Next Article in Journal
Comparison of FCS-MPC Strategies in a Grid-Connected Single-Phase Quasi-Z Source Inverter
Previous Article in Journal
Approach to the Impact of Digital Technologies on Sustainability Reporting through Structural Equation Modeling and Artificial Neural Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Systematic Review

Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues

1
Department of IT, MIT Art, Design and Technology University, Pune 412201, India
2
Department of Computer Science & Engineering, SRM Institute of Science and Technology, Delhi-NCR Campus, Ghaziabad 201204, India
3
Department of Computer Science and Engineering, Uttranchal University, Dehradun 248007, India
4
Department of Computer Science and Engineering, Amity School of Engineering and Technology, Research and Innovation Cell, Amity University, Kolkata 700157, India
5
School of AI Convergence, College of Information Technology, Soongsil University, Seoul 06978, Republic of Korea
6
Department of Artificial Intelligence and Big Data, Woosong University, Daejeon 34606, Republic of Korea
*
Authors to whom correspondence should be addressed.
Electronics 2023, 12(9), 2050; https://doi.org/10.3390/electronics12092050
Submission received: 21 March 2023 / Revised: 24 April 2023 / Accepted: 25 April 2023 / Published: 28 April 2023

Abstract

:
Advancements in Healthcare Internet of Things (H-IoT) systems have created new opportunities and solutions for healthcare services, including the remote treatment and monitoring of patients. In addition, the security and privacy of personal health data must be ensured during data transfer. Security breaches in H-IoT can have serious safety and legal implications. This comprehensive review provides insights about secured data accession by employing cryptographic platforms such as H-IoT in big data, H-IoT in blockchain, H-IoT in machine learning and deep learning, H-IoT in edge computing, and H-IoT in software-defined networks. With this information, this paper reveals solutions to mitigate threats caused by different kinds of attacks. The prevailing challenges in H-IoT systems, including security and scalability challenges, real-time operating challenges, resource constraints, latency, and power consumption challenges are also addressed. We also discuss in detail the current trends in H-IoT, such as remote patient monitoring and predictive analytics. Additionally, we have explored future prospects, such as leveraging health data for informed strategic planning. A critical analysis performed by highlighting the prevailing limitations in H-IoT systems is also presented. This paper will hopefully provide future researchers with in-depth insights into the selection of appropriate cryptographic measures to adopt an energy-efficient and resource-optimized healthcare system.

1. Introduction

Over the last few decades, several healthcare applications have been developed to improve medical fields in which recent trends and advancements in information technology have opened the gateway to revolutionary electronic healthcare and industrial research [1]. The Internet of Things (IoT) is an amalgamation of various communication devices that sense and communicate with each other. IoT devices have brought about turbulence in the field of biomedical applications by analyzing the various challenges and complications faced in the past [2]. These IoT devices are capable of generating a significant amount of bio-medical data, which could play a key role in the development of automatic medical data collection systems [3].
When IoT devices are combined with advanced Machine Learning (ML) algorithms, big data becomes an essential part for improvising these health systems in diagnosis, treatment, and decision-making. The IoT in biomedical applications has developed research interest in the Internet of Everything (IoE), which includes symptomatic treatments and the observation and monitoring of patients [4]. Furthermore, the innovation of miniature sensors in healthcare that continuously monitor the vital signs of patients is making the human healthcare system more secure and offers great potential for early diagnosis and treatment. [5]. With the increasing availability of wearable devices, sensors, and other connected devices, healthcare providers can gather a vast amount of patient health data that can be used to improve patient outcomes and quality of care. However, to fully utilize these data, healthcare providers must have effective information processing systems in place. Information processing in the Healthcare Internet of Things (H-IoT) involves the collection, storage, analysis, and dissemination of data generated by IoT devices. These data can include vital signs such as blood pressure, heart rate, and oxygen saturation, as well as patient activity levels, sleep patterns, and medication adherence. Healthcare providers can use these data to detect early signs of disease, monitor patients remotely, and personalize treatment plans for each patient.
The first step in information processing for H-IoT is data collection. Data is collected through sensors, wearables, and other connected devices. The data is then transmitted to a central database or cloud storage system. The database must be designed to handle large amounts of data and be accessible to healthcare providers from multiple locations. Once data is collected and stored, the next step is data analysis. Data analysis involves using advanced algorithms to identify patterns and trends in the data. This can include identifying changes in vital signs, detecting irregularities in patient behavior, and predicting future health issues. Machine learning and artificial intelligence can also be used to analyze data and identify potential health risks. The final step in information processing for H-IoT is data dissemination. Data must be communicated to healthcare providers in a way that is easily accessible and understandable. This can include visualizations such as graphs and charts that highlight key trends and patterns in the data. Alerts and notifications can also be set up to notify healthcare providers of any significant changes in a patient’s health status.
In order to address the challenges that come with the increased use of H-IoT devices, which generate large volumes of data that can be overwhelming for healthcare providers to manage, mindsponge theory has been proposed. According to this theory, healthcare providers need to be able to “sponge up” and process this data in a way that enables them to make informed decisions and provide better care to patients. This can be achieved through the use of advanced analytics and machine learning algorithms that can help to identify patterns and trends in the data, as well as prioritize the most relevant information for clinicians. By leveraging the power of IoT data in this way, healthcare providers can improve patient outcomes and enhance the overall quality of care [6,7].
The security issues in IoT devices are bound to increase gradually due to the rapid development and deployment of IoT systems. The security issues in H-IoT are of utmost concern because data breaches can lead to the loss of lives. Figure 1 exhibits the revolutionary features of H- IoT in a hospital environment. Individuals with diabetes are provided with identification cards that will be scanned and connected to a cloud-based platform, where Electronic Health Records (EHRs), prescriptions, crucial laboratory findings, and medical history records are stored. This will make it easier for nurses and physicians to access these records through desktops, laptops, or tablets. While ensuring comfort and security during the sharing of personal health information was considered important, it was challenging to meet these requirements due to the varying security policies and access to control structures.
To provide a solution to this, there are various cryptographic platforms such as blockchain, big data, software-defined networks, edge computing, and artificial intelligence. IoT in healthcare has been continuously evolving in accordance with the advances in the aforementioned technologies. The incorporation of blockchain, big data, software-defined networks, edge computing, and artificial intelligence into H-IoT has the capability to revolutionize the sector by providing improved security, efficiency, and precision of data management, along with better diagnosis and treatment options. Nevertheless, implementing these technologies can be intricate and costly—necessitating specific skills. Laws and rules regarding data ownership and responsibility are still evolving, and handling and analyzing extensive amounts of data can pose difficulties. Moreover, specific hardware and software infrastructure may be obligatory, and edge computing may not be appropriate for all H-IoT applications. An important challenge associated with H-IoT is the expense associated with establishing and sustaining the essential infrastructure. The cost of IoT gadgets, sensors, and wearables can be high, and the expense of integrating them with existing healthcare systems can also be a significant hindrance. Moreover, healthcare providers may need to invest in specialized personnel such as data analysts and IT professionals to manage the data produced by IoT devices. Finally, ongoing maintenance expenses can be substantial, including the cost of replacing batteries, upgrading software, and replacing outdated devices. These expenses can be particularly difficult for smaller healthcare providers or those with restricted budgets. As a result, it is crucial to meticulously evaluate the expenses and benefits of H-IoT before making significant investments in this technology. Vuong et al. [8] examined the phenomenon of “near-suicide,” where patients stop medical treatment due to financial concerns, leading to fatal outcomes. BMF analytics were used to analyze a dataset of 1042 Vietnamese patients, finding that seriously ill patients were more likely to quit treatment if paying for it would heavily impact their family’s financial status.
The H-IoT sector is rapidly developing, with current trends emphasizing remote patient monitoring, wearable tech, predictive analytics, and intelligent hospitals. The combination of AI and telemedicine is projected to result in more accurate diagnoses, increased patient involvement, and better health results. The future possibilities of enhanced H-IoT systems include utilizing health data for well-informed strategic planning, developing more customized treatment strategies, and the possibility of new healthcare devices integrating with IoT technologies. Nevertheless, data confidentiality and safety are possible concerns that require attention to ensure that H-IoT is used safely and effectively.
The significant features of a reliable IoT system in healthcare include high fault tolerance, data security, reliable QoS parameters (such as low power consumption), low latency, good scalability with high data integrity, and interoperability. In addition, ease of mobility, real-time processing, and ease of deployment are also discussed in this paper. The statistical aspect of the explosive proliferation of H-IoT systems keeps on expanding. There are numerous comprehensive surveys [9,10] exploring this aspect; however, the surveys fail to address all of the significant aspects of H-IoT, resulting in important developments, technologies, and applications being overlooked, ultimately leading to inadequate comprehension of the subject matter. The omission of essential details could result in missed opportunities for understanding, decision-making, or meaningful contributions to the field. It is critical to highlight these shortcomings and encourage further research to provide a more comprehensive and insightful analysis. This paper provides an innovative and perceptive viewpoint to the field, presenting novel observations and concepts that have not been previously explored, and provides clear insights to future researchers.
The structure of this paper is organized as follows: In Section 2, H-IoT is discussed in brief along with H-IoT in big data, H-IoT in edge computing, and the detailed use of machine and deep learning in H-IoT. Furthermore, Section 6 and Section 7 discuss H-IoT in software-defined networks and blockchain, respectively. A taxonomy of the challenges associated with H-IoT is highlighted in Section 3, and in Section 4, the significance of H-IoT is discussed. The future applications of IoT devices and systems in healthcare are explained in Section 5, and subsequently, a critical analysis of the work is performed in Section 6. Finally, the work is concluded in Section 7.

2. Healthcare Internet of Things

The H-IoT is a rapidly expanding field that merges internet-enabled gadgets, sensors, and software applications in the healthcare industry. Its aim is to enhance patient outcomes, increase efficiency, and decrease expenses by offering real-time data, predictive analytics, and remote monitoring. The applications of the H-IoT include wearable devices, remote patient monitoring, telemedicine, and intelligent hospital systems [11]. With the integration of AI and machine learning, the H-IoT has the potential to revolutionize healthcare delivery by providing tailored and efficient care. However, ensuring data confidentiality and safety is a potential issue that must be addressed to guarantee the secure and effective use of H-IoT technologies. In recent times, the IoT has been said to be one of the most promising technologies in the field of healthcare. Along these lines, Rodrigues et al. [12] presented a comprehensive review of IoT in healthcare, which is also expressed as H-IoT. Further, this study identifies technological advances in H-IoT and the corresponding limitations that need to be overcome. Rodrigues et al. also suggested that further research in this field is essential for improvising the current challenges faced by H-IoT. Our extensive review will be a great source of information to the researchers, technology specialists, healthcare providers, and the general population for improvising H-IoT.
A competent cryptosystem for the secure transmission of MRI images in H-IoT environments has been reported by Tsafack et al. [13]. The study delved into the dynamics of a 2D trigonometric map, which has infinite solutions. The study further utilized phase portraits, bifurcation diagrams, and the Lyapunov exponent for showcasing the complex dynamics of the map. The performance analysis of the study’s proposed cryptosystem suggested that it is highly secure and can be efficiently included in the field of H-IoT for the secure transmission of medical images. Figure 2 depicts how the utilization of IoT in healthcare is progressively gaining acceptance with the aim of enhancing patient results, augmenting effectiveness, and curbing expenses.

2.1. H-IoT in Big Data

H-IoT relies heavily on big data, as it permits the accumulation and assessment of extensive medical information. The integration of big data in H-IoT has resulted in the development of predictive models, which can aid in detecting possible health hazards and projecting disease advancement [14]. Through the utilization of machine learning algorithms, healthcare providers can analyze substantial data sets to formulate tailored treatment strategies for patients. These things considered, big data analytics in H-IoT can identify patterns and trends, leading to enhanced patient outcomes, decreased healthcare expenses, and streamlined healthcare delivery. The personalized healthcare system can deliver E-health services to fulfill the clinical requirements of aged people. A detailed study on the emerging technologies in healthcare industries regarding big data analytics, mobile-based applications, IoT, fog computing, and cloud computing was performed by Jagadeeswari et al. in [15]. Further, this study analyzed the drawbacks in building an improvised healthcare system for the early detection of diseases and provided insights into feasible solutions to overcome limitations. Our review hopes to help form the foundations for building a better healthcare system in future.
An intelligent H-IoT-driven big data storage system that also secures data has been suggested by Yang et al. in [16]. This suggested system would also possess adaptive access control, provide high-level security to the healthcare data of patients, recognize access control for emergency and normal situations, and support smart de-duplication in saving storage space for big data. The medical files generated by H-IoT were encrypted and stored in a system that could be securely shared with healthcare workers from various medical domains. Further, these access control techniques enable authorized users to decrypt the confidential medical data and support in providing first aid treatment to the patients whose life is at risk. This study suggested a new twofold and secure access control system, which is self-adaptive in the case of emergency situations and normal situations. In critical emergency situations, the medical data of patients can be recovered by utilizing a break glass access mechanism [17]. Finally, the study stated that, this suggested framework is proven to be secure.
Big data accumulates a huge amount of data for numerous professional applications, including H-IoT systems and robotics. H-IoT-driven systems play a significant role in big data analytics. However, sensing may provide challenges when attempting to predict accurate results. Therefore, a H-IoT system that utilizes Artificial Intelligence (AI) for the treatment of Parkinson’s disease (PD) was suggested by Sivaparthipan et al. [18] to enhance the gait of affected patients. Further, this study briefly outlines the significant use of robotics in the treatment of Parkinson’s disease. Robotic methods used to treat PD involve predicting walker motion and providing physical training. Robotics can also foster interactions with big data. For the prediction of walker motion, the robots must walk alongside the patients while sensors are used to monitor the patients and robots. Additionally, the study compared the performance of the suggested method with other existing methods.
The applications of big data in healthcare sectors are rapidly growing, and novel discoveries and methods have been published in the last ten years. Big data techniques have been efficiently utilized in healthcare research and biomedical informatics. Recently, researchers, hospitals, patients, sensors, and mobile phones have generated a huge amount of healthcare data. These data are constantly generated by clinical organizations and are utilized to detect and cure new diseases. Various new technologies for collecting these data have been developed by different researchers. Similarly, patients have started to use these technologies in the form of mobile applications for managing their recovery needs. Additionally, by using IoT, these devices and apps can be progressively utilized and combined with telehealth and telemedicine. Mishra et al. [19] discussed big data’s biomedical applications as well as its challenges. Their study presented new approaches to the advancements in healthcare systems by utilizing distributed computing systems and big data technologies. IoT is said to be substantial advancement in the era of big data as it supports several real-time applications via enhanced services, as demonstrated in Figure 3.
Generally, the IoT requires every device to generate massive amounts of data, necessitating effective processing and storage. Cloud computing emerged to solve this issue. Nevertheless, the data from healthcare applications must be processed in real-time to improvise performance and reduce latency. Fog computing can be considered a promising solution that is applicable to the healthcare domain as it can reduce delays in data communication, promote flexible services, and distribute resource demands. Moreover, a fog-based H-IoT system was suggested by Feng et al. [21] to reduce energy and network delay. Additionally, the study suggested and provided some essential services of big data infrastructure for medical big data analytics in fog devices.
Smart sensors and IoT devices are utilized in various parts of life, such as communication, transportation, healthcare, surveillance, business, and several other industries. These sensors and devices produce tons and tons of data, which is beneficial and valuable for healthcare organizations if they subject these data to further analysis [22].

2.2. H-IoT in Edge Computing

In general, the IoT connects numerous smart sensing devices, such as heterogeneous networks, and they are integrated in various applications, including smart grid, smart home, and smart health [23,24,25]. Further, when considering IoT-based healthcare systems, the security of IoT devices and data is essential. Edge computing is said to be a promising aspect of IoT that attempts to rectify complex processing issues. Edge computing has the potential to provide less latency data by improvising the computation and communication speed of IoT devices [26,27]. Utilizing AI and building optimized networks can promote load balancing and effective resource usage in IoT-enabled edge computing-based healthcare systems. Nevertheless, these devices possess a lot less power, and its data is more susceptible to security threats. Thus, [28,29] developing a secure structure for IoT-enabled edge computing-based healthcare systems via software-defined networks (SDN) is essential. IoT devices are authenticated by edge servers through utilizing a lightweight authentication approach. After the authentication, the IoT devices will collect and subsequently transmit patients’ data to edge servers for storage, processing, and analysis purposes. These edge servers are linked by an SDN controller that facilitates the effective usage of resources, network optimization, and load balancing in healthcare systems. Finally, the suggested method was evaluated by utilizing the computer-based simulations. From the simulation outcomes, the study stated that the suggested method provided better solutions for healthcare systems based on edge computing and IoT.
Advancements in sensing techniques have helped develop smart systems to continuously monitor human behaviors, as seen in [30,31]. Wearable sensor-based frameworks for activity prediction via a Recurrent Neural Network (RNN) on devices such as personal computers or laptops have become popular. The input data, such as gyroscope, accelerometer, magnetometer, and ECG sensors (Electrocardiography), were obtained from different wearable healthcare sensors. The suggested method was compared with traditional methods with available datasets. From the experimental outcomes, the study stated that the suggested method outperforms other conventional methods.
Emerging trends in edge computing have helped to develop effective healthcare applications, including patient remote monitoring via central electronic clouds (E-clouds). This requires better quality of service (QoS), high sensing levels, and clear visualization, the latter of which must be considered the highest priority. Therefore, a Window-based Rate Control Algorithm (W-RCA) has been suggested by [32] for optimizing Medical QoS (M-QoS) in edge computing by considering Peak to Mean Ratio (PMR), delay, Standard Deviation (SD), and network jitter. Further, the study evaluated the suggested W-RCA algorithm and compared it with other prevailing algorithms, such as the Battery Smoothing Algorithm (BSA), to optimize M-QoS. From the experimental analysis, the study represented that the suggested method outperformed other prevailing methods by optimizing applications such as tele-surgery.
The rapid growth in information technology and IoT has promoted the utilization of smart systems. Moreover, cloud and edge computing are significant for intelligent healthcare systems in developed and smart cities. The Emergency Departments (ED) require real-time systems and tailored methods for modelling, simulating, and optimizing service flow and system resources. Therefore, [33] suggested a system for modelling the non-consumable resources, describing and validating it theoretically. Furthermore, the RPN was applicable to real-time scenarios, factoring in performance indicators such as average patient waiting time, usage rate of resources, and the patient’s length of stay (LoS). The study simulated the suggested system, which emphasized improvements in the LoS, patient waiting time, and resource utilization.

2.3. H-IoT in Machine Learning and Deep Learning

The following section describes the machine learning and deep learning methods used in H-IoT. A new H-IoT-based deep learning (DL) structure was outlined in [34] to detect and classify cervical cancer by utilizing the transfer learning concept. Further, the study also integrated a Convolutional Neural Network (CNN) [35,36,37] with various conventional ML approaches, such as Support Vector Machines (SVM), Random Forest, Logistic Regression (LR), Naïve Bayes (NB), and K-Nearest Neighbor (KNN). This study performed feature extraction by utilizing the pre-trained CNN models such as ResNet50, SqueezeNet, VGG19, and Inception V3. Moreover, the study evaluated the performance of the suggested H-IoT system, and from these evaluations, the study stated that the suggested model achieved a high classification rate of 97.89%. A DL methodology has been represented in the use of a Softmax classifier and stacked Auto-Encoders (AEs) to efficiently classify and then prognosticate the CKD [38]. The suggested model employed AEs to mine the features and find the multi-model patterns residing in the corresponding dataset. It also assisted in obtaining an enhanced classification performance. This leads to simple classification via feature reduction for individual AEs. Subsequently, a Softmax classifier has also been utilized for the sample classification of varied classes that rely on identical features. This can be found from the outcomes observable by implementing the introduced technique, the Deep Stacked AE model, which classifies the CKD so that it will be an effective diagnostic tool that possesses accuracy, specificity, recall, and precision, all of which are vital in the medical field. Similarly, the paper [39] introduced and assessed a DL algorithm to prognosticate CKD from the retinal images. There are several prevailing studies in the diagnosis of P. vivax. The authors of [40] suggested a new Stacked CNN framework, which improvised the diagnosis of malaria automatically without considering hand-crafted features. Moreover, the process of fivefold cross-validation has gained higher accuracy in the detection of parasites. These outcomes proved that, with changing depth and filter sizes, the convolutional layers could extract various features for the process of classification.

2.4. H-IoT in Software Defined Networks

A software-defined approach enables the network nodes to be regulated through language programming rather than the conventional model of administration [41,42]. To address the various limitations of the IoT, SDNs provide network virtualization, network management, energy management, resource utilization, privacy, and security by means of separating the hardware device control. The major functionality of an SDN is to separate the control plane from the corresponding data plane for the purpose of streamlining network performance. The authors of [43] designed a secured framework for authenticating IoT devices through edge servers with the use of a lightweight authenticating system. After the process of authentication, these devices extract the data from the corresponding patients and transmit them to edge servers for storage, processing, and analysis purposes. These edge servers are interconnected with the SDN controller that performs network optimization, load balancing, and effective resource utilization [44]. The suggested framework has been evaluated using computer-sided simulations with better outcomes. Confidential medical reports and records stored in the cloud must overcome network security attacks [45]. This system sends immediate alerts to the medical worker, thereby controlling many kinds of diseases. The authors of [46,47] suggested an SDN-based framework in which every patient possesses a dedicated virtual machine in the data-sharing system that could be released to authorized consumers. Additionally, the virtual machine was protected by SDN-based gateway processing that acts as a firewall and guarantees privacy and access to patients via VMs with unique MAC addresses.

2.5. H-IoT in Blockchain

Blockchain has been considered as a distributed ledger methodology which could be more effective in the provision of access control in healthcare systems [48]. Since migrating or implementing to a complete blockchain solution seems to be an extremely challenging task, various implementations and designs must be considered, as evidenced in the following: The authors of [49] suggested a novel system based on blockchain that correlated with swarm exchange methods used for facilitating the user-initiated secure and seamless transmission of electronic health records. This study employed various peer open, peer closing, announcement, and swarm intelligence algorithms for the incorporation of the actual pervasive EHR transmission power for optimum healthcare service provision. The suggested system was developed with the use of tools such as IPFS, GnuPG, and Golang. This study stimulated various IoT health sensor nodes in the blockchain-assisted swarm exchange framework, such as pulse rate, body temperature, and oxygen saturation. The authors of [50] combined blockchain smart contracts with IoT devices for the structural health monitoring of underground structures to define an efficient, novel, secured, and scalable distributed network for improving the safety of the operation. Here, the features of globally centralized and locally centralized distribution were activated by categorizing them to the edge and core networks to improve scalability and efficiency. Overall, this proved effective in simulating controlled structures and enabling autonomous monitoring. The authors of [51,52] investigated the monitoring of the vital signs of patients by using blockchain-based smart contracts. This system was designed using hyper ledger fabric and provided various benefits to individuals, irrespective of their location. The study used a Linoleum toolkit for acquiring physiological information. The efficiency of the developed framework was assessed in terms of latency, resource utilization, and transaction per second with the use of a standard benchmark hyper ledger caliper. It was observed from the study that this system is effective in the monitoring of patient data when compared to conventional healthcare systems. The authors of [53] suggested a blockchain-based system that predicts the status of customers and provides rewards in accordance with formulated rules. The results observed from the model suggested that this customer-centric model makes it easier for the business to modernize.

3. Challenges

The various performance-related challenges of H-IoT, such as security, latency, reliability, and efficiency, constitute a huge roadblock in the development of H-IoT. An improved H-IoT system should perform with low latency, high reliability, low power operation, and high security. In the following section, the challenges faced by several authors regarding IoT systems are discussed in detail.

3.1. Low Latency

In the field of H-IoT, achieving low latency is crucial for the following processes: real-time data processing and analysis of emergency response systems, remote patient monitoring, and telemedicine. Low latency enables healthcare providers to make timely decisions and respond promptly to emergencies. However, attaining low latency can be complex, requiring specialized hardware and software, as well as the optimization of network infrastructure. The transmission and analysis of data in real-time is a significant challenge in H-IoT, and any delays in processing and transmission could hinder the ability of healthcare providers to make informed decisions. The time-critical nature of a H-IoT system demands very low latency regarding end-to-end transmission and data processing. The total delay is decreased by reducing the transmission delay through the exploration of communication technology with a high availability and high bandwidth. The employment of ML algorithms for channel access and routing could considerably decrease the end-to-end delay, which is in contrast to the advantages of fog and edge computing frameworks. Further, these edge and fog computing frameworks have been found to be highly efficient when integrated with AI [54]. Deep learning methods enhance the big data analytical system designed to handle massive amounts of information; however, the existing challenges remain as an obstacle for the extraction of all reliable information from the provided dataset. Hence, there is an immediate demand for powerful algorithms that could potentially exploit and complete the set of information from the dataset. In order to resolve this, the employment of computing resources near the network edge decreases, as does the transmission delay and the processing delay. The usage of distributed computerized platforms provided by the fog paradigm could ensure minimum latency in time-critical H-IoT systems [55]. Incorporating fog computing in H-IoT can mitigate the adverse impact of cloud latency on emergency response systems. Nevertheless, there are still challenges related to response time, latency, and energy consumption that require attention. To overcome these limitations, the Energy-Efficient Internet of Medical Things to Fog Interoperability of Task Scheduling (EEIoMT) framework has been proposed [56]. This framework optimizes task scheduling by prioritizing critical tasks that need to be completed within a given timeframe while managing energy consumption and processing other tasks.

3.2. Security Challenges

In H-IoT, security is a major concern due to the confidential nature of patient information. As H-IoT devices and systems become more connected and accessible, they become more susceptible to security breaches and cyberattacks. Cybercriminals may find medical data valuable for identity theft, fraud, and other nefarious activities. Furthermore, a security breach in a H-IoT system may cause significant harm to patients due to the potential exposure of confidential medical information and/or the tampering of medical devices. Therefore, H-IoT systems must have strong security measures to ensure patient data confidentiality, integrity, and availability, as well as the safety and dependability of medical devices. H-IoT are resource constrained; thus, it become tedious to frame lightweight algorithms. Furthermore, the main problem exists in maintaining energy efficiency. Hence, the implementation of aspects built for mitigating security threats requires an energy-efficient machine learning or deep learning algorithm which could handle lightweight cryptography [57,58,59]. However, computational complexities exist in the above discussed system. Hence, a fog paradigm could be adopted, employing a federal system near the devices for security.
Despite its ability to offer efficient healthcare services, the Internet of Medical Things (IoMT) encounters security issues because of its susceptibility to middleman attacks and the insufficient security awareness of inexperienced users. In order to address these risks, a security enhancement approach called RECC-VC was proposed. This method incorporates K-anonymity, optimized neural networks, and blockchain technology, resulting in greater precision and security than existing methods [60].

3.3. Real Time Operational Platforms

In general, the health status of the user might be more deeply understood with the data collected from the sensors. It has to be noted that the amount of generated data is observed to be substantial and requires specialized processing algorithms for the extraction of useful information. However, many existing algorithms have proven to be incapable of entire data processing, necessitating the use of real-time data handling algorithms. Even though deep learning algorithms can handle massive real-time data, the extraction of multiple and redundant features from the dataset is imperative [61].

3.4. Energy Consumption

Although wearable H-IoT devices may be recharged after a particular operational period, the implants need a sustainable battery for hassle-free long-term operation. To overcome this energy constraint, various solutions have been suggested in the literature. One solution to this problem proposes minimal foreign intervention in the process that prevents hazardous side effects in the implementation process [62]. Additionally, better management of resources with a limited processing capability, limited power, and limited memory in the IoT is necessary for improving the network lifetime [63,64,65]. In fog and edge computing, a short-range power system has been that consumes a considerably low amount of power has been suggested, but availability becomes a problem in these cases. The solutions presented in the literature regarding energy harvesting in nodes need to be cost-effective, capable of fast-charging, and harmless to the user.

3.5. Scalability Challenges

To support the large-scale deployment of H-IoT systems, challenges in scalability must be addressed. Furthermore, the delivery of data in H-IoT systems is decisive, and a proper access mechanism should be used to ensure there is no loss of packets. Aside from this, most of the existing routing protocols in H-IoT systems do not perform well due to their dynamic nature. In addition, there are also some important issues in terms of localization and coverage. The standardization of implantable sensors and wearable devices for providing seamless connectivity is essential. The generated data traffic must be processed without the infusion of additional costs and computational delays. Consequently, challenges also deal with the network calibration in the nodes which are continuously changing. Mobility issues also seem to challenge IoT-based systems. The sensors which are employed on a source, e.g., the human body, degrade the network performance when the user changes their present location. Hence, reliable services must be adopted to retain the availability of the network while the user is moving.

4. Significance of H-IoT in the Medical Field

In today’s world, healthcare providers are facing many challenges. H-IoT increases medial IQ by providing the right information in the right place. Initially, it streamlines the workflow by eliminating simple things, thereby substantially reducing service cost and also provides more quality doctor/patient time. Moreover, higher patient satisfaction and patient outcome scores found in surveys such as HCAHPS could generate revenue by increasing third-party payments. Additionally, H-IoT improvises both patient and business outcomes. According to the IMS Institute, in 2012, the medical sector generated over two-hundred-billion dollars. Increased IQ in the medical field significantly reduces the risk of clinical mistakes occurring. The recent advancements in biometric devices and sensors mean they can provide immediate feedback to doctors. Instead of waiting fourteen days for a patient to respond, with the help of the IoE, instant actions can be obtained. When integrated with big data, additional benefits can be obtained, such as improved patient care. Most importantly, the IoE provides the necessary information required by the healthcare sectors to maintain general wellness [66].

5. Applications of H-IoT

5.1. Patient Prediction

H-IoT plays a predominant role in predicting patient visits to hospitals. Several articles have discussed the use of big data in predicting patient visits to hospitals. It has been stated that data from different sources are integrated to make daily and hourly predictions. Further, data scientists have implemented the techniques of time series analysis in the admission of hospital records. This has helped to predict patient admission rates as well as the rate of staff availability. Additionally, various ML algorithms act as essential tools for the analysis and prediction of admission rate trends in future patients. When predictions are performed, staff members are able to better anticipate when they will be required. Hence, more staff will be available, thereby reducing the waiting time of patients and also guaranteeing improved patient care.

5.2. EHR (Electronic Health Record)

The most common utilization of H-IoT in the healthcare sector is in regard to EHR (Electronic Health Records). These electronic health records are composed of patient reports, such as lab test results and medical histories [67,68]. Moreover, a secured information system has been employed for making these EHRs available for the private and public sectors. Since every record is digitized and the data files are consistently updated, there is no need for paperwork and data duplication.
In addition, electronic health records could generate reminders to track the prescriptions of patients and warnings when required lab tests are being conducted. Even though the implementation of EHR is beneficial, several countries have still struggled to implement them. A study suggested that, in the US (United States), a system named Health-Connect has been implemented, enabling easy sharing and utilization of data [69]. The reports from McKinsey on the integration of systems related to BD (big data) in healthcare indicate that approximately one million dollars have been saved due to reductions in office visits as well as pathology tests for cardiovascular diseases.

5.3. Real-Time Alerting

In the use of H-IoT systems, the real-time alerting of healthcare analytics is considered a predominant functionality. Generally, in hospitals, a real time CDS (Clinical Decision Support) system helps the health practitioners and doctors with prescriptions and advice given on the spot to the patients. However, these real-time systems are costly. Hence, doctors or health practitioners prefer their patients to stay away from their hospitals. In recent years, a personal analytics design was adopted, meaning that the health data of patients are constantly observable via wearable devices, such as smart watches, and information is shared via the cloud [70]. For instance, if there was a rapid increase in the blood pressure of a particular patient, their personal doctor will receive an alarm so that actions can be taken for reducing the patient’s blood pressure. Moreover, in an Asthma polis system, the inhaler has GPS access, used for finding asthma trends on an individual level and on a wider basis. These data are aggregated by clinical decision support, resulting in better treatment plans for patients suffering from asthma.

5.4. Enhancing Patient Engagement

It is evident that people are more health conscious nowadays, using smart devices to monitor their own pulse rate, blood pressure, and sleep and also to record their day-to-day routine. This increase in self-monitoring means that health risks of any kind are more likely to be identified and treated. Moreover, heart diseases can also be predicted by chronic insomnia and increased heart rate. Ultimately, by using smart devices, patients will also be involved in health monitoring activities [71]. Additionally, specific health trends can be identified by the H-IoT system and uploaded to the cloud, from which they can be accessed and used by physicians. Due to this enhanced self-monitoring, there will be a significant reduction in the number of hospital visits, and also patients will be independent.

5.5. Informed Strategic Planning by Utilizing Health Data

In today’s world, strategic planning within the healthcare sector is essential, and help can be provided by big data analytics. A recent study suggested that Google Maps could aid in illustrating different real-time problems. As such, the spread of any chronic disease among the population can be represented in the form of heat maps. The availability of medical services in intensive care units has been compared to real-time data, and decisions were taken with respect to healthcare strategies, which were augmented by several healthcare units.

5.6. Big Data Could Cure Cancer

By utilizing big data, a system named Cancer Moonshot was developed to help find a cure for cancer. This program aims to cure cancer within a much shorter time period compared to conventional methods. Several researchers from the medical field utilized huge amounts of data to achieve better results and identify useful trends. The results of this system will provide good recovery rates as well as treatment plans. Furthermore, the tumor samples that are stored in bio-banks are linked to the treatment records. These data are referenced in order and the interactions, as well as the mutations, among the cancer proteins mean that treatment plans can be mapped, resulting in better outcomes. This also sometimes yields surprising results, such as the presence of desipramine, which has been found to cure lung cancer.
Additionally, these researches demand collaboration with different hospitals, institutions, and non-profit organizations, in all of which treatment records are available. The samples of cancer tissues of trial patients are sequenced genetically and added to a worldwide cancer database. Nevertheless, the use of big data analytics to identify a cure for cancer has some limitations, primarily surrounding the issue of incompatible data, as some datasets cannot interact with others.

5.7. Predictive Analytics in the Healthcare Sector

In recent years, predictive analytics have been exploited for business applications and will surely be further explored in the future. A recent study suggested that a research project in US (United States) gathered datasets from thirty million people, from which the study observed a good quality of delivery care [72].
These kinds of intelligent tactics assist health practitioners and doctors in making decisions based on available datasets, leading to improved and better patient treatment. For instance, if a patient has a complicated medical history and also suffers from critical health disorders, these tactics could be more helpful. Moreover, there are some new tools which can predict heart disease, blood pressure, and diabetes. Patients suffering from these conditions could be advised to partake in regular physicals, seek regular medical advice, and also make use of dietary plans or weight management programs [73]. The proposed system has been compared, in terms of accuracy, to heart disease prediction via various existing systems [74,75], such as GV + SVM, SVM, MLP, ANN, LR, KNN, NB, DT, and SVM + MLP. The analytical results exhibited a high accuracy with the IoT methods, signifying its potential use in healthcare sector, as shown in Figure 4.

5.8. Tele-Heleathcare

Tele-healthcare is used for delivering long-distance healthcare services, offering the remote monitoring of patients. With the help of tele-healthcare, the gap between patients and their healthcare provider(s) has been bridged somewhat. The major advantage of tele-healthcare is the minimization of costs thanks to the reduction in regular hospital visits. Tele-healthcare involves the use of mobile technology, computers, and telecommunications to remotely deliver healthcare services and consultations across geographic boundaries.
Lately, networks have utilized multiple routes for data transmission. Nonetheless, certain experts have devised a dependable route between nodes in networks for tele-surgery objectives. They accomplished this by leveraging medical apps such as health monitors, which comprise tele-surgery functionalities. This optimization of Medical Quality of Service (m-QoS) is especially critical during the current pandemic era, wherein most individuals are unable to travel. To rectify these issues, the authors of [76] introduced a reliable and trustworthy method to help facilitate communication between doctors and patients so that the operation can be performed from longer distances. Further, these communications will be monitored by the suggested method, which receives data without delay. This study examines how it can increase buffer space, which can be efficiently utilized to reduce the delay between the source and the destination. Moreover, this study introduced a novel S-RCA (Smart Route control algorithm) to create virtual smart paths between the source and destination in order to transfer data. This offers a reliable connection that could be utilized in surgeries to guarantee that every instruction is received without delay. This method improvises M-QoS in remote surgery with reliable paths.
A tele-medical service was introduced in [77] to conduct clinical exams directly on patients in a hospital via IoT medical devices. The outcomes of these exams were sent to doctors through the hospital cloud in an automated manner. Specifically, the study discussed distributed scenario, in which the medical doctors, technicians, and nurses belonging to various hospitals form a virtual healthcare team to perform healthcare work by leveraging blockchain technology features. However, the study failed to integrate comprehensive healthcare scenarios involved with various organizations, such as pharmaceutical companies. Telemedicine has been a part of the industry for over 40 years and has adapted to incorporate various new technologies such as smartphones, wireless devices, online video conferences (VCs), and wearables. The remote medical services involve medical professionals monitoring patients remotely. Moreover, telemedicine offers personalized treatment plans, preventing re-admission or hospitalization. Healthcare data analytics help doctors predict critical medical events in the lives of patients and prevent health issues. With the help of telemedicine, the number of admissions in hospitals have significantly reduced, and the QoS (Quality of Service) has increased. Since the condition of patients can be monitored from anywhere and doctors can be consulted at any time, hospital visits are not needed, thereby significantly reducing waiting times.

5.9. Big-Data and Medical Imaging

Big data has made major contributions to medical imaging, e.g., several radiologists can individually investigate medical images, analyze them, and store them so that they are accessible for many years. However, this method is more costly and time-consuming.
The Carestream algorithm can analyze numerous images, find specific patterns within the pixels of the medical images, and convert them into numbers. These numbers play a vital role in diagnosis, thereby helping doctors treat diseases. This concept saves doctors from having to remember numerous medical images, which is incredibly difficult due to the fact that they are so highly detailed. Therefore, the Carestream algorithm has a positive impact in the field of medical industry. Table 1 shows a survey from the healthcare industry and H-IoT solutions.

6. Critical Analysis

The following graph (Figure 5) provides detail about the number of papers involved in the review according to various cryptographic platforms. Numerous research papers have focused on the advantages of using blockchain technology in healthcare, yet they fail to sufficiently address the difficulties that come with its implementation, such as concerns regarding scalability, interoperability, and regulatory compliance. While many researchers have explored the potential of edge computing in the healthcare sector, few have conducted a thorough assessment of its limitations. Although edge computing can enhance the speed and efficiency of data processing, it requires significant computational power and infrastructure, which smaller healthcare organizations may find challenging to acquire. Similarly, some researchers have offered a general overview of the potential applications of AI in healthcare, but they have not provided an in-depth analysis of its limitations and ethical implications.

7. Conclusions

Securing and ensuring user privacy has been considered the most important challenge for the extensive adaptation of IoT devices in healthcare systems. Several novel methods were used to enhance security, but they had certain limitations. In this work, we conducted a review of secure data accession by employing cryptographic platforms such as H-IoT in big data, H-IoT in blockchain, H-IoT in machine learning and deep learning, H-IoT in edge computing, and H-IoT in software-defined networks. We have also discussed the challenges associated with the H-IoT, along with potential applications. The paper also discusses current trends and future prospects in H-IoT, paving the way for the creation of advanced applications and solutions that augment patient care and optimize healthcare results. The solutions provided in this paper could address the discussed challenges and enable the mass adoption of reliable H-IoT devices and systems. Hence, the study recommends the need for legislative action and policies that outline frameworks designed to maintain cooperation between the legislative bodies and community of researchers in the field of H-IoT. Ensuring user security and privacy is vital for the widespread acceptance of IoT in healthcare systems, and this research paper suggests investigating the use of cryptographic platforms such as H-IoT to improve security. The paper examines the challenges and uses of H-IoT, proposes solutions for establishing a dependable H-IoT system, and emphasizes the need for legislative action and policy frameworks. It may serve as a reference for researchers interested in working with H-IoT.

Author Contributions

Conceptualization, M.K. and A.K.; methodology and implementation, M.K. and A.K.; simulation, M.K. and P.B.; validation, M.K. and D.G.; data curation, M.K., A.K. and D.G.; writing—original draft preparation, M.K., A.K. and S.V.; writing—review and editing, P.B. and S.V.; supervision, S.-h.K. and A.S.M.S.H.; funding acquisition, S.-h.K. and A.S.M.S.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2021R1G1A1009828), and Woosong University Academic Research Fund, Korea.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dhanvijay, M.M.; Patil, S.C. Internet of Things: A survey of enabling technologies in healthcare and its applications. Comput. Netw. 2019, 153, 113–131. [Google Scholar] [CrossRef]
  2. Chandy, A. A review on iot based medical imaging technology for healthcare applications. J. Innov. Image Process. 2019, 1, 51–60. [Google Scholar] [CrossRef]
  3. Karthick, G.S.; Pankajavalli, P.B. A Review on Human Healthcare Internet of Things: A Technical Perspective. SN Comput. Sci. 2020, 1, 198. [Google Scholar] [CrossRef]
  4. Khan, M.A.; Quasim, M.T.; Alghamdi, N.S.; Khan, M.Y. A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data. IEEE Access 2020, 8, 52018–52027. [Google Scholar] [CrossRef]
  5. Kristoffersson, A.; Lindén, M. A Systematic Review on the Use of Wearable Body Sensors for Health Monitoring: A Qualitative Synthesis. Sensors 2020, 20, 1502. [Google Scholar] [CrossRef]
  6. Vuong, Q.H.; Nguyen, M.H.; La, V.P. (Eds.) The Mindsponge and BMF Analytics for Innovative Thinking in Social Sciences and Humanities; Walter de Gruyter GmbH: Berlin, Germany, 2022. [Google Scholar]
  7. Vuong, Q.H. Mindsponge Theory; De Gruyter: Berlin, Germany, 2023. [Google Scholar]
  8. Vuong, Q.-H.; Le, T.-T.; Jin, R.; Van Khuc, Q.; Nguyen, H.-S.; Vuong, T.-T.; Nguyen, M.-H. Near-Suicide Phenomenon: An Investigation into the Psychology of Patients with Serious Illnesses Withdrawing from Treatment. Int. J. Environ. Res. Public Health 2023, 20, 5173. [Google Scholar] [CrossRef]
  9. Dang, L.M.; Piran, J.; Han, D.; Min, K.; Moon, H. A Survey on Internet of Things and Cloud Computing for Healthcare. Electronics 2019, 8, 768. [Google Scholar] [CrossRef]
  10. Dinesh, R.; Marimuthu, R. A Survey about WSN and IoT Based Health Care Applications and ADPLL Contribution for Health Care Systems. In Proceedings of the 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST), Morioka, Japan, 23–25 October 2019; pp. 1–8. [Google Scholar] [CrossRef]
  11. Dimitrov, D.V. Medical Internet of Things and Big Data in Healthcare. Healthc. Inform. Res. 2016, 22, 156–163. [Google Scholar] [CrossRef]
  12. Rodrigues, J.J.P.C.; Segundo, D.B.D.R.; Junqueira, H.A.; Sabino, M.H.; Prince, R.M.; Al-Muhtadi, J.; De Albuquerque, V.H.C. Enabling Technologies for the Internet of Health Things. IEEE Access 2018, 6, 13129–13141. [Google Scholar] [CrossRef]
  13. Tsafack, N.; Sankar, S.; Abd-El-Atty, B.; Kengne, J.; Jithin, K.C.; Belazi, A.; Mehmood, I.; Bashir, A.K.; Song, O.-Y.; El-Latif, A.A.A. A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things. IEEE Access 2020, 8, 137731–137744. [Google Scholar] [CrossRef]
  14. Brühl, C.A.; Zaller, J.G. Biodiversity Decline as a Consequence of an Inappropriate Environmental Risk Assessment of Pesticides. Front. Environ. Sci. 2019, 7, 177. [Google Scholar] [CrossRef]
  15. Jagadeeswari, V.; Vairavasundaram, S.; Logesh, R.; Vijayakumar, V. A study on medical Internet of Things and Big Data in personalized healthcare system. Health Inf. Sci. Syst. 2018, 6, 14. [Google Scholar] [CrossRef]
  16. Yang, Y.; Zheng, X.; Guo, W.; Liu, X.; Chang, V. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 2019, 479, 567–592. [Google Scholar] [CrossRef]
  17. Ghosh, G.; Kavita; Verma, S.; Jhanjhi, N.Z.; Talib, M.N. Secure Surveillance System Using Chaotic Image Encryption Technique. IOP Conf. Ser. Mater. Sci. Eng. 2020, 993, 012062. [Google Scholar] [CrossRef]
  18. Sivaparthipan, C.; Muthu, B.A.; Manogaran, G.; Maram, B.; Sundarasekar, R.; Krishnamoorthy, S.; Hsu, C.-H.; Chandran, K. Innovative and efficient method of robotics for helping the Parkinson’s disease patient using IoT in big data analytics. Trans. Emerg. Telecommun. Technol. 2020, 31, e3838. [Google Scholar] [CrossRef]
  19. Mishra, K.N.; Chakraborty, C. A Novel Approach Towards Using Big Data and IoT for Improving the Efficiency of m-Health Systems. In Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare; Springer: Cham, Switzerland, 2019; Volume 875, pp. 123–139. [Google Scholar] [CrossRef]
  20. Robinson, C.; Portier, C.J.; Čavoški, A.; Mesnage, R.; Roger, A.; Clausing, P.; Whaley, P.; Muilerman, H.; Lyssimachou, A. Achieving a High Level of Protection from Pesticides in Europe: Problems with the Current Risk Assessment Procedure and Solutions. Eur. J. Risk Regul. 2020, 11, 450–480. [Google Scholar] [CrossRef]
  21. Feng, C.; Adnan, M.; Ahmad, A.; Ullah, A.; Khan, H.U. Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions. Sci. Program. 2020, 2020, 7063681. [Google Scholar] [CrossRef]
  22. Ahmed, I.; Ahmad, M.; Jeon, G.; Piccialli, F. A Framework for Pandemic Prediction Using Big Data Analytics. Big Data Res. 2021, 25, 100190. [Google Scholar] [CrossRef]
  23. Singh, A.; Chatterjee, K. Securing smart healthcare system with edge computing. Comput. Secur. 2021, 108, 102353. [Google Scholar] [CrossRef]
  24. Pratap, A.; Kumar, A.; Kumar, M. Analyzing the Need of Edge Computing for Internet of Things (IoT). In Proceedings of Second International Conference on Computing, Communications, and Cyber-Security; Springer: Singapore, 2021; pp. 203–212. [Google Scholar] [CrossRef]
  25. Kaushik, S.; Gandhi, C. Ensure Hierarchal Identity Based Data Security in Cloud Environment. Int. J. Cloud Appl. Comput. 2019, 9, 21–36. [Google Scholar] [CrossRef]
  26. Yang, G.; Jan, M.A.; Rehman, A.U.; Babar, M.; Aimal, M.M.; Verma, S. Interoperability and Data Storage in Internet of Multimedia Things: Investigating Current Trends, Research Challenges and Future Directions. IEEE Access 2020, 8, 124382–124401. [Google Scholar] [CrossRef]
  27. Kumar, M.; Raju, K.S.; Kumar, D.; Goyal, N.; Verma, S.; Singh, A. An efficient framework using visual recognition for IoT based smart city surveillance. Multimedia Tools Appl. 2021, 80, 31277–31295. [Google Scholar] [CrossRef] [PubMed]
  28. Kumar, S.; Shanker, R.; Verma, S. Context Aware Dynamic Permission Model: A Retrospect of Privacy and Security in Android System. In Proceedings of the 2018 International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, India, 19–20 April 2018; pp. 324–329. [Google Scholar] [CrossRef]
  29. Misra, S.; Saha, R.; Ahmed, N. Health-Flow: Criticality-Aware Flow Control for SDN-Based Healthcare IoT. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  30. Rani, P.; Kavita; Verma, S.; Rawat, D.B.; Dash, S. Mitigation of black hole attacks using firefly and artificial neural network. Neural Comput. Appl. 2022, 34, 15101–15111. [Google Scholar] [CrossRef]
  31. Uddin, M.Z. A wearable sensor-based activity prediction system to facilitate edge computing in smart healthcare system. J. Parallel Distrib. Comput. 2019, 123, 46–53. [Google Scholar] [CrossRef]
  32. Sodhro, A.H.; Luo, Z.; Sangaiah, A.K.; Baik, S.W. Mobile edge computing based QoS optimization in medical healthcare applications. Int. J. Inf. Manag. 2019, 45, 308–318. [Google Scholar] [CrossRef]
  33. Oueida, S.; Kotb, Y.; Aloqaily, M.; Jararweh, Y.; Baker, T. An Edge Computing Based Smart Healthcare Framework for Resource Management. Sensors 2018, 18, 4307. [Google Scholar] [CrossRef]
  34. Abhishek, G.; Kumar, M.; Rangra, A.; Tiwari, V.K.; Saxena, P. Network Intrusion Detection Types and Analysis of Their Tools; Department of Computer Science and Information Technology, Jaypee University of Information Technology: Waknaghat, India, 2012. [Google Scholar]
  35. Mani, N.; Moh, M.; Moh, T.S. Defending deep learning models against adversarial attacks. Int. J. Softw. Sci. Comput. Intell. 2021, 13, 72–89. [Google Scholar] [CrossRef]
  36. Kumar, M.; Mukherjee, P.; Verma, K.; Verma, S.; Rawat, D.B. Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Trans. Netw. Sci. Eng. 2021, 9, 3272–3281. [Google Scholar] [CrossRef]
  37. Gupta, R.; Verma, E.S.; Kavita, E. Solving ipv4 (32 bits) address shortage problem using ipv6 (128 bits). IJREISS 2012, 2. [Google Scholar]
  38. Dash, S.; Verma, S.; Kavita; Khan, M.S.; Wozniak, M.; Shafi, J.; Ijaz, M.F. A Hybrid Method to Enhance Thick and Thin Vessels for Blood Vessel Segmentation. Diagnostics 2021, 11, 2017. [Google Scholar] [CrossRef]
  39. Sabanayagam, C.; Xu, D.; Ting, D.S.W.; Nusinovici, S.; Banu, R.; Hamzah, H.; Lim, C.; Tham, Y.-C.; Cheung, C.Y.; Tai, E.S.; et al. A deep learning algorithm to detect chronic kidney disease from retinal photographs in community-based populations. Lancet Digit. Health 2020, 2, e295–e302. [Google Scholar] [CrossRef]
  40. Umer, M.; Sadiq, S.; Ahmad, M.; Ullah, S.; Choi, G.S.; Mehmood, A. A Novel Stacked CNN for Malarial Parasite Detection in Thin Blood Smear Images. IEEE Access 2020, 8, 93782–93792. [Google Scholar] [CrossRef]
  41. Barka, E.; Dahmane, S.; Kerrache, C.A.; Khayat, M.; Sallabi, F. STHM: A Secured and Trusted Healthcare Monitoring Architecture Using SDN and Blockchain. Electronics 2021, 10, 1787. [Google Scholar] [CrossRef]
  42. Gopal, G.; Verma, S.; Jhanjhi, N.Z.; Talib, M.N. Secure surveillance system using chaotic image encryption technique. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 993, p. 012062. [Google Scholar]
  43. Khan, S.; Akhunzada, A. A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT). Comput. Commun. 2021, 170, 209–216. [Google Scholar] [CrossRef]
  44. Prasad, J.R.; Bendale, S.P.; Prasad, R.S. Semantic Internet of Things (IoT) Interoperability Using Software Defined Network (SDN) and Network Function Virtualization (NFV). In Semantic IoT: Theory and Applications. Studies in Computational Intelligence; Springer: Cham, Switzerland, 2021; pp. 399–415. [Google Scholar] [CrossRef]
  45. Meng, Y.; Huang, Z.; Shen, G.; Ke, C. SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare. IEEE Trans. Netw. Serv. Manag. 2019, 17, 308–318. [Google Scholar] [CrossRef]
  46. Biswas, S.; Sharif, K.; Li, F.; Mohanty, S. Blockchain for e-Health-Care Systems: Easier Said Than Done. Computer 2020, 53, 57–67. [Google Scholar] [CrossRef]
  47. Sumathi, M.; Sangeetha, S. Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System. Int. J. Cloud Appl. Comput. 2020, 10, 77–92. [Google Scholar] [CrossRef]
  48. Kaur, M.; Verma, S.; Kavita. Flying Ad-Hoc Network (FANET): Challenges and Routing Protocols. J. Comput. Theor. Nanosci. 2020, 17, 2575–2581. [Google Scholar] [CrossRef]
  49. Jo, B.W.; Khan, R.M.A.; Lee, Y.-S. Hybrid Blockchain and Internet-of-Things Network for Underground Structure Health Monitoring. Sensors 2018, 18, 4268. [Google Scholar] [CrossRef]
  50. Jamil, F.; Ahmad, S.; Iqbal, N.; Kim, D.-H. Towards a remote monitoring of patient vital signs based on IoT-based blockchain integrity management platforms in smart hospitals. Sensors 2020, 20, 2195. [Google Scholar] [CrossRef]
  51. Kumar, M.; Mukherjee, P.; Verma, S.; Kavita; Kaur, M.; Singh, S.; Kobielnik, M.; Woźniak, M.; Shafi, J.; Ijaz, M.F. BBNSF: Blockchain-Based Novel Secure Framework Using RP2-RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems. Sensors 2022, 22, 9448. [Google Scholar] [CrossRef] [PubMed]
  52. Ramisetty, S.; Kavita; Varma, S. The Amalgamative Sharp Wireless Sensor Networks Routing and with Enhanced Machine Learning. J. Comput. Theor. Nanosci. 2019, 16, 3766–3769. [Google Scholar] [CrossRef]
  53. Kumar, P.M.; Lokesh, S.; Varatharajan, R.; Babu, G.C.; Parthasarathy, P. Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. Future Gener. Comput. Syst. 2018, 86, 527–534. [Google Scholar] [CrossRef]
  54. Lee, G.; Saad, W.; Bennis, M. An Online Optimization Framework for Distributed Fog Network Formation with Minimal Latency. IEEE Trans. Wirel. Commun. 2019, 18, 2244–2258. [Google Scholar] [CrossRef]
  55. Alatoun, K.; Matrouk, K.; Mohammed, M.A.; Nedoma, J.; Martinek, R.; Zmij, P. A Novel Low-Latency and Energy-Efficient Task Scheduling Framework for Internet of Medical Things in an Edge Fog Cloud System. Sensors 2022, 22, 5327. [Google Scholar] [CrossRef]
  56. Kumar, M.; Ghrera, S.P. A new group key transfer protocol using CBU hash function. Indian J. Sci. Technol. 2014, 7, 19–24. [Google Scholar] [CrossRef]
  57. Akhtar, M.A.K.; Kumar, M. Detection of DDoS Attack Using Naive Bayes Classifier. In Advancements in Security and Privacy Initiatives for Multimedia Images; IGI Global: Hershey, PA, USA, 2021; pp. 214–225. [Google Scholar]
  58. Akhtar, M.A.K.; Kumar, M.; Kumar, A. Botnet Dynamics and Measures for India. In Trends in Wireless Communication and Information Security: Proceedings of EWCIS 2020; Springer: Singapore, 2021; pp. 301–309. [Google Scholar]
  59. Kumar, M.; Kavita; Verma, S.; Kumar, A.; Ijaz, M.F.; Rawat, D.B. ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC. IEEE Trans. Ind. Inform. 2022, 18, 8936–8943. [Google Scholar] [CrossRef]
  60. Obinikpo, A.A.; Kantarci, B. Big Sensed Data Meets Deep Learning for Smarter Health Care in Smart Cities. J. Sens. Actuator Netw. 2017, 6, 26. [Google Scholar] [CrossRef]
  61. Ghosh, G.; Kavita; Anand, D.; Verma, S.; Rawat, D.B.; Shafi, J.; Marszałek, Z.; Woźniak, M. Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map. Symmetry 2021, 13, 1447. [Google Scholar] [CrossRef]
  62. Yadav, A.L.; Verma, E.S.; Kavita, E. Grip on the cloud and service grid technologies some pain points that clouds and service grids address. IJECS 2013, 2, 2319–7242. [Google Scholar]
  63. Kumar, M.; Kumar, D.; Akhtar, M.A.K. A Modified GA-Based Load Balanced Clustering Algorithm for WSN: MGALBC. Int. J. Embed. Real-Time Commun. Syst. (IJERTCS) 2021, 12, 44–63. [Google Scholar] [CrossRef]
  64. Kumar, M.; Mittal, S.; Akhtar, A.K. A NSGA-II Based Energy Efficient Routing Algorithm for Wireless Sensor Networks. J. Inf. Sci. Eng. 2020, 36, 777–794. [Google Scholar]
  65. Rani, P.; Kavita; Verma, S.; Kaur, N.; Wozniak, M.; Shafi, J.; Ijaz, M.F. Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks. Sensors 2021, 22, 251. [Google Scholar] [CrossRef]
  66. El-Sappagh, S.; Abuhmed, T.; Islam, S.R.; Kwak, K.S. Multimodal multitask deep learning model for Alzheimer’s disease progression detection based on time series data. Neurocomputing 2020, 412, 197–215. [Google Scholar] [CrossRef]
  67. Khennou, F.; Khamlichi, Y.I.; Chaoui, N.E.H. Improving the Use of Big Data Analytics within Electronic Health Records: A Case Study based OpenEHR. Procedia Comput. Sci. 2018, 127, 60–68. [Google Scholar] [CrossRef]
  68. Jim, H.S.L.; Hoogland, A.; Brownstein, N.C.; Barata, A.; Dicker, A.P.; Knoop, H.; Gonzalez, B.D.; Perkins, R.; Rollison, D.; Gilbert, S.M.; et al. Innovations in research and clinical care using patient-generated health data. CA Cancer J. Clin. 2020, 70, 182–199. [Google Scholar] [CrossRef]
  69. Benhlima, L. Big data management for healthcare systems: Architecture, requirements, and implementation. Adv. Bioinform. 2018, 2018, 4059018. [Google Scholar]
  70. Sharma, A.E.; Rivadeneira, N.A.; Barr-Walker, J.; Stern, R.J.; Johnson, A.K.; Sarkar, U. Patient Engagement In Health Care Safety: An Overview Of Mixed-Quality Evidence. Health Aff. 2018, 37, 1813–1820. [Google Scholar] [CrossRef]
  71. Hasan, M.K.; Shahjalal; Chowdhury, M.Z.; Jang, Y.M. Real-Time Healthcare Data Transmission for Remote Patient Monitoring in Patch-Based Hybrid OCC/BLE Networks. Sensors 2019, 19, 1208. [Google Scholar] [CrossRef]
  72. Hopp, W.J.; Li, J.; Wang, G. Big Data and the Precision Medicine Revolution. Prod. Oper. Manag. 2018, 27, 1647–1664. [Google Scholar] [CrossRef]
  73. Kumar, S.; Singh, M. Big data analytics for healthcare industry: Impact, applications, and tools. Big Data Min. Anal. 2018, 2, 48–57. [Google Scholar] [CrossRef]
  74. Bansal, K.; Singh, A.; Verma, S.; Kavita; Jhanjhi, N.Z.; Shorfuzzaman, M.; Masud, M. Evolving CNN with Paddy Field Algorithm for Geographical Landmark Recognition. Electronics 2022, 11, 1075. [Google Scholar] [CrossRef]
  75. Li, J.P.; Haq, A.U.; Din, S.U.; Khan, J.; Khan, A.; Saboor, A. Heart Disease Identification Method Using Machine Learning Classification in E-Healthcare. IEEE Access 2020, 8, 107562–107582. [Google Scholar] [CrossRef]
  76. Abujassar, R.S.; Yaseen, H.; Al-Adwan, A.S. A Highly Effective Route for Real-Time Traffic Using an IoT Smart Algorithm for Tele-Surgery Using 5G Networks. J. Sens. Actuator Netw. 2021, 10, 30. [Google Scholar] [CrossRef]
  77. Celesti, A.; Ruggeri, A.; Fazio, M.; Galletta, A.; Villari, M.; Romano, A. Blockchain-Based Healthcare Workflow for Tele-Medical Laboratory in Federated Hospital IoT Clouds. Sensors 2020, 20, 2590. [Google Scholar] [CrossRef]
  78. Lomotey, R.K.; Pry, J.; Sriramoju, S. Wearable IoT data stream traceability in a distributed health information system. Pervasive Mob. Comput. 2017, 40, 692–707. [Google Scholar] [CrossRef]
  79. Dogra, V.; Verma, S.; Verma, K.; Jhanjhi, N.Z.; Ghosh, U.; Le, D.-N. A Comparative Analysis of Machine Learning Models for Banking News Extraction by Multiclass Classification with Imbalanced Datasets of Financial News: Challenges and Solutions. Int. J. Interact. Multimedia Artif. Intell. 2022, 7, 35. [Google Scholar] [CrossRef]
  80. Hossain, M.; Islam, S.R.; Ali, F.; Kwak, K.-S.; Hasan, R. An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 2018, 82, 422–439. [Google Scholar] [CrossRef]
  81. Misra, S.; Deb, P.K.; Koppala, N.; Mukherjee, A.; Mao, S. S-Nav: Safety-Aware IoT Navigation Tool for Avoiding COVID-19 Hotspots. IEEE Internet Things J. 2020, 8, 6975–6982. [Google Scholar] [CrossRef]
  82. Takabayashi, K.; Tanaka, H.; Sakakibara, K. Integrated Performance Evaluation of the Smart Body Area Networks Physical Layer for Future Medical and Healthcare IoT. Sensors 2018, 19, 30. [Google Scholar] [CrossRef]
  83. Rich, E.; Miah, A.; Lewis, S. Is digital health care more equitable? The framing of health inequalities within England’s digital health policy 2010–2017. Sociol. Health Illn. 2019, 41, 31–49. [Google Scholar] [CrossRef]
  84. Dash, S.; Verma, S.; Kavita; Jhanjhi, N.Z.; Masud, M.; Baz, M. Curvelet Transform Based on Edge Preserving Filter for Retinal Blood Vessel Segmentation. Comput. Mater. Contin. 2022, 71, 2459–2476. [Google Scholar] [CrossRef]
  85. Alabdulkarim, A.; Al-Rodhaan, M.; Ma, T.; Tian, Y. PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices. Sensors 2019, 19, 142. [Google Scholar] [CrossRef]
  86. Adly, A.S.; Adly, A.S.; Adly, M.S. Approaches based on artificial intelligence and the internet of intelligent things to prevent the spread of COVID-19: Scoping review. J. Med. Internet Res. 2020, 22, e19104. [Google Scholar] [CrossRef]
  87. Rahman, A.; Chakraborty, C.; Anwar, A.; Karim, M.; Islam, M.; Kundu, D.; Rahman, Z.; Band, S.S. SDN–IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic. Clust. Comput. 2021, 25, 2351–2368. [Google Scholar] [CrossRef]
  88. Kumar, A. Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection. Int. J. Cloud Appl. Comput. 2019, 9, 22–36. [Google Scholar] [CrossRef]
Figure 1. Revolutionary features of H-IoT in a hospital environment.
Figure 1. Revolutionary features of H-IoT in a hospital environment.
Electronics 12 02050 g001
Figure 2. Internet of Things in healthcare industries.
Figure 2. Internet of Things in healthcare industries.
Electronics 12 02050 g002
Figure 3. Applications of big data in healthcare industries [20].
Figure 3. Applications of big data in healthcare industries [20].
Electronics 12 02050 g003
Figure 4. Heart disease prediction accuracy across multiple prediction systems [74,75].
Figure 4. Heart disease prediction accuracy across multiple prediction systems [74,75].
Electronics 12 02050 g004
Figure 5. Visualization of the different aspects of IoT discussed in this paper.
Figure 5. Visualization of the different aspects of IoT discussed in this paper.
Electronics 12 02050 g005
Table 1. Survey on the prevailing challenges in the healthcare industries associated with the possible IoT solutions.
Table 1. Survey on the prevailing challenges in the healthcare industries associated with the possible IoT solutions.
S.NoChallengesIoT SolutionsAuthor
1.Lack of smart hospitals
  • IoT (Internet of Things) offers smart hospitals by utilizing connected dedicated networks as well as automation.
  • An IoT device consists of sensors, which provide proper and relevant information about the patient’s abnormalities.
  • A smart hospital provides all information in a digitized manner and also significantly reduces the patient’s waiting time.
  • Data analysis could help day-to-day operation and aid the care of COVID-19 patients.
[78,79]
2.Storage of patient data (COVID-19)
  • The IoT device effectively transmits, stores, and analyzes the patients’ data to offer better treatment in future.
  • This helps to analyze and check the recovery of patients.
  • Increases awareness regarding the causes of COVID-19.
[80,81]
3.Treating COVID-19 patients
  • Various clinical devices such as pumps, scales, and nebulizers are utilized to effectively monitor COVID-19 patients.
  • IoT devices are also capable of monitoring and regulating environmental conditions such as humidity, temperature, etc.
  • IoT devices possess real-time location services, which are utilized in the treatment of COVID-19 patients.
[82,83]
4.Lack of accurate decisionmaking
  • IoT devices are beneficial in making accurate decisions as they can predict and regularly monitor patient data.
  • Accurate surgery requires good communication, IOT technology records all data and makes quality decisions.
[84,85]
5.Improper patient monitoring
  • IoT devices regularly monitor the cleanliness and infections levels in support areas and hospitals.
  • IoT devices also monitor the proper medication and protein administration of the patients.
  • Further, IoT devices check for improvements in the patient’s condition in day-to-day life.
  • The role of the cloud in preserving privacy.
[86,87,88]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kumar, M.; Kumar, A.; Verma, S.; Bhattacharya, P.; Ghimire, D.; Kim, S.-h.; Hosen, A.S.M.S. Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues. Electronics 2023, 12, 2050. https://doi.org/10.3390/electronics12092050

AMA Style

Kumar M, Kumar A, Verma S, Bhattacharya P, Ghimire D, Kim S-h, Hosen ASMS. Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues. Electronics. 2023; 12(9):2050. https://doi.org/10.3390/electronics12092050

Chicago/Turabian Style

Kumar, Mohit, Ashwani Kumar, Sahil Verma, Pronaya Bhattacharya, Deepak Ghimire, Seong-heum Kim, and A. S. M. Sanwar Hosen. 2023. "Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues" Electronics 12, no. 9: 2050. https://doi.org/10.3390/electronics12092050

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop