Index


a

  • Accelerometer sensor 155, 164, 166, 167
  • Access points (APs) 40, 51
  • Additive manufacturing (AM) 7
  • ADM. See Automating design methodology (ADM)
  • Advanced Encryption Standard (AES) 71
  • Ambient assisted living (AAL) 26
  • Application layer communication 73
  • Application programming interface (API) 44
  • Applications and cloud storage–related security issues
    • baiting attack 74
    • big data 75
    • data protection 75
    • DDoS/DoS attacks 75–76
    • phishing attack 74
    • PHR access 74–75
    • web application attacks 76
  • Ardunio IDE software 162
  • Artificial intelligence (AI)
    • applications of 9–11
    • Global Partnership on AI 10
    • in healthcare 4–5
    • health record maintenance 10–11
    • management 5
    • patient care improvement 10
  • Artificial Intelligence of Things (AIoT) 40
  • Artificial neural network 189
  • Asset hacking 34
  • Authentication mechanism 40
  • Automating design methodology (ADM) 111
  • Ayushman Bharat‐National Health Protection Mission 134

b

  • Backend servers 92
  • Baiting attack 74
  • Big data 75
  • Biosensors
    • bioresorbable 105–106
    • characteristics of 95
    • electrochemical 94, 106
    • enzyme 95, 106
    • FET 106–107
    • flexible and versatile wearable 107
    • implantable 105
    • metal oxide 107–108
    • in m‐health 104–109
    • micro fluidic 108
    • operation of 105
    • polymer organic 108–109
    • real‐time diagnosis 96
    • segments of 95–96
    • transducer in 95
  • Blockchain 3
    • application of 12–14
    • distant patient monitoring 13
    • in healthcare 7
    • prevention of costly errors 13–14
    • stability of patients’ data 13
    • with VANETs 202–203, 208–209, 212
  • Blood glucose monitoring 103–104
  • Blood pressure monitoring 99
  • Bluetooth 92
  • Body area networking (BAN) 43, 46, 50, 89
  • Body temperature
    • core temperature 102
    • measurement of 102–103, 164, 166–168
    • skin temperature 102
  • Botnet 71

c

  • Cancer, types of 178
  • Cervical cancer
    • ACAD system 187–191
    • automated Pap analysis 180
    • cases and deaths 178–179, 181
    • central cloud repository 186–187
    • clinical signs of 177
    • feature extraction and selection 189
      • intensity‐based 190
      • morphological 190
      • texture‐based 190
    • HPV infection 177–178, 181
    • image acquisition process 185
      • Raspberry Pi 184–185
      • robotics equipment 186
      • ultrasonic sensor 185–186
    • image segmentation
      • artificial neural network 189
      • clustering 188–189
      • RG algorithm 189
      • threshold 189
    • IoMT‐based smart remote monitoring system 184, 191–193
    • LBC 180
    • Pap test 179
    • preprocessing 187–188
    • pre‐screening of 180–181
    • recommender system 191
    • risk factors 178
    • visual analysis of acetic acid 180
    • visual screening methods 180
  • Chemiresister 94
  • Cloud computing (CC) 6
    • advantages 20, 26
    • drawbacks 20, 27
    • healthcare applications 48
    • pay‐per‐use 26
    • SDN‐based 46, 48–40
    • software‐defined 49
  • Clustering algorithm 188–189
  • Clustering, in VANETs 204
    • advantages of 206
    • with blockchain 208–209
    • cluster head 205
    • with fog computing 207–208
    • with IoT 207
    • role of 206–207
    • traffic scenario 206
  • Colposcopy 181
  • Communication technologies–related security issues
    • IoT communication protocols
      • application layer 73
      • data link layer 72
      • network layer 72
      • transport layer 72–73
    • secure data aggregation 73–74
    • WLAN 71
    • WWAN 71
  • Community health centers (CHCs) 129
  • Compatibility testing 160
  • Computer‐assisted diagnosis (CAD) 179, 186–187
  • Conducting polymers 109
  • Constrained Application Protocol (CoAP) 73
  • Content store (CS) 22
  • Continuous glucose monitor (CGM) 103–104
  • Convolutional neural networks (CNNs) 181, 182
  • Covid‐19 pandemic 14
  • Cross‐site request forgery attack (CSRF) 76
  • Cryptographic methods 34, 75
  • Cyberattacks 76–77
  • Cyber Enhancement Act (CEA) 68
  • Cyber Security Framework (CSF) 69

d

  • Data acquisition system (DAS) 153
  • Data Encryption Standard (DES) 71
  • Datagram Transport Layer Security (DTLS) 73
  • Data link layer (DLL) communication 72
  • Data organization 33–34
  • DDoS attacks. See Distributed Denial of Service (DDoS) attacks
  • Debian operating system 91
  • Dedicated short range communication (DSRC) 199
  • Delay‐sensitive IoT applications 48
  • Denial of Service (DoS) attack 75–76
  • Device testing 157, 160
  • Diabetes
    • glucose monitoring 11–12
    • telemedicine care 125
  • Diastolic pressure 99
  • Diffie‐Hellmen algorithm 71
  • Distant patient monitoring 13
  • Distributed Denial of Service (DDoS) attacks 70–71, 75–76
  • DTLS. See Datagram Transport Layer Security (DTLS)

e

  • Edge computing 27, 40
    • decentralized architecture 45–46
    • and information security 46
    • in SDN 45–48
  • E‐Government Act of 2002. See Federal Information Security Management Act (FISMA)
  • E‐HAMC 29
  • E‐healthcare system 123
    • in India
      • cost‐effectiveness 137
      • diabetes healthcare 125
      • emergency healthcare 125
      • IoT 124–126
      • literature review 124–129
      • mobile applications 127, 128
      • parameters 124
      • publications on 135–138
      • remote monitoring system 126–127
      • rural areas and 135
      • secure data transmission 128–129
      • sensors 136, 137
      • smart hospital system 126
      • technologies 135–137
      • telehealth program 125
      • telemedicine services 125, 128
      • vital signs monitoring 128
      • wearable sensors 126
      • websites 127
      • WSN 127–128
    • problem statement 134
    • in Thailand
      • CHCs’ IT use and adoption 129
      • cost‐effectiveness 137
      • EMR and e‐EMS system 130–131
      • herbal treatments 132
      • ICT 132
      • IT organizational adoption 130
      • literature review 129–133
      • malaria control and prevention program 130
      • mobile technology 130
      • packet delay and packet loss variations 133
      • privacy for mHealth 131
      • publications on 135–138
      • rural areas and 135
      • sensors 137
      • technologies 135–137
      • Tele‐ICU 131
      • telemedicine 131, 132
      • teleneurology services 129
  • Electrochemical biosensor 94, 106
  • Electronic health records (EHRs) 10–11, 64, 130–131, 208
  • Emergency medical services (EMS) 130–131
  • Emergency message dissemination, VANETs 199–200
    • applications of 201
    • blockchain 202–203, 212
    • case study 204–205
    • clustering framework 204
      • advantages of 206
      • with blockchain 208–209
      • cluster head 205
      • with fog computing 207–208
      • with IoT 207
      • role of 206–207
      • traffic scenario 206
    • emerging trends and possibilities 211–213
    • field operating testing 211
    • fog computing 202, 203
    • future directions of 200–203
    • implications of 209–210
    • IoT 201–203, 212
    • limitations of 203
    • models
      • communication 211
      • driver and vehicle 211
      • traffic 211
    • network congestion control 212
    • network simulator 211
    • realistic channel modeling 212
    • in real‐time environment 210–211
    • representation of 203–204
    • roadside unit 199, 202, 207
    • strategies 200, 201
    • traffic simulator 211
  • Emerging technologies
    • in smart healthcare 3–4
      • artificial intelligence 4–5
      • blockchain 7
      • 5G 8–9
      • IoT 5–7
      • 3D printing 7–8
  • Encryption 71, 74–76
  • Enhanced RSA (E‐RSA) algorithm 71
  • Enzyme biosensors 95, 106

f

  • FarmBeats 154
  • Federal Information Processing Standards (FIPS) 68
  • Federal Information Security Management Act (FISMA)
    • data security 67–69
    • features of 68
    • laws 69
  • FIB. See Forwarding information base (FIB)
  • Field‐effect transistor‐based biosensor (FET biosensor) 106–107
  • 5G 3
    • benefits of 9
    • in smart healthcare 8–9
  • Floodlight 44
  • Fog computing
    • in healthcare
      • data examination 28–29
      • data gathering 28
      • fog node organization 29
      • HGs 29
      • patient data 28
  • Forwarding information base (FIB) 24

g

  • Game theoretical model 75
  • Gas sensors 95
    • electrochemical 94
    • electrode line 94
    • metal oxide 94
    • sensing layer 94
  • Glass conductor sensor 107
  • Glucose monitoring system 11–12
  • Google APP Engine 44

h

  • Hacking 45
  • HealthCare atHome 127
  • Healthcare Internet of Things (HealthIoT) 43
  • Healthcare system, work flow of 90
    • backend servers 92
    • BAN 89
    • collection phase 89
    • GSM module 89
    • microcontrollers 89–90
      • Raspberry Pi 90–91
    • wearable gadgets 91–92
  • Health gadgets (HGs) 20, 29
    • 5 Vs of 33
    • scalability 34
    • usage of 34
  • Health gadgets layer (HGL) 30
  • Health Insurance and Portability Accountability Act (HIPPA) 67
  • Health PIE 127
  • Health records
    • confidentiality 53
    • illegal access 71
    • maintenance of 10–11
  • Healthy You Card 127
  • Hearing aids 14
  • Heart rate (HR)
    • comparison table 101
    • measurement of 101–102
    • monitoring 12
  • HGs. See Health gadgets (HGs)
  • Host Identity Protocol (HIP) 72
  • Human Development Index (HDI) 178
  • Human papillomavirus (HPV) 177–178
  • Hybrid prediction model (HPM) 182
  • Hyperglycemia 103

i

  • ICN‐fog‐based healthcare architecture 20
    • cloud layer 32–33
      • application layer 33
      • connection layer 33
      • data management layer 33
    • design of 30, 31
    • health gadgets layer 30
    • information‐centric networking fog computing layer 30
    • issues and challenges
      • data organization 33–34
      • privacy and security 34
      • scalability 34
      • usage of gadgets 34
  • IEEE 802.15.4 standard 72
  • Image segmentation
    • artificial neural network 189
    • clustering 188–189
    • RG algorithm 189
    • threshold 189
  • India, e‐healthcare system in 124
    • cost‐effectiveness 137
    • diabetes healthcare 125
    • emergency healthcare 125
    • IoT 124–126
    • literature review 124–129
    • mobile applications 127, 128
    • parameters 124
    • publications on 135–138
    • remote monitoring system 126–127
    • rural areas and 135
    • secure data transmission 128–129
    • sensors used for 136, 137
    • smart hospital system 126
    • technologies 135–137
    • telehealth program 125
    • telemedicine services 125, 128
    • vital signs monitoring 128
    • wearable sensors 126
    • websites 127
    • WSN 127–128
  • India Fights Dengue 128
  • Information‐centric networking (ICN), 20. See also ICN‐fog‐based healthcare architecture
    • architecture 21–23
    • data structures
      • content store 22
      • forwarding information base 24
      • pending interest table 22, 24
    • features of 21
    • NDN packet format 22, 24
  • Information‐centric networking–fog nodes (IFN) 20
  • Information security
    • cryptographic methods 34
    • SDN 53
  • Inhalers 12
  • Integrity of data testing 160
  • Intelligent transportation system (ITS), 205. See also Vehicular ad hoc networks (VANETs)
  • Intensity‐based feature extraction 190
  • Internet of Medical Things (IoMT), 181. See also IoMT‐based smart remote monitoring system
  • Internet of Things (IoT) 144
    • applications of 11–12
    • challenges for 26
    • communication protocols
      • application layer 73
      • data link layer 72
      • network layer 72
      • transport layer 72–73
    • features 64
    • glucose monitoring system 11–12
    • in healthcare 5–7, 24–25
    • heart rate monitoring 12
    • in SDN 43–45
    • in smart healthcare system 64–66
    • smart inhalers 12
    • telerehabilitation 6
    • VANETs with 201–203, 207, 212
    • working of 144–145
  • Internet of Vehicle (IoV) 207
  • Internet Protocol Security (IPSec) 72
  • Internet Protocol version 6 (IPv6) 72
  • IoMT‐based smart remote monitoring system
    • android app 182
    • for cervical cancer 177–181, 192
      • ACAD system 187–191
      • CAD system 179, 186–187
      • image acquisition process 183–186
      • Raspberry Pi 183–185
      • recommender system 191
      • robotics equipment 186
      • ultrasonic sensor 185–186
    • cloud information exchange 193
    • device malfunctioning 193
    • hybrid prediction model 182
    • literature review 181–183
    • management and scheduling 192–193
    • SDN controller 193
  • IoT‐and WSNs‐based smart surveillance system
    • Android applications 168, 171–173
    • architecture model 156, 163
    • Ardunio IDE software 162
    • device testing 157, 160
    • experimental environment 160
    • literature review 152–155
    • methodology 156–160
    • parseInt method 157
    • phases of 155–157
    • sensors 155–157, 161
  • IoT‐based rehabilitation system
    • advantages 110
    • automating design methodology 111
    • block diagram 110
    • design process 113–114
    • diagnostic process 111, 112
    • issues in 109
    • metaphysics 110
    • rehabilitation strategy design 112–113
    • security 115
    • service‐oriented design 110–111
    • subsystem design 113
    • system topology 109–110

k

  • KNN algorithm 6–7
  • KNOWME platform 152

l

  • Liquid‐based cytology (LBC) 180
  • Load balancing
    • defined 50
    • in SDN 51–52
    • system architecture 51, 52
  • Long term evolution (LTE) 71
  • Long term evolution‐advanced (LTE‐A) 71
  • Lybrate 127

m

  • Machine learning 5, 11
  • MAX6675 temperature sensor 166–168
  • MDCs. See Mobile data collectors (MDCs)
  • Medical cyber physical systems (MCPSs) 29
  • Mera Aspataal 128
  • Message Queue Telemetry Transport (MQTT) 29, 73
  • Metal oxide biosensors 94, 107–108
  • mHealth
  • M Health Basic 127
  • Micro controllers 89–91
  • Micro fluidic biosensors 108
  • Mirai malware 71
  • Mobile applications 66, 127, 128, 131
  • Mobile data collectors (MDCs) 153–154
  • Mobile wireless sensor networks (MWSNs) 63, 149
  • Mobility Re‐imagined 213
  • Morphological feature extraction 190
  • MQTT. See Message Queue Telemetry Transport (MQTT)
  • Mswasthya CDAC 127
  • Multimedia WSNs 148–149

n

  • National Institute of Science and Technology (NIST) 66, 68
  • Natural language processing (NLP) 10
  • Network layer communication 72
  • Network simulator 211
  • NHP Swasth Bharat 128

o

  • OB Insulin 127
  • OMNET++ 213
  • Organisation for Economic Co‐operation and Development (OECD)
    • AI Principles 5
    • Global Partnership on AI 10
    • science, technology, and innovation 4
  • Oximeter 97–99

p

  • Pap test 179
  • Patient data
    • fog computing 28
    • organization of 33–34
    • privacy and security 34, 53
    • stability of 13
  • Patient monitoring
  • Pay‐per‐use cloud computing model 26
  • PCA. See Principal component analysis (PCA)
  • Pending interest table (PIT) 22, 24
  • Performance testing 160
  • Personal health records (PHRs)
    • access 74–75
    • privacy in 76, 77
    • security of 74–75
  • Phishing attack 74
  • Physical attack 70
  • Physical objects–related security issues
    • DDoS attack 70–71
    • illegal access 71
    • physical attacks 70
    • RFID 70
  • WSNs 70
  • PIT. See Pending interest table (PIT)
  • Polymer organic biosensors 108–109
  • Pradhan Mantri Surakshit Matritva Abhiyan 128
  • Principal component analysis (PCA) 6
  • Privacy issues
    • cryptographic methods 34
    • cyberattacks 76–77
    • Health Insurance and Portability Accountability Act 67
    • PHR 76
    • in smart healthcare IoT applications 64–66
    • in stored data 77
  • Protected healthcare information (PHI) 67
  • Pulse oxygenation 97–99
  • Pulse sensor 155, 156, 164–166

r

  • Radiation temperature detector 102
  • Radio frequency identification tags (RFID) 11, 26, 70
  • Rapid prototyping 7
  • Raspberry Pi 90–91, 1843–185
  • RBAC. See Role Based Access Control technique (RBAC)
  • Real‐time monitoring, issues with 40
  • Re‐authentication protocol 71
  • Region growing (RG) algorithm 189
  • Rehabilitation strategy design 111–113
  • Reliability testing 160
  • Remote monitoring, 6, 192. See also IoMT‐based smart remote monitoring system
  • Reprogramming attack 75–76
  • Respiration rate measurement 100–101
  • Roadside unit (RSU) 199, 202, 207
  • Role Based Access Control technique (RBAC) 75
  • Routing Protocol for Low Power and Lossy Networks (RPL) 72
  • Routing strategy 97

s

  • Scalability testing 160
  • SDN. See Software‐defined networking (SDN)
  • Secure data aggregation 74
  • Secure Socket Layer (SSL) 72–73
  • Security issues
    • applications and cloud storage–related
      • baiting attack 74
      • big data 75
      • data protection 75
      • DDoS/DoS attacks 75–76
      • phishing attack 74
      • PHR access 74–75
      • web application attacks 76
    • communication technologies–related
      • IoT communication protocols 71–74
      • secure data aggregation 73–74
      • WLAN 71
      • WWAN 71
    • cryptographic techniques 75
    • data encryption 74, 75
    • Federal Information Security Management Act 67–69
    • in IoT‐based rehabilitation system 115
    • physical objects–related
      • DDoS attack 70–71
      • illegal access 71
      • physical attacks 70
      • RFID 70
      • WSNs 70
    • SDN management 53
    • in smart healthcare IoT applications 64–66
    • threats 66
  • Security testing 160
  • Sensors. See also Biosensors; Wireless sensor networks (WSNs)
    • accelerometer 155, 164, 166, 167
    • BAN 47
    • benefits of 87–88
    • blood pressure 99–100
    • gas 94–95
    • in health care system 88–89
    • heart rate 101–102, 155–156, 164–166
    • in India 136, 137
    • miniaturization of 88
    • performance 88
    • real‐time monitoring 63
    • respiration rate 100–101
    • smart 93–94
    • SpO2 97–99, 163–165
    • sugar level 103–104
    • temperature 102–103, 164, 166–168
    • in Thailand 137
    • ultrasonic 185–186
  • Service‐oriented design (SOA) 110–111
  • Skin temperature (ST) 102
  • Smart healthcare system
    • architecture 65
    • field control units 65
    • healthcare data acquisition layer 65
    • IoT in 64–66
    • sensor data acquisition layer 64–65
  • Smart hospital system (SHS) 126
  • Smart inhalers 12
  • Smart sensors 93–94, 104
  • Social attacks 74
  • Software‐defined cloud computing (SDCC) 49
  • Software‐defined networking (SDN)
    • advantages of 41–42
    • centralized management 41–42, 50
    • cloud computing in 46, 48–49
      • benefits of 50
      • with WBANs 49–50
    • controllers 40, 41, 46, 50, 53, 193
    • control plane 49
    • database management system 50
    • data plane 49
    • decoupling 39
    • edge computing in 45–48
    • in healthcare 41–42, 54
      • decreasing error instances 53
      • effective interaction 54
      • information exchange 54
      • information security 53
      • mergers and acquisitions 53
      • patient monitoring 53
      • prioritization of network traffic 52
      • tracking configuration changes 53
    • IoT in 43–45
    • issues and challenges in 55
    • load balancing 50–52
    • open‐source design of 42
    • technologies of 42
    • virtualization 50
  • Software‐defined Wi‐Fi networks (SD‐Wi‐Fi) 51
  • Solid freeform fabrication 7
  • Special Publications 800 series (SP‐800) 68
  • SpO2 sensor 97–99, 163–165
  • SQL injection attack 76
  • Systolic pressure 99

t

  • TCP/IP layer‐based communication protocols
    • application layer 73
    • data link layer 72
    • network layer 72
    • transport layer 72–73
  • Tele‐ICU 131
  • Telemedicine
  • Telemedicine Diagnosis System for Rural Thailand (TEDIST) 131
  • Telerehabilitation, 6. See also IoT‐based rehabilitation system
  • Temperature sensor 155, 164, 166–168
  • Terrestrial WSNs 146, 147
  • Texture‐based feature extraction 190
  • Thailand, e‐healthcare system in 124
    • CHCs’ IT use and adoption 129
    • cost‐effectiveness 137
    • EMR and e‐EMS system 130–131
    • herbal treatments 132
    • ICT 132
    • IT organizational adoption 130
    • literature review 129–133
    • malaria control and prevention program 130
    • mobile technology 130
    • packet delay and packet loss variations 133
    • privacy for mHealth 131
    • publications on 135–138
    • rural areas and 135
    • sensors 137
    • technologies 135–137
    • Tele‐ICU 131
    • telemedicine 131, 132, 136
    • teleneurology services 129
  • ThingSpeak 151, 153, 156, 157, 162–163
  • Threats 53, 66
  • 3‐dimensional (3D) printing
    • applications of 14
    • hearing aids 14
    • in rejuvenative medicine 14
    • in smart healthcare 7–8
  • Threshold‐based segmentation method 189
  • Topology Dissemination Based on Reverse‐Path Forwarding (TBRPF) 97
  • Traffic simulators 211
  • Transport layer communication 72–73
  • Transport Layer Security (TLS) 73

u

  • Ultrasonic techniques 99
  • Underground WSNs 147
  • Underwater WSNs 147–148
  • Unified theory of acceptance and use of technology (UTAUT) 129
  • Usability testing 160
  • US Department of Transportation (DoT) 205, 210
  • User Datagram Protocol (UDP) 72, 73

v

  • Vaccine Tracker 128
  • Vehicular ad hoc networks (VANETs) 199–200
    • applications of 201
    • blockchain 202–203, 212
    • communication model 211
    • driver and vehicle model 211
    • emergency message dissemination 199–200
      • case study 204–205
      • clustering (See Clustering, in VANETs)
      • emerging trends and possibilities 211–213
      • future directions of 200–203
      • implications of 209–210
      • representation of 203–204
      • strategies 200, 201
    • field operating testing 211
    • fog computing 202
    • in healthcare systems 203–205
    • IoT 201–202, 212
    • limitations of 203
    • network congestion control 212
    • network simulator 211
    • realistic channel modeling 212
    • in real‐time environment 210–211
    • roadside unit 199, 202, 207
    • traffic model 211
    • traffic simulator 211
  • Vehicular communication 199
  • Vital signs monitoring
    • blood glucose 103–104
    • blood pressure 99–100
    • body temperature 102–103
    • heart rate 101–102
    • in India 128
    • pulse oxygenation 97–99
    • respiration rate 100–101

w

  • Wearable biosensors 107, 126
  • Wearable gadgets 66, 91–92
  • Web application attacks 76
  • Wi‐Fi networks 40
    • load‐balancing in 51
    • software‐defined 51
  • Wireless access in vehicle environment (WAVE) 199
  • Wireless body area networks (WBANs). See Body area networking (BAN)
  • Wireless Ethernet 145
  • Wireless local area network (WLAN) 71
  • Wireless Routing Protocol 97
  • Wireless sensor networks (WSNs) 19, 127–128, 145–146
    • applications of 149–150
    • architecture 97
    • constraints of 149
    • data collection 96
    • within IoT system 150–151
    • mobile 149
    • monitoring system 154
    • multimedia 148–149
    • security attacks 70
    • sensor nodes in 19
    • terrestrial 146, 147
    • underground 147
    • underwater 147–148
  • Wireless wide area network (WWAN) 71
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.239.111