Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (295)

Search Parameters:
Keywords = IoMT

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 1337 KiB  
Systematic Review
The Use of Smart Rings in Health Monitoring—A Meta-Analysis
by Matteo Fiore, Alessandro Bianconi, Gaia Sicari, Alice Conni, Jacopo Lenzi, Giulia Tomaiuolo, Flavia Zito, Davide Golinelli and Francesco Sanmarchi
Appl. Sci. 2024, 14(23), 10778; https://doi.org/10.3390/app142310778 - 21 Nov 2024
Viewed by 198
Abstract
Smart Rings (SRs) are user-friendly devices capable of measuring various health parameters, making them suitable for remote continuous monitoring in diverse clinical settings. Since the available evidence on the accuracy of SRs recording health data is highly heterogeneous, this systematic review, conducted in [...] Read more.
Smart Rings (SRs) are user-friendly devices capable of measuring various health parameters, making them suitable for remote continuous monitoring in diverse clinical settings. Since the available evidence on the accuracy of SRs recording health data is highly heterogeneous, this systematic review, conducted in accordance with PRISMA guidelines, searched for articles evaluating the efficacy of SRs for sleep, respiratory, and cardiovascular monitoring across the PubMed, SCOPUS, and ProQuest databases. Meta-analyses were conducted for health outcomes evaluated in at least three studies with a comparable study population and design, and the same comparison device. Nineteen articles were included: eleven analyses focused on sleep quality, eight on cardiovascular parameters, and one on oxygen saturation. Studies analysing cardiovascular outcomes found a good accuracy of SRs in measuring heart rate (HR) with a mean bias of −0.4 bpms (limits of agreement (LoAs): −2.7; 1.8). The meta-analyses showed variability in SRs’ efficacy in monitoring total sleep time (mean bias: −21.3 min, LoAs: −69.9, 27.4) and REM duration (mean bias: −18.2 min, LoAs: −33.3, −3.1). The results highlighted the promising potential of SRs for HR monitoring. Further research is needed to clarify the reliability of SRs in monitoring sleep quality and their use directed to a broader range of health parameters. With further development, SRs could become valuable tools for healthcare professionals. Full article
(This article belongs to the Special Issue Advanced Technologies for Health Improvement)
Show Figures

Figure 1

Figure 1
<p>(<b>A</b>) SR’s concept of function. The SR registers and collects the health data (SpO2, heart rate and others) communicating with smartphones or other devices. These data can be used to monitor patient vital signs and alert healthcare professionals to potential problems or changes in a patient’s condition. (<b>B</b>) IoMT ecosystem architecture and layers. The collection layer consists of medical sensors. Devices collect the health data and transmit them to a gateway node. The communication layer stores those data and analyses them using conventional threshold values to report any abnormality. Last is the application layer: using a web-based interface, medical professionals can check and verify the diagnostics and take corresponding measures.</p>
Full article ">Figure 2
<p>PRISMA flowchart describing the selection process of the included studies.</p>
Full article ">Figure 3
<p>(<b>A</b>) Sleep studies: control device characteristics. PSG: polysomnography. EEG: electroencephalography. (<b>B</b>) Sleep studies: smart ring characteristics. Gen: generation.</p>
Full article ">Figure 4
<p>(<b>A</b>) Cardiovascular studies: control device. PSG: polysomnography. ECG: Electrocardiogram. BP: Blood Pressure. (<b>B</b>) Cardiovascular studies: smart ring type. Gen: generation.</p>
Full article ">
22 pages, 945 KiB  
Review
Resilience in the Internet of Medical Things: A Review and Case Study
by Vikas Tomer, Sachin Sharma and Mark Davis
Future Internet 2024, 16(11), 430; https://doi.org/10.3390/fi16110430 - 20 Nov 2024
Viewed by 352
Abstract
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare [...] Read more.
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare domain due to its profound impact on health and public well-being. Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. Several other situations, such as natural disasters, war, construction works, etc., can cause IoMT networks to become unavailable and fail to transmit the data. The first step in these situations is to recover from failure as quickly as possible, resume the data transfer, and detect the cause of faults, failures, and errors. Several solutions exist in the literature to make the IoMT resilient to failure. However, no single approach proposed in the literature can simultaneously protect the IoMT networks from various attacks, failures, and faults. This paper begins with a detailed description of IoMT and its applications. It considers the underlying requirements of resilience for IoMT networks, such as monitoring, control, diagnosis, and recovery. This paper comprehensively analyzes existing research efforts to provide IoMT network resilience against diverse causes. After investigating several research proposals, we identify that the combination of software-defined networks (SDNs), machine learning (ML), and microservices architecture (MSA) has the capabilities to fulfill the requirements for achieving resilience in the IoMT networks. It mainly focuses on the analysis of technologies, such as SDN, ML, and MSA, separately, for meeting the resilience requirements in the IoMT networks. SDN can be used for monitoring and control, and ML can be used for anomaly detection and diagnosis, whereas MSA can be used for bringing distributed functionality and recovery into the IoMT networks. This paper provides a case study that describes the remote patient monitoring (RPM) of a heart patient in IoMT networks. It covers the different failure scenarios in IoMT infrastructure. Finally, we provide a proposed methodology that elaborates how distributed functionality can be achieved during these failures using machine learning, software-defined networks, and microservices technologies. Full article
(This article belongs to the Special Issue The Future Internet of Medical Things II)
Show Figures

Figure 1

Figure 1
<p>Possible issues of remote patient monitoring.</p>
Full article ">Figure 2
<p>Functional components of IoMT.</p>
Full article ">Figure 3
<p>Mapping of critical requirements into key technologies for resilient IoMT networks.</p>
Full article ">Figure 4
<p>Failure scenario in a general layerwise architecture.</p>
Full article ">Figure 5
<p>A single-point-of-failure issue in an IoMT network.</p>
Full article ">Figure 6
<p>An expected framework of IoMT networks with distributed functionality and resilience.</p>
Full article ">Figure 7
<p>Proposed architecture by using the combination of SDN, ML, and MSA.</p>
Full article ">
23 pages, 1624 KiB  
Article
An Explainable Deep Learning-Enhanced IoMT Model for Effective Monitoring and Reduction of Maternal Mortality Risks
by Sherine Nagy Saleh, Mazen Nabil Elagamy, Yasmine N. M. Saleh and Radwa Ahmed Osman
Future Internet 2024, 16(11), 411; https://doi.org/10.3390/fi16110411 - 8 Nov 2024
Viewed by 940
Abstract
Maternal mortality (MM) is considered one of the major worldwide concerns. Despite the advances of artificial intelligence (AI) in healthcare, the lack of transparency in AI models leads to reluctance to adopt them. Employing explainable artificial intelligence (XAI) thus helps improve the transparency [...] Read more.
Maternal mortality (MM) is considered one of the major worldwide concerns. Despite the advances of artificial intelligence (AI) in healthcare, the lack of transparency in AI models leads to reluctance to adopt them. Employing explainable artificial intelligence (XAI) thus helps improve the transparency and effectiveness of AI-driven healthcare solutions. Accordingly, this article proposes a complete framework integrating an Internet of Medical Things (IoMT) architecture with an XAI-based deep learning model. The IoMT system continuously monitors pregnant women’s vital signs, while the XAI model analyzes the collected data to identify risk factors and generate actionable insights. Additionally, an efficient IoMT transmission model is developed to ensure reliable data transfer with the best-required system quality of service (QoS). Further analytics are performed on the data collected from different regions in a country to address high-risk cities. The experiments demonstrate the effectiveness of the proposed framework by achieving an accuracy of 80% for patients and 92.6% for regional risk prediction and providing interpretable explanations. The XAI-generated insights empower healthcare providers to make informed decisions and implement timely interventions. Furthermore, the IoMT transmission model ensures efficient and secure data transfer. Full article
(This article belongs to the Special Issue eHealth and mHealth)
Show Figures

Figure 1

Figure 1
<p>Proposed region monitoring scheme.</p>
Full article ">Figure 2
<p>Proposed patient monitoring scheme.</p>
Full article ">Figure 3
<p>Proposed deep learning model for risk classification.</p>
Full article ">Figure 4
<p>Proposed patient monitoring transmission scheme.</p>
Full article ">Figure 5
<p>Pearson correlation of the region-based MMR assessment using all 33 features. The naming labels denote only the odd features from the list.</p>
Full article ">Figure 6
<p>Accuracy and loss training and validation charts for the state dataset.</p>
Full article ">Figure 7
<p>Feature influence on the low-risk class (<b>a</b>) and the high-risk class (<b>b</b>) in the region dataset.</p>
Full article ">Figure 8
<p>Pearson correlation of the dataset features.</p>
Full article ">Figure 9
<p>Box plot showing the range of values for each feature and whether there are any outliers.</p>
Full article ">Figure 10
<p>SHAP summary showing feature influence for low-risk (<b>a</b>), medium-risk (<b>b</b>), and high-risk (<b>c</b>) patients.</p>
Full article ">Figure 11
<p>LIME analysis for three different patient records: one at low risk (<b>a</b>), another at a mid-level of risk (<b>b</b>), and the final at high risk (<b>c</b>).</p>
Full article ">Figure 12
<p>Required transmission power for the UP/DL communication (dBm) versus interfering devices’ transmission power (<math display="inline"><semantics> <msub> <mi>P</mi> <mi>I</mi> </msub> </semantics></math>) (dBm).</p>
Full article ">Figure 13
<p>Overall energy efficiency for the UP/DL communication (EE) (bit/J) versus interfering devices’ transmission power <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mi>I</mi> </msub> <mo>)</mo> </mrow> </semantics></math> (dBm). Subfigures (<b>a</b>–<b>e</b>) correspond to distances between source S1 and destination D1 and between destinations D1 and D2 of 50 m, 100 m, 150 m, 200 m, and 250 m, respectively.</p>
Full article ">Figure 14
<p>(<b>a</b>) Required smart monitor device transmission power <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mrow> <mi>S</mi> <mi>r</mi> <mi>e</mi> <mi>q</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math> (dBm) versus the required uplink QoS <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>Q</mi> <mrow> <mi>U</mi> <mi>L</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math>. (<b>b</b>) Required gateway transmission power <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mrow> <mi>S</mi> <mi>r</mi> <mi>e</mi> <mi>q</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math> (dBm) versus the required downlink QoS <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mi>Q</mi> <mrow> <mi>D</mi> <mi>L</mi> </mrow> </msub> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">
22 pages, 13809 KiB  
Article
Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment
by Xinzhong Su and Youyun Xu
Sensors 2024, 24(22), 7119; https://doi.org/10.3390/s24227119 - 5 Nov 2024
Viewed by 393
Abstract
Authentication is considered one of the most critical technologies for the next generation of the Internet of Medical Things (IoMT) due to its ability to significantly improve the security of sensors. However, higher frequency cyber-attacks and more intrusion methods significantly increase the security [...] Read more.
Authentication is considered one of the most critical technologies for the next generation of the Internet of Medical Things (IoMT) due to its ability to significantly improve the security of sensors. However, higher frequency cyber-attacks and more intrusion methods significantly increase the security risks of IoMT sensor devices, resulting in more and more patients’ privacy being threatened. Different from traditional IoT devices, sensors are generally considered to be based on low-cost hardware designs with limited storage resources; thus, authentication techniques for IoMT scenarios might not be applicable anymore. In this paper, we propose an efficient three-factor cluster-based user authentication protocol (3ECAP). Specifically, we establish the security association between the user and the sensor cluster through fine-grained access control based on Merkle, which perfectly achieves the segmentation of permission. We then demonstrate that 3ECAP can address the privilege escalation attack caused by permission segmentation. Moreover, we further analyze the security performance and communication cost using formal and non-formal security analysis, Proverif, and NS3. Simulation results demonstrated the robustness of 3ECAP against various cyber-attacks and its applicability in an IoMT environment with limited storage resources. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Figure 1
<p>Authentication model for IoMT.</p>
Full article ">Figure 2
<p>Merkle tree-based access list.</p>
Full article ">Figure 3
<p>Summary of medical staff registration phase.</p>
Full article ">Figure 4
<p>Summary of login and authentication phase.</p>
Full article ">Figure 5
<p>Results of executing Proverif.</p>
Full article ">Figure 6
<p>Comparison of calculation and communication cost [<a href="#B26-sensors-24-07119" class="html-bibr">26</a>,<a href="#B27-sensors-24-07119" class="html-bibr">27</a>,<a href="#B28-sensors-24-07119" class="html-bibr">28</a>,<a href="#B29-sensors-24-07119" class="html-bibr">29</a>].</p>
Full article ">Figure 7
<p>NS3-based 3ECAP simulation results.</p>
Full article ">
21 pages, 2302 KiB  
Article
Detecting and Localizing Wireless Spoofing Attacks on the Internet of Medical Things
by Irrai Anbu Jayaraj, Bharanidharan Shanmugam, Sami Azam and Suresh Thennadil
J. Sens. Actuator Netw. 2024, 13(6), 72; https://doi.org/10.3390/jsan13060072 - 1 Nov 2024
Viewed by 725
Abstract
This paper proposes a hybrid approach using design science research to identify rogue RF transmitters and locate their targets. We engineered a framework to identify masquerading attacks indicating the presence of multiple adversaries posing as a single node. We propose a methodology based [...] Read more.
This paper proposes a hybrid approach using design science research to identify rogue RF transmitters and locate their targets. We engineered a framework to identify masquerading attacks indicating the presence of multiple adversaries posing as a single node. We propose a methodology based on spatial correlation calculated from received signal strength (RSS). To detect and mitigate wireless spoofing attacks in IoMT environments effectively, the hybrid approach combines spatial correlation analysis, Deep CNN classification, Elliptic Curve Cryptography (ECC) encryption, and DSRM-powered attack detection enhanced (DADE) detection and localization (DAL) frameworks. A deep neural network (Deep CNN) was used to classify trusted transmitters based on Python Spyder3 V5 and ECC encrypted Hack RF Quadrature Signals (IQ). For localizing targets, this paper also presents DADE and DAL frameworks implemented on Eclipse Java platforms. The hybrid approach relies on spatial correlation based on signal strength. Using the training methods of Deep CNN1, Deep CNN2, and Long Short-Term Memory (LSTM), it was possible to achieve accuracies of 98.88%, 95.05%, and 96.60% respectively. Full article
(This article belongs to the Section Wireless Control Networks)
Show Figures

Figure 1

Figure 1
<p>Generic signal flow for identifying RF imperfection characteristics.</p>
Full article ">Figure 2
<p>IoMT RF security framework.</p>
Full article ">Figure 3
<p>Deep CNN data extraction process.</p>
Full article ">Figure 4
<p>Hack RF device setup.</p>
Full article ">Figure 5
<p>Benchmarking report [<a href="#B20-jsan-13-00072" class="html-bibr">20</a>,<a href="#B22-jsan-13-00072" class="html-bibr">22</a>,<a href="#B37-jsan-13-00072" class="html-bibr">37</a>].</p>
Full article ">
16 pages, 567 KiB  
Article
ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System
by Babu Kaji Baniya
Sensors 2024, 24(20), 6601; https://doi.org/10.3390/s24206601 - 13 Oct 2024
Viewed by 1234
Abstract
The continuous evolution of the IoT paradigm has been extensively applied across various application domains, including air traffic control, education, healthcare, agriculture, transportation, smart home appliances, and others. Our primary focus revolves around exploring the applications of IoT, particularly within healthcare, where it [...] Read more.
The continuous evolution of the IoT paradigm has been extensively applied across various application domains, including air traffic control, education, healthcare, agriculture, transportation, smart home appliances, and others. Our primary focus revolves around exploring the applications of IoT, particularly within healthcare, where it assumes a pivotal role in facilitating secure and real-time remote patient-monitoring systems. This innovation aims to enhance the quality of service and ultimately improve people’s lives. A key component in this ecosystem is the Healthcare Monitoring System (HMS), a technology-based framework designed to continuously monitor and manage patient and healthcare provider data in real time. This system integrates various components, such as software, medical devices, and processes, aimed at improvi1g patient care and supporting healthcare providers in making well-informed decisions. This fosters proactive healthcare management and enables timely interventions when needed. However, data transmission in these systems poses significant security threats during the transfer process, as malicious actors may attempt to breach security protocols.This jeopardizes the integrity of the Internet of Medical Things (IoMT) and ultimately endangers patient safety. Two feature sets—biometric and network flow metric—have been incorporated to enhance detection in healthcare systems. Another major challenge lies in the scarcity of publicly available balanced datasets for analyzing diverse IoMT attack patterns. To address this, the Auxiliary Classifier Generative Adversarial Network (ACGAN) was employed to generate synthetic samples that resemble minority class samples. ACGAN operates with two objectives: the discriminator differentiates between real and synthetic samples while also predicting the correct class labels. This dual functionality ensures that the discriminator learns detailed features for both tasks. Meanwhile, the generator produces high-quality samples that are classified as real by the discriminator and correctly labeled by the auxiliary classifier. The performance of this approach, evaluated using the IoMT dataset, consistently outperforms the existing baseline model across key metrics, including accuracy, precision, recall, F1-score, area under curve (AUC), and confusion matrix results. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>ACGAN architecture: label (<span class="html-italic">C</span>), noise (<span class="html-italic">Z</span>), real samples (<math display="inline"><semantics> <msub> <mi>X</mi> <mrow> <mi>r</mi> <mi>e</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> </semantics></math>), generator (<span class="html-italic">G</span>) synthetic samples (<math display="inline"><semantics> <msub> <mi>X</mi> <mrow> <mi>s</mi> <mi>y</mi> <mi>n</mi> <mi>t</mi> <mi>h</mi> <mi>e</mi> <mi>t</mi> <mi>i</mi> <mi>c</mi> </mrow> </msub> </semantics></math>), discriminator (<span class="html-italic">D</span>), and predicated classes: ‘Normal’ and ‘Attack’.</p>
Full article ">Figure 2
<p>The challenges of healthcare monitoring systems.</p>
Full article ">Figure 3
<p>Overview of EHMS: medical sensors, gateway, network (router, switch, attacker, intrusion detection system), and server [<a href="#B1-sensors-24-06601" class="html-bibr">1</a>].</p>
Full article ">Figure 4
<p>ROC curve of ‘Attack’ and ‘Normal’ category of WUSTL-EHMS-2020 dataset).</p>
Full article ">Figure 5
<p>t-SNE visualization of the original attack samples (depicted in light blue) and synthetic samples (depicted in orange) of the EHMS dataset (attack samples).</p>
Full article ">Figure 6
<p>Stack ensemble structure: support vector machine, adaboost, and random forest are base classifiers, and logistic regression is a meta-classifier.</p>
Full article ">Figure 7
<p>Comparison of the classification accuracies of network flow, biometric, and combined features using different classifiers.</p>
Full article ">
26 pages, 4673 KiB  
Article
Utilizing IoMT-Based Smart Gloves for Continuous Vital Sign Monitoring to Safeguard Athlete Health and Optimize Training Protocols
by Mustafa Hikmet Bilgehan Ucar, Arsene Adjevi, Faruk Aktaş and Serdar Solak
Sensors 2024, 24(20), 6500; https://doi.org/10.3390/s24206500 - 10 Oct 2024
Viewed by 1017
Abstract
This paper presents the development of a vital sign monitoring system designed specifically for professional athletes, with a focus on runners. The system aims to enhance athletic performance and mitigate health risks associated with intense training regimens. It comprises a wearable glove that [...] Read more.
This paper presents the development of a vital sign monitoring system designed specifically for professional athletes, with a focus on runners. The system aims to enhance athletic performance and mitigate health risks associated with intense training regimens. It comprises a wearable glove that monitors key physiological parameters such as heart rate, blood oxygen saturation (SpO2), body temperature, and gyroscope data used to calculate linear speed, among other relevant metrics. Additionally, environmental variables, including ambient temperature, are tracked. To ensure accuracy, the system incorporates an onboard filtering algorithm to minimize false positives, allowing for timely intervention during instances of physiological abnormalities. The study demonstrates the system’s potential to optimize performance and protect athlete well-being by facilitating real-time adjustments to training intensity and duration. The experimental results show that the system adheres to the classical “220-age” formula for calculating maximum heart rate, responds promptly to predefined thresholds, and outperforms a moving average filter in noise reduction, with the Gaussian filter delivering superior performance. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Sports devices and wearables with integrated sensors.</p>
Full article ">Figure 2
<p>The proposed IoMT-empowered athlete health monitoring and alert system.</p>
Full article ">Figure 3
<p>The front (<b>a</b>) and back (<b>b</b>) views of the prototype IoMT-based athlete health monitoring and alert system.</p>
Full article ">Figure 4
<p>Web interface for real-time data visualization.</p>
Full article ">Figure 5
<p>Acceleration coordinate systems used to calculate the linear speed. (<b>a</b>) Gyroscope rotation. (<b>b</b>) Athlete movement illustration.</p>
Full article ">Figure 6
<p>Heart rate values during different phases.</p>
Full article ">Figure 7
<p>SpO2 values during different phases.</p>
Full article ">Figure 8
<p>Body temperature values during different phases.</p>
Full article ">Figure 9
<p>Speed values during different phases.</p>
Full article ">Figure 10
<p>Alert signal during different phases.</p>
Full article ">Figure 11
<p>Heart rate values during different phases (moving average).</p>
Full article ">Figure 12
<p>SpO2 values during different phases (moving average).</p>
Full article ">Figure 13
<p>Speed values during different phases (moving average).</p>
Full article ">Figure 14
<p>Heart rate values during different phases (Gaussian filter).</p>
Full article ">Figure 15
<p>SpO2 values during different phases (Gaussian filter).</p>
Full article ">Figure 16
<p>Speed values during different phases (Gaussian filter).</p>
Full article ">Figure 17
<p>Heart rate values during the resting phase.</p>
Full article ">Figure 18
<p>Speed values during the resting phase.</p>
Full article ">Figure 19
<p>SpO2 values during the resting phase.</p>
Full article ">Figure 20
<p>Body temperature values during the resting phase.</p>
Full article ">Figure 21
<p>Heart rate values during the walking phase.</p>
Full article ">Figure 22
<p>Speed values during the walking phase.</p>
Full article ">Figure 23
<p>SpO2 values during the walking phase.</p>
Full article ">Figure 24
<p>Body temperature values during the walking phase.</p>
Full article ">Figure 25
<p>Heart rate values during the running phase.</p>
Full article ">Figure 26
<p>Speed values during the running phase.</p>
Full article ">Figure 27
<p>SpO2 values during the running phase.</p>
Full article ">Figure 28
<p>Body temperature values during the running phase.</p>
Full article ">
20 pages, 665 KiB  
Article
STORMS: A Pilot Feasibility Study for Occupational TeleRehabilitation in Multiple Sclerosis
by Lucilla Vestito, Federica Ferraro, Giulia Iaconi, Giulia Genesio, Fabio Bandini, Laura Mori, Carlo Trompetto and Silvana Dellepiane
Sensors 2024, 24(19), 6470; https://doi.org/10.3390/s24196470 - 7 Oct 2024
Viewed by 928
Abstract
Digital solutions in the field of restorative neurology offer significant assistance, enabling patients to engage in rehabilitation activities remotely. This research introduces ReMoVES, an Internet of Medical Things (IoMT) system delivering telemedicine services specifically tailored for multiple sclerosis rehabilitation, within the overarching framework [...] Read more.
Digital solutions in the field of restorative neurology offer significant assistance, enabling patients to engage in rehabilitation activities remotely. This research introduces ReMoVES, an Internet of Medical Things (IoMT) system delivering telemedicine services specifically tailored for multiple sclerosis rehabilitation, within the overarching framework of the STORMS project. The ReMoVES platform facilitates the provision of a rehabilitative exercise protocol, seamlessly integrated into the Individual Rehabilitation Project, curated by a multidimensional medical team operating remotely. This manuscript delves into the second phase of the STORMS pilot feasibility study, elucidating the technology employed, the outcomes achieved, and the practical, professional, and academic implications. The STORMS initiative, as the genesis of digital telerehabilitation solutions, aims to enhance the quality of life for multiple sclerosis patients. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>CONSORT flow diagram of the study.</p>
Full article ">Figure 2
<p>Targets taken and targets missed in the 52 HotAir sessions (Patient A). The x-axis represents the number of sessions played, while on the y-axis, we find the number of targets taken (yellow) and target missed (green).</p>
Full article ">Figure 3
<p>Objects taken, errors and semantic errors in supermarket sessions (Patient A). Semantic errors (in yellow) are considered less “serious” than errors (in grey).</p>
Full article ">Figure 4
<p>Patient A: the learning curve for the Shelf Cans over 26 sessions.</p>
Full article ">Figure 5
<p>Angles between the optimal trajectory and the one performed by the patient (<b>left</b>). Execution times to perform the required movement (<b>right</b>). Subfigures (<b>a</b>,<b>b</b>) refer to the red cans, (<b>c</b>,<b>d</b>) to the orange cans, and (<b>e</b>,<b>f</b>) to the green cans.</p>
Full article ">Figure 6
<p>Shoulder angle range of motion: Patient A.</p>
Full article ">Figure 7
<p>Box plot depicting the values of trajectory angles of Healthy Subjects (HS, blue) and Patient A (patA, red).</p>
Full article ">Figure 8
<p>Targets taken at each session, Owl Nest, Patient A. Orange sessions have been played with right arm; the blue session with the left arm.</p>
Full article ">Figure 9
<p>Trajectories during session 12 (<b>a</b>) and session 23 (<b>b</b>) of Owl Nest activity of Patient A.</p>
Full article ">Figure 10
<p>Number of sessions performed each week. The x-axis shows the exercises. The exercises in red highlight the execution of non-prescribed activities, while the red circles represent the doctor’s prescription per exercise.</p>
Full article ">Figure 11
<p>Number of correct and incorrect paths per session.</p>
Full article ">Figure 12
<p>Number of correct and incorrect answers per session.</p>
Full article ">Figure 13
<p>Cognitive measures at T0,T1, and T2 for Patient A.</p>
Full article ">Figure 14
<p>Cognitive measures at T0,T1, and T2 for Patient B.</p>
Full article ">
20 pages, 2074 KiB  
Review
Blockchain-Based Privacy Preservation for the Internet of Medical Things: A Literature Review
by Afnan Alsadhan, Areej Alhogail and Hessah Alsalamah
Electronics 2024, 13(19), 3832; https://doi.org/10.3390/electronics13193832 - 28 Sep 2024
Viewed by 1349
Abstract
The Internet of Medical Things (IoMT) is a rapidly expanding network comprising medical devices, sensors, and software that collect and exchange patient health data. Today, the IoMT has the potential to revolutionize healthcare by offering more personalized care to patients and improving the [...] Read more.
The Internet of Medical Things (IoMT) is a rapidly expanding network comprising medical devices, sensors, and software that collect and exchange patient health data. Today, the IoMT has the potential to revolutionize healthcare by offering more personalized care to patients and improving the efficiency of healthcare delivery. However, the IoMT also introduces significant privacy concerns, particularly regarding data privacy. IoMT devices often collect and store large amounts of data about patients’ health. These data could be used to track patients’ movements, monitor their health habits, and even predict their future health risks. This extensive data collection and surveillance could be a major invasion of patient privacy. Thus, privacy-preserving research in an IoMT context is an important area of research that aims to mitigate these privacy issues. This review paper comprehensively applies the PRISMA methodology to analyze, review, classify, and compare current approaches of preserving patient data privacy within IoMT blockchain-based healthcare environments. Full article
Show Figures

Figure 1

Figure 1
<p>IoMT privacy-preserving blockchain-based structure.</p>
Full article ">Figure 2
<p>Blockchain architecture layers.</p>
Full article ">Figure 3
<p>PRISMA study selection diagram. N represents the number of papers.</p>
Full article ">Figure 4
<p>SecureMed workflow [<a href="#B28-electronics-13-03832" class="html-bibr">28</a>].</p>
Full article ">Figure 5
<p>Wang et al.’s proposed system architecture [<a href="#B45-electronics-13-03832" class="html-bibr">45</a>].</p>
Full article ">Figure 6
<p>Number of studies based on blockchain type.</p>
Full article ">Figure 7
<p>Number of studies based on the applied cryptography algorithm.</p>
Full article ">
21 pages, 4992 KiB  
Article
Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission
by José Ricardo Cárdenas-Valdez, Ramón Ramírez-Villalobos, Catherine Ramirez-Ubieta and Everardo Inzunza-Gonzalez
Entropy 2024, 26(9), 787; https://doi.org/10.3390/e26090787 - 14 Sep 2024
Viewed by 966
Abstract
Protecting sensitive patient data, such as electrocardiogram (ECG) signals, during RF wireless transmission is essential due to the increasing demand for secure telemedicine communications. This paper presents an innovative chaotic-based encryption system designed to enhance the security and integrity of telemedicine data transmission. [...] Read more.
Protecting sensitive patient data, such as electrocardiogram (ECG) signals, during RF wireless transmission is essential due to the increasing demand for secure telemedicine communications. This paper presents an innovative chaotic-based encryption system designed to enhance the security and integrity of telemedicine data transmission. The proposed system utilizes a multi-scroll chaotic system for ECG signal encryption based on master–slave synchronization. The ECG signal is encrypted by a master system and securely transmitted to a remote location, where it is decrypted by a slave system using an extended state observer. Synchronization between the master and slave is achieved through the Lyapunov criteria, which ensures system stability. The system also supports Orthogonal Frequency Division Multiplexing (OFDM) and adaptive n-quadrature amplitude modulation (n-QAM) schemes to optimize signal discretization. Experimental validations with a custom transceiver scheme confirmed the system’s effectiveness in preventing channel overlap during 2.5 GHz transmissions. Additionally, a commercial RF Power Amplifier (RF-PA) for LTE applications and a development board were integrated to monitor transmission quality. The proposed encryption system ensures robust and efficient RF transmission of ECG data, addressing critical challenges in the wireless communication of sensitive medical information. This approach demonstrates the potential for broader applications in modern telemedicine environments, providing a reliable and efficient solution for the secure transmission of healthcare data. Full article
Show Figures

Figure 1

Figure 1
<p>Chaotic attractor.</p>
Full article ">Figure 2
<p>Error state responses.</p>
Full article ">Figure 3
<p>Architecture of n-QAM scheme.</p>
Full article ">Figure 4
<p>Overall diagram scheme.</p>
Full article ">Figure 5
<p>Block diagram of the transmission testbed proposed. Part A: Signal transmission and control. Part B: Signal path and measurement.</p>
Full article ">Figure 6
<p>Photo of the experimental testbed. Equipment pertinent to the setup: (<b>A</b>) Altera Cyclone V FPGA SoC-Kit. (<b>B</b>) AD9361 RF Agile Transceiver operating at a center frequency of 2.45 GHz. (<b>C</b>) Mini-circuits ZFBP-2400-S+ bandpass filter. (<b>D</b>) Mini-circuits for power amplifiers ZX60-V63+. (<b>E</b>) Coupler mini-circuits ZHDC-16-63-S+. (<b>F</b>) SIGLENT SSA 3032X Spectrum Analyzer. (<b>G</b>) GW INSTEK GPS-3303 Power Supply. (<b>H</b>) Display HOST PC-MATLAB R2024a.</p>
Full article ">Figure 7
<p>A 128-QAM with a power amplifier using a scale factor of 0.05.</p>
Full article ">Figure 8
<p>An ECG signal decrypted under a 128-QAM scheme.</p>
Full article ">Figure 9
<p>ECG signal encrypted under the 128-QAM modulation scheme.</p>
Full article ">Figure 10
<p>ECG signal with tachycardia encrypted under the 128-QAM modulation scheme.</p>
Full article ">Figure 11
<p>128-QAM constellation of an encrypted ECG signal.</p>
Full article ">Figure 12
<p>Cross-correlation of ideal received signal and transmitted–received ECG signal.</p>
Full article ">Figure 13
<p>Discrete Fourier transform of transmitted and received ECG signal.</p>
Full article ">Figure 14
<p>Histogram of transmitted and received ECG signal.</p>
Full article ">
23 pages, 1151 KiB  
Article
Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things
by Theyab Alsolami, Bader Alsharif and Mohammad Ilyas
Sensors 2024, 24(18), 5937; https://doi.org/10.3390/s24185937 - 13 Sep 2024
Cited by 1 | Viewed by 1423
Abstract
This study investigates the efficacy of machine learning models for intrusion detection in the Internet of Medical Things, aiming to enhance cybersecurity defenses and protect sensitive healthcare data. The analysis focuses on evaluating the performance of ensemble learning algorithms, specifically Stacking, Bagging, and [...] Read more.
This study investigates the efficacy of machine learning models for intrusion detection in the Internet of Medical Things, aiming to enhance cybersecurity defenses and protect sensitive healthcare data. The analysis focuses on evaluating the performance of ensemble learning algorithms, specifically Stacking, Bagging, and Boosting, using Random Forest and Support Vector Machines as base models on the WUSTL-EHMS-2020 dataset. Through a comprehensive examination of performance metrics such as accuracy, precision, recall, and F1-score, Stacking demonstrates exceptional accuracy and reliability in detecting and classifying cyber attack incidents with an accuracy rate of 98.88%. Bagging is ranked second, with an accuracy rate of 97.83%, while Boosting yielded the lowest accuracy rate of 88.68%. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Sensors Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>This figure shows the data flow of the IoMT.</p>
Full article ">Figure 2
<p>Summary of the dataset’s statistical attributes.</p>
Full article ">Figure 3
<p>Balanced dataset after random over-sampling.</p>
Full article ">Figure 4
<p>Top 10 features selected by mutual information.</p>
Full article ">Figure 5
<p>The processes of stacking, boosting, and bagging ensemble learning techniques.</p>
Full article ">Figure 6
<p>Confusion matrix of stacking.</p>
Full article ">Figure 7
<p>Confusion matrix of Bagging.</p>
Full article ">Figure 8
<p>Confusion matrix of Boosting.</p>
Full article ">Figure 9
<p>ROC curve of Boosting.</p>
Full article ">
19 pages, 1200 KiB  
Article
Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection
by Ghaida Balhareth and Mohammad Ilyas
Sensors 2024, 24(17), 5712; https://doi.org/10.3390/s24175712 - 2 Sep 2024
Viewed by 1378
Abstract
The Internet of Medical Things (IoMTs) is a network of connected medical equipment such as pacemakers, prosthetics, and smartwatches. Utilizing the IoMT-based system, a huge amount of data is generated, offering experts a valuable resource for tasks such as prediction, real-time monitoring, and [...] Read more.
The Internet of Medical Things (IoMTs) is a network of connected medical equipment such as pacemakers, prosthetics, and smartwatches. Utilizing the IoMT-based system, a huge amount of data is generated, offering experts a valuable resource for tasks such as prediction, real-time monitoring, and diagnosis. To do so, the patient’s health data must be transferred to database storage for processing because of the limitations of the storage and computation capabilities of IoMT devices. Consequently, concerns regarding security and privacy can arise due to the limited control over the transmitted information and reliance on wireless transmission, which leaves the network vulnerable to several kinds of attacks. Motivated by this, in this study, we aim to build and improve an efficient intrusion detection system (IDS) for IoMT networks. The proposed IDS leverages tree-based machine learning classifiers combined with filter-based feature selection techniques to enhance detection accuracy and efficiency. The proposed model is used for monitoring and identifying unauthorized or malicious activities within medical devices and networks. To optimize performance and minimize computation costs, we utilize Mutual Information (MI) and XGBoost as filter-based feature selection methods. Then, to reduce the number of the chosen features selected, we apply a mathematical set (intersection) to extract the common features. The proposed method can detect intruders while data are being transferred, allowing for the accurate and efficient analysis of healthcare data at the network’s edge. The system’s performance is assessed using the CICIDS2017 dataset. We evaluate the proposed model in terms of accuracy, F1 score, recall, precision, true positive rate, and false positive rate. The proposed model achieves 98.79% accuracy and a low false alarm rate 0.007 FAR on the CICIDS2017 dataset according to the experimental results. While this study focuses on binary classification for intrusion detection, we are planning to build a multi-classification approach for future work which will be able to not only detect the attacks but also categorize them. Additionally, we will consider using our proposed feature selection technique for different ML classifiers and evaluate the model’s performance empirically in real-world IoMT scenarios. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>The distribution of the benign and malicious traffic of the CICIDS2017 dataset.</p>
Full article ">Figure 2
<p>The flow of The proposed model.</p>
Full article ">Figure 3
<p>Illustration of the workflow of the data pre-processing steps.</p>
Full article ">Figure 4
<p>Features importance ranking by Mutual Information.</p>
Full article ">Figure 5
<p>Features importance ranking By XGBoost.</p>
Full article ">Figure 6
<p>The common features between MI-XGBoost.</p>
Full article ">Figure 7
<p>Potential applications of the proposed intrusion detection model in IoMT.</p>
Full article ">Figure 8
<p>(<b>a</b>) The confusion matrix of Decision Tree. (<b>b</b>) The confusion matrix of Random Forest. (<b>c</b>) The confusion matrix of XGBoost. (<b>d</b>) The confusion matrix of CatBoost.</p>
Full article ">Figure 9
<p>Average ROC curve for (<b>a</b>) Decision Tree, (<b>b</b>) Random Forest, (<b>c</b>) XGBoost, and (<b>d</b>) CatBoost.</p>
Full article ">Figure 10
<p>The average of the scores for the accuracy of the proposed models.</p>
Full article ">
21 pages, 360 KiB  
Article
Automatic Classification of Anomalous ECG Heartbeats from Samples Acquired by Compressed Sensing
by Enrico Picariello, Francesco Picariello, Ioan Tudosa, Sreeraman Rajan and Luca De Vito
Bioengineering 2024, 11(9), 883; https://doi.org/10.3390/bioengineering11090883 - 31 Aug 2024
Viewed by 939
Abstract
In this paper, a method for the classification of anomalous heartbeats from compressed ECG signals is proposed. The method operating on signals acquired by compressed sensing is based on a feature extraction stage consisting of the evaluation of the Discrete Cosine Transform (DCT) [...] Read more.
In this paper, a method for the classification of anomalous heartbeats from compressed ECG signals is proposed. The method operating on signals acquired by compressed sensing is based on a feature extraction stage consisting of the evaluation of the Discrete Cosine Transform (DCT) coefficients of the compressed signal and a classification stage performed by means of a set of k-nearest neighbor ensemble classifiers. The method was preliminarily tested on five classes of anomalous heartbeats, and it achieved a classification accuracy of 99.40%. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>An overview of the five analyzed beats. (<b>a</b>) Normal beat; (<b>b</b>) atrial premature beat; (<b>c</b>) Right-branch block beat; (<b>d</b>) premature ventricular contraction; (<b>e</b>) left-branch block beat.</p>
Full article ">Figure 2
<p>An overview of the proposed method for ECG signal acquisition, feature extraction, and unbalancing data correction.</p>
Full article ">Figure 3
<p>An overview of the signal segmentation, processing, and compression phases. (<b>a</b>) Segmented ECG beat; (<b>b</b>) filtered and normalized ECG beat; (<b>c</b>) compressed ECG beat.</p>
Full article ">Figure 4
<p>An overview of the training and validation phase.</p>
Full article ">Figure 5
<p>An overview of the testing phase.</p>
Full article ">
36 pages, 2715 KiB  
Article
Integrating IoMT and AI for Proactive Healthcare: Predictive Models and Emotion Detection in Neurodegenerative Diseases
by Virginia Sandulescu, Marilena Ianculescu, Liudmila Valeanu and Adriana Alexandru
Algorithms 2024, 17(9), 376; https://doi.org/10.3390/a17090376 - 23 Aug 2024
Viewed by 900
Abstract
Neurodegenerative diseases, such as Parkinson’s and Alzheimer’s, present considerable challenges in their early detection, monitoring, and management. The paper presents NeuroPredict, a healthcare platform that integrates a series of Internet of Medical Things (IoMT) devices and artificial intelligence (AI) algorithms to address these [...] Read more.
Neurodegenerative diseases, such as Parkinson’s and Alzheimer’s, present considerable challenges in their early detection, monitoring, and management. The paper presents NeuroPredict, a healthcare platform that integrates a series of Internet of Medical Things (IoMT) devices and artificial intelligence (AI) algorithms to address these challenges and proactively improve the lives of patients with or at risk of neurodegenerative diseases. Sensor data and data obtained through standardized and non-standardized forms are used to construct detailed models of monitored patients’ lifestyles and mental and physical health status. The platform offers personalized healthcare management by integrating AI-driven predictive models that detect early symptoms and track disease progression. The paper focuses on the NeuroPredict platform and the integrated emotion detection algorithm based on voice features. The rationale for integrating emotion detection is based on two fundamental observations: (a) there is a strong correlation between physical and mental health, and (b) frequent negative mental states affect quality of life and signal potential future health declines, necessitating timely interventions. Voice was selected as the primary signal for mood detection due to its ease of acquisition without requiring complex or dedicated hardware. Additionally, voice features have proven valuable in further mental health assessments, including the diagnosis of Alzheimer’s and Parkinson’s diseases. Full article
Show Figures

Figure 1

Figure 1
<p>Architecture of NeuroPredict platform.</p>
Full article ">Figure 2
<p>Flowchart for building the emotion classification model. The base for the architecture that led to the best results for the algorithm used in the NeuroPredict platform is presented.</p>
Full article ">Figure 3
<p>Representation of augmentation techniques. (<b>a</b>) original signal; (<b>b</b>) signal with random noise added; (<b>c</b>) stretched signal: duration changed and pitch kept the same; (<b>d</b>) signal shifted in time with a random number of samples; (<b>e</b>) signal with a shift in pitch of 0.7 musical steps.</p>
Full article ">Figure 4
<p>Representation of Mel spectrogram for an audio signal of (<b>a</b>) positive class and (<b>b</b>) negative class.</p>
Full article ">Figure 5
<p>Representation of chroma STFT for an audio signal of (<b>a</b>) positive class and (<b>b</b>) negative class.</p>
Full article ">Figure 6
<p>Learning curve for training and testing accuracy for 150 epochs for the SER algorithm integrated into the NeuroPredict platform.</p>
Full article ">
15 pages, 1096 KiB  
Article
Substantiation and Effectiveness of Remote Monitoring System Based on IoMT Using Portable ECG Device
by Hee-Young Lee, Yoon-Ji Kim, Kang-Hyun Lee, Jung-Hun Lee, Sung-Pil Cho, Junghwan Park, Il-Hwan Park and Hyun Youk
Bioengineering 2024, 11(8), 836; https://doi.org/10.3390/bioengineering11080836 - 16 Aug 2024
Viewed by 1012
Abstract
Cardiovascular disease is a major global health concern, with early detection being critical. This study assesses the effectiveness of a portable ECG device, based on Internet of Medical Things (IoMT) technology, for remote cardiovascular monitoring during daily activities. We conducted a clinical trial [...] Read more.
Cardiovascular disease is a major global health concern, with early detection being critical. This study assesses the effectiveness of a portable ECG device, based on Internet of Medical Things (IoMT) technology, for remote cardiovascular monitoring during daily activities. We conducted a clinical trial involving 2000 participants who wore the HiCardi device while engaging in hiking activities. The device monitored their ECG, heart rate, respiration, and body temperature in real-time. If an abnormal signal was detected while a physician was remotely monitoring the ECG at the IoMT monitoring center, he notified the clinical research coordinator (CRC) at the empirical research site, and the CRC advised the participant to visit a hospital. Follow-up calls were made to determine compliance and outcomes. Of the 2000 participants, 318 showed abnormal signals, and 182 were advised to visit a hospital. The follow-up revealed that 139 (76.37%) responded, and 30 (21.58% of those who responded) sought further medical examination. Most visits (80.00%) occurred within one month. Diagnostic approaches included ECG (56.67%), ECG and ultrasound (20.00%), ultrasound alone (16.67%), ECG and X-ray (3.33%), and general treatment (3.33%). Seven participants (23.33% of those who visited) were diagnosed with cardiovascular disease, including conditions such as arrhythmia, atrial fibrillation, and stent requirements. The portable ECG device using the patch-type electrocardiograph detected abnormal cardiovascular signals, leading to timely diagnoses and interventions, demonstrating its potential for broad applications in preventative healthcare. Full article
(This article belongs to the Special Issue IoT Technology in Bioengineering Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Emergency response protocols in place.</p>
Full article ">Figure 2
<p>Flowchart of IoMT monitoring service.</p>
Full article ">
Back to TopTop