Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation
Abstract
:1. Introduction
- Identification of Sources: We collected 160 sources from various databases. Before the screening process, we removed the duplicate records and irrelevant records.
- Screening of sources based on objectives: The screened records from the previous step were sought for retrieval, and the same number of reports were assessed for eligibility. The screening process resulted in the optimal number of records which contributed the best for carrying out the systematic survey.
- Final resources which we included: After performing the level-wise screening, the final 136 resources were identified for reference. The number of sources from each databases was tabulated in detail.
1.1. Motivation
1.2. Our Contribution
- We reviewed nine standard IoT architectures, key challenges of these IoT Architectures, and various IoT applications.
- The IoT World Forum (IWF) reference architecture is the most suitable model for the effortless development for any IoT application after performing a comprehensive analysis on these IoT architectures with pros and cons.
- We have designed a Smart Healthcare Reference Architecture (SHRA) based on IWF Architecture and present a detailed analysis on the substantial challenges of SHRA.
- Finally, we present the significance of smart healthcare during the COVID-19 pandemic with up-to-date statistical analysis.
2. Flow of Systematic Investigation
2.1. Formulation of Research Questions
2.2. Development of Research Plan/Protocol
2.3. Literature Search and Survey Based on Plan
2.4. Identifying Potential Limitations
2.5. Discussions of Possible Countermeasures
2.6. Analysis and Interpretation of Review
3. IoT Standard Architectures
- ETSI IoT Standard.
- ITU-T IoT Reference Model.
- IoT-A Reference Model.
- Intel’s IoT Architecture.
- Three-Layer Architecture.
- Middle-Based Architecture.
- Service-Oriented Architecture.
- Five-Layer Architecture.
- Social Internet of Things Representative Architecture.
- Multi-Internet of Things Architecture.
- IWF Reference Architecture.
3.1. ESTI M2M Reference Architecture
3.1.1. Advantages of ESTI M2M Reference Architecture
- ESTI is involved in standardizing the technologies at the radio and service layers.
- Context information management enables the exchange of data together with its context.
- Fixed and mobile networks are supported with easy maintenance.
3.1.2. Disadvantages of ESTI M2M Reference Architecture
- Limited flexibility for developing a reference architecture for any smart application.
- Security and ownership of data are not figured out.
- This model does not support interoperability across many application domains.
- It is designed and optimized for networks with fewer smart devices.
- The step-by-step flow of IoT data is a big concern in the ESTI M2M model.
3.2. ITU-T Reference Architecture
3.2.1. Advantages of ITU-T Reference Architecture
- The IoT reference model defined by ITU-T focuses on the capabilities view of IoT infrastructure.
- It can easily collaborate with other IoT reference architectures.
- This architecture supports smart ports for any smart application, improving their operations and services.
3.2.2. Disadvantages of ITU-T Reference Architecture
- Data processing and management support are limited for any smart application.
- This architecture defines the capability exposure of each layer rather than the flow of IoT data from the device layer to the application layer.
3.3. IoT-A Architectural Reference Model
3.3.1. Advantages of IoT-A Reference Architecture
- This model can be concretely related to the other standard IoT architectures.
- It promotes the overall understanding of IoT domains.
- A reference architecture can be drawn based on IoT-A architecture using its building blocks.
3.3.2. Disadvantages of IoT-A Reference Architecture
- It is a bit harder to understand the processes and responsibilities of each layer.
- Limited adaptability, and it is difficult to understand a complex functional view along with a security and privacy perspective.
- Designing a reference architecture from the IoT-A model must consider the domain, information, and communication models.
3.4. Intel’s IoT Architecture
Advantages of Intel’s IoT Architecture
- It supports enterprises to move towards the edge. This facilitates bulk data capturing, faster analysis, and high-speed processing.
- Strategic decision-making is enabled in the IoT-A reference model.
- It delivers more significant support for big data processing and analytics.
3.5. Three-Layer Architecture
3.5.1. Advantages of Three-Layer Architecture
- Simple architecture and easy-to-understand flow of IoT data.
- Any real-time application can be used in this basic architecture.
3.5.2. Disadvantages of Three-Layer Architecture
- Three-layer architecture presents the abstract view of the IoT operational stack, so it cannot deliver detailed architecture for designing a reference architecture.
- It provides the outline of IoT and does not give practical insight into researching the IoT.
3.6. Middle-Ware Based Architecture
3.6.1. Advantages of Middle-Ware Based Architecture
- The functional components of IoT middle-ware architecture enable interoperation and context detection.
- Effective device discovery and management with platform portability.
- Enhanced security and privacy.
- Managing high data volumes.
3.6.2. Disadvantages of Middle-Ware Based Architecture
- There is no generic middle-ware that can be applied for multiple smart applications.
- Scalability is not achieved in this model.
3.7. Service-Oriented Architecture
3.7.1. Advantages of Service-Oriented Architecture
- SOA can be used to create a reference based on system services.
- This architecture reduces the product development time by neglecting the unnecessary details.
3.7.2. Disadvantages of Service-Oriented Architecture
- SOA needs higher bandwidth for data transmission in IoT applications.
- The model will be overloaded with extra computation if multiple services are used.
3.8. Five-Layer Architecture
3.8.1. Advantages Five-Layer Architecture
- It extends three-layer architecture and delivers a detailed perspective about IoT technologies.
- This architecture is most suitable for edge technologies and broad application areas.
3.8.2. Disadvantages of Five-Layer Architecture
- This model cannot provide deep insight into data ingestion and aggregation of IoT data.
3.9. Social Internet of Things Representative Architecture (SIoT-RA)
3.9.1. Advantages of SIoT-RA
- Easy integration of WSNs and short range communication technologies such as NFC, Ultra-Wide Band, and RFID.
- A separate layer is dedicated for data transport functionalities.
- Component sub-layer enables the interoperabiltiy and service discovery features.
3.9.2. Disadvantages of SIoT-RA
- The relationship management is only enabled for the servers, but not for objects and gateways.
- Efficiency of resource discovery will be decreased if the number of interactions among the objects is increased.
- Higher complexity.
3.10. Multi-Internet of Things Architecture
3.10.1. Advantages of MIoT
- Reduced complexity in managing multiple IoT systems with social networking paradigms.
- Complex IoT networks can be handled with reliability.
3.10.2. Disadvantages MIoT
- Cannot support cleaning and preprocessing of IoT data at edge.
- Data integration is not addressed in this architecture.
3.11. IWF Reference Architecture
Advantages of IWF Reference Model over Other Architectures
- The IoT system topology is depicted clearly in the IWF model.
- It boosts the operational efficiency of the IoT ecosystem by effective decision-making on resource and service management.
- All seven layers of the IWF model are responsible for the optimal flow of IoT data, so this architecture minimizes the cost and downtime by enabling preventive maintenance.
- The business layer of the IWF model is responsible for collaboration and business process handling. This improves the IoT products and services through user or customer satisfaction. This model opens up new business opportunities.
- Realizing the scalability is easy with the IWF model compared to other architectural standards,
- IWF Architecture is the best model for data management. It defines the data accumulation and abstraction capabilities separately for exhaustive data processing.
- Instead of being conceptual, the IWF reference model is a real and approachable system applicable to any IoT application.
- This model ensures modularity and interoperability by enabling the technologies to be compatible with Industry 4.0
4. IoT Protocols
- Application Protocols: Application protocols are responsible for reporting, analytics, and controlling the users’ interactions with the applications for adding business value to the services.
- Service Discovery Protocols: Service discovery protocols deal with finding the available services for the client’s available requests in the network.
- Infrastructure Protocols: Infrastructure protocols include network technologies and Internet protocols. These fundamental protocols enable communication and access technologies.
4.1. Application Protocols
- Message Queue Telemetry Transport (MQTT): This protocol was invented by IBM in 2000 for telemetry applications using low power data rates [47]. This protocol operates in a publish–subscribe model and is designed exclusively for lightweight applications. It requires a small code footprint and low bandwidth.
- Data Distribution Service (DDS): This is a machine-to-machine communication protocol that enables data exchange through the publish–subscribe method [54,55]. Unlike MQTT and CoAP, DDS uses a broker-less architecture. As this model has a data bus that directly connects producers and subscribers; it employs multi-casting techniques for data transmission and a high-quality service in small memory footprint devices.
4.2. Service Discovery Protocols
- Multicast DNS (m-DNS): It resolves host names to IP addresses without using a unicast DNS server [56]. It operates on multicast UDP packets, through which a node acquires terms of all nodes in the local network. This protocol can be implemented irrespective of infrastructure failures.
- DNS-Service Discovery (DNS-SD): It uses standard DNS messages to discover services of an IoT network [57]. Host names of the service provider are resolved, and IP addresses are paired with host names using mDNS.
- Simple Service Discovery Protocol (SSDP): This protocol is the basis for UPnP used in small-scale networks to advertise and discover network services [58]. It does not use any server-based configuration mechanism such as DHCP or DNS, based on an IP suite.
4.3. Infrastructure Protocols
4.3.1. Network Technologies
- Zigbee: It uses the IEEE 802.15.4 standard and operates in the 2.4 GHz frequency range with 250 kbps [59]. The maximum number of nodes in the network is 1024, and has a capacity of up to 200 m. Zigbee can use 128-bit AES encryption.
- Bluetooth Low Energy (BLE): It provides the same range as classic Bluetooth with considerably less energy consumption [60]. This is used in beacons used to send contextual information based on location (Google Beacon Platform, Google Physical Web, Apple ibeacon).
- Near Field Communication (NFC): It is a short-range, high frequency (13.56 MHz) wireless technology based on RFID [61]. Two devices have to come closer to initiate the transaction, such as a phone and payment terminal.
- IEEE 802.15.4: It is a standard that specifies the physical layer and media access control for low-rate wireless personal area networks [62]. It has the Zigbee, Wireless HART, and MiWi specifications. It is used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet.
4.3.2. Internet Protocols
- Internet Protocol v6 (IPv6): It is a 128-bit addressable protocol that provides improved remote access and large-scale IoT device management [63]. It ensures the security, scalability, and connectivity of IoT ecosystems. Thus, it is the perfect solution for real-time IoT deployment.
- IPv6 over Low Power Wireless Personal Area Network (6LoWPAN): This is an adaption layer for IPv6 over IEEE 802.15.4 links [64]. It operates only in the 2.4 GHz frequency range with a 250 kbps transfer rate. It is a network encapsulation protocol.
- Routing Protocol for Low Power and Lossy Networks (RPL): It was developed by the IETF ROLL working group. It is ideal for N to 1 links (meters reading) [65]. It is a proactive protocol that is susceptible to packet loss. It is implemented in Contiki OS for usage on microcontrollers and sensor nodes.
- User Datagram Protocol (UDP): This connection-less and lightweight communication protocol focuses on low latency communication, rather than reliability, which is the desirable characteristic of IoT communication [66].
5. IoT Applications and Challenges
6. Designing a Smart Healthcare Reference Architecture
6.1. Layer 1: Sensor Data of Patients
6.2. Layer 2: Transmission of Patient Data
6.3. Layer 3: Transformation of Collected Data at Edge/Fog Layer
6.4. Layer 4: Accumulation of Transformed Data to the Cloud
6.5. Layer 5: Abstraction and Analytics of Accumulated Data
6.6. Layer 6: Building Smart Healthcare Applications
6.7. Layer 7: Collaboration of Hospital Staff
7. Architectural Challenges in Designing Any Smart Healthcare Application
- Connectivity.
- Data Handling.
- Heterogeneity.
- Interoperability.
- Privacy.
- Scalability.
- Security.
- Authentication.
7.1. IoT Connectivity in Smart Healthcare
7.1.1. CSRA
7.1.2. NOMA
7.1.3. mMIMO
7.1.4. MLRA
7.2. IoT Data Handling in Smart Healthcare
7.3. IoT Heterogeneity in Smart Healthcare
7.3.1. Self-Organizing Network Topologies (Architectures and Routing Protocols)
7.3.2. Technology Advancements in Data Processing and Transmission
7.3.3. Approaches to Efficient Power Supply and Energy Consumption
7.3.4. Advanced Mechanisms for Ensuring Privacy and Security
7.3.5. Modern Techniques for Decision Making and Sensing
7.3.6. Heterogeneous Network Elements (HNEs)
7.4. IoT Interoperability in Smart Healthcare
7.5. IoT Privacy in Smart Healthcare
- User identification.
- User tracking.
- Profiling.
- Utility monitoring and controlling.
- Lightweight authentication.
- Device fingerprinting techniques.
- Context-aware access control.
- Edge computing software modules.
- Privacy-aware systems of user data.
- Decentralized clouds.
- Data brokers and separation algorithms.
- Denaturing frameworks.
- Data mining.
- Data summarization.
7.6. IoT Scalability in Smart Healthcare
- The scalability of IoT platforms can be increased by maximizing the use of edge or fog computing techniques [113].
- Usage of a software define virtual private network (SD-VPN) can improve the security and scalability of IoT networks [114].
- Scalable application design using a multi-stage approach [115]. There are emerging techniques to achieve scalability using automated bootstrapping, controlling the IoT data pipeline, a three-axis approach for scaling, a microservice architecture, multiple data storage systems, and easily expanded systems.
7.7. IoT Security in Smart Healthcare
IoT Authentication in Smart Healthcare
- Cloud-based IoT authentication.
- Lightweight authentication.
- Decentralized blockchain-based authentication. Blockchain technology is beneficial for storing, distributing, and verifying the authentication of any user. Access control policies are stated in the resource–requester pair as a transaction. Token-based propagation to the blockchain is done via an auditing tool.
- Bio-metrics-based Remote User Authentication: Elliptic curve pairing-based one time password (OTP) authentication schemes of IoT are presented in [122]. The public key generator (PKG) generates OTP and validation at the IoT platform, and it occurs in four phases.
8. Approaches of SHRA to Avoiding Each Architectural Challenge
8.1. IWF Architecture for Solving Connectivity Challenges
8.2. IWF Architecture in Solving Data Handling Challenges
8.3. IWF Architecture in Solving Heterogeneity Challenges
8.4. IWF Architecture in Solving Interoperability Challenges
8.5. IWF Architecture in Solving Privacy Challenges
8.6. IWF Architecture in Solving Scalability Challenges
8.7. IWF Architecture in Solving Security Challenges
IoT Authentication and the Role of the IWF Model in Solving These Issues
9. Significance of Smart Healthcare during COVID-19 Pandemic
10. Discussions
11. Conclusions
Author Contributions
Funding
Informed Consent Statement
Conflicts of Interest
References
- Shancang, L.; Li, X.D.; Shanshan, Z. The Internet of Things: A survey. Inf. Syst. Front. 2015, 17, 243–259. [Google Scholar]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of things(iot): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
- Ding, J.; Nemati, M.; Ranaweera, C.; Choi, J. IoT Connectivity Technologies and Applications: A Survey. arXiv 2020, arXiv:2002.12646v1. [Google Scholar] [CrossRef]
- IoT-A. Converged Architectural Reference Model for the IoT v2.0; SAP: Zurich, Switzerland, 2012. [Google Scholar]
- Abu-Elkheir, M.; Hayajneh, M.; Ali, N.A. Data Management for the Internet of Things: Design Primitives and Solution. Sensors 2013, 13, 15582–15612. [Google Scholar] [CrossRef]
- Qiu, T.; Chen, N.; Li, K.; Atiquzzaman, M.; Zhao, W. How Can Heterogeneous Internet of Things Build Our Future: A Survey. IEEE Commun. Surv. Tutor. 2018, 20, 2011–2027. [Google Scholar] [CrossRef]
- Haseeb, S.; Hashim, A.H.A.; Khalifa, O.O.; Ismail, A.F. Connectivity, Interoperability and Manageability Challenges in Internet of Things. AIP Conf. Proc. 2017, 1883, 020004. [Google Scholar] [CrossRef]
- Ait Abdelouahid, R.; Chhiba, L.; Marzak, A.; Mamouni, A.; Sael, N. IoT Interoperability Architectures: Comparative Study. In Proceedings of the First International Conference on Real Time Intelligent Systems, Casablanca, Morocco, 18–20 October 2017; Springer: Cham, Switzerland, 2017; pp. 209–215. [Google Scholar] [CrossRef]
- Noura, M.; Atiquzzaman, M.; Gaedke, M. Interoperability in Internet of Things: Taxonomies and Open Challenges. Mob. Netw. Appl. 2019, 24, 796–809. [Google Scholar] [CrossRef]
- Weber, R.H. Internet of Things: Privacy Issues Revisited. Comput. Law Secur. Rev. 2015, 31, 618–627. [Google Scholar] [CrossRef]
- Seliem, M.; Elgazzar, K.; Khalil, K. Towards Privacy Preserving IoT Environments: A Survey. Hindawi Wirel. Commun. Mob. Comput. 2018, 2018, 1032761. [Google Scholar] [CrossRef]
- Gupta, A.; Christie, R.; Manjula, R. Scalability in Internet of Things: Features, Techniques and Research Challenges. Int. J. Comput. Intell. Res. 2017, 13, 1617–1627. [Google Scholar]
- Sadique, K.M.; Rahmani, R.; Johannesson, P. Towards Security on Internet of Things: Applications and Challenges in Technology. Procedia Comput. Sci. 2018, 141, 199–206. [Google Scholar] [CrossRef]
- Kavianpour, S.; Shanmugam, B.; Azam, S.; Zamani, M.; Narayana Samy, G.; De Boer, F. A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. J. Comput. Netw. Commun. 2019, 2019, 5747136. [Google Scholar]
- Trnka, M.; Cerny, T.; Stickney, N. Survey of Authentication and Authorization for the Internet of Things. Secur. Commun. Netw. 2018, 2018, 4351603. [Google Scholar] [CrossRef]
- Atwady, Y.; Hammoudeh, M. A Survey on Authentication Techniques for the Internet of Things. In Proceedings of the International Conference on Future Networks and Distributed Systems ICFNDS’17, Cambridge, UK, 19–20 July 2017. [Google Scholar] [CrossRef]
- El-Hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef] [PubMed]
- Capra, M.; Bussolino, B.; Marchisio, A.; Shafique, M.; Masera, G.; Martina, M. An Updated Survey of Efficient Hardware Architectures for Accelerating Deep Convolutional Neural Networks. Future Internet 2020, 12, 113. [Google Scholar] [CrossRef]
- Alabdan, R. Phishing Attacks Survey: Types, Vectors, and Technical Approaches. Future Internet 2020, 12, 168. [Google Scholar] [CrossRef]
- Ghazal, T.M.; Hasan, M.K.; Alshurideh, M.T.; Alzoubi, H.M.; Ahmad, M.; Akbar, S.S.; Al Kurdi, B.; Akour, I.A. IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare—A Review. Future Internet 2021, 13, 218. [Google Scholar] [CrossRef]
- Available online: https://libguides.umn.edu/systematicreviews (accessed on 26 July 2022).
- Gill, A.Q.; Behbood, V.; Ramadan-Jradi, R.; Beydoun, G. IoT architectural concerns: A systematic review. In Proceedings of the Second International Conference on Internet of Things, Data and Cloud Computing (ICC’17), Cambridge, UK, 22–23 March 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Adrianto, D.; Lin, F.J. Analysis of security protocols and cor-responding cipher suites in ETSI M2M standards. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015; pp. 777–782. [Google Scholar] [CrossRef]
- Chen, H.C.; You, I.; Weng, C.E.; Cheng, C.H.; Huang, Y.F. A security gateway application for End-to-End M2M communications. Comput. Stand. Interfaces 2016, 44, 85–93. [Google Scholar] [CrossRef]
- Joachim, W.W. Internet-of-Things Architecture IoTA Project Deliverable D1.2-Initial Architectural Reference Model for IoT. Available online: https://cocoa.ethz.ch/downloads/2014/01/1360_D1%202_Initial_architectural_reference_model_for_IoT.pdf (accessed on 26 July 2022).
- Saad, M.; Soomro, T.R. Cyber Security Andinternet of Things. Pak. J. Eng. Technol. Sci. 2017, 7. [Google Scholar] [CrossRef]
- Sethi, P.; Sarangi, S.R. Internet of Things: Architectures, Protocols, and Applications. J. Electr. Comput. Eng. 2017, 2017, 9324035. [Google Scholar] [CrossRef]
- Romdhani, I.; Abdmeziem, R. Architecting the Internet of Things: State of the Art. Robot. Sens. Clouds 2015, 36, 55–75. [Google Scholar]
- Amaral, L.A. Middleware Technology for IoT Systems:Challenges and Perspectives Toward 5G. Internet Things (IoT) 5G Mob. Technol. 2016, 8, 333–367. [Google Scholar] [CrossRef]
- Ungurean, I. A middleware based architecture for the industrialinternet of things. KSII Trans. Internet Inf. Syst. (TIIS) 2016, 10, 2874–2891. [Google Scholar] [CrossRef]
- Xiao, L.; Xiao, N.; Li, M.; Xie, S.; Hou, K.; Li, Y. Architecture and Implementation of IoT Middlewarefor Ground Support Systems in Launch Site. In Proceedings of the 2020 International Conference on Sensing, Measurement & Data Analytics in the Era of Artificial Intelligence (ICSMD), Xi’an, China, 15–17 October 2020. [Google Scholar] [CrossRef]
- Mesmoudi, Y.; Lamnaour, M.; El Khamlichi, Y.; Tahiri, A.; Touhafi, A.; Braeken, A. A Middleware based on Service Oriented Architec-ture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT). J. King Saud Univ.-Comput. Inf. Sci. 2020, 32, 1108–1116. [Google Scholar] [CrossRef]
- Mishra, S.K.; Sarkar, A. Service-oriented architecture for internet of things: A semantic approach. J. King Saud Univ.-Comput. Inf. Sci. 2021; in press. [Google Scholar] [CrossRef]
- Lan, L.; Li, F.; Wang, B.; Zhang, L.; Shi, R. An Event-Driven Service-Oriented Architecture for the Internet of Things. In Proceedings of the 2014 Asia-Pacific Services Computing Conference, Fuzhou, China, 4–6 December 2014. [Google Scholar] [CrossRef]
- Abd Rahim, M.R.; Rashid, R.A.; Rateb, A.M.; Sarijari, M.A.; Abdullah, A.S.; Hamid, A.H.F.A.; Sayuti, H.; Fisal, N. Service-Oriented Architecturefor IoT Home Area Networking in 5G. Fundam. Requir. Enabling Technol. Oper. Manag. 2018, 577–602. [Google Scholar] [CrossRef]
- Antao, L.; Pinto, R.; Reis, J.; Gonçalves, G. Requirements for Testing and Validating the IndustrialInternet of Things. In Proceedings of the 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Västerås, Sweden, 9–13 April 2018. [Google Scholar] [CrossRef]
- Liu, X.; Lam, K.H.; Zhu, K.; Zheng, C.; Li, X.; Du, Y.; Liu, C.; Pong, P.W.T. Overview of Spintronic Sensors, Internet of Things, and Smart Living (2016). IEEE Trans. Magn. 2019, 55, 1–22. [Google Scholar]
- Atzori, L.; Iera, A.; Morabito, G.; Nitti, M. The Social Internet of Things (SIoT)–When social networks meet the Internet of Things: Concept, architecture and network characterization. Comput. Netw. 2012, 56, 3594–3608. [Google Scholar] [CrossRef]
- Cauteruccio, F.; Cinelli, L.; Fortino, G.; Savaglio, C.; Terracina, G.; Ursino, D.; Virgili, L. An approach to compute the scope of a social object in a Multi-IoT scenario. Pervasive Mob. Comput. 2020, 67, 101223. [Google Scholar] [CrossRef]
- Ursino, D.; Virgili, L. Humanizing IoT: Defining the Profile and the Reliability of a Thing in a Multi-IoT Scenario. In Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
- Cauteruccio, F.; Cinelli, L.; Corradini, E.; Terracina, G.; Ursino, D.; Virgili, L.; Savaglio, C.; Liotta, A.; Fortino, G. A framework for anomaly detection and classification in Multiple IoT scenarios. Future Gener. Comput. Syst. 2021, 114, 322–335. [Google Scholar] [CrossRef]
- Hakim, A.E. Internet of Things (IoT) System Architecture and Technologies. White Pap. 2018, 10, 2. [Google Scholar] [CrossRef]
- Al-Sarawi, S.; Anbar, M.; Alieyan, K.; Alzubaidi, M. Internet of Things (IoT) communication protocols: Review. In Proceedings of the 2017 8th International Conference on Information Technology (ICIT), Amman, Jordan, 17–18 May 2017. [Google Scholar] [CrossRef]
- Heđi, I.; Špeh, I.; Šarabok, A. IoT network protocols com-parison for the purpose of IoT constrained networks. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017. [Google Scholar] [CrossRef]
- Sharma, S.; Kumar, S. A Review on IoT:Protocols, Architecture, Technologies, Application and Research Chal-lenges. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020. [Google Scholar] [CrossRef]
- Geng, H. Networking protocols and standardsfor internet of things. In Internet of Things and Data Analytics Handbook; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2016. [Google Scholar] [CrossRef]
- Mishra, B. The Use of MQTT in M2M and IoT Systems: A Survey. IEEE Access 2020, 8, 201071–201086. [Google Scholar] [CrossRef]
- Wang, H. A lightweight XMPP publish/subscribe scheme for resource-constrained IoT devices. IEEE Access 2017, 5, 16393–16405. [Google Scholar] [CrossRef]
- Nikolov, N. Research of MQTT, CoAP, HTTP and XMPP IoT communication protocols for embedded system. In Proceedings of the 2020 XXIX International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 16–18 September 2020. [Google Scholar] [CrossRef]
- Uy, N.Q.; Nam, V.H. A comparison of AMQP and MQTT protocols forInternet of Things. In Proceedings of the 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 12–13 December 2019. [Google Scholar] [CrossRef]
- Naik, N. Choice of effective messaging protocols for IoT systems:MQTT, CoAP, AMQP and HTTP. In Proceedings of the 2017 IEEE International Systems Engineering Symposium (ISSE), Vienna, Austria, 11–13 October 2017. [Google Scholar] [CrossRef]
- Coetzee, L.; Oosthuizen, D.; Mkhize, B. An Analysis ofCoAP as Transport in an Internet of Things Environment. In Proceedings of the 2018 IST-Africa Week Conference (IST-Africa), Gaborone, Botswana, 9–11 May 2018. [Google Scholar]
- Rahman, R.A.; Shah, B. Security analysis of IoT protocols: A focus in CoAP. In Proceedings of the 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, 15–16 March 2016. [Google Scholar] [CrossRef]
- Alaerjan, A.; Kim, D.K.; Al Kafaf, D. Modeling functionalbehaviors of DDS. In Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San Francisco, CA, USA, 4–8 August 2017. [Google Scholar] [CrossRef]
- Ho, M.H.; Yen, H.C.; Lai, M.Y.; Liu, Y.T. Imple-mentation of DDS Cloud Platform for Real-time Data Acquisition of Sensors. In Proceedings of the 2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien City, Taiwan, 16–19 November 2021. [Google Scholar] [CrossRef]
- Jara, A.J.; Martinez-Julia, P.; Skarmeta, A. Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things. In Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Palermo, Italy, 4–6 July 2012. [Google Scholar] [CrossRef]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Achir, M.; Abdelli, A.; Mokdad, L. A taxonomy of service discovery approaches in IoT. In Proceedings of the 2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM), Reims, France, 27–29 October 2020. [Google Scholar] [CrossRef]
- Purnama, B.; Budiarto, R.; Stiawan, D.; Hanapi, D. Monitoring Connectivity of In-ternet of Things Device on Zigbee Protocol. In Proceedings of the 2018 International Conference on Electrical Engineering and Computer Science (ICECOS), Pangkal, Indonesia, 2–4 October 2018. [Google Scholar] [CrossRef]
- Chandan, A.R.; Khairnar, V.D. Bluetooth Low Energy(BLE) Crackdown Using IoT. In Proceedings of the 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 11–12 July 2018. [Google Scholar] [CrossRef]
- Vagdevi, P.; Nagaraj, D.; Prasad, G.V. Home: IOT based homeautomation using NFC. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017. [Google Scholar] [CrossRef]
- 802.15.4-2015; IEEE Standard for Low-Rate Wireless Networks. IEEE: Piscataway Township, NJ, USA, 22 April 2016. [CrossRef]
- Geng, H. IPv6 for IoT and gatewa. In Internet of Things and Data Analytics Handbook; Wiley: New York, NY, USA, 2016; ISBN 978-1-119-17364-9. [Google Scholar] [CrossRef]
- McGee, K.; Collier, M. 6LoWPAN Forwarding Techniques for IoT. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019. [Google Scholar] [CrossRef]
- Mahmud, M.A.; Abdelgawad, A.; Yelamarthi, K. Improved RPL for IoT Applications. In Proceedings of the 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), Windsor, ON, Canada, 5–8 August 2018. [Google Scholar] [CrossRef]
- Masirap, M.; Amaran, M.H.; Yussoff, Y.M.; Ab Rahman, R.; Hashim, H. Evaluation of reliable UDP-based transport protocols for Internet of Things (IoT). In Proceedings of the 2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Penang, Malaysia, 30–31 May 2016. [Google Scholar] [CrossRef]
- Porkodi, R.; Bhuvaneswari, V. The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview. In Proceedings of the 2014 International Conference on Intelligent Computing Applications, Coimbatore, India, 6–7 March 2014. [Google Scholar] [CrossRef]
- Giri, A.; Dutta, S.; Neogy, S.; Dahal, K.; Pervez, Z. Internet of things (IoT): A survey on architecture, enabling technologies, applications and challenges. In Proceedings of the 1st International Conference on Internet of Things and Machine Learning (IML ’17), Liverpool, UK, 17–18 October 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1–12. [Google Scholar] [CrossRef]
- Khanna, A.; Kaur, S. Internet of Things (IoT), Applications and Challenges: A Comprehensive Review. Wirel. Pers. Commun. 2020, 114, 1687–1762. [Google Scholar] [CrossRef]
- Baker, S.B.; Xiang, W.; Atkinson, I. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities. IEEE Access 2017, 5, 26521–26544. [Google Scholar] [CrossRef]
- Choi, J.; Choi, C.; Kim, S.; Ko, H. Medical Information Protection Frameworks for Smart Healthcare based on IoT. In Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, Seoul, Korea, 26–28 June 2019. [Google Scholar] [CrossRef]
- Ahmed, S.; Ilyas, M.; Raja, M.Y.A. Internet ofThings: Applications in Smart Healthcare. In Proceedings of the 9th International Conference on Society and Information Technology (IICSIT 2018), Orlando, FL, USA, 13–16 March 2018; pp. 19–24. [Google Scholar]
- Ahad, A.; Tahir, M.; Yau, K.L.A. 5G-Based Smart Healthcare Network: Architecture, Tax-onomy, Challenges and Future Research Directions. IEEE Access 2019, 7, 100747–100762. [Google Scholar] [CrossRef]
- Khaloufi, H.; Abouelmehdi, K.; Beni-Hssane, A. Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, 31 March–2 April 2020. [Google Scholar] [CrossRef]
- Ma, X.; Wang, Z.; Zhou, S.; Wen, H.; Zhang, Y. Intelligent Healthcare Systems Assisted by Data Analyticsand Mobile Computing. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018. [Google Scholar] [CrossRef]
- Ullah, A.; Azeem, M.; Ashraf, H.; Alaboudi, A.A.; Humayun, M.; Jhanjhi, N.Z. Secure Healthcare Data Aggregation and Transmission inIoT—A Survey. IEEE Access 2021, 9, 16849–16865. [Google Scholar] [CrossRef]
- Lytras, M.D.; Chui, K.T.; Visvizi, A. Data Analytics in Smart Healthcare: The RecentDevelopments and Beyond. Appl. Sci. 2019, 9, 2812. [Google Scholar] [CrossRef]
- Tian, S.; Yang, W.; Le Grange, J.M.; Wang, P.; Huang, W.; Ye, Z. Smart healthcare: Making medical care more intelligent. Glob. Health J. 2019, 3, 62–65. [Google Scholar] [CrossRef]
- Thakare, V.; Khire, G. Role of Emerging Technology for Building Smart Hospital Information System. Procedia Econ. Financ. 2014, 11, 583–588. [Google Scholar] [CrossRef]
- Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Udo, I.J.; Ekpenyong, M.E. Improving Emergency Healthcare Response using Real-Time Collaborative Technology. In Proceedings of the 2020 4th International Conference on Medical and Health Informatics, Kamakura City, Japan, 14–16 August 2020. [Google Scholar] [CrossRef]
- Sundaravadivel, P.; Kougianos, E.; Mohanty, S.P.; Ganapathiraju, M.K. Everything you wanted to know about smart health care: Evaluating the different technologies and components of the internet of things for better health. IEEE Consum. Electron. Mag. 2017, 7, 18–28. [Google Scholar] [CrossRef]
- Khodkari, H.; Maghrebi, S.G.; Asosheh, A.; Hosseinzadeh, M. Smart Healthcare and Quality of Service Challenges. In Proceedings of the 2018 9th Inter-national Symposium on Telecommunications (IST), Tehran, Iran, 17–19 December 2018; pp. 253–257. [Google Scholar] [CrossRef]
- Abdullah, H.; Jalil, S.Z.A.; Sarip, S.; Izhar, M.A.M.; Bani, N.A. Internet of things devices and issues in iot system development for healthcare. Turk. J. Physiother. Rehabil. 2021, 32, 2. [Google Scholar]
- Saleem, J.; Hammoudeh, M.; Raza, U.; Adebisi, B.; Ande, R. IoT standardisation: Challenges, perspectivesand solution. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ’18), Amman, Jordan, 26–27 June 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1–9. [Google Scholar] [CrossRef]
- Atlam, H.F.; Wills, G.B. IoT Security, Privacy, Safety and Ethics. In Digital Twin Technologies and Smart Cities; Springer: Cham, Switzerland, 2020; pp. 123–149. [Google Scholar] [CrossRef]
- Ahad, A.; Tahir, M.; Aman Sheikh, M.; Ahmed, K.I.; Mughees, A.; Numani, A. Technologies Trend towards 5G Network for SmartHealth-Care Using IoT: A Review. Sensors 2020, 20, 4047. [Google Scholar] [CrossRef] [PubMed]
- Schlegel, C.; Kempter, R.; Kota, P. A novel random wireless packet multiple access method using cdma. IEEE Trans. Wirel. Commun. 2006, 5, 1362–1370. [Google Scholar] [CrossRef]
- Choi, J.; Yu, N.Y. Compressive channel division multiple access for mtc under frequency-selective fading. IEEE Trans. Commun. 2017, 65, 2715–2725. [Google Scholar] [CrossRef]
- Lv, T.; Ma, Y.; Zeng, J.; Mathiopoulos, P.T. Millimeter-wave noma transmission in cellular m2m communications for internet of things. IEEE Internet Things J. 2018, 5, 1989–2000. [Google Scholar] [CrossRef]
- Osorio, C.A.C.; Echeverry, G.A.I.; Ossa, L.F.C.; Bedoya, O.H.F. Computational architecture of IoT data analytics for connected homebased on deep learning. In Proceedings of the 10th Euro-American Conference on Telematics and Information Systems (EATIS ’20), Aveiro, Portugal, 25–27 November 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Dorj, U.O.; Lee, M.; Choi, J.Y.; Lee, Y.K.; Jeong, G. The Intelligent Healthcare Data ManagementSystem Using Nanosensors. J. Sens. 2017, 2017, 7483075. [Google Scholar] [CrossRef]
- Kazmi, A.; Jan, Z.; Zappa, A.; Serrano, M. Overcoming the Heterogeneity in the Internet of Things for Smart Cities. In Proceedings of the International Workshop on Interoperability and Open-Source Solutions, Stuttgart, Germany, 7 November 2016; Springer: Cham, Switzerland, 2016. [Google Scholar] [CrossRef]
- Ghosh, S.; Basu, K.; Das, S.K. ‘MeshUp’: Self-organizing meshbased topologies for next generation radio access networks. Ad Hoc Netw. 2007, 5, 652–679. [Google Scholar] [CrossRef]
- Du, S.; Khan, A.; PalChaudhuri, S.; Post, A.; Saha, A.K.; Druschel, P.; Johnson, D.B.; Riedi, R. Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking. Ad Hoc Netw. 2008, 6, 485–507. [Google Scholar] [CrossRef]
- Gong, M.X.; Midkiff, S.F.; Mao, S. On-demand routing and channel assignment in multi-channel mobile ad hoc networks. Ad Hoc Netw. 2009, 7, 63–78. [Google Scholar] [CrossRef]
- Jiang, H.; Zhou, C.; Wu, L.; Wang, H.; Lu, Z.; Ma, L.; Li, Y. TDOCP: A two-dimensional optimization integrating channel assignment and power control for large-scale WLANs with dense users. Ad Hoc Netw. 2015, 26, 114–127. [Google Scholar] [CrossRef]
- Patota, F.; Chiaraviglio, L.; Bella, F.; Deriu, V.; Fortunato, S.; Cuomo, F. DAFNES: A distributed algorithm for network energy saving based on stress-centrality. Comput. Netw. 2016, 94, 263–284. [Google Scholar] [CrossRef]
- Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
- Li, S.; Oikonomou, G.; Tryfonas, T.; Chen, T.M.; Xu, L.D. A distributed consensus algorithm for decision making in serviceoriented Internet of Things. IEEE Trans. Ind. Informat. 2014, 10, 1461–1468. [Google Scholar]
- Khan, W.A.; Hussain, M.; Latif, K.; Afzal, M.; Ahmad, F.; Lee, S. Process Interoperability in Healthcare Systemswith Dynamic Semantic Web Services. Computing 2013, 95, 837–862. [Google Scholar] [CrossRef]
- Hoebeke, J.; De Poorter, E.; Bouckaert, S.; Moerman, I.; Demeester, P. Managed ecosystems of networked objects. Wirel. Pers.Commun. 2011, 58, 125–143. [Google Scholar] [CrossRef] [Green Version]
- Tolk, A. Composable mission spaces and M&S repositories–applicability of open standards. In Spring Simulation Interoperability Workshop; Springer: Arlington, VA, USA, 2004. [Google Scholar]
- Ishaq, I.; Hoebeke, J.; Moerman, I.; Demeester, P. Internet of things virtual networks: Bringing network virtualization to constrained devices. In Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Besancon, France, 20–23 November 2012. [Google Scholar]
- Ahmed, S.M.; Rajput, A. Threats to patients’ privacy in smart healthcareenvironment. In Innovation in Health Informatics; Academic Press: Cambridge, MA, USA, 2020. [Google Scholar] [CrossRef]
- Ranjith, J.; Mahantesh, K. Privacy and Security issues in Smart HealthCare. In Proceedings of the 2019 4th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), Mysuru, India, 13–14 December 2019. [Google Scholar] [CrossRef]
- Masood, I.; Wang, Y.; Daud, A.; Aljohani, N.R.; Dawood, H. Towards Smart Healthcare: Patient Data Pri-vacy and Security in Sensor-Cloud Infrastructure Survey. Wirel. Commun. Mob. Comput. 2018, 2018, 2143897. [Google Scholar] [CrossRef]
- Sharma, C.; Sunanda, D. Survey on Smart Healthcare: An Application of IoT. Int. J. Emerg. Technol. 2017, 8, 330–333. [Google Scholar]
- Gia, T.N.; Rahmani, A.M.; Westerlund, T.; Liljeberg, P.; Tenhunen, H. Fault Tolerant and Scalable IoT-based Architecturefor Health Monitoring. In Proceedings of the 2015 IEEE Sensors Applications Symposium (SAS), Zadar, Croatia, 13–15 April 2015. [Google Scholar] [CrossRef]
- Kalid, N.; Zaidan, A.A.; Zaidan, B.B.; Salman, O.H.; Hashim, M.; Muzammil, H.J.J.O.M.S. Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related “Big Data” UsingBody Sensors information and Communication Technology. J. Med. Syst. 2018, 42, 1–30. [Google Scholar] [CrossRef]
- Borujeni, A.M.; Fathy, M.; Mozayani, N. A hierarchical, scalable architecture for areal-time monitoring system for an electrocardiography, using context-aware computing. J. Biomed. Inform. 2019, 96, 103251. [Google Scholar] [CrossRef] [PubMed]
- Alabdulatif, A.; Khalil, I.; Yi, X.; Guizani, M. Secure Edge of Things for Smart Healthcare Surveillance Framework. IEEE Access 2019, 7, 31010–31021. [Google Scholar] [CrossRef]
- Tseng, C.-L.; Lin, F.J. Extending scalability of IoT/M2M platforms with Fog computing. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018. [Google Scholar] [CrossRef]
- Shif, L.; Wang, F. Improvement of security and scalability for IoT network using SD-VPN. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018. [Google Scholar] [CrossRef]
- Venkatesh, J.; Aksanli, B. Scalable-Application Design for the IoT. IEEE Softw. 2017, 34, 62–70. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of Threats?: A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Frustaci, M.; Pace, P.; Aloi, G.; Fortino, G. Evaluating Critical Security Issues of the IoTWorld: Present and Future Challenges. IEEE Internet Things J. 2018, 5, 2483–2495. [Google Scholar] [CrossRef]
- Lu, Y.; Sinnott, R.O. Security and privacy solutions forsmart healthcare systems. In Innovation in Health Informatics; Academic Press: Cambridge, MA, USA, 2020. [Google Scholar] [CrossRef]
- Karunarathne, S.M.; Saxena, N.; Khan, M.K. Security and Privacy in IoT SmartHealthcare. IEEE Internet Comput. 2021, 25, 37–48. [Google Scholar] [CrossRef]
- Wheelus, C.; Zhu, X. IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework. IoT 2020, 1, 259–285. [Google Scholar] [CrossRef]
- Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Abbas, Y. An In-Depth Analysis of IoT Security Requirements, Challenges and their Countermeasures via Software Defined Security. IEEE Internet Things J. 2020, 7, 10250–10276. [Google Scholar] [CrossRef]
- Shivraj, V.L.; Rajan, M.A.; Singh, M.; Balamuralidhar, P. One timepassword authentication scheme based on elliptic curves for internet of things (iot). In Proceedings of the 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, Saudi Arabia, 17–19 February 2015; pp. 1–6. [Google Scholar]
- Lai, C.; Lu, R.; Zheng, D.; Li, H.; Shen, X.S. GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput. Netw. 2016, 99, 66–81. [Google Scholar] [CrossRef]
- Aman, M.N.; Chua, K.C.; Sikdar, B. Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet Things J. 2017, 4, 1327–1340. [Google Scholar] [CrossRef]
- Chen, D.; Zhang, N.; Qin, Z.; Mao, X.; Qin, Z.; Shen, X.; Li, X. S2M: A Lightweight Acoustic Fingerprintsbased Wireless Device Authentication Protocol. IEEE Internet Things J. 2016, 4, 88–100. [Google Scholar] [CrossRef]
- Wallrabenstein, J.R. Practical and Secure IoT Device Authentication Using Physical Unclonable Functions. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016. [Google Scholar]
- Kothmayr, T.; Schmitt, C.; Hu, W.; Brünig, M.; Carle, G. DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 2013, 11, 2710–2723. [Google Scholar] [CrossRef]
- DRAFT–Controlled Distribution, White Paper, The Internet of Things Reference Model, © 2014 Cisco and/or Its Affiliates. All Rights Reserved. Available online: https://dl.icdst.org/pdfs/files4/0f1d1327c5195d1922175dd77878b9fb.pdf (accessed on 26 July 2022).
- Building the Internet of Things, White Paper, © 2013 Cisco and/or Its Affiliates. All Rights Reserved. Available online: https://www.cisco.com (accessed on 26 July 2022).
- Atlam, H.F.; Wills, G.B. Technical aspects of blockchain and IoT. Adv. Comput. 2019, 115, 1–39. [Google Scholar] [CrossRef]
- Noor, M.b.M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
- Kumar, A.; Krishnamurthi, R.; Nayyar, A.; Sharma, K.; Grover, V.; Hossain, E. A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes. IEEE Access 2020, 8, 118433–118471. [Google Scholar] [CrossRef]
- Radanliev, P.; De Roure, D. Review of Algorithms for Artificial Intelligence on Low Memory Devices. IEEE Access 2021, 9, 109986–109993. [Google Scholar] [CrossRef]
- Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarné, G.M. Trust and Reputation in the Internet of Things: State-of-the-Art and Research Challenges. IEEE Access 2020, 8, 60117–60125. [Google Scholar] [CrossRef]
- Corradini, E.; Nicolazzo, S.; Nocera, A.; Ursino, D.; Virgili, L. Increasing protection and autonomy in the IoT through a two-tier blockchain framework. In CEUR Workshop Proceedings; Sun SITE Central Europe: Aachen, Germany, 2021. [Google Scholar]
- Radanliev, P.; De Roure, D.; Burnap, P.; Santos, O. Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. Rev. Socionetwork Strateg. 2021, 15, 381–411. [Google Scholar] [CrossRef]
Layer | Responsibility |
---|---|
1–Edge Devices/Controllers | Physical devices like sensors, actuators, RFID tags |
2–Connectivity | Sum of all hardware and protocols |
3–Edge/Fog Computing | Data handling and network security such as the end to end data encryption, Data filtering, Data scrubbing, Event generation |
4–Data Accumulation | Data in motion becomes Data at Rest, creation of database records, allowing data query, accumulation, and filtering strategies for data optimization |
5–Data abstraction | Ensures quality and completeness of data, Extract, Transform, Load (ETL) functions, Data Processing, Data Comparison and reconciliation, and many types of data manipulations |
6–Applications | Data interpretation, Reporting, Analytics and System Control |
7–Users/Collaboration | User interaction is coordinated with all functions of the system |
Layer | Responsibility |
---|---|
1—Edge Devices/Controllers | Physical devices like sensors, actuators, RFID tags |
2—Connectivity | Sum of all hardware and protocols |
3—Edge/Fog Computing | Data handling and network security such as the end to end data encryption, Data filtering, Data scrubbing, Event generation |
4—Data Accumulation | Data in motion becomes Data at Rest, creation of database records, allowing data query, accumulation, and filtering strategies for data optimization |
5—Data abstraction | Ensures quality and completeness of data, Extract, Transform, Load (ETL) functions, Data Processing, Data Comparison and reconciliation, and many types of data manipulations |
6—Applications | Data interpretation, Reporting, Analytics and System Control |
7—Users/Collaboration | User interaction is coordinated with all functions of the system. |
IoT Application | Issues in Implementation | Corresponding Countermeasures |
---|---|---|
Smart Health | Handling high dimensional and weakly-structured data, Handling physical-digital ecosystems | Knowledge Discovery and Data mining, Human–Computer Interaction |
Smart Agriculture | Interoperability of different standards, connectivity in rural areas, Constrained devices | Authentication and Access control, Privacy-preserving, Block-chain based solutions for data integrity, Physical countermeasures |
Smart Wearable | Privacy, Security, Battery life, Connectivity, Platform standardization, design, data handling | Data management techniques, lightweight encryption, passive devices, BLE, IPv6 protocols |
Smart Industry | Lack of real-time data, disparate data systems | Smart asset monitoring, enterprise IoT platform |
Smart Transportation in Smart Cities | Designing Sustainable, effective, and secure transport systems, Autonomous and Connected vehicles | Mobility As A Service, Intelligent Traffic Management Solutions, Micro mobility Management |
Smart Supply Chain | Optimize inventory and supply chain demands across multiple channels, Improve quality and speed in supply chain | Predictive and Prescriptive Analytics to Identify and model sales trends, Introducing internal check points in DBMS, Cryptography, and Key management. |
IoT Protocols | Respective IoT Application |
---|---|
NFC | Payments and loyalty points, Identity Validation, Access Control, Attendance tracking, and record-keeping |
BLE | Fitness trackers, Smart watches, Beacons, Medical devices, Home automation devices |
Zigbee | Security systems, Light control systems, Gaming consoles, Wireless control, Industrial automation, Health care, Fire extinguishers |
Wi-Fi | Mobile applications, Business applications, Smart home, Computerized applications, Automotive segment |
6LoWPAN | Automation, Industrial monitoring, Smart grid, Smart home |
IPV6 | Net utilities (ping, ipconfig), FTP, TELNET, SMTP |
LoRa WAN | Smart city, Industrial applications, Smart home applications, Smart health, Smart applications |
LTE-M | Smart city services, Asset tracking, Wearable, E-Health solutions |
NB-IoT | Smart metering, Facility management services, Intruder and fire alarms, Appliances measuring health parameters, Object tracking, Smart city infrastructure, Connected Industrial appliances |
MQTT | Gathering sensor data, Synchronization of sensors, Monitoring health parameters via sensors, Alert messages, Facebook Messenger |
CoAP | Smart energy, Building automation |
Parameter | Traditional Data Management | IoT Data Management |
---|---|---|
Data collection | From finite sources | From a growing number of sources |
Form of storage | Scalar form with strict normalized rules | Unstructured storages |
Frequency of updating | Occasional updating | Continuous streaming |
Maintenance of ACID properties | It can be realized easily | It’s challenging to realize while executing transactions. |
Data accumulation | No issues in storing static data | Problems in storing generating mobile data |
Fog Computing | Data Accumulation | Data Abstraction |
---|---|---|
Data filtering, clean up, aggregation, Packet content inspection, Network and data level analytics, Thresholding, Event generation | Event filtering and sampling, and comparison, Rule evaluation and aggregation, North bound/south bound altering, Event persistence in storage | Integration of multiple data formats, Maintaining consistent semantics of data, Placing data in the appropriate database, Altering high-level applications, Data virtualization, Data protection, Normalization, De-normalization, and Indexing for fast application access |
Layers of IoT Interoperability Model in [102] | Layers of IoT Interoperability Model in [103] | Feature of Layer |
---|---|---|
Connection | No connection | No interoperability between systems |
Communication | Technical | Basic Network connectivity |
Semantic | Syntactical | Data exchanging |
Dynamic | Semantic | Understanding the meaning of the data |
Behavioral | Programmatic/Dynamic | Application of information |
Conceptual | Conceptual | Shared view of the world |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aguru, A.D.; Babu, E.S.; Nayak, S.R.; Sethy, A.; Verma, A. Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation. Algorithms 2022, 15, 309. https://doi.org/10.3390/a15090309
Aguru AD, Babu ES, Nayak SR, Sethy A, Verma A. Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation. Algorithms. 2022; 15(9):309. https://doi.org/10.3390/a15090309
Chicago/Turabian StyleAguru, Aswani Devi, Erukala Suresh Babu, Soumya Ranjan Nayak, Abhisek Sethy, and Amit Verma. 2022. "Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation" Algorithms 15, no. 9: 309. https://doi.org/10.3390/a15090309
APA StyleAguru, A. D., Babu, E. S., Nayak, S. R., Sethy, A., & Verma, A. (2022). Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation. Algorithms, 15(9), 309. https://doi.org/10.3390/a15090309