Skip to main content

A Novel Framework for Healthcare Monitoring System Through Cyber-Physical System

  • Chapter
  • First Online:
Internet of Things and Personalized Healthcare Systems

Part of the book series: SpringerBriefs in Applied Sciences and Technology ((BRIEFSFOMEBI))

Abstract

In recent years, the major concern with people is healthcare. Humans are susceptible to various chronic diseases such as diabetes insipidus, kidney diseases, and eating disorders. The patient suffering from the mentioned diseases should be monitored and treated regularly to avoid any serious conditions. Thus, an embedded technology is developed to transfer the patient’s health information through sensor to network and then to the cloud storage. The existing technologies usually monitor the patient’s clinical data and share the sensor data to cloud. But, the system does not perform any data analysis or actuation process for efficient remedial treatment. In critical situations, the patient also requires the doctors and clinical assistants to be alongside to provide treatment immediately. Therefore, it requires a smart improvement in the current technology. In our methodology, we implement cyber-physical system (CPS) technique for healthcare system. CPS technology classifies the implementation into three parts, namely communication, computation, and actuation or control. CPS continuously monitors the patient’s health parameters such as blood glucose (BG) level, blood pressure (BP) level, body temperature (BT) level, and heart beat (HB) rate. When the health parameter value reaches their critical bound, then through actuators the patients are treated inevitably as a remedial measure. The proposed system benefits the patients, doctors, and clinical assistants in reducing the overhead of assisting all the patients during the inconvenience period. Due to increased physical connectivity constraints, embedded systems and networks have more security exposures. Especially in healthcare systems, the lack of importance on device security has headed to numerous cyber-security gaps. Therefore, a proper investigation is needed on the CPS security issues to make sure that systems are working safe. Furthermore, security resilience and robustness are discussed. Finally, some healthcare data security challenges are elevated for the future study. The proposed CPS model decreases the overhead of medical representatives. This approach also decreases the time and cost complexity compared to the previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C. Konstantinou, M. Maniatakos, F. Saqib, S. Hu, J. Plusquellic, Y. Jin, Cyber-physical systems: a security perspective, in 2015 20th IEEE European Test Symposium (ETS), pp. 1–8 (2015)

    Google Scholar 

  2. V. Buzduga, D.M. Witters, J.P. Casamento, W. Kainz, Testing the immunity of active implantable medical devices to CW magnetic fields up to 1 MHz by an immersion method. IEEE Trans. Biomed. Eng. 54(9), 1679–1686 (2007)

    Article  Google Scholar 

  3. J. Zhang, N. Xue, X. Huang, A secure system for pervasive social network-based healthcare. IEEE Access 4, 9239–9250 (2016)

    Article  Google Scholar 

  4. Y.M. Huang, M.Y. Hsieh, H.C. Chao, S.H. Hung, J.H. Park, Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE J. Sel. Areas Commun. 27(4), 400–411 (2009)

    Article  Google Scholar 

  5. M.A. Khan, K. Salah, IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. (2017)

    Google Scholar 

  6. X. Yue, H. Wang, D. Jin, M. Li, W. Jiang, Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10) (2016)

    Google Scholar 

  7. Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain technology: architecture, consensus, and future trends, in Proceedings—2017 IEEE 6th International Congress on Big Data, BigData Congress (2017), pp. 557–564

    Google Scholar 

  8. M. Samaniego, R. Deters, blockchain as a service for IoT, in Proceedings2016 IEEE International Conference on Internet of Things; IEEE Green Computing and Communications; IEEE Cyber, Physical, and Social Computing; IEEE Smart Data, iThings-GreenCom-CPSCom-Smart Data 2016, (2017), pp. 433–436

    Google Scholar 

  9. K. Christidis, M. Devetsikiotis, Blockchains smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  10. N. Kshetri, Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecomm. Policy 41(10), 1027–1038 (2017)

    Article  Google Scholar 

  11. A. Sharma, D. Bhuriya, U. Singh, Secure data transmission on MANET by hybrid cryptography technique, in IEEE International Conference on Computer Communication and Control, IC4 2015 (2016)

    Google Scholar 

  12. Y. Zhang, F. Patwa, R. Sandhu, Community-Based Secure Information and Resource Sharing in AWS Public Cloud, in 2015 IEEE Conference on Collaboration and Internet Computing (CIC), pp. 46–53 (2015)

    Google Scholar 

  13. M. Dark, Advancing cybersecurity education. IEEE Secur. Priv. 12(6), 79–83 (2014)

    Article  Google Scholar 

  14. W.J. Schünemann, M.O. Baumann, Privacy, Data Protection and Cybersecurity in Europe (2017)

    Google Scholar 

  15. N. Kshetri, India’s cybersecurity landscape: the roles of the private sector and public-private partnership. IEEE Secur. Priv. 13(3), 16–23 (2015)

    Article  Google Scholar 

  16. M.R. Yuce, Implementation of wireless body area networks for healthcare systems. Sens. Actuat. A Phys. 162(1), 116–129 (2010)

    Article  Google Scholar 

  17. H.C. Keong, M.R. Yuce, Low data rate ultra wideband ECG monitoring system, in 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 3413–3416 (2008)

    Google Scholar 

  18. M.R. Yuce, H.C. Keong, M.S. Chae, Wideband communication for implantable and wearable systems. IEEE Trans. Microw. Theor. Tech. 57(10), 2597–2604 (2009)

    Article  Google Scholar 

  19. J.Y. Khan, M.R. Yuce, F. Karami, Performance evaluation of a wireless body area sensor network for remote patient monitoring, in 2008 30th Annual International Conference IEEE Engineering Medical Biology Society (2008)

    Google Scholar 

  20. J. Yusuf Khan, M.R. Yuce, G. Bulger, B. Harding, Wireless body area network (wban) design techniques and performance evaluation. J. Med. Syst. 36(3), 1441–1457 (2012)

    Article  Google Scholar 

  21. S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, S. Shamshirband, Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Informat. J. (2016)

    Google Scholar 

  22. A.G. Fragopoulos, J. Gialelis, D. Serpanos, Imposing holistic privacy and data security on person centric eHealth monitoring infrastructures, 12th IEEE International Conference on e-Health Networking (Healthcom, Application and Services, 2010), p. 2010

    Google Scholar 

  23. A. Papalambrou, A. Fragopoulos, D. Tsitsipis, J. Gialelis, D. Serpanos, S. Koubias, Communication security and privacy in pervasive user-centric e-health systems using digital rights management and side channel attacks defense mechanisms, in 2012 IEEE International Conference on Industrial Technology, ICIT 2012, Proceedings, 2012, pp. 614–619

    Google Scholar 

  24. W. Badreddine, N. Khernane, M. Potop-Butucaru, C. Chaudet, Convergecast in wireless body area networks. Ad Hoc Netw. 66, 40–51 (2017)

    Article  Google Scholar 

  25. J.I. Naganawa, K. Wangchuk, M. Kim, T. Aoyagi, J.I. Takada, Simulation-based scenario-specific channel modeling for WBAN cooperative transmission schemes. IEEE J. Biomed. Heal. Informat. 19(2), 559–570 (2015)

    Article  Google Scholar 

  26. G. Anastasi, M. Conti, M. Di Francesco, A. Passarella, Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw. 7(3), 537–568 (2009)

    Article  Google Scholar 

  27. G. Anastasi, M. Conti, M. Di Francesco, A. Passarella, An adaptive and low-latency power management protocol for wireless sensor networks, in MobiWAC 2006—Proceedings of the 2006 ACM International Workshop on Mobility Management and Wireless Access, vol. 2006, pp. 67–74 (2006)

    Google Scholar 

  28. S.H. Lee, J.H. Song, I.K. Kim, CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans. Serv. Comput. 9(2), 241–249 (2016)

    Article  Google Scholar 

  29. F.B. Vernadat, Technical, semantic and organizational issues of enterprise interoperability and networking, in 2009 IFAC Proceedings Volumes (IFAC-PapersOnline), vol. 13, no. PART 1, pp. 728–733 (2009)

    Article  Google Scholar 

  30. M.Z. Hasan, Intelligent healthcare computing and networking, in 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services, Healthcom 2012, pp. 481–485 (2012)

    Google Scholar 

  31. J. Walker, E. Pan, D. Johnston, J. Adler-Milstein, D.W. Bates, B. Middleton, The value of health care information exchange and interoperability. Health Aff. (Millwood), vol. Suppl Web (2005)

    Google Scholar 

  32. Y. Zhang, M. Qiu, C.W. Tsai, M.M. Hassan, A. Alamri, Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)

    Article  Google Scholar 

  33. J. Wan, H. Yan, H. Suo, F. Li, Advances in cyber-physical systems research. KSII Trans. Internet Informat. Syst. 5(11), 1891–1908 (2011)

    Google Scholar 

  34. L. Zhou, V. Varadharajan, K. Gopinath, A secure role-based cloud storage system for encrypted patient-centric health records. Comput. J. 59(11), 1593–1611 (2016)

    Article  Google Scholar 

  35. B.J.S. Chee, F.J. Curtis, Cloud computing: technologies and strategies of the ubiquitous data center, in Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, pp. 67–90 (2010)

    Google Scholar 

  36. R. Sandhu, D. Ferraiolo, R. Kuhn, The NIST model for role-based access control, in Proceedings of the Fifth ACM Workshop on Role-Based Access Control—RBAC’00, pp. 47–63 (2000)

    Google Scholar 

  37. D.F. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role-based access control. Components 2002(10), 338 (2003)

    MATH  Google Scholar 

  38. K. Abouelmehdi, A. Beni-Hssane, H. Khaloufi, M. Saadi, Big data security and privacy in healthcare: a review. Proc. Comput. Sci. 113, 73–80 (2017)

    Article  Google Scholar 

  39. Y. Ashibani, Q.H. Mahmoud, Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)

    Article  Google Scholar 

  40. H. Hu, Y. Wen, T.S. Chua, X. Li, Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652–687 (2014)

    Article  Google Scholar 

  41. A.A. Cardenas, P.K. Manadhata, S.P. Rajan, Big data analytics for security. IEEE Secur. Priv. 11(6), 74–76 (2013)

    Article  Google Scholar 

  42. C. Tankard, Big data security. Netw. Secur. 2012(7), 5–8 (2012)

    Article  Google Scholar 

  43. H. Demirkan, A smart healthcare systems framework. IT Prof. 15(5), 38–45 (2013)

    Article  Google Scholar 

  44. G.E. Santagati, T. Melodia, An implantable low-power ultrasonic platform for the Internet of Medical Things, in Proceedings—IEEE INFOCOM (2017)

    Google Scholar 

  45. K. Bache, M. Lichman, UCI Machine Learning Repository. University of California Irvine School of Information, vol. 2008, no. 14/8. p. 0 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Monisha .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Monisha, K., Rajasekhara Babu, M. (2019). A Novel Framework for Healthcare Monitoring System Through Cyber-Physical System. In: Internet of Things and Personalized Healthcare Systems. SpringerBriefs in Applied Sciences and Technology(). Springer, Singapore. https://doi.org/10.1007/978-981-13-0866-6_3

Download citation

Publish with us

Policies and ethics