skip to main content
10.1145/3342428.3342693acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgoodtechsConference Proceedingsconference-collections
research-article

IoT Healthcare: Benefits, Issues and Challenges

Authors Info & Claims
Published:25 September 2019Publication History

ABSTRACT

A sportsman's watch no longer marks the time, but it also provides information on the geographical location, on the number of steps, on the heart rate, on the blood oxygenation, on the blood pressure, etc. The bracelet of an elderly person can measure different physiological signals and can transmit them in real time to her doctor, allowing him to monitor the state of health even if the two are not in the same place. Thanks to the implementation and use of sensors, watches and bracelets have become smart objects. It is the world of the Internet of things that enters the health sector and fills the shelves of electronic stores with objects that can monitor our bodies. A market sector that is worth billions of dollars, but that has several implications along with its benefits. What happens to our data? Who has access to our data? Is it possible to cyber-attack these devices? Is our behavior influenced by reading this data? These are some of the questions that arise from the use of IoT devices in the health sector and in this paper we will address them by analyzing this scenario in detail, by highlighting threats and vulnerabilities and by proposing approaches that might mitigate issues related to the use of IoT in the health scenario.

References

  1. Regulatory Agency. 2018. Medical devices: software applications (apps). Medicines and Healthcare products. Regulatory Agency. Available at: https://www.gov.uk/government/publications/medical-devices-software-applications-apps (2018).Google ScholarGoogle Scholar
  2. Shifali Arora, Jennifer Yttri, and Wendy Nilsen. 2014. Privacy and Security in Mobile Health (mHealth) Research. Alcohol Res 36, 1 (2014).Google ScholarGoogle Scholar
  3. Nicolai Bodemer, Stephanie M. Müller, Yasmina Okan, Rocio Garcia-Retamero, and Angela Neumeyer-Gromen. 2012. Do the media provide transparent health information? A cross-cultural comparison of public information about the HPV vaccine. Vaccine 30, 25 (2012), 3747--3756. Special Issue: The Role of Internet Use in Vaccination Decisions.Google ScholarGoogle ScholarCross RefCross Ref
  4. Luciano Bononi, Lorenzo Donatiello, and Marco Furini. 2009. Real-Time Traffic in Ad-Hoc Sensor Networks. In Proceedings of IEEE International Conference on Communications (ICC)). 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Maged Kamel Boulos, Ann Brewer, Chante Karimkhani, David Buller, and Robert Dellavalle. 2014. Mobile medical and health apps: state of the art, concerns, regulatory control and certification. Online Journal of Public Health Informatics 5, 3 (2014).Google ScholarGoogle Scholar
  6. Armir Bujari, Marco Furini, Federica Mandreoli, Riccardo Martoglia, Manuela Montangero, and Daniele Ronzani.2018. Standards, Security and Business Models: Key Challenges for the IoT Scenario. Mobile Networks and Applications 23, 1 (01 Feb 2018), 147--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Marco Conti, Lorenzo Donatiello, and Marco Furini. 2002. Design and Analysis of RT-Ring: a protocol for supporting real-time communications. IEEE Transaction on Industrial Electronics 49, 6 (December 2002), 1214--1226.Google ScholarGoogle ScholarCross RefCross Ref
  8. Xiaohui Cui, Nanhai Yang, Zhibo Wang, Cheng Hu, Weiping Zhu, Hanjie Li, Yujie Ji, and Cheng Liu. 2015. Chinese social media analysis for disease surveillance. Personal and Ubiquitous Computing 19, 7 (01 Oct 2015), 1125--1132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Munmun De Choudhury. 2014. Opportunities of Social Media in Health and Well-being. XRDS 21, 2 (Dec. 2014), 23--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Giovanni Delnevo, Silvia Mirri, Lorenzo Monti, Catia Prandi, Manesha Putra, Marco Roccetti, Paola Salomoni, and Robert J. Sokol. 2018. Patients Reactions to Non-Invasive and Invasive Prenatal Tests: A Machine-Based Analysis from Reddit Posts. In IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining. 980--987.Google ScholarGoogle Scholar
  11. G. Delnevo, M. Roccetti, and S. Mirri. 2018. Modeling Patients' Online Medical Conversations: A Granger Causality Approach. In International Conference on Connected Health: Applications, Systems and Engineering Technologies. 40--44.Google ScholarGoogle Scholar
  12. Deloitte. 2019. Global Health Care Outlook. In Research Report. Available at: https://www2.deloitte.com/global/en/pages/life-sciences-and-healthcare/articles/global-health-care-sector-outlook.html.Google ScholarGoogle Scholar
  13. Lorenzo Donatiello and Marco Furini. 2003. Ad Hoc Networks: A Protocol for Supporting QoS Applications. In Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003). IEEE, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mark Dredze, Zachary Wood-Doughty, Sandra Crouse Quinn, and David A. Broniatowski. 2017. Vaccine opponents' use of Twitter during the 2016 US presidential election: Implications for practice and policy. Vaccine 35, (2017),Google ScholarGoogle Scholar
  15. Stefano Ferretti, Marco Furini, and Manuela Montangero. 2019. Diabetes: what are Italian Twitter users talking about?. In Proceedings of the IEEE International Conference on Computer Communications and Networks.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jim Finkle and Caroline Humer. 2014. Community Health says data stolen in cyber attack from China. Reuters. Available at: https://www.reuters.com/article/us-community-health-cybersecurity/community-health-says-data-stolen-in-cyber-attack-from-china-idUSKBN0GI16N20140818 (2014).Google ScholarGoogle Scholar
  17. Susannah Fox. 2014. The social life of health information. Pew Research (Jan. 2014).Google ScholarGoogle Scholar
  18. Marco Furini. 2014. Users Behavior in Location-aware Services: Digital Natives vs Digital Immigrants. Advances in Human-Computer Interaction 2014 (2014).Google ScholarGoogle Scholar
  19. Marco Furini, Federica Mandreoli, Riccardo Martoglia, and Manuela Montangero. 2017. IoT: Science Fiction or Real Revolution? Springer International Publishing, Cham, 96--105.Google ScholarGoogle Scholar
  20. Marco Furini and Gabriele Menegoni. 2018. Public Health and Social Media: Language Analysis of Vaccine Conversations. In Proceedings of the ACM/IEEE International Conference on Internet of Things Design and Implementation.Google ScholarGoogle ScholarCross RefCross Ref
  21. Marco Furini and Valentina Tamanini. 2015. Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions. Multimedia Tools and Applications 74, 21 (2015), 9795--9825. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Andrea L. Hartzler, Bridget Weis, Carly Cahill, Wanda Pratt, Albert Park, Uba Backonja, and David W. McDonald. Design and Usability of Interactive User Profiles for Online Health Communities. ACM Trans. Comput.-Hum. Interact. 23, 3 (2016). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. X. Hei, X. Du, S. Lin, I. Lee, and O. Sokolsky. 2015. Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System. IEEE Transactions on Parallel and Distributed Systems 26, 11 (Nov 2015), 3108--3121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Philip Henson, Gary David, Karen Albright, and John Torous. 2019. Deriving a practical framework for the evaluation of health apps. The Lancet Digital Health 1 (2019).Google ScholarGoogle Scholar
  25. S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. Kwak. 2015. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 3 (2015), 678--708.Google ScholarGoogle ScholarCross RefCross Ref
  26. C. Kotronis, G. Minou, G. Dimitrakopoulos, M. Nikolaidou, D. Anagnostopoulos, A. Amira, F. Bensaali, H. Baali, and H. Djelouat. 2017. Managing Criticalities of e-Health IoT systems. In 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB). 1--5.Google ScholarGoogle Scholar
  27. D. Kotz. 2011. A threat taxonomy for mHealth privacy. In 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011). 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  28. J. Sathish Kumar and Dhiren R. Patel. 2014. Article: A Survey on Internet of Things: Security and Privacy Issues. International Journal of Computer Applications 90, 11 (March 2014), 20--26. Full text available.Google ScholarGoogle Scholar
  29. H. Lin, J. Jia, J. Qiu, Y. Zhang, G. Shen, L. Xie, J. Tang, L. Feng, and T. Chua. 2017. Detecting Stress Based on Social Interactions in Social Networks. IEEE Transactions on Knowledge and Data Engineering 29, 9 (Sept 2017), 1820--1833.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jian Mou, Dong-Hee Shin, and Jason F. Cohen. 2017. Tracing College Students' Acceptance of Online Health Services. International Journal of Human-Computer Interaction 33, 5 (2017), 371--384.Google ScholarGoogle ScholarCross RefCross Ref
  31. Yvonne O'Connor, Wendy Rowan, Laura Lynch, and Ciara Heavin. 2017. Privacy by Design: Informed Consent and Internet of Things for Smart Health. Procedia Computer Science (2017). International Conference on Emerging Ubiquitous Systems and Pervasive Networks.Google ScholarGoogle Scholar
  32. A. B. Pawar and S. Ghumbre. 2016. A survey on IoT applications, security challenges and counter measures. In International Conference on Computing, Analytics and Security Trends.Google ScholarGoogle Scholar
  33. Koustuv Saha and De Choudhury Munmun. 2017. Modeling Stress with Social Media Around Incidents of Gun Violence on College Campuses. Proc. ACM Hum.-Comput. Interact. 1 (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Reijo M. Savola, Habtamu Abie, and Markus Sihvonen. 2012. Towards Metrics-driven Adaptive Security Management in e-Health IoT Applications. In Proceedings of the 7th International Conference on Body Area Networks. 276--281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Michael Schukat, D McCaldin, Kai Wang, Günter Schreier, Nigel H. Lovell, Michael Marschollek, and Stephen James Redmond. 2016. Unintended Consequences of Wearable Sensor Use in Healthcare. Yearbook of medical informatics 1 (2016), 73--86.Google ScholarGoogle Scholar
  36. Eliza Strickland. 2012. The FDA Takes On Mobile Health Apps. IEEE Spectrum (2012).Google ScholarGoogle Scholar
  37. Aatif Sulleyman. 2017. NHS Cyber Attack: why stolen medical information is so much more valuable than financial data. Indepented.Google ScholarGoogle Scholar
  38. A.Tanner. 2017. Our Bodies, Our Data: How Companies Make Billions Selling Our Medical Records. Beacon Press.Google ScholarGoogle Scholar

Index Terms

  1. IoT Healthcare: Benefits, Issues and Challenges

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          GoodTechs '19: Proceedings of the 5th EAI International Conference on Smart Objects and Technologies for Social Good
          September 2019
          272 pages
          ISBN:9781450362610
          DOI:10.1145/3342428

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 September 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader