a
- Accelerometer sensor 155, 164, 166, 167
- Access points (APs) 40, 51
- Additive manufacturing (AM) 7
- ADM. See Automating design methodology (ADM)
- Advanced Encryption Standard (AES) 71
- Ambient assisted living (AAL) 26
- Application layer communication 73
- Application programming interface (API) 44
- Applications and cloud storage–related security issues
- baiting attack 74
- big data 75
- data protection 75
- DDoS/DoS attacks 75–76
- phishing attack 74
- PHR access 74–75
- web application attacks 76
- Ardunio IDE software 162
- Artificial intelligence (AI)
- applications of 9–11
- Global Partnership on AI 10
- in healthcare 4–5
- health record maintenance 10–11
- management 5
- patient care improvement 10
- Artificial Intelligence of Things (AIoT) 40
- Artificial neural network 189
- Asset hacking 34
- Authentication mechanism 40
- Automating design methodology (ADM) 111
- Ayushman Bharat‐National Health Protection Mission 134
b
- Backend servers 92
- Baiting attack 74
- Big data 75
- Biosensors
- bioresorbable 105–106
- characteristics of 95
- electrochemical 94, 106
- enzyme 95, 106
- FET 106–107
- flexible and versatile wearable 107
- implantable 105
- metal oxide 107–108
- in m‐health 104–109
- micro fluidic 108
- operation of 105
- polymer organic 108–109
- real‐time diagnosis 96
- segments of 95–96
- transducer in 95
- Blockchain 3
- application of 12–14
- distant patient monitoring 13
- in healthcare 7
- prevention of costly errors 13–14
- stability of patients’ data 13
- with VANETs 202–203, 208–209, 212
- Blood glucose monitoring 103–104
- Blood pressure monitoring 99
- Bluetooth 92
- Body area networking (BAN) 43, 46, 50, 89
- Body temperature
- core temperature 102
- measurement of 102–103, 164, 166–168
- skin temperature 102
- Botnet 71
c
- Cancer, types of 178
- Cervical cancer
- ACAD system 187–191
- automated Pap analysis 180
- cases and deaths 178–179, 181
- central cloud repository 186–187
- clinical signs of 177
- feature extraction and selection 189
- intensity‐based 190
- morphological 190
- texture‐based 190
- HPV infection 177–178, 181
- image acquisition process 185
- Raspberry Pi 184–185
- robotics equipment 186
- ultrasonic sensor 185–186
- image segmentation
- artificial neural network 189
- clustering 188–189
- RG algorithm 189
- threshold 189
- IoMT‐based smart remote monitoring system 184, 191–193
- LBC 180
- Pap test 179
- preprocessing 187–188
- pre‐screening of 180–181
- recommender system 191
- risk factors 178
- visual analysis of acetic acid 180
- visual screening methods 180
- Chemiresister 94
- Cloud computing (CC) 6
- advantages 20, 26
- drawbacks 20, 27
- healthcare applications 48
- pay‐per‐use 26
- SDN‐based 46, 48–40
- software‐defined 49
- Clustering algorithm 188–189
- Clustering, in VANETs 204
- advantages of 206
- with blockchain 208–209
- cluster head 205
- with fog computing 207–208
- with IoT 207
- role of 206–207
- traffic scenario 206
- Colposcopy 181
- Communication technologies–related security issues
- IoT communication protocols
- application layer 73
- data link layer 72
- network layer 72
- transport layer 72–73
- secure data aggregation 73–74
- WLAN 71
- WWAN 71
- Community health centers (CHCs) 129
- Compatibility testing 160
- Computer‐assisted diagnosis (CAD) 179, 186–187
- Conducting polymers 109
- Constrained Application Protocol (CoAP) 73
- Content store (CS) 22
- Continuous glucose monitor (CGM) 103–104
- Convolutional neural networks (CNNs) 181, 182
- Covid‐19 pandemic 14
- Cross‐site request forgery attack (CSRF) 76
- Cryptographic methods 34, 75
- Cyberattacks 76–77
- Cyber Enhancement Act (CEA) 68
- Cyber Security Framework (CSF) 69
d
- Data acquisition system (DAS) 153
- Data Encryption Standard (DES) 71
- Datagram Transport Layer Security (DTLS) 73
- Data link layer (DLL) communication 72
- Data organization 33–34
- DDoS attacks. See Distributed Denial of Service (DDoS) attacks
- Debian operating system 91
- Dedicated short range communication (DSRC) 199
- Delay‐sensitive IoT applications 48
- Denial of Service (DoS) attack 75–76
- Device testing 157, 160
- Diabetes
- glucose monitoring 11–12
- telemedicine care 125
- Diastolic pressure 99
- Diffie‐Hellmen algorithm 71
- Distant patient monitoring 13
- Distributed Denial of Service (DDoS) attacks 70–71, 75–76
- DTLS. See Datagram Transport Layer Security (DTLS)
e
- Edge computing 27, 40
- decentralized architecture 45–46
- and information security 46
- in SDN 45–48
- E‐Government Act of 2002. See Federal Information Security Management Act (FISMA)
- E‐HAMC 29
- E‐healthcare system 123
- in India
- cost‐effectiveness 137
- diabetes healthcare 125
- emergency healthcare 125
- IoT 124–126
- literature review 124–129
- mobile applications 127, 128
- parameters 124
- publications on 135–138
- remote monitoring system 126–127
- rural areas and 135
- secure data transmission 128–129
- sensors 136, 137
- smart hospital system 126
- technologies 135–137
- telehealth program 125
- telemedicine services 125, 128
- vital signs monitoring 128
- wearable sensors 126
- websites 127
- WSN 127–128
- problem statement 134
- in Thailand
- CHCs’ IT use and adoption 129
- cost‐effectiveness 137
- EMR and e‐EMS system 130–131
- herbal treatments 132
- ICT 132
- IT organizational adoption 130
- literature review 129–133
- malaria control and prevention program 130
- mobile technology 130
- packet delay and packet loss variations 133
- privacy for mHealth 131
- publications on 135–138
- rural areas and 135
- sensors 137
- technologies 135–137
- Tele‐ICU 131
- telemedicine 131, 132
- teleneurology services 129
- Electrochemical biosensor 94, 106
- Electronic health records (EHRs) 10–11, 64, 130–131, 208
- Emergency medical services (EMS) 130–131
- Emergency message dissemination, VANETs 199–200
- applications of 201
- blockchain 202–203, 212
- case study 204–205
- clustering framework 204
- advantages of 206
- with blockchain 208–209
- cluster head 205
- with fog computing 207–208
- with IoT 207
- role of 206–207
- traffic scenario 206
- emerging trends and possibilities 211–213
- field operating testing 211
- fog computing 202, 203
- future directions of 200–203
- implications of 209–210
- IoT 201–203, 212
- limitations of 203
- models
- communication 211
- driver and vehicle 211
- traffic 211
- network congestion control 212
- network simulator 211
- realistic channel modeling 212
- in real‐time environment 210–211
- representation of 203–204
- roadside unit 199, 202, 207
- strategies 200, 201
- traffic simulator 211
- Emerging technologies
- in smart healthcare 3–4
- artificial intelligence 4–5
- blockchain 7
- 5G 8–9
- IoT 5–7
- 3D printing 7–8
- Encryption 71, 74–76
- Enhanced RSA (E‐RSA) algorithm 71
- Enzyme biosensors 95, 106
f
- FarmBeats 154
- Federal Information Processing Standards (FIPS) 68
- Federal Information Security Management Act (FISMA)
- data security 67–69
- features of 68
- laws 69
- FIB. See Forwarding information base (FIB)
- Field‐effect transistor‐based biosensor (FET biosensor) 106–107
- 5G 3
- benefits of 9
- in smart healthcare 8–9
- Floodlight 44
- Fog computing
- in healthcare
- data examination 28–29
- data gathering 28
- fog node organization 29
- HGs 29
- patient data 28
- Forwarding information base (FIB) 24
g
- Game theoretical model 75
- Gas sensors 95
- electrochemical 94
- electrode line 94
- metal oxide 94
- sensing layer 94
- Glass conductor sensor 107
- Glucose monitoring system 11–12
- Google APP Engine 44
h
- Hacking 45
- HealthCare atHome 127
- Healthcare Internet of Things (HealthIoT) 43
- Healthcare system, work flow of 90
- backend servers 92
- BAN 89
- collection phase 89
- GSM module 89
- microcontrollers 89–90
- Health gadgets (HGs) 20, 29
- 5 Vs of 33
- scalability 34
- usage of 34
- Health gadgets layer (HGL) 30
- Health Insurance and Portability Accountability Act (HIPPA) 67
- Health PIE 127
- Health records
- confidentiality 53
- illegal access 71
- maintenance of 10–11
- Healthy You Card 127
- Hearing aids 14
- Heart rate (HR)
- comparison table 101
- measurement of 101–102
- monitoring 12
- HGs. See Health gadgets (HGs)
- Host Identity Protocol (HIP) 72
- Human Development Index (HDI) 178
- Human papillomavirus (HPV) 177–178
- Hybrid prediction model (HPM) 182
- Hyperglycemia 103
i
- ICN‐fog‐based healthcare architecture 20
- cloud layer 32–33
- application layer 33
- connection layer 33
- data management layer 33
- design of 30, 31
- health gadgets layer 30
- information‐centric networking fog computing layer 30
- issues and challenges
- data organization 33–34
- privacy and security 34
- scalability 34
- usage of gadgets 34
- IEEE 802.15.4 standard 72
- Image segmentation
- artificial neural network 189
- clustering 188–189
- RG algorithm 189
- threshold 189
- India, e‐healthcare system in 124
- cost‐effectiveness 137
- diabetes healthcare 125
- emergency healthcare 125
- IoT 124–126
- literature review 124–129
- mobile applications 127, 128
- parameters 124
- publications on 135–138
- remote monitoring system 126–127
- rural areas and 135
- secure data transmission 128–129
- sensors used for 136, 137
- smart hospital system 126
- technologies 135–137
- telehealth program 125
- telemedicine services 125, 128
- vital signs monitoring 128
- wearable sensors 126
- websites 127
- WSN 127–128
- India Fights Dengue 128
- Information‐centric networking (ICN), 20. See also ICN‐fog‐based healthcare architecture
- architecture 21–23
- data structures
- content store 22
- forwarding information base 24
- pending interest table 22, 24
- features of 21
- NDN packet format 22, 24
- Information‐centric networking–fog nodes (IFN) 20
- Information security
- cryptographic methods 34
- SDN 53
- Inhalers 12
- Integrity of data testing 160
- Intelligent transportation system (ITS), 205. See also Vehicular ad hoc networks (VANETs)
- Intensity‐based feature extraction 190
- Internet of Medical Things (IoMT), 181. See also IoMT‐based smart remote monitoring system
- Internet of Things (IoT) 144
- applications of 11–12
- challenges for 26
- communication protocols
- application layer 73
- data link layer 72
- network layer 72
- transport layer 72–73
- features 64
- glucose monitoring system 11–12
- in healthcare 5–7, 24–25
- heart rate monitoring 12
- in SDN 43–45
- in smart healthcare system 64–66
- smart inhalers 12
- telerehabilitation 6
- VANETs with 201–203, 207, 212
- working of 144–145
- Internet of Vehicle (IoV) 207
- Internet Protocol Security (IPSec) 72
- Internet Protocol version 6 (IPv6) 72
- IoMT‐based smart remote monitoring system
- android app 182
- for cervical cancer 177–181, 192
- ACAD system 187–191
- CAD system 179, 186–187
- image acquisition process 183–186
- Raspberry Pi 183–185
- recommender system 191
- robotics equipment 186
- ultrasonic sensor 185–186
- cloud information exchange 193
- device malfunctioning 193
- hybrid prediction model 182
- literature review 181–183
- management and scheduling 192–193
- SDN controller 193
- IoT‐and WSNs‐based smart surveillance system
- Android applications 168, 171–173
- architecture model 156, 163
- Ardunio IDE software 162
- device testing 157, 160
- experimental environment 160
- literature review 152–155
- methodology 156–160
- parseInt method 157
- phases of 155–157
- sensors 155–157, 161
- IoT‐based rehabilitation system
- advantages 110
- automating design methodology 111
- block diagram 110
- design process 113–114
- diagnostic process 111, 112
- issues in 109
- metaphysics 110
- rehabilitation strategy design 112–113
- security 115
- service‐oriented design 110–111
- subsystem design 113
- system topology 109–110
k
- KNN algorithm 6–7
- KNOWME platform 152
l
- Liquid‐based cytology (LBC) 180
- Load balancing
- defined 50
- in SDN 51–52
- system architecture 51, 52
- Long term evolution (LTE) 71
- Long term evolution‐advanced (LTE‐A) 71
- Lybrate 127
n
- National Institute of Science and Technology (NIST) 66, 68
- Natural language processing (NLP) 10
- Network layer communication 72
- Network simulator 211
- NHP Swasth Bharat 128
o
- OB Insulin 127
- OMNET++ 213
- Organisation for Economic Co‐operation and Development (OECD)
- AI Principles 5
- Global Partnership on AI 10
- science, technology, and innovation 4
- Oximeter 97–99
p
- Pap test 179
- Patient data
- fog computing 28
- organization of 33–34
- privacy and security 34, 53
- stability of 13
- Patient monitoring
- Pay‐per‐use cloud computing model 26
- PCA. See Principal component analysis (PCA)
- Pending interest table (PIT) 22, 24
- Performance testing 160
- Personal health records (PHRs)
- access 74–75
- privacy in 76, 77
- security of 74–75
- Phishing attack 74
- Physical attack 70
- Physical objects–related security issues
- DDoS attack 70–71
- illegal access 71
- physical attacks 70
- RFID 70
- WSNs 70
- PIT. See Pending interest table (PIT)
- Polymer organic biosensors 108–109
- Pradhan Mantri Surakshit Matritva Abhiyan 128
- Principal component analysis (PCA) 6
- Privacy issues
- cryptographic methods 34
- cyberattacks 76–77
- Health Insurance and Portability Accountability Act 67
- PHR 76
- in smart healthcare IoT applications 64–66
- in stored data 77
- Protected healthcare information (PHI) 67
- Pulse oxygenation 97–99
- Pulse sensor 155, 156, 164–166
s
- Scalability testing 160
- SDN. See Software‐defined networking (SDN)
- Secure data aggregation 74
- Secure Socket Layer (SSL) 72–73
- Security issues
- applications and cloud storage–related
- baiting attack 74
- big data 75
- data protection 75
- DDoS/DoS attacks 75–76
- phishing attack 74
- PHR access 74–75
- web application attacks 76
- communication technologies–related
- IoT communication protocols 71–74
- secure data aggregation 73–74
- WLAN 71
- WWAN 71
- cryptographic techniques 75
- data encryption 74, 75
- Federal Information Security Management Act 67–69
- in IoT‐based rehabilitation system 115
- physical objects–related
- DDoS attack 70–71
- illegal access 71
- physical attacks 70
- RFID 70
- WSNs 70
- SDN management 53
- in smart healthcare IoT applications 64–66
- threats 66
- Security testing 160
- Sensors. See also Biosensors; Wireless sensor networks (WSNs)
- accelerometer 155, 164, 166, 167
- BAN 47
- benefits of 87–88
- blood pressure 99–100
- gas 94–95
- in health care system 88–89
- heart rate 101–102, 155–156, 164–166
- in India 136, 137
- miniaturization of 88
- performance 88
- real‐time monitoring 63
- respiration rate 100–101
- smart 93–94
- SpO2 97–99, 163–165
- sugar level 103–104
- temperature 102–103, 164, 166–168
- in Thailand 137
- ultrasonic 185–186
- Service‐oriented design (SOA) 110–111
- Skin temperature (ST) 102
- Smart healthcare system
- architecture 65
- field control units 65
- healthcare data acquisition layer 65
- IoT in 64–66
- sensor data acquisition layer 64–65
- Smart hospital system (SHS) 126
- Smart inhalers 12
- Smart sensors 93–94, 104
- Social attacks 74
- Software‐defined cloud computing (SDCC) 49
- Software‐defined networking (SDN)
- advantages of 41–42
- centralized management 41–42, 50
- cloud computing in 46, 48–49
- benefits of 50
- with WBANs 49–50
- controllers 40, 41, 46, 50, 53, 193
- control plane 49
- database management system 50
- data plane 49
- decoupling 39
- edge computing in 45–48
- in healthcare 41–42, 54
- decreasing error instances 53
- effective interaction 54
- information exchange 54
- information security 53
- mergers and acquisitions 53
- patient monitoring 53
- prioritization of network traffic 52
- tracking configuration changes 53
- IoT in 43–45
- issues and challenges in 55
- load balancing 50–52
- open‐source design of 42
- technologies of 42
- virtualization 50
- Software‐defined Wi‐Fi networks (SD‐Wi‐Fi) 51
- Solid freeform fabrication 7
- Special Publications 800 series (SP‐800) 68
- SpO2 sensor 97–99, 163–165
- SQL injection attack 76
- Systolic pressure 99
t
- TCP/IP layer‐based communication protocols
- application layer 73
- data link layer 72
- network layer 72
- transport layer 72–73
- Tele‐ICU 131
- Telemedicine
- Telemedicine Diagnosis System for Rural Thailand (TEDIST) 131
- Telerehabilitation, 6. See also IoT‐based rehabilitation system
- Temperature sensor 155, 164, 166–168
- Terrestrial WSNs 146, 147
- Texture‐based feature extraction 190
- Thailand, e‐healthcare system in 124
- CHCs’ IT use and adoption 129
- cost‐effectiveness 137
- EMR and e‐EMS system 130–131
- herbal treatments 132
- ICT 132
- IT organizational adoption 130
- literature review 129–133
- malaria control and prevention program 130
- mobile technology 130
- packet delay and packet loss variations 133
- privacy for mHealth 131
- publications on 135–138
- rural areas and 135
- sensors 137
- technologies 135–137
- Tele‐ICU 131
- telemedicine 131, 132, 136
- teleneurology services 129
- ThingSpeak 151, 153, 156, 157, 162–163
- Threats 53, 66
- 3‐dimensional (3D) printing
- applications of 14
- hearing aids 14
- in rejuvenative medicine 14
- in smart healthcare 7–8
- Threshold‐based segmentation method 189
- Topology Dissemination Based on Reverse‐Path Forwarding (TBRPF) 97
- Traffic simulators 211
- Transport layer communication 72–73
- Transport Layer Security (TLS) 73
u
- Ultrasonic techniques 99
- Underground WSNs 147
- Underwater WSNs 147–148
- Unified theory of acceptance and use of technology (UTAUT) 129
- Usability testing 160
- US Department of Transportation (DoT) 205, 210
- User Datagram Protocol (UDP) 72, 73
v
- Vaccine Tracker 128
- Vehicular ad hoc networks (VANETs) 199–200
- applications of 201
- blockchain 202–203, 212
- communication model 211
- driver and vehicle model 211
- emergency message dissemination 199–200
- field operating testing 211
- fog computing 202
- in healthcare systems 203–205
- IoT 201–202, 212
- limitations of 203
- network congestion control 212
- network simulator 211
- realistic channel modeling 212
- in real‐time environment 210–211
- roadside unit 199, 202, 207
- traffic model 211
- traffic simulator 211
- Vehicular communication 199
- Vital signs monitoring
- blood glucose 103–104
- blood pressure 99–100
- body temperature 102–103
- heart rate 101–102
- in India 128
- pulse oxygenation 97–99
- respiration rate 100–101
w
- Wearable biosensors 107, 126
- Wearable gadgets 66, 91–92
- Web application attacks 76
- Wi‐Fi networks 40
- load‐balancing in 51
- software‐defined 51
- Wireless access in vehicle environment (WAVE) 199
- Wireless body area networks (WBANs). See Body area networking (BAN)
- Wireless Ethernet 145
- Wireless local area network (WLAN) 71
- Wireless Routing Protocol 97
- Wireless sensor networks (WSNs) 19, 127–128, 145–146
- applications of 149–150
- architecture 97
- constraints of 149
- data collection 96
- within IoT system 150–151
- mobile 149
- monitoring system 154
- multimedia 148–149
- security attacks 70
- sensor nodes in 19
- terrestrial 146, 147
- underground 147
- underwater 147–148
- Wireless wide area network (WWAN) 71
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.