An IoT healthcare service model of a vehicle using implantable devices

As IoT technologies have become more available, healthcare patients increasingly want to be provided with services at places other than hospitals or their homes. Most patients with implantable devices still visit hospitals, sometimes using a self-driving car or public transportation to obtain services. When an emergency situation develops for a patient in a vehicle lacking the means to address the crisis, the patient’s life cannot help but be in danger. The present paper proposes an IoT healthcare service model that will enable patients with a medical sensor to be provided healthcare services in a vehicle installed with IoT devices. To solve problems in existing models that do not include electromagnetic interference-based (EMI) multiple property management and control, the proposed model involves medical sensors with different multiple-property information guarantee targeted SINRs and minimum blackouts. The model also features the ability to connect to hospital healthcare service centers using the IoT devices installed in vehicles, thereby enabling information on the patient’s condition and first aid needs to be transmitted in real time. To secure the patient’s biometric data during information transmission, the proposed model weights that information to enhance the efficiency of the IoT devices. Performance evaluation results revealed that compared to existing algorithms, the communication strength of the proposed model is an average of 5.2% higher, and network efficiency between IoT devices and medical sensors is an average of 7.6% higher. In addition, the overhead on IoT devices was an average of 3.5% lower.

[1]  Soon Myoung Chung,et al.  A parallel text document clustering algorithm based on neighbors , 2015, Cluster Computing.

[2]  Wei-Tsong Lee,et al.  Adaptive Combiner for MapReduce on cloud computing , 2014, Cluster Computing.

[3]  Hideyuki Imai,et al.  A fuzzy representation for non-additive weights of AHP , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).

[4]  Cristina Comaniciu,et al.  A cross-layer framework for multiobjective performance evaluation of wireless ad hoc networks , 2013, Ad Hoc Networks.

[5]  Sergio Camorlinga,et al.  Electromagnetic Interference-Aware Transmission Scheduling and Power Control for Dynamic Wireless Access in Hospital Environments , 2011, IEEE Transactions on Information Technology in Biomedicine.

[6]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[7]  Zheng Junjun,et al.  Study on the Selection of Venture Capitalists Based on Fuzzy AHP , 2010, 2010 3rd International Conference on Information Management, Innovation Management and Industrial Engineering.

[8]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[9]  Liangxiu Han,et al.  Parallel data intensive applications using MapReduce: a data mining case study in biomedical sciences , 2014, Cluster Computing.

[10]  Feng Kong,et al.  Analysis of and Improvement on Ranking Method for Fuzzy AHP , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[11]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[12]  Hai Jiang,et al.  Accelerating MapReduce framework on multi-GPU systems , 2013, Cluster Computing.

[13]  Yacine Ouzrout,et al.  Fuzzy multi-criteria lifecycle system maturity decision making based on an integrated Fuzzy AHP and VIKOR methodology , 2014, 2014 International Conference on Computational Science and Technology (ICCST).

[14]  I-En Liao,et al.  Ontology-based library recommender system using MapReduce , 2013, Cluster Computing.

[15]  Xiaoping Wu,et al.  Information systems security risk assessment on improved fuzzy AHP , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[16]  Christoph Schroth,et al.  The Internet of Things in an Enterprise Context , 2009, FIS.

[17]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[18]  Shahid Raza,et al.  Lightweight Security Solutions for the Internet of Things , 2013 .

[19]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[20]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[21]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[22]  Vipul Gupta,et al.  Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.

[23]  Dusit Niyato,et al.  An EMI-Aware Prioritized Wireless Access Scheme for e-Health Applications in Hospital Environments , 2010, IEEE Transactions on Information Technology in Biomedicine.

[24]  Shijian Fang,et al.  A fuzzy AHP approach for service vendor selection under uncertainty , 2011, 2011 International Conference on Business Management and Electronic Information.

[25]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[26]  Xiaohui Liang,et al.  Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation , 2014, IEEE Journal of Biomedical and Health Informatics.