Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT
Abstract
:1. Introduction
- Step 1: Subscribe to a trusted network.
- Step 2: Collect and report the data from the patient via IoT devices.
- Step 3: The platform should ensure that data is privacy preserved. Unauthorized access should be detected.
- Step 4: The end-to-end data from collection to receipt by the RHM should be integrity assured (a verification process will be part of the process).
- Step 5: All communication should be signed with a privately owned digital network and backed by a decentralized network instead centralized trusted network.
2. Background
2.1. IoT RHM Services
2.1.1. Ambient Assisted Living
2.1.2. Adverse Drug Reactions
2.1.3. Community Healthcare
2.1.4. Wearable Device Access
2.1.5. Indirect Emergency Healthcare
2.2. IoT RHM Applications
2.2.1. Glucose Monitoring
2.2.2. Heart Rate Monitoring
2.2.3. Robotic Surgery Monitoring
2.2.4. Connected Inhaler Monitoring
2.3. Blockchain and Smart Contracts
2.3.1. Blockchain
2.3.2. Smart Contracts
2.4. IoT RHM Sensors and Microcontrollers
2.4.1. IoT RHM Sensors
2.4.2. MAX30100 Sensor
2.5. Microcontrollers
ESP6288 Microcontroller
2.6. Cryptography Techniques
2.6.1. Encryption
2.6.2. Hash Functions
3. Literature Review and Gap Analysis
3.1. Suggested Approaches for Secure IoT Data Transmissions
3.2. Blockchain Approaches
3.3. Gap Analysis
- Summary
4. Proposed IoT RHM Blockchain Scheme
4.1. Core Proposed Methodology
4.2. Methodology Phases
4.2.1. Review the Securely Transmitted Data in the Current RHM
4.2.2. IoT RHM Devices
4.2.3. Remote Healthcare Monitoring Center
4.2.4. Identify Security Breaches in the IoT Devices and Their Communication Mechanisms
4.2.5. Design and Develop a Framework to Rectify These Security Breaches
- Step 1: Design and develop privacy-protected transfer data.
- Step 2: Design and develop an integrity-aware protocol for exchange between patients and the healthcare center.
- Step 3: Design and develop a trusted network.
4.2.6. Evaluate the Framework
- Privacy: RHM devices, like any other technology that collects and stores PHI, must prioritize privacy. So, end-to-end privacy verification of patient data as soon as collected from the patient through IoT devices and until received or processed by healthcare personnel is needed. Data privacy should be protected.
- Integrity: Ensuring the integrity of RHM devices is important to ensure the accuracy and reliability of the data being collected. So, end-to-end integrity validation of the data is ensured for the patient. The data that is collected from the patient should be secure until receipt or processing by healthcare personnel.
- Trusted Network: The patient and healthcare personnel should be in a trusted network.
4.3. Proposed IoT Remote Healthcare Monitoring Transmission via Blockchain
4.3.1. Initiate Transaction
4.3.2. Verifying
4.3.3. Validate Account
4.4. RHM Center Data Collecting and Verifying
- Patient with wearable IoT devices: The IoT device will collect all health data from the patient. Such data could be heartbeats and SPO2 monitoring data. Patients themselves are the owners of their personal data and are responsible for granting, denying, or revoking data access to or from any other parties, such as the RHM center. If the patient needs medical treatment, he/she will share personal health data with the desired doctor. Once the treatment is finished, the patient can deny further access to the doctor or healthcare provider.
- Smart contract: The smart contract enables the establishment of agreements within IoT devices, which are triggered when specific conditions are satisfied. For instance, we can configure conditions for both the highest and lowest heart rate and SpO2 levels. When the wearable device detects readings that fall outside the specified range, the smart contract will promptly dispatch an alert message to the authorized the patient or healthcare provider. Simultaneously, it will archive the anomalous data in the cloud, ensuring healthcare providers can access the patient’s heart rate or SpO2 readings when necessary.
- Blockchain: In the blockchain system, each block in the sequence 1, 2,…, n contains a batch of transactions. These transactions are verified, timestamped, and added to the block by network participants, known as validators. Once a block is successfully created, it is cryptographically linked to the previous block through a unique hash, forming a secure and immutable chain of blocks. This process repeats for each block in the sequence, with the blockchain growing continuously as new blocks are added. The blockchain’s decentralization and consensus mechanisms ensure the security and integrity of the data stored within it. It provides transparency and trust among participants in the network, making it a reliable technology for various applications.
- Hash: The hash is a crucial process of the blockchain that creates a unique hash value for each block of data, transaction, or any piece of information stored within the blockchain. This hash is generated using a cryptographic hash function. Additionally, hashing provides data privacy because the actual data is not stored on the blockchain; instead, only its hash representation is recorded. This ensures sensitive information remains confidential while still being verifiable.
- Data Verifier: The data verifier plays a crucial role in ensuring data integrity and security during the transition to the remote healthcare data center. Each block contains a hash of the previous block, forming a secure chain of blocks linked and encrypted by AES256. Subsequently, the RHM center decrypts the data to map the previous hash and block hashing of each block. Any alteration in the data within a block would result in a change in its hash value, consequently impacting the subsequent blocks in the chain. This characteristic renders it exceedingly difficult for malicious actors to modify past transactions or blocks without detection.
- RHM center: The RHM center serves as a centralized repository for patient data, presenting vital information such as heart rate and SpO2 readings in real time or as recorded data. This center plays a pivotal role in modern healthcare by offering a key function (real-time monitoring, data display, data history, data security, improved access to healthcare, etc.).
- Privacy: The primary objective of privacy is to restrict, control, and safeguard access to an individual’s personal information and sensitive data. This is achieved through access management processes that empower authorized individuals to determine who can access their data and under what circumstances. These processes are designed to uphold the patient’s autonomy while safeguarding their confidentiality and security.
- Doctor/nurse: The doctor and nurse are essential nodes responsible for providing care to patients in our system. They are not allowed to disclose patients’ data without proper authority or consent by the patient’s access management.
4.4.1. Formal Description of the Protocol
- Let Di represent the health data collected at instance i.
- Let H be a cryptographic hash function, e.g., SHA-256.
- Let Bj represent a blockchain block containing the j transaction.
- Let C denote the concatenation operation.
- Let V be the verification function comparing the received data hash and the calculated hash.
4.4.2. Protocol Steps
- (1)
- Data Collection and Hashing:
- For each data instance i, calculate the hash of the data:
- (2)
- Block Creation:
- Create a new block for transaction , which includes hi and potentially other data (e.g., timestamp, device ID).
- If multiple data instances are included in one block, concatenate their hashes:
- (3)
- Blockchain Integration:
- Integrate into the blockchain, ensuring that contains hcombined or the individual hi for all included data instances.
- The integration also involves linking with the previous block by including in .
- (4)
- Data Transmission and Verification:
- Transmit the collected data alongside its corresponding block identifier to the healthcare monitoring platform.
- Upon receipt, the platform retrieves from the blockchain and extracts hcombined or the relevant .
- Recalculate the hash(es) of the received data:
- Verify the integrity by checking if
4.4.3. Mathematical Representation
5. Implementation of the proposed IoT framework
5.1. Data Collection
5.2. Testbed Environment
Visual Studio Code
5.3. IoT Device Configuration
5.3.1. MAX30100 Sensor with ESP6388 Microcontroller
5.4. Hyper-Ledger Components
5.5. Remote Healthcare Monitoring Center
6. Experimental Results
6.1. Performance of Our System
- Trusted data: This component verifies the integrity of the data. In the event of any tampering attempts, the system employs a “Data Verifier” located within the RHM center to detect and ensure the security and integrity of patient data. ‘Trusted’ is highlighted as green and ‘Untrusted’ is highlighted as red.
- Heart rate status: This component indicates the status of the heart rate, which can fall into either a normal or abnormal category (60~130), based on the heart rate range described in Section 5.3.1. ‘Normal’ is highlighted as green and ‘Abnormal’ is highlighted as red.
- SPO2 status: This component indicates the status of the SPO2, which can fall into either a normal or abnormal category based on the heart rate range described in Section 5.3.1. ‘Normal’ is highlighted as green and ‘Abnormal’ is highlighted as red.
6.2. Detecting Tampering Attempts in the RHM System
6.3. Data Integrity
- Step 1: The percentage of data packets or requests received without errors.
- Step 2: Number of detected data-tampering attempts.
6.4. Throughput
- Maximum data transfer rate achievable under normal conditions.
6.5. Latency
- Step 1: Round-trip time: This is how long it takes for data packets to move from IoT devices to the blockchain network and then back to IoT devices. Alternatively, within our framework, the IoT and blockchain are considered an integrated entity, eliminating the concept of round-trip time.
- Step 2: Average delay due to blockchain consensus: Blockchain networks often introduce delays in transaction confirmation due to the consensus mechanisms in place.
7. Conclusions
8. Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Gupta, R.; Gupta, R. ABC of Internet of Things: Advancements, benefits, challenges, enablers and facilities of IoT. In Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, India, 18–19 March 2016; pp. 1–5. [Google Scholar]
- Venkatesh, D.A.N. Connecting the dots: Internet of Things and human resource management. Am. Int. J. Res.Humanit. Arts Soc.Sci. 2017, 17, 21–24. [Google Scholar]
- Asharf, J.; Moustafa, N.; Khurshid, H.; Debie, E.; Haider, W.; Wahab, A. A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions. Electronics 2020, 9, 1177. [Google Scholar] [CrossRef]
- Ioulianou, P.; Vasilakis, V.; Moscholios, I.; Logothetis, M. A Signature-Based Intrusion Detection System for the Internet of Things. Available online: https://eprints.whiterose.ac.uk/133312/ (accessed on 2 May 2024).
- Meidan, Y.; Bohadana, M.; Shabtai, A.; Ochoa, M.; Tippenhauer, N.O.; Guarnizo, J.D.; Elovici, Y. Detection of unauthorized IoT devices using machine learning techniques. arXiv 2017, arXiv:1709.04647. [Google Scholar]
- Wang, J.; Hao, S.; Wen, R.; Zhang, B.; Zhang, L.; Hu, H.; Lu, R. IoT-praetor: Undesired behaviors detection for IoT devices. IEEE Internet Things J. 2020, 8, 927–940. [Google Scholar] [CrossRef]
- Hussain, F.; Abbas, S.G.; Shah, G.A.; Pires, I.M.; Fayyaz, U.U.; Shahzad, F.; Garcia, N.M.; Zdravevski, E. A framework for malicious traffic detection in IoT healthcare environment. Sensors 2021, 21, 3025. [Google Scholar] [CrossRef]
- Alshamrani, M. IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 4687–4701. [Google Scholar] [CrossRef]
- Rashid, S.; Paul, S.P. Proposed methods of IP spoofing detection & prevention. Int. J. Sci. Res. 2013, 2, 438–444. [Google Scholar]
- Klonoff, D.C. Continuous glucose monitoring: Roadmap for 21st century diabetes therapy. Diabetes Care 2005, 28, 1231–1239. [Google Scholar] [CrossRef]
- Polat, H.; Polat, O.; Cetin, A. Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability 2020, 12, 1035. [Google Scholar] [CrossRef]
- van Amsterdam, B.; Clarkson, M.J.; Stoyanov, D. Gesture Recognition in Robotic Surgery: A Review. IEEE Trans. Biomed. Eng. 2021, 68, 2021–2035. [Google Scholar] [CrossRef]
- Kim, M.S.; Henderson, K.A.; Van Sickle, D. Using Connected Devices to Monitor Inhaler Use in the Real World. Available online: https://propellerhealth.com/wp-content/uploads/2017/09/Kim-et-al_Using-Connected-Devices-to-Monitor-Inhaler-Use-in-the-Real-World-1.pdf (accessed on 2 May 2024).
- Elhoseny, M.; Ramírez-González, G.; Abu-Elnasr, O.M.; Shawkat, S.A.; Arunkumar, N.; Farouk, A. Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 2018, 6, 20596–20608. [Google Scholar] [CrossRef]
- McGhin, T.; Choo, K.-K.R.; Liu, C.Z.; He, D. Blockchain in healthcare applications: Research challenges and opportunities. J. Netw. Comput. Appl. 2019, 135, 62–75. [Google Scholar] [CrossRef]
- Hu, B.; Zhang, Z.; Liu, J.; Liu, Y.; Yin, J.; Lu, R.; Lin, X. A comprehensive survey on smart contract construction and execution: Paradigms, tools, and systems. Patterns 2021, 2, 100179. [Google Scholar] [CrossRef] [PubMed]
- Zhang, Y.; Liu, D. Toward vulnerability detection for ethereum smart contracts using graph-matching network. Futur. Internet 2022, 14, 326. [Google Scholar] [CrossRef]
- Yew, H.T.; Ng, M.F.; Ping, S.Z.; Chung, S.K.; Chekima, A.; Dargham, J.A. Iot based real-time remote patient monitoring system. In Proceedings of the 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), Langkawi, Malaysia, 28–29 February 2020; pp. 176–179. [Google Scholar]
- Tham, O.Y.; Markom, M.A.; Bakar, A.H.A.; Tan, E.S.M.M.; Markom, A.M. IoT health monitoring device of oxygen saturation (SpO2) and heart rate level. In Proceedings of the 2020 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering (ICITAMEE), Yogyakarta, Indonesia, 13–14 October 2020; pp. 128–133. [Google Scholar]
- Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Bangash, Y.A. An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 2020, 7, 10250–10276. [Google Scholar] [CrossRef]
- Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 2019, 19, 326. [Google Scholar] [CrossRef] [PubMed]
- Srivastava, G.; Dwivedi, A.D.; Singh, R. PHANTOM protocol as the new crypto-democracy. In Computer Information Systems and Industrial Management, Proceedings of the 17th International Conference, CISIM 2018, Olomouc, Czech Republic, 27–29 September 2018, Proceedings 17; Springer: Berlin/Heidelberg, Germany, 2018; pp. 499–509. [Google Scholar]
- Gupta, D.; Rani, S.; Raza, S.; Qureshi, N.M.F.; Mansour, R.F.; Ragab, M. Security paradigm for remote health monitoring edge devices in internet of things. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101478. [Google Scholar] [CrossRef]
- Pirbhulal, S.; Pombo, N.; Felizardo, V.; Garcia, N.; Sodhro, A.H.; Mukhopadhyay, S.C. Towards machine learning enabled security framework for IoT-based healthcare. In Proceedings of the 2019 13th International Conference on Sensing Technology (ICST), Sydney, Australia, 2–4 December 2019; pp. 1–6. [Google Scholar]
- Srivastava, G.; Crichigno, J.; Dhar, S. A light and secure healthcare blockchain for iot medical devices. In Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, AB, Canada, 5–8 May 2019; pp. 1–5. [Google Scholar]
- Raghu, R.; Jayaraman, V.; Jayaraman, J.; Nukala, S.S.V.; Díaz, V.G. A multi-layered edge-secured cloud framework for healthcare monitoring in old-age homes using smart systems driven by comprehensive user interaction. Int. J. Saf. Secur. Eng. 2022, 12, 449–457. [Google Scholar] [CrossRef]
- Zendehdel, G.A.; Kaur, R.; Chopra, I.; Stakhanova, N.; Scheme, E. Automated security assessment framework for wearable ble-enabled health monitoring devices. ACM Trans. Internet Technol. 2021, 22, 1–31. [Google Scholar] [CrossRef]
- Ratta, P.; Kaur, A.; Sharma, S.; Shabaz, M.; Dhiman, G. Application of blockchain and internet of things in healthcare and medical sector: Applications, challenges, and future perspectives. J. Food Qual. 2021, 2021, 7608296. [Google Scholar] [CrossRef]
- Wang, H.; Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352. [Google Scholar] [CrossRef]
- Majeed, U.; Khan, L.U.; Yaqoob, I.; Kazmi, S.M.A.; Salah, K.; Hong, C.S. Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. J. Netw. Comput. Appl. 2021, 181, 103007. [Google Scholar] [CrossRef]
- Pustišek, M.; Kos, A. Approaches to front-end iot application development for the ethereum blockchain. Procedia Comput. Sci. 2018, 129, 410–419. [Google Scholar] [CrossRef]
- Panetta, K. Gartner Top 10 Strategic Technology Trends for 2019; Gartner: Stamford, CT, USA, 2018. [Google Scholar]
- Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Boston, MA, USA, 11–14 December 2017; pp. 557–564. [Google Scholar]
- Katende, M. Combining mqtt and blockchain to improve data security. In Proceedings of the 3rd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), Seoul, Republic of Korea, 13 July 2020. [Google Scholar]
- Aborokbah, M.M.; Al-Mutairi, S.; Sangaiah, A.K.; Samuel, O.W. Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis. Sustain. Cities Soc. 2018, 41, 919–924. [Google Scholar] [CrossRef]
- Kizza, J.M.; Kizza, J.M. Internet of Things (IoT): Growth, challenges, and security. In Guide to Computer Network Security; Springer International Publishing: Cham, Germany, 2020; pp. 517–531. [Google Scholar]
- Górski, T. Towards Continuous Deployment for Blockchain. Appl. Sci. 2021, 11, 11745. [Google Scholar] [CrossRef]
- Virani, S.S.; Alonso, A.; Aparicio, H.J.; Benjamin, E.J.; Bittencourt, M.S.; Callaway, C.W.; Carson, A.P.; Chamberlain, A.M.; Cheng, S.; Delling, F.N.; et al. Heart disease and stroke statistics-2021 update: A report from the American Heart Association. Circulation 2021, 143, e254–e743. [Google Scholar]
- Poorzargar, K.; Pham, C.; Ariaratnam, J.; Lee, K.; Parotto, M.; Englesakis, M.; Nagappa, M. Accuracy of pulse oximeters in measuring oxygen saturation in patients with poor peripheral perfusion: A systematic review. J. Clin. Monit. Comput. 2022, 36, 961–973. [Google Scholar] [CrossRef]
Author | Year | Objective | Pros | Cons |
---|---|---|---|---|
Gupta et al. [23] | 2023 | Ensure security of edge devices used in remote health monitoring using NDN architecture. | Efficient data retrieval, secure data transmission, integrates IoT with edge computing for health data security based on hashing and encryption. | No explicit mention of existing trusted frameworks. |
Pirbhulal et al. [24] | 2019 | Secure data transmission in IoT-based healthcare systems using blockchain technology. | Transparent sharing of medical data among stakeholders while maintaining patient privacy, secure and tamper-proof system, decentralized architecture for improved security and privacy. | Limited scalability due to high computational overhead. |
Srivastava et al. [25] | 2019 | Detect anomalies in medical sensor data collected from IoT devices in healthcare systems using machine learning techniques. | Early detection of potential health issues, unsupervised learning techniques for identifying abnormal patterns in sensor data, improves patient outcomes through early intervention and treatment planning based on detected anomalies. | Limited to detecting anomalies only; does not provide a comprehensive solution for securing medical data transmission. |
Elhoseny et al. [14] | 2018 | Secure medical data transmission in IoT-based healthcare systems using an innovative approach addressing privacy concerns and ensuring the integrity and authenticity of patient data while being applicable to other types of IoT-based systems beyond healthcare as well. | Comprehensive approach to securing medical data transmission, addresses privacy concerns and ensures the integrity and authenticity of patient data, applicable to other types of IoT-based systems beyond healthcare as well. | No explicit mention of existing trusted frameworks. |
Raghu et al. [26] | 2022 | Secure medical data transmission in IoT-based healthcare systems using a hybrid approach combining blockchain technology with homomorphic encryption techniques. | Ensures secure sharing of medical data among different stakeholders while maintaining patient privacy; ensures confidentiality of sensitive information using homomorphic encryption techniques. | Limited scalability due to high computational overhead. |
Zendehdel et al. [27] | 2021 | Develop an intelligent system for monitoring elderly people’s health status using wearable sensors and machine learning algorithms. | Predicts the risk of falls among elderly people based on sensor data, which can help prevent falls and improve their quality of life. | Limited to monitoring elderly people’s health status only; does not provide a comprehensive solution for securing medical data transmission. |
Ratta, et al. [28] | 2021 | Develop a secure and efficient data transmission protocol for IoT-based healthcare systems using blockchain technology. | Ensures secure sharing of medical data among different stakeholders while maintaining patient privacy; lightweight consensus algorithm to ensure efficient data transmission. | No explicit mention of existing trusted frameworks. |
Reference | Authors | Year | Methodology | Research Field |
---|---|---|---|---|
[29] | Zheng, Zibin, et al. | (2018) | The methodology used in the paper is sound and comprehensive. The authors conducted a thorough literature review and identified a wide range of consensus protocols for IoT networks. They also developed a useful classification of consensus protocols based on their underlying mechanisms. The evaluation of the consensus protocols was also well done, and the authors provided clear and concise recommendations for future research. | Blockchain technology has the potential to revolutionize the way that IoT devices are used, and consensus protocols are essential for making blockchain-based IoT networks secure and reliable. |
[30] | Majeed, Umer, et al. | (2021) | Comprehensive review of the role of blockchain in enabling IoT-based smart cities, including applications, case studies, and requirements. | IoT-based smart cities |
[31] | Pustišek, Matevž, and Andrej Kos. | (2018) | Approaches to front-end IoT application development for Ethereum, with architecture comparison and practical considerations. | Conceptual paper on front-end IoT application development for Ethereum, without experiments. |
[32] | Kasey Panetta | (2018) | Blockchain-based security framework for IoT devices leveraging immutability, decentralization, and transparency. | Conceptual paper on IoT security using blockchain technology, without experiments. |
[33] | M. A. Khan and K. Salah, | (2018) | Peer-reviewed collection of original research papers on the latest advances in communication and computational technologies. | Proceedings of a conference on communication and computational technologies, without experiments. |
[28] | Ratta, Pranav, et al. | (2021) | “Applications, Challenges, and Future Perspectives” reviews the applications, challenges, and future perspectives of blockchain and IoT in the healthcare and medical sector. | Survey paper on applications of blockchain and IoT in healthcare, without experiments. |
[34] | Zheng, Zibin, et al. | (2017) | Proposes a novel access control framework for IoT devices that leverages blockchain technology to ensure secure and dynamic access control based on device attributes and trust levels. | Blockchain-based security for IoT devices, specifically for access control. |
[35] | Katende, M. | (2020) | Proposes a blockchain-based authentication mechanism for the MQTT protocol, which uses the Ethereum blockchain to implement a second-factor out-of-band channel. | Experimental paper on blockchain-based authentication mechanism for MQTT using Ethereum smart contracts. |
[36] | Aborokbah, Majed M., et al. | (2019) | Discussion of the potential of blockchain technology to improve IoT security by providing secure data storage, sharing, authentication, and authorization. | Conceptual paper on the potential of blockchain technology to improve IoT security, without experiments. |
[37] | Kizza, Joseph Migga, et al. | (2017) | Presents the current state of the art in blockchain-based security solutions for IoT devices and identifies key challenges and future research directions. | Survey of blockchain-based security solutions for IoT devices, without experiments. |
RAM | 20.0 GB |
Processor | intel(R) Core (TM) i7-10750H CPU @ 2.60 GHz 2.59 GHz |
Sensor | MAX 30100 pulse oximeter and heart beat sensor |
Microcontroller | ESP8266 with Wi-Fi module |
Software tool | Arduino IDE (2.2.1) and Visual Studio Code (1.84.2) |
Development program | Node.js, SQL, Go, and PHP |
ID | Date | Heart Rate | SPO2 | Trusted Data | Heart Rate Status | SPO2 Status |
---|---|---|---|---|---|---|
1 | 1 May 2024 | 78 | 95 | Trusted | Normal | Normal |
2 | 1 May 2024 | 55 | 97 | Trusted | Abnormal | Normal |
3 | 1 May 2024 | 87 | 95 | Trusted | Normal | Normal |
4 | 1 May 2024 | 65 | 97 | Trusted | Normal | Normal |
5 | 1 May 2024 | 77 | 97 | Trusted | Normal | Normal |
6 | 1 May 2024 | 60 | 97 | Trusted | Normal | Normal |
7 | 1 May 2024 | 62 | 97 | Trusted | Normal | Normal |
8 | 1 May 2024 | 62 | 97 | Trusted | Normal | Normal |
9 | 1 May 2024 | 64 | 97 | Trusted | Normal | Normal |
10 | 1 May 2024 | 60 | 97 | Trusted | Normal | Normal |
11 | 1 May 2024 | 69 | 98 | Trusted | Normal | Normal |
12 | 1 May 2024 | 61 | 98 | Trusted | Normal | Normal |
13 | 1 May 2024 | 74 | 98 | Trusted | Normal | Normal |
14 | 1 May 2024 | 61 | 98 | Trusted | Normal | Normal |
15 | 1 May 2024 | 73 | 98 | Trusted | Normal | Normal |
16 | 1 May 2024 | 64 | 98 | Trusted | Normal | Normal |
17 | 1 May 2024 | 67 | 99 | Trusted | Normal | Normal |
18 | 1 May 2024 | 68 | 99 | Trusted | Normal | Normal |
19 | 1 May 2024 | 64 | 99 | Trusted | Normal | Normal |
20 | 1 May 2024 | 66 | 98 | Trusted | Normal | Normal |
21 | 1 May 2024 | 71 | 98 | Trusted | Normal | Normal |
22 | 1 May 2024 | 67 | 98 | Trusted | Normal | Normal |
23 | 1 May 2024 | 65 | 98 | Trusted | Normal | Normal |
24 | 1 May 2024 | 61 | 98 | Trusted | Normal | Normal |
25 | 1 May 2024 | 78 | 94 | Trusted | Normal | Abnormal |
26 | 1 May 2024 | 56 | 94 | Trusted | Abnormal | Abnormal |
27 | 1 May 2024 | 82 | 98 | Trusted | Normal | Normal |
28 | 1 May 2024 | 79 | 98 | Trusted | Normal | Normal |
29 | 1 May 2024 | 81 | 96 | Trusted | Normal | Normal |
30 | 1 May 2024 | 60 | 94 | Trusted | Normal | Abnormal |
31 | 1 May 2024 | 66 | 98 | Trusted | Normal | Normal |
32 | 1 May 2024 | 70 | 98 | Trusted | Normal | Normal |
33 | 1 May 2024 | 58 | 98 | Trusted | Abnormal | Normal |
34 | 1 May 2024 | 68 | 98 | Trusted | Normal | Normal |
35 | 1 May 2024 | 81 | 97 | Trusted | Normal | Normal |
36 | 1 May 2024 | 55 | 94 | Trusted | Abnormal | Abnormal |
37 | 1 May 2024 | 59 | 93 | Untrusted | Abnormal | Abnormal |
38 | 1 May 2024 | 55 | 94 | Trusted | Abnormal | Abnormal |
39 | 1 May 2024 | 69 | 97 | Trusted | Normal | Normal |
40 | 1 May 2024 | 153 | 93 | Trusted | Abnormal | Abnormal |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alharbi, S.H.; Alzahrani, A.M.; Syed, T.A.; Alqahtany, S.S. Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT. Computers 2024, 13, 164. https://doi.org/10.3390/computers13070164
Alharbi SH, Alzahrani AM, Syed TA, Alqahtany SS. Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT. Computers. 2024; 13(7):164. https://doi.org/10.3390/computers13070164
Chicago/Turabian StyleAlharbi, Salah Hamza, Ali Musa Alzahrani, Toqeer Ali Syed, and Saad Said Alqahtany. 2024. "Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT" Computers 13, no. 7: 164. https://doi.org/10.3390/computers13070164
APA StyleAlharbi, S. H., Alzahrani, A. M., Syed, T. A., & Alqahtany, S. S. (2024). Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT. Computers, 13(7), 164. https://doi.org/10.3390/computers13070164