Enabling Blockchain with IoMT Devices for Healthcare
Abstract
:1. Introduction
2. Background
2.1. Blockchain
2.2. Blockchain Components
2.2.1. Ledger
2.2.2. Secure
2.2.3. Shared
2.2.4. Distributed
2.2.5. Private
2.3. IoMT
2.4. Fog, Edge and Cloud-Computing
3. Research Motivation
Methodology
4. System Design
4.1. Device Registration
4.1.1. IoT Device Registration Process at Edge Layer
4.1.2. Patient EHR/EMR Registration
4.1.3. Lightweight Block Generation of Patient Data
4.2. IoT System
- Data Collection Layer: This layer primarily includes sensors and devices that collect data from the patient and can forward it using a wireless communication protocol such as WiFi, Bluetooth, ANT, Zigbee, NFC. A few examples are heart rate monitoring devices, health bands, and fitness trackers.
- Data Storage Layer: This layer includes various types of data storage, including physical storage or cloud storage. The data storage must have negligible latency in data retrieval due to the critical nature of healthcare applications. It is also crucial that the data stored has sufficient redundancy and backup to be securely recovered.
- Data Processing Layer: This layer concerns the analysis of stored data for decision making and insights. The processing could be done entirely in the cloud or distributed between the edge and the cloud. Artificial intelligence, as well as other optimization techniques, are frequently used in this layer.
4.2.1. IoT System Components
- Edge Layer: Edge layers are directly related to data collected through the “patient”, having a two-tiered structure, where all the information which is collected with the help of sensor-based IoMT devices travels via a smart gateway. Usually these gateways are smartphones or smart devices connected to the wireless network for streaming data. The main function of IoMT devices is to establish an effective sensing technology to collect various types of patient health data. All IoT devices collect the patient’s medical information or any other type of information that is specific to the patient. These devices are small electronic circuits with specific functionality and therefore they lack computing power and storage. The availability of less computation, speed, memory and more latency results in the poor performance of data streaming and cryptography calculations [22]. Thus, data processing requires a higher level with the central node in blockchain, a high-performance computer that acts as an intelligent gateway to blockchain in the upper layer. Each patient will have a blockchain to integrate all the patient’s IoT data into the patient’s blockchain.The measurement of various physiological parameters requires multiple on-body and implantable sensors. All these sensor nodes are standalone, as well as being capable of communicating with the rest of the system. Each one has its wireless trans-receiver, a computing unit in the form of a micro-controller or microprocessor and energy supply in the form of a battery with an optional energy harvesting unit to charge this battery. Various physiological parameters are sensed, collected, processed and then forwarded to an access point using the wireless interface. Some of the standard sensor nodes used are Accelerators, Gyroscope, Magnetometer, Temperature sensors, ECG Sensor, EEG Sensor, EMG, EOG and pulse oxy-meter. Accelerators, Gyroscopes and Magnetometers are used for motion detection, monitoring and fall detection. In addition, ECG, EEG, EMG and EOG are used to record physiological parameters used in conjunction with other vital signs to detect various chronic diseases such as heart conditions, respiratory diseases and neurological diseases. It is important that the sensed parameters met the standards of Quality of Information (QoI) standards to ensure that the underlying decisions made using this data regarding the patient’s health are reliable, fast and useful.
- Fog Layer: All the sensors that are connected in the gateway layer route the data with the help of an IoT gateway. Any type of abnormal sensor data is identified and managed with the help of these gateways. They have the power to identify the format in which the data is transferred across the gateway. They are responsible because any irrelevant piece of data should not travel across the blockchain network at the time of a smart contract in the network layer. Failure of which can result in no, wait for the data in the blockchain. The rejection rate will be very hard for all the information that is not in the prescribed format as required. The network layer connects to all the P2P nodes across the entire blockchain. These nodes are exclusively responsible for providing a backbone towards all the transactions that happens in the Ledger. From the gateway or smart phone application, the sensor data travels with the help of these central nodes and any kind of conflicts are resolved at this level. Once the data is found, clean and as per the format, the network layer routes the data towards further processing in the Ledger.
- Cloud Layer: The cloud layer is where IoT is supplemented by the processing and storage capabilities of the cloud. Cloud-level blockchain is necessary to control the interaction. This work aims to design a cloud fog-based model for detecting and monitoring patients of COVID-19 efficiently and in real-time using cloud fog computing. The information of the patient after their constant monitoring and detection of the disease is replicated and broadcasted over the P2P network in the blockchain. This ensures that the correct piece of information goes global and the analytics and research which are required to be done for any specific disease are executed without any hindrances. It must be noted that all three layers execute at different level in the P2P network to provide a properly processed block of data. This framework consists of three levels: sensing level, fog level and cloud layer. Regarding the sensing level, it consists of a variety of sensors, such as sensors/medical devices on/inside the body, that can measure health-related data (measure vital signs) and carry out the acquisition, analysis and forwarding of essential data to highly computerized, dedicated servers (fog and cloud servers).
4.2.2. Bottom-Up Decision-Making Approach
4.2.3. Decision Making at Edge Layer
4.2.4. Decision Making at Fog Layer
4.2.5. Decision Making at Cloud Layer
5. Experiment and Observations
- For all the devices having a valid device ID and IP address, direct connectivity is provided to the cloud gateway.
- For the devices that follow certain industry standards and are used for transferring information from a range of existing technologies such as BLE or ZigBee [25], the connectivity is provided with the help of a field gateway. These devices need to be registered once before they are enrolled in the transaction processing system at Ledger level in the blockchain.
- Some devices require the installation of specific device drivers or consensus protocols translations that empowers them to be used in the communication network. These devices, after proper installation of the protocol, can be used with the help of a customized cloud gateway to send the transaction or information from one point to another.
- The connectivity to other devices is approved and provided with the help of a field gateway or any other custom cloud gateway. This enables the manual installation and approval system to handle all such devices inside the broadcasting network.
5.1. Field Gateway
5.2. Cloud Gateway
5.3. AI Powering the Edge Computing
5.4. Hardware and Software
- Hardware: PC (RAM 32 GB, SSD 1 TB), Intel(R) Core (TM) i9-9900k CPU, Dual NVIDIA Ge-Force RTX 2070 SUPER;
- Software: Anaconda using Jupiter Notebook. Lighter libraries to use deep learning concepts.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chiuchisan, I.; Costin, H.-N.; Geman, O. Adopting the internet of things technologies in health care systems. In Proceedings of the 2014 IEEE International Conference and Exposition on Electrical and Power Engineering (EPE), Iasi, Romania, 16–18 October 2014. [Google Scholar]
- Asghar, M.H.; Negi, A.; Mohammadzadeh, N. Principle application and vision in Internet of Things (IoT). In Proceedings of the 2015 IEEE International Conference on Computing, Communication & Automation, Luxembourg, 8–11 September 2015. [Google Scholar]
- Darshan, K.; Anandakumar, K. A comprehensive review on usage of Internet of Things (IoT) in healthcare system. In Proceedings of the 2015 IEEE International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, India, 17–19 December 2015. [Google Scholar]
- Janbi, N.; Katib, I.; Albeshri, A.; Mehmood, R. Distributed artificial intelligence-as-a-service (DAIaaS) for smarter IoE and 6G environments. Sensors 2020, 20, 5796. [Google Scholar] [CrossRef] [PubMed]
- Verma, P.; Sood, S. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet Things J. 2018, 5, 1789–1796. [Google Scholar] [CrossRef]
- Kshetri, N. Can blockchain strengthen the internet of things? IT Profess. 2017, 19, 68–72. [Google Scholar] [CrossRef]
- Randall, D.; Goel, P.; Abujamra, R. Blockchain applications and use cases in health information technology. J. Health Med. Inform. 2017, 8, 8–11. [Google Scholar] [CrossRef]
- Dautov, R.; Distefano, S.; Buyya, R. Hierarchical data fusion for smart healthcare. J. Big Data 2019, 6, 1–23. [Google Scholar] [CrossRef]
- Joyia, G.J.; Rao, M.; Liaqat, A.F.; Rehman, S. Internet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain. J. Commun. 2017, 12, 240–247. [Google Scholar] [CrossRef]
- Alshahrani, S.-M.; Jeeva, S.C.; Rajsingh, E.B. URL Phishing Detection Using Particle Swarm Optimization and Data Mining. CMC J. 2022, 73, 5625–5640. [Google Scholar]
- Zhang, B.; Kraska, T. The Cloud is Not Enough: Saving IoT from the Cloud. In Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15), Santa Clara, CA, USA, 18 May 2015. [Google Scholar]
- Zhou, L.; Wang, L.; Sun, Y.; Lv, P. Beekeeper: A blockchain-based IoT system with secure storage and homomorphic computation. IEEE Access 2018, 6, 43472–43488. [Google Scholar] [CrossRef]
- Jan, M.A.; Cai, J.; Gao, X.-C.; Khan, F.; Mastorakis, S.; Usman, M.; Alazab, M.; Watters, P. Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions. J. Netw. Comput. Appl. 2021, 175, 102918. [Google Scholar] [CrossRef]
- Mekki, K.; Bajic, E.; Chaxel, F.; Meyer, F. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
- Schulz, P.; Matthe, M.; Klessig, H.; Simsek, M.; Fettweis, G.; Ansari, J. Latency critical IoT applications in 5G: Perspective on the design of radio interface and network architecture. IEEE Commun. Mag. 2017, 55, 70–78. [Google Scholar] [CrossRef]
- Bormann, C.; Castellani, A.P.; Shelby, Z. Coap: An application protocol for billions of tiny internet nodes. IEEE Internet Comput. 2012, 16, 62–67. [Google Scholar] [CrossRef]
- Kumari, A.; Gupta, R.; Tanwar, S. Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review. Comput. Commun. 2021, 172, 102–118. [Google Scholar] [CrossRef]
- Dorri, A.; Kanhere, S.S.; Jurdak, R. Towards an optimized blockchain for IoT. In Proceedings of the 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA, 18–21 April 2017. [Google Scholar]
- Katib, A.F.M.R.; Albogami, I.; Albeshri, N.N.A. Data fusion and IoT for smart ubiquitous environments: A survey. IEEE Access 2017, 5, 9533–9554. [Google Scholar]
- Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain Technology Overview; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018.
- Niranjanamurthy, M.; Nithya, B.; Jagannatha, S. Analysis of Blockchain technology: Pros, cons and SWOT. Cluster Comput. 2019, 22, 14743–14757. [Google Scholar] [CrossRef]
- Mukhopadhyay, S.; Suryadevara, N. Internet of Things: Challenges and Opportunities; Mukhopadhyay, S., Ed.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 1–17. [Google Scholar]
- Anawar, M.R.; Wang, S.; Azam, M.Z.; Jadoon, A.K. Fog computing: An overview of big IoT data analytics. Wirel. Commun. Mob. Comput. 2018, 2018, 1–22. [Google Scholar] [CrossRef]
- Lyu, L.; Jin, J.; Rajasegarar, S.; He, X.; Palaniswani, M. Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet Things J. 2017, 4, 1174–1184. [Google Scholar] [CrossRef]
- Alsulami, M.H.; Atkins, A.S.; Alaboudi, A.A. ZigBee Technology to Provide Elderly People with Well-Being at Home. Int. J. Sens. Wirel. Commun. Control 2021, 11, 921–927. [Google Scholar] [CrossRef]
- Aitizaz, A.; Almaiah, M.A.; Hajjej, F.; Pasha, M.F.; Fang, O.H.; Khan, R.; Teo, J.; Zakarya, M. An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 2022, 22, 572. [Google Scholar]
- Dammak, B.; Turki, M.; Cheikhrouhou, S.; Baklouti, M.; Mars, R.; Dhahbi, A. LoRaChainCare: An IoT Architecture Integrating Blockchain and LoRa Network for Personal Health Care Data Monitoring. Sensors 2022, 22, 1497. [Google Scholar] [CrossRef]
- Mohanty, M.D.; Das, A.; Mohanty, M.N.; Altameem, A.; Nayak, S.R.; Saudagar, A.K.J.; Poonia, R.C. Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm. Healthcare 2022, 10, 1275. [Google Scholar] [CrossRef] [PubMed]
- Bataineh, M.R.; Mardini, W.; Khamayseh, Y.M.; Yassein, M.M.B. Novel and Secure Blockchain Framework for Health Applications in IoT. IEEE Access 2022, 10, 14914–14926. [Google Scholar] [CrossRef]
- Ahmed, I.; Zhang, Y.; Jeon, G.; Lin, W.; Khosravi, M.R.; Qi, L. A blockchain-and artificial intelligence-enabled smart IoT framework for sustainable city. Int. J. Intell. Syst. 2022, 37, 6493–6507. [Google Scholar] [CrossRef]
- Alwakeel, A.M. An overview of fog computing and edge computing security and privacy issues. Sensors 2021, 21, 8226. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Al-Ahmad, A.; Jaradat, A. Fog computing security and privacy issues, open challenges, and blockchain solution: An overview. Int. J. Electr. Comput. Eng. 2021, 11, 2088–8708. [Google Scholar] [CrossRef]
- Epiphaniou, G.; Pillai, P.; Bottarelli, M.; Al-Khateeb, H.; Hammoudesh, M.; Maple, C. Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Trans. Eng. Manag. 2020, 67, 1059–1073. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Almalki, J.; Al Shehri, W.; Mehmood, R.; Alsaif, K.; Alshahrani, S.M.; Jannah, N.; Khan, N.A. Enabling Blockchain with IoMT Devices for Healthcare. Information 2022, 13, 448. https://doi.org/10.3390/info13100448
Almalki J, Al Shehri W, Mehmood R, Alsaif K, Alshahrani SM, Jannah N, Khan NA. Enabling Blockchain with IoMT Devices for Healthcare. Information. 2022; 13(10):448. https://doi.org/10.3390/info13100448
Chicago/Turabian StyleAlmalki, Jameel, Waleed Al Shehri, Rashid Mehmood, Khalid Alsaif, Saeed M. Alshahrani, Najlaa Jannah, and Nayyar Ahmed Khan. 2022. "Enabling Blockchain with IoMT Devices for Healthcare" Information 13, no. 10: 448. https://doi.org/10.3390/info13100448
APA StyleAlmalki, J., Al Shehri, W., Mehmood, R., Alsaif, K., Alshahrani, S. M., Jannah, N., & Khan, N. A. (2022). Enabling Blockchain with IoMT Devices for Healthcare. Information, 13(10), 448. https://doi.org/10.3390/info13100448