Machine-to-Machine Communications for e-Health Applications

The emerging technology of Machine-to-Machine (M2M) communications is bringing a paradigm shift in healthcare delivery. A broad range of e-Health applications can be conceived, with considerable benefits for both patients and healthcare providers. Many technological challenges have to be met, however, to ensure the widespread adoption of e-Health solutions in the future. In this context, we aim to provide a comprehensive overview on M2M systems for e-Health applications from a wireless communication perspective. We provide an overview of the candidate wireless technologies that are suitable for different parts of the M2M system architecture and then show how these technologies are seamlessly integrated to provide an end-to-end e-Health solution. In particular, we discuss end-toend solution designs and testbed implementations, we present the key security and privacy challenges associated with the sensitive nature of medical data and we summarize the most recent research projects dedicated to e-Health applications.

[1]  E. Singleton The Data Protection Directive , 1995 .

[2]  A. M. Murray Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .

[3]  Seog Park,et al.  Task-role-based access control model , 2003, Inf. Syst..

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  A Min Tjoa,et al.  Security aspects of ubiquitous computing in health care , 2006, Elektrotech. Informationstechnik.

[6]  John A. Stankovic,et al.  ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .

[7]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[8]  Jie Wu,et al.  A Survey on Secure Localization in Wireless Sensor Networks , 2007 .

[9]  Elfed Lewis,et al.  Efficiently securing data on a wireless sensor network , 2007 .

[10]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[11]  Dimitrios Hatzinakos,et al.  Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..

[12]  Ricardo Dahab,et al.  NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks , 2008, EWSN.

[13]  T. Dimitriou,et al.  Security issues in biomedical wireless sensor networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.

[14]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[15]  S.D. Baker,et al.  Medical-Grade, Mission-Critical Wireless Networks [Designing an Enterprise Mobility Solution in the Healthcare Environment] , 2008, IEEE Engineering in Medicine and Biology Magazine.

[16]  Katarzyna Wac,et al.  Power- and delay-awareness of health telemonitoring services: the mobihealth system case study , 2009, IEEE Journal on Selected Areas in Communications.

[17]  Dusit Niyato,et al.  Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization , 2009, IEEE Journal on Selected Areas in Communications.

[18]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[19]  Jelena V. Misic,et al.  Bridging between ieee 802.15.4 and IEEE 802.11b networks for multiparameter healthcare sensing , 2009, IEEE Journal on Selected Areas in Communications.

[20]  Victor C. M. Leung,et al.  Enabling technologies for wireless body area networks: A survey and outlook , 2009, IEEE Communications Magazine.

[21]  G. Mandellos,et al.  e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation , 2010, International journal of telemedicine and applications.

[22]  Lea Skorin-Kapov,et al.  Analysis of QoS Requirements for e-Health Services and Mapping to Evolved Packet System QoS Classes , 2010, International journal of telemedicine and applications.

[23]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[24]  Jelena V. Misic,et al.  Bridge performance in a multitier wireless network for healthcare monitoring , 2010, IEEE Wireless Communications.

[25]  Jianfeng Wang,et al.  Applications, challenges, and prospective in emerging body area networking technologies , 2010, IEEE Wireless Communications.

[26]  Yan Zhang,et al.  Wireless telemedicine services over integrated IEEE 802.11/WLAN and IEEE 802.16/WiMAX networks , 2010, IEEE Wireless Communications.

[27]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[28]  Liam Peyton,et al.  Policy-based Data Integration for e-Health Monitoring Processes in a B2B Environment: Experiences from Canada , 2010, J. Theor. Appl. Electron. Commer. Res..

[29]  Gregorio López,et al.  LOBIN: E-Textile and Wireless-Sensor-Network-Based Platform for Healthcare Monitoring in Future Hospital Environments , 2010, IEEE Transactions on Information Technology in Biomedicine.

[30]  Guangjie Han,et al.  A novel secure localization scheme against collaborative collusion in wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[31]  Mehmet Hadi Gunes,et al.  Ensuring access control in cloud provisioned healthcare systems , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[32]  David Kotz,et al.  A threat taxonomy for mHealth privacy , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[33]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[34]  José García,et al.  Trends and challenges of the emerging technologies toward interoperability and standardization in e-health communications , 2011, IEEE Communications Magazine.

[35]  Geng Wu,et al.  M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.

[36]  Mourad Gueroui,et al.  Secure range-free localization scheme in Wireless sensor networks , 2011, 2011 10th International Symposium on Programming and Systems.

[37]  Kim Chang,et al.  Global Wireless Machine-to-Machine Standardization , 2011, IEEE Internet Computing.

[38]  Ali Alinejad Cross-Layer Ultrasound Video Streaming Over Mobile WiMAX and HSUPA Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[39]  Odej Kao,et al.  Security and Communication Architecture for Networked Medical Devices in Mobility-Aware eHealth Environments , 2012, 2012 IEEE First International Conference on Mobile Services.

[40]  Yuan-Ting Zhang,et al.  Guest Editorial Introduction to the Special Section: 4G Health - The Long-Term Evolution of m-Health , 2012, IEEE Trans. Inf. Technol. Biomed..

[41]  Xuemin Shen,et al.  Emerging technologies for e-healthcare [Editor's Note] , 2012, IEEE Netw..

[42]  David Kotz,et al.  Privacy in mobile technology for personal healthcare , 2012, CSUR.

[43]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[44]  Kwang-Cheng Chen,et al.  Machine-to-Machine Communications for Healthcare , 2012, J. Comput. Sci. Eng..

[45]  Divya Sharma,et al.  Body area networks: A survey , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).