of Things: Mapping the Value Beyond the Hype (2015), https://tinyurl.com/ 258
y3xvw45q. Accessed 23 Sept 2019 259
O
14. S. Poudel, Internet of things: Underlying technologies, interoperability, and threats to privacy 260
and security. Berkeley Technol. Law J. 31(2016), 997 (2016) 261
C
15. S. Jabbar et al., Semantic interoperability in heterogeneous IoT infrastructure for healthcare. 262
Wirel. Commun. Mob. Comput. 2017, 1–10 (2017) 263
N
16. Standard for an Architectural Framework for the Internet of Things (IoT) IEEE (2016), http:// 264
grouper.ieee.org/groups/2413/Intro-to-IEEE-P2413.pdf. Accessed 23 Sept 2019 265
U
AQ1. Please confirm if the affiliations details have been set correctly for all the
authors.
AQ2. Please confirm the inserted citation for Figs. 2, 5, and 6.
AQ3. Please check if the edits made to sentence “Heterogeneity of devices . . . ”
retain the intended meaning.
F
O
O
PR
D
TE
EC
R
R
O
C
N
U