You are currently viewing a new version of our website. To view the old version click .
Engineering Proceedings
  • Proceeding Paper
  • Open Access

12 January 2024

Development of a Modified Medical Data Transmission over the Cellular Network System to Secure Health-Related Data from Changes in Environmental Parameters †

and
Department of IoT, Koneru Lakshmaiah Education Foundation, Vaddeswaram 500502, AP, India
*
Author to whom correspondence should be addressed.
Presented at the International Conference on Recent Advances in Science and Engineering, Dubai, United Arab Emirates, 4–5 October 2023.
This article belongs to the Proceedings Eng. Proc., 2023, RAiSE-2023

Abstract

Patients are generally sent to hospitals during emergencies and life-threatening conditions using ambulances. The health problems of patients become more serious when the treatment is delayed. If the vital signs of patients inside an ambulance or a treatment area sent to a hospital in real time, the odds of saving lives will improve considerably. The patient’s medical needs can be arranged by paramedics with the doctors’ instructions until their arrival at the hospital. Information from past vital signs can also be archived their medical history. The Internet of Things (IoT) is a paradigm that visualizes practically everything connected to the Internet. This opens access to a lot of tiny medical needs and emergency relief tools. As a proof of concept, a test model prototype was implemented using an IoT-enabled ambulatory vital sign sensor board and a remote hospital framework. The objective of the implementation of such a prototype blends IoT technology with healthcare services to provide a more efficient and patient-centred approach to monitoring and controlling health issues, particularly in instances when continuous remote monitoring is advantageous. The working of the proposed device was validated and the results were monitored for the health-related data collected during the testing period. This strategy promotes health monitoring in emergencies with eHealth Signals for medical assistance.

1. Introduction

Local hospitals should be willing to identify the most seriously wounded patients who need to be treated on time. In addition, additional medical staff and supplies and medical advice for patients in critical condition may be considerably delayed. Consequently, human lives are at risk in such cases. There is a need to bridge this gap and reduce the delay. Also, paramedics are not the decision-makers for the most important patients, and immediately after the outbreak of a mass accident, there is an absence of doctors on the triage site to evaluate the condition of patients who have been seriously wounded. It is therefore beneficial to explore a technique to collect the health-related data of patients and move them to the hospital while ambulances carrying several patients are in transit. The main objective of our work discussed in this paper was to strengthen previous work with real-time vital signs of patients being transferred to a remote hospital in a fast and secure way.
Our focus is to transfer to remote hospitals the real-time vital signs of patients securely. Their live transmission will enable the emergency room doctors in the hospital to be well-equipped in advance to treat patients on their way to hospitals. The state of the art in emergency health care management is considered a high priority. In Section 1, we discuss the literature review, which covers the vital sign data transmission techniques and diagnosis analysis. In Section 2, the proposed modified Medical Data Transmission over the Cellular Network (MEDTOC) system architecture, and the algorithm to allocate patients to hospitals based on the importance of the Revised Trauma Score (RTS) and other factors, are discussed. In Section 3, we cover the development of the ambulatory vital sign monitoring system functional platform board. In Section 4, the Modified Medical Data Transmission over the Cellular Network (MEDTOC) system is presented. Section 5 addresses the A-Data encryption algorithm for data security and simulation results. In Section 4, the results and a discussion of the work are provided, and in Section 5, the conclusion and future work are presented.

2. Literature Review

Medical emergency systems enabled by IoT have expanded tremendously as a result of technical improvements and the need for more efficient and rapid healthcare solutions. According to research, they have the potential to transform emergency treatment by offering prompt interventions, increasing patient outcomes, and improving the entire healthcare experience. However, security, data privacy, interoperability, and regulatory compliance remain concerns that academics and developers are actively addressing in their work.
Using the previously presented Medical Data Transmission over the Cellular Network (MEDTOC) [] method, the delay in the first visit with doctors can be greatly reduced. Similarly, the vital signs of many patients in the MEDTOC system can be combined, optionally reduced, and sent over the cellular network to local hospitals for patient monitoring. The received data are decompressed and separated in the hospital to be shown to the doctors. MEDTOC features complex packet-header formats, guidelines for patient grouping, and a web portal to provide doctors with a stable and familiar interface. In a recent paper, ref. [] outlined a revised MEDTOC-based system for controlling and accessing patient data until they appear for medication at the local hospitals using Smart algorithms. To adapt to the resources available, the previously specified framework was altered and improved.
A medicine reminder mechanism was used to integrate the patient data collected onsite using vital motes [] and send it to hospitals using the cellular network. Vital motes are instruments that capture a patient’s vital signs and relay them for medication. Most of these systems, however, are limited to data for single patients. On the other hand, the aggregation of data for multiple patients assessed in [,,] was limited to internal use either on-site or in hospital triage rooms. A web portal was designed to enable registered users to obtain vital statistics about the overall scenario of disaster management. Earlier, the concept of real-time wireless transmission of patient medical data was introduced, and several systems for this purpose have been developed. For multiple patients, Code Blue sensors [] may be used to aggregate information on vital signs, including temperature, blood pressure, levels of SpO2 saturation, and pulse rate.
An approach that allows physicians to track health-related data like ECG, BPM, SPo2, and blood pressure obtained using a real-time event-based engine [,,] has been proposed by Iancu Constantinetal. An e-Health framework for cardiac tele monitoring, which uses a Link It One development board, has been developed []. In [], an eHealth Smart Networked Device was investigated. A framework for the automated collection of patient information using wireless sensor networks linked to medical equipment has been proposed by Rolimetal. In an emergency, IoT-based healthcare secure strategies were applied for further investigation []. The data collected were transferred to cloud healthcare provider centres to store, process, and analyse the data from patients. The role of the IoT has motivated researchers to investigate its use in the field of health care in a secure way over the last few years []. In the healthcare sector, however, the introduction of IoT is still in the early stages. In many cases, the healthcare domain mandates pervasive approaches [] in distinct interventions. Various health advances in research and technical aspects were discussed [,,,,,,,,,,,,] using adaptable setups.

3. Methodology for Modified Secure IoT Healthcare System

The patient’s health parameters can be monitored locally by various approaches. They can be sent to a remote location using Internet packet protocols. Taking this as motivation, with improvisation, a working prototype model was built. The Internet of Things (IoT) plays an important role in connecting devices by using messaging standards and networking protocols. One can easily transmit important health messages. The open-source IOT cloud is useful for storing sensor data. The advantage of digitally storing data is that data can be retrieved easily and quickly in the event of an emergency for safe healthcare. It has the ability to handle many patients with the vital attributes of patient care and well-being. Push notifications can be used when critical values are not met in the event. The vitals of the patients are being monitored with proposed Health care platform. Considering each physician’s smart device is getting vital signs, it is possible to ensure the safety of many patients in transit. Any change in a patient’s condition is recorded by the most recent data collected.
This model is divided into 3 functional level modules as listed below:
  • Ambulatory Vital Sign monitoring functional platform board.
  • Modified Medical Data Transmission over the Cellular Network (MEDTOC) system.
  • Data Encryption algorithm for health-related data security and simulation results.

3.1. Development of Ambulatory Vital Sign Monitoring System Functional Platform Board

Health-related data monitoring applications are very useful in the field of health at the platform level. The block diagram is shown in Figure 1. This device connects individuals to the patients. All of the kits monitor various health data such as temperature, SPO2, ECG, EMG, GSR, Pulse, airflow, BP, glucose, etc. Individual vital signs are stored along with the patient’s name and ID.
Figure 1. eHealth ambulatory vital sign monitoring embedded system.
It defines the sampling frequencies for different physical parameters that automatically bring about asynchronous systems. Individual records are saved in the cloud from the local database server. From the cloud, hospital assistants and doctors can access to diagnose patients, as shown in Figure 2. The differences and modifications performed in the above algorithm are tracked for all of the patients at the same time. It was modified as a one-to-one track from each patient in real time.
Figure 2. Block diagram of the modified MEDTOC system.
The strategic method is improved and explained in the algorithm steps below:
  • Monitoring of Vital Signs (patient vital signs data, patient vital signs references, physician scheduled at a base)
  • Given: vital signs data for N patients, database for M physicians, capacity L patients per physician
  • For (i = 1 to N)
  • Receive vital signs data of patient I and display it in a graphical reference scale;
  • Connect it to the physician schedule database = D
  • For (j = 1 to M)
  • Search for an available physician by status (P, Q, NA)
  • If (i = 1, i = M, i++) i.e., physician found with status P, alert the physician before the arrival of the data with an audible beep. Start sending the vital signs data of patient “i” to the physician with status (P), or go to step 1.
  • If (i = 1, i = M, i++) i.e., physician found with status Q, stop accepting more patients capacity // is reached. Record physician ID (T, Z) where T = title or “ID” of the physician and Z = MAC address of the physician’s smart device.
  • Or go to step 1.
  • if (j = 0, j = M, j++) i.e., physician found with status NA, patient is sent to step 8.

3.2. Modified Medical Data Transmission over the Cellular Network (MEDTOC) System

There are many mental images about what the term ‘Smart Hospital’ means. The reality, however, is that adding technology, devices, and sensors does not inherently make a building ‘smart’. In some situations, digital technologies are being pushed into hospitals without even worrying about the consequences. While hospitals are under increased pressure to achieve a real-time health system, they are hampered by the nature of their operating models or the interoperability problems that may exist. The approach helps to build the new eco system in the health domain to address the realtime problems. addresses consequences from all perspectives.
Smart Hospital digital technology can deliver a viable means to address these challenges. Figure 3 represents the patient ambulatory vital signs test setup arranged to monitor health-related data: (1) Identifying physical objects and their digital representation (basic requirement); (2) Creating an instance of physical objects and their environment, and connecting to existing data and systems (PLM and MES); (3) Selecting the connectivity protocols and using application needs; (4) Considering security; (5) Considering data science to be applied to achieve the requirements; and (6) Maintaining the records to clear and reuse the data.
Figure 3. Setup of the Ambulatory Vital Sign Monitoring Functional Platform Board.
The value of the modified MEDTOC system includes: (a) Improves overall quality and predicts quality(b) Provides services; (c) Records rotation and serialization; and (d) Grows revenue and opportunities. The developed hospital digital framework is shown in Figure 4. The vital sign values are taken from the in-patient outpatient services. These are coordinated at various stages, like patient health diagnostic services. Here, the vital signs are monitored and sent to the informatics lab. Any emergency services are linked by interconnected devices.
Figure 4. Information process of Ambulatory Vital Sign interconnected devices.
This is implemented by considering four key enabling factors: data, context, reasoning, and KPIs. Data from the Smart Hospital are used, such as data about people, processes, connected devices, operational building systems, Hospital/Clinical Information Systems, and external health systems, as discussed in the Client-Server Algorithm shown in Table 1 and Table 2.
Table 1. Improved MEDTOC Client Side Procedure.
Table 2. Improved MEDTOC Server Side Procedure.
The modified MEDTOC calculates a hospital’s total treatment capacity (TTC) based on the individual critical care capacity (CCC) of each physician. The TTC of a hospital h is represented by the total number of patients. There are a limited number of physicians available to treat victims.
T T C h = i = 1 p C C C i
When a patient is assigned to a physician, the capacity of the physician and the hospital is updated. MEDTOC updates the selected physician’s CCC by subtracting the difference between the patient’s RTS value and the maximum possible [] RTS value of 7.8408. The equations for updating treatment capacities after assigning patient m to a physician n at hospital h are shown below:
C C C n , n e w = C C C n , o l d ( 7.8408 R T S m )
C C C h , n e w = T T C h , o l d ( 7.8408 R T S m )
The distance to the hospital, the hospital trauma rank, and the TTC are used to assign a patient to a specific hospital, as shown in Equation (4):
Priority(h) = T R h T R max * R T S + ( 1 D h D max ) + T T C h , a v a i l a b l e
The assignment of a patient to a specific hospital is determined by the distance to the hospital, the hospital trauma rank, and the TTC as shown in Equation (4). Equation (4) determines a hospital’s priority inpatient assignment based on three factors. The first factor takes into account the hospital’s trauma ranking. This rank, which ranges from 1 to 5, is derived from the five parameters listed below. These parameters were validated in collaboration with a major hospital and trauma centre’s Head of Emergency. The method was designed to help a large number of victims in a disaster who could be accommodated in local hospitals.
Context includes real-time information about the actual hospital’s current condition, the people within it, and their interactions with each other. The key element here is capturing the current status of people, systems, and things and making them more visible. Reasoning is a method for applying reasoning to data that are needed to drive action. Most commonly, the reasoning is based on separately processed rules, artificial intelligence (AI) or machine learning (ML) models, or temporal reasoning for a varied frequency of events. Key performance indicators (KPIs) provide a meaningful business context and ensure alignment between the hospital objectives and the performance measurement. This saves time and is shown in Table 3. The dashboard data are accessible from the cloud by using secure APIs.
Table 3. Comparative patient assignments.
As a result, emergency room wait times can be reduced and patient flow can be improved, decreasing operational costs and enhancing the patient experience. One hospital measured a 90 per cent improvement in cost savings after implementing digital technology to remove bottlenecks in bed management and inpatient flow []. One of the familiar vital signs is tracked and monitored and listed in Table 3 with the improved RTS range.
Another vital sign of the patient is tracked and monitored for one hour. It was analysed and observed and is shown in Figure 5. This system allowed for achieving real-time access by analysing the whole picture in real time. Hospital management can examine the complete hospital environment from data to workflows to patients to clinicians. If a patient’s condition is abnormal or there is an emergency on a certain floor, the right action in real time is to respond. Tracking and improving, and context-rich semantic linking, provides a picture of the past, present, and future state of the hospital.
Figure 5. Ambulatory Vital Signs data uploads in the Thing Speak platform.

3.3. A Data Encryption Algorithm for Data Security and Simulation Results

It is important to talk about the security aspects of using block cipher security algorithms. Ambulatory vital sign data protections, including cryptography keys, are used to guarantee the security of the user data and prevent any identity fraud (authentication). With the multiplication of devices used to become more sensitive to access paid services (cloud) or any other access-controlled resource, this subsequent asset becomes more sensitive. Finally, to prevent computer failure or malfunction, system functionality itself must be secured. A hash function is a type of computation that can map an indeterminate size of data within a set data size. More specifically, it gives some quantities that represent the data for input.
For many different problems, from integrity and authenticity, hash functions can be used, such as a block cipher hash function.
A cryptographic hash function can be improved in three criteria:
  • Preimage resistance
  • Second preimage resistance (weak collision resistance)
  • Strong collision resistance
In Table 4, explains the hashing techniques to data, which resulted in decent efficiency, security, and original data recovery.
Table 4. Ambulatory vital sign attributes applied for cipher algorithm and data recovery to the real-time environmental parameters monitored data.
Here, the hash function used mathematical one-way functions and calculated them to create an input hash value. Using block ciphers, cryptographic hashes were created. The encryption was represented using modular arithmetic by first transforming the letters into numbers, according to the scheme:
A = 0, B = 1…., Z = 25.
Encryption by a shift ‘n’ is described mathematically as:
En(x) = (x + n) mod26 (encryption phase with shift n)
Dn(x) = (x − n) mod 26 (decryption phase with shift n)
To this, sensor values were observed as shown in Table 5 and fed to the program to generate cipher data as follows:
Table 5. Real-time ambulatory vital sign data and encrypted data.
  • Assumed lowercase letters in string format.
  • A shifted integer between 0–25
  • Traversed one character at a time throughout the specified text.
  • Transformed the given character as per the rule for each character, depending on whether we are encrypting or decrypting the document. Return the newly produced string.
  • At the end, received the value (integer) for the text (string) and shift, and returns the encrypted text.
The development board came up with the AES architecture and presented here is the modification and improvisation that happened with the BCHASH algorithm padding procedure. Almost 20 years ago, the National Institute of Standards and Technology (NIST) developed AES as an encryption standard to replace the Data Encryption Standard (DES). AES encryption keys can go up to 256 bits, after all, while DES stopped at just 56 bits. A cipher that provided greater protection may have been chosen, but the trade-off would have required greater overhead, which would not be realistic.

4. Results and Discussions

The proposed work helped the hospital framework, which helps to monitor vital signs such as BP, ECG, SpO2, and HR, which are converted to digital format. The system exhibits the patients’ physiological vital signs monitored on a local level. Once the data have been collected, they can be transmitted to a remote location using Internet packet protocols over a cellular network. In this study, a working prototype model was created based on a physiological monitoring platform. For testing purposes, we wrote code in the open-source Arduino integrated development environment (IDE) software to read the patient’s test temperature data and upload it to the Arduino board connected to the My Signals hardware. This code reads the health parameters and writes them to the serial port of the Arduino. The ESP8286 is an SoC with Wi-Fi connectivity. The ESP8266 has an embedded TCP/IP protocol stack that allows every microcontroller to connect to a Wi-Fi network. In the test model of our proposed device, we interfaced the ESP8266 computer with the Arduino module to read data from the Arduino’s serial port and transfer them to the remote hospital server. The Arduino board reads patient data and transfers them to the serial port of the Arduino. The ESP8286 module then reads the data from the serial port and sends them to a defined Thing Speak platform. Multiple real-time ambulatory vital signs are observed. Because each smart device is receiving the vital signs, it is possible to ensure that any change in the real values prompts an evaluation of the condition of the patient and is captured for analysis.
A host machine used to store the data is shown in Figure 2. The Arduino board sends medical sensor data to the serial port of the host machine, which displays the obtained vital signs in graphical form on the monitor attached to it. This helps the paramedics inside the ambulance, who will check the patient’s health status at any time. Figure 5 displays a single patient’s vital signs on Thing Speak.
Assuming N patients, M physicians, and K hospitals. The modified MEDTOC determines the available hospital nearby and the patient’s current state as determined by the paramedics and vital signs by solving Equation (4).
A considerable number of users are drawn to untrusted servers by the ease of maintenance and motivation. A cloud server (CS) can disclose confidential information to third parties. As a result, all data must be distributed in ciphertext mode to guarantee data confidentiality and integrity in the face of untrustworthy cloud service providers (CSPs) [,]. The transmitted data are encrypted such that only approved parties can decipher them. The primary security methods used are presented. Symmetric encryption, also known as “private key cryptography”, is a simple and reliable means of securing online transmission. A private key saves arbitrarily generated words or combinations of letters linked to a hidden key to modify the message specifically. This encryption technique used is “block cipher”, with the amount of data encrypted or decrypted strictly proportional to the amount of time and processed for a fixed amount of data. The data are being monitored and applied to the block cipher algorithm to implement security aspects. Here, it was executed for 8 vital signs of the patient and performed encryption and decryption using the proposed block cipher hash values. Compared with various literature algorithms as listed in Table 6, the secure algorithm exhibited less time (0.6 ms) for encryption vice versa for decryption than the other algorithms. Finally, the objective of the proposed research method on a Secure IoT Healthcare Data Transfer System based on Environmental Parameters Monitoring was implemented.
Table 6. Comparative Analysis of Symmetric Encryption Algorithms.

5. Conclusions

The remote location is at a large distance from health centres. The sudden occurrence of a health emergency requires medication and treatment. This paper proposes a digital architecture Healthcare system for patients to a doctor at the nearest facility in normal situations and emergencies. A cloud-connected hospital framework is built. The framework includes patient ID, hospital ID, nearest accessible distance, and physician status in an interactive way using smart IoT platforms. The work represents a smooth function of the patients allocated to a doctor at the nearest hospital. In the communication of the inter-device patient data, the health messaging standards use the IoT (Internet of Things), and security aspects that were built play a vital role in effectively being able to store ambulatory vital sign data securely by improved hash algorithm techniques. As to future scope, we recommend extending the project reach by linking patient data obtained from essential motes and automatically transferring decisions using edge MQTT lightweight protocols. Starting with the first phases of system design and architecture, scalability and dependability were considered. Continuous monitoring and testing have been observed to maintain a high level of performance and availability as the system expands to accommodate more hospitals and patients.

Author Contributions

Conceptualization, K.K. and V.R.K.; methodology, K.K. and V.R.K.; software, K.K. and V.R.K.; validation, K.K. and V.R.K.; formal analysis, K.K. and V.R.K.; investigation, K.K. and V.R.K.; resources, K.K.; data curation K.K. and V.R.K.; writing—original draft preparation, K.K. and V.R.K.; writing—review and editing K.K. and V.R.K.; supervision, K.K. and V.R.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

All the data used are available in the present work.

Acknowledgments

I would also like to show my gratitude to Supervisor and KLEF, for guidance and assistance, which improved the quality of the research work and manuscript.

Conflicts of Interest

The authors acknowledged that there are no conflicting interests in the research work.

References

  1. Misbahuddin, S. IoT-Based Ambulatory Vital Signs Data Transfer System. J. Comput. Netw. Commun. 2018, 2018, 4071474. [Google Scholar] [CrossRef]
  2. Zubairi, J.A.; Idwan, S. Smart algorithms for patient assignment in disasters. ICT Express 2018, 4, 107–111. [Google Scholar] [CrossRef]
  3. Zanjal, S.V.; Talmale, G.R. Medicine reminder and monitoring system for secure health using IoT. Procedia Comput. Sci. 2016, 78, 471–476. [Google Scholar] [CrossRef]
  4. Deligiannidis, L.; Arabnia, H.R. Security Projects for Systems and Networking Professionals. In Emerging Trends in ICT Security; Elsevier: Amsterdam, The Netherlands, 2014. [Google Scholar]
  5. Islam, M.; Rahaman, A.; Islam, R. Development of smart healthcare monitoring system in IoT environment. SN Comput. Sci. 2020, 1, 1–11. [Google Scholar] [CrossRef]
  6. Olson, R.; Zubairi, J.A.; Biliciler, A. A software framework for patient data handling in emergencies and disasters. In Proceedings of the 2014 International Conference on Collaboration Technologies and Systems (CTS), Minneapolis, MN, USA, 19–23 May 2014; pp. 553–557. [Google Scholar]
  7. Kliem, A.; Hovestadt, M.; Kao, O. Security and Communication Architecture for Networked Medical Devices in Mobility-Aware eHealth Environments. In Proceedings of the 2012 IEEE First International Conference on Mobile Services, MS 2012, Honolulu, HI, USA, 24–29 June 2012; pp. 112–114. [Google Scholar]
  8. Pavlopoulos, S.; Kyriacou, E.; Berler, A.; Dembeyiotis, S.; Koutsouris, D. A novel emergency telemedicine system based on wireless communication technology–AMBULANCE. IEEE Trans. Inf. Technol. Biomed. Spec. Issue Emerg. Health Telemat. Appl. Eur. 1998, 2, 261–267. [Google Scholar] [CrossRef] [PubMed]
  9. Islam, S.M.R. The Internet of things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
  10. Idwan, S.; Zubairi, J. Load balancing for disaster recovery and management. Springer Wirel. Pers. Commun. J. 2016, 90, 369–379. [Google Scholar] [CrossRef]
  11. Nateghizad, M.B.M.; Maarof, M.A. Secure searchable based asymmetric encryption in cloud computing. Int. J. Adv. Soft Comput. Its Appl. 2014, 6, 1–13. [Google Scholar]
  12. Saini, N.; Pandey, N.; Singh, A.P. Enhancement of security using cryptographic techniques. In Proceedings of the 4th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2015, Noida, India, 2–4 September 2015. [Google Scholar]
  13. Masood, I. Towards smart healthcare: Patient data privacy and security in sensor-cloud infrastructure. Wirel. Commun. Mob. Comput. 2018, 2018, 2143897. [Google Scholar] [CrossRef]
  14. Sadek, I. Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations. In Proceedings of the International Conference on Smart Homes and Health Telematics, New York, NY, USA, 14–16 October 2019; Springer: Cham, Switzerland, 2019. [Google Scholar]
  15. Haghi, M. A Flexible and Pervasive IoT-Based Healthcare Platform for Physiological and Environmental Parameters Monitoring. IEEE Internet Things J. 2020, 7, 5628–5647. [Google Scholar] [CrossRef]
  16. Karthik, G.V.S.; Fathima, S.Y.; Rahman, M.Z.U.; Ahamed, S.R.; Lay-Ekuakille, A. Efficient signal conditioning techniques for brain activity in remote health monitoring network. IEEE Sens. J. 2013, 13, 3276–3283. [Google Scholar] [CrossRef]
  17. Gayathri, N.B.; Thumbur, G.; Kumar, P.R.; Rahman, Z.U.; Reddy, P.V.; Lay-Ekuakille, A. Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J. 2019, 6, 9064–9075. [Google Scholar] [CrossRef]
  18. Aparna, P.; Kishore, P.V.V. Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Process. 2019, 13, 421–428. [Google Scholar] [CrossRef]
  19. Soumya, I.; Rahman, M.Z.U.; Reddy, D.V.R.K.; Lay-Ekuakille, A. Efficient block processing of long duration biotelemetric brain data for health care monitoring. Rev. Sci. Instrum. 2015, 86, 035003. [Google Scholar] [CrossRef] [PubMed]
  20. Prasad, C.; Bojja, P. A reliable, energy aware and stable topology for bio-sensors in health-care applications. J. Commun. 2019, 14, 390–395. [Google Scholar] [CrossRef]
  21. Shinde, S.A.; Rajeswari, P.R. Intelligent health risk prediction systems using machine learning: A review. Int. J. Eng. Technol. 2018, 7, 1019–1023. [Google Scholar] [CrossRef]
  22. Krishna, C.V.P.; Kiran, K.V.D.; Kim, T.-H. Integrated Distributed Architecture to Integrate Wireless Sensor Networks (WSN) with Grid for Healthcare. Int. J. Bio-Sci. Bio-Technol. 2015, 7, 243–250. [Google Scholar] [CrossRef]
  23. Radhika, R.C.; Rao, M.R.N.; Venkateswarlu, S. Review on the security issues in human sensor networks for healthcare applications. Int. J. Eng. Technol. 2018, 7, 269–274. [Google Scholar]
  24. Mubarakali, A.; Ashwin, M.; Mavaluru, D.; Kumar, A.D. Design an attribute-based health record protection algorithm for healthcare services in cloud environment. Multimed. Tools Appl. 2020, 79, 3943–3956. [Google Scholar] [CrossRef]
  25. Kishore, K.H.; Nath, K.V.S.; Krishna, K.V.N.H.; Kumar, D.P.; Manikanta, V.; Basha, F.N. IOT Based Smart Health Monitoring Alert Device. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2019, 8, 157–160. [Google Scholar]
  26. Khan, M.M.; Alanazi, T.M.; Albraikan, A.A.; Almalki, F.A. IoT-based health monitoring system development and analysis. Secur. Commun. Netw. 2022, 2022, 9639195. [Google Scholar] [CrossRef]
  27. Abdulmalek, S.; Nasir, A.; Jabbar, W.A.; Almuhaya, M.A.M.; Bairagi, A.K.; Khan, M.A.-M.; Kee, S.-H. IoT-Based Healthcare-Monitoring System towards Improving Quality of Life: A Review. Healthcare 2022, 10, 1993. [Google Scholar] [CrossRef] [PubMed]
  28. Islam, R.; Kabir, M.; Mridha, M.F.; Alfarhood, S.; Safran, M.; Che, D. Deep Learning-Based IoT System for Remote Monitoring and Early Detection of Health Issues in Real-Time. Sensors 2023, 23, 5204. [Google Scholar] [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.