Wearable IoT Data Architecture

Internet-of-Things (IoT) devices can be employed to stream personal medical data (e.g., vitals) into healthcare information systems for the purposes of health monitoring and efficient diagnosis. A challenge however is when "dumb" terminals are employed for the data streaming process, it is difficult to determine the originating source. This makes it even harder to match personal data from incoming devices. This paper proposes a traceability route formation using a network graph based on techniques such as tuple of inputs and the Büchi automaton. This enabled the work to provide proper trace routes for the personal data from the originating source to the destination, which can be a health information system (HIS). The results from several empirical evaluations conducted in a real-world wearable IoT ecosystem prove the feasibility of the proposed work.

[1]  Victor Khomenko,et al.  Factored Planning: From Automata to Petri Nets , 2013, ACSD.

[2]  Jatinder Singh,et al.  On middleware for emerging health services , 2014, Journal of Internet Services and Applications.

[3]  Elisa Bertino,et al.  IdentiDroid: Android can finally Wear its Anonymous Suit , 2014, Trans. Data Priv..

[4]  Rong Yang,et al.  A Petri Net-Based Approach to Service Composition and Monitoring in the IOT , 2014, 2014 Asia-Pacific Services Computing Conference.

[5]  Elisa Bertino,et al.  Data Security and Privacy in the IoT , 2016, EDBT.

[6]  Edoardo Pignotti,et al.  Trusted tiny things: making the internet of things more transparent to users , 2013, ASPI '13.

[7]  Peeter Kool,et al.  Service-Oriented Middleware Architecture for Mobile Personal Health Monitoring , 2011, MobiHealth.

[8]  Mirjana Maksimovic,et al.  A custom Internet of Things healthcare system , 2015, 2015 10th Iberian Conference on Information Systems and Technologies (CISTI).

[9]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[10]  Marianne Winslett,et al.  Preventing history forgery with secure provenance , 2009, TOS.

[11]  Najah AbuAli,et al.  Internet of nano-things healthcare applications: Requirements, opportunities, and challenges , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[12]  Mangal Sain,et al.  Middleware for ubiquitous Healthcare Information system , 2009, 2009 11th International Conference on Advanced Communication Technology.

[13]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[14]  Mohammed Elkoutbi,et al.  Modeling and enforcing security and service control policies using FlexRFID middleware: Healthcare scenarios , 2014, 2014 Science and Information Conference.

[15]  David M. Eyers,et al.  Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.

[16]  Fabian Monrose,et al.  Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Lujo Bauer,et al.  More than skin deep: measuring effects of the underlying model on access-control system usability , 2011, CHI.

[18]  Akbar Sheikh Akbari,et al.  Application of ZigBee and RFID Technologies in Healthcare in Conjunction with the Internet of Things , 2013, MoMM '13.

[19]  Shingo Yamaguchi,et al.  An analysis system of IoT services based on agent-oriented Petri net PN2 , 2016, 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW).

[20]  Junshan Zhang,et al.  Robust and Cost-Effective Design of Cyber-Physical Systems: An Optimal Middleware Deployment Approach , 2016, IEEE/ACM Transactions on Networking.

[21]  Jeannette M. Wing CHAPTER 9 – Scenario Graphs Applied to Network Security , 2008 .

[22]  George Suciu,et al.  An overview of cloud middleware services for interconnection of healthcare platforms , 2014, 2014 10th International Conference on Communications (COMM).