Skip to main content

Health Care in the Cyberspace: Medical Cyber-Physical System and Digital Twin Challenges

  • Chapter
  • First Online:
Digital Twin Technologies and Smart Cities

Part of the book series: Internet of Things ((ITTCC))

Abstract

Cyber-Physical Systems and Digital Twins are commonly used today in the industrial sector, and the healthcare sector is keen to implement these technological solutions to enhance their capabilities and offer better services for patient care provision. In fact, the adoption of Wireless Body Area Networks (WBAN) based on IoT along with cloud computing systems has led to the development of new methodologies to monitor and treat patients. However, the adoption of the new technologies comes with several challenges in terms of performance and security. Considering that, WBAN can be wearable or implanted under the skin, and the overall concept leads to several cybersecurity challenges that would require deeper investigation. This chapter presents an analysis of the impact that WBAN has on health care. It also provides some definitions of Medical Cyber-Physical Systems (MCPSs) and Digital Twins along with technological enablers such as cloud and IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, I., Sokolsky, O., Chen, S., Hatcliff, J., Jee, E., Kim, B., King, A., Mullen-Fortino, M., Park, S., Roederer, A., Venkatasubramanian, K.K.: Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100(1), 75–90 (2012)

    Article  Google Scholar 

  2. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1658–1686 (2014)

    Article  Google Scholar 

  3. Kocabas, O., Soyata, T., Aktas, M.K.: Emerging security mechanisms for medical cyber physical systems. IEEE/ACM Trans. Comput. Biol. Bioinform. 13(3), 401–416 (2016)

    Article  Google Scholar 

  4. Cavallari, R., Martelli, F., Rosini, R., Buratti, C., Verdone, R.: A survey on wireless body area networks: technologies and design challenges. IEEE Commun. Surv. Tutor. 16(3), 1635–1657 (2014)

    Article  Google Scholar 

  5. Anwar, M., Abdullah, A.H., Qureshi, K.N., Majid, A.H.: Wireless body area networks for healthcare applications: an overview. Telkomnika 15(3), 1088–1095 (2017)

    Article  Google Scholar 

  6. Babu, S., Chandini, M., Lavanya, P., Ganapathy, K., Vaidehi, V.: Cloud-enabled remote health monitoring system. In: 2013 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 702–707. IEEE (2013)

    Google Scholar 

  7. Soyata, T., Muraleedharan, R., Funai, C., Kwon, M., Heinzelman, W.: Cloud-vision: real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. In: 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 000059–000066. IEEE (2012)

    Google Scholar 

  8. Powers, N., Alling, A., Osolinsky, K., Soyata, T., Zhu, M., Wang, H., Ba, H., Heinzelman, W., Shi, J., Kwon, M.: The cloudlet accelerator: bringing mobile-cloud face recognition into real-time. In: 2015 IEEE Globecom Workshops (GC Wkshps), pp. 1–7. IEEE (2015)

    Google Scholar 

  9. Mao, Y., Chen, Y., Hackmann, G., Chen, M., Lu, C., Kollef, M., Bailey, T.C.: Medical data mining for early deterioration warning in general hospital wards. In: 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW), pp. 1042–1049. IEEE (2011)

    Google Scholar 

  10. Kocabaş, Ö., Soyata, T.: Medical data analytics in the cloud using homomorphic encryption. In: Handbook of Research on Cloud Infrastructures for Big Data Analytics, pp. 471–488. IGI Global (2014)

    Google Scholar 

  11. Nalinipriya, G., Kumar, R.A.: Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework. In: 2013 IEEE International Conference on Smart Structures and Systems (ICSSS), pp. 171–177. IEEE (2013)

    Google Scholar 

  12. Hani, A.F.M., Paputungan, I.V., Hassan, M.F., Asirvadam, V.S., Daharus, M.: Development of private cloud storage for medical image research data. In: 2014 International Conference on Computer and Information Sciences (ICCOINS), pp. 1–6. IEEE (2014)

    Google Scholar 

  13. Barbash, G.I., Glied, S.A.: New technology and health care costs—the case of robot-assisted surgery. N. Engl. J. Med. 363(8), 701–704 (2010)

    Article  Google Scholar 

  14. Brenner, B., Hummel, V.: Digital twin as enabler for an innovative digital shopfloor management system in the ESB logistics learning factory at Reutlingen-university. Procedia Manuf. 9, 198–205 (2017)

    Article  Google Scholar 

  15. Bruynseels, K., Santoni de Sio, F., van den Hoven, J.: Digital twins in health care: ethical implications of an emerging engineering paradigm. Front. Genet. 9, 31 (2018)

    Article  Google Scholar 

  16. Uhlemann, T.H.J., Schock, C., Lehmann, C., Freiberger, S., Steinhilper, R.: The digital twin: demonstrating the potential of real time data acquisition in production systems. Procedia Manuf. 9, 113–120 (2017)

    Article  Google Scholar 

  17. Uhlemann, T.H.J., Lehmann, C., Steinhilper, R.: The digital twin: realizing the cyber-physical production system for industry 4.0. Procedia CIRP 61, 335–340 (2017)

    Article  Google Scholar 

  18. Qureshi, K.N., Abdullah, A.H., Anwar, R.W.: The evolution in health care with information and communication technologies. In: Proceeding of 2nd International Conference of Applied Information and Communications Technology-2014. Elsevier, Oman (2014)

    Google Scholar 

  19. Ullah, S., Khan, P., Ullah, N., Saleem, S., Higgins, H., Kwak, K.S.: A review of wireless body area networks for medical applications (2010). arXiv:1001.0831

  20. Mukhopadhyay, S.C.: Wearable sensors for human activity monitoring: a review. IEEE Sens. J. 15(3), 1321–1330 (2015)

    Article  Google Scholar 

  21. Parkka, J., Ermes, M., Korpipaa, P., Mantyjarvi, J., Peltola, J., Korhonen, I.: Activity classification using realistic data from wearable sensors. IEEE Trans. Inf Technol. Biomed. 10(1), 119–128 (2006)

    Article  Google Scholar 

  22. Winkley, J., Jiang, P., Jiang, W.: Verity: an ambient assisted living platform. IEEE Trans. Consum. Electron. 58(2) (2012)

    Article  Google Scholar 

  23. Leonov, V.: Thermoelectric energy harvesting of human body heat for wearable sensors. IEEE Sens. J. 13(6), 1–8 (2013)

    Article  Google Scholar 

  24. W H Organization. Global report on diabetes (2016)

    Google Scholar 

  25. Schwiebert, L., Gupta, S.K., Weinmann, J.: Research challenges in wireless networks of biomedical sensors. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 151–165. ACM (2001)

    Google Scholar 

  26. Regehr, C., Glancy, D., Pitts, A., LeBlanc, V.R.: Interventions to reduce the consequences of stress in physicians: a review and meta-analysis. J. Nerv. Ment. Dis. 202(5), 353–359 (2014)

    Article  Google Scholar 

  27. Cassel, J.: Physical illness in response to stress. In: Social Stress, pp. 189–209. Routledge (2017)

    Google Scholar 

  28. Milenković, A., Otto, C., Jovanov, E.: Wireless sensor networks for personal health monitoring: issues and an implementation. Comput. Commun. 29(13–14), 2521–2533 (2006)

    Article  Google Scholar 

  29. Hadjidj, A., Souil, M., Bouabdallah, A., Challal, Y., Owen, H.: Wireless sensor networks for rehabilitation applications: challenges and opportunities. J. Netw. Comput. Appl. 36(1), 1–15 (2013)

    Article  Google Scholar 

  30. Zhou, H., Hu, H.: Human motion tracking for rehabilitation—A survey. Biomed. Signal Process. Control 3(1), 1–18 (2008)

    Article  Google Scholar 

  31. High Confidence Software and Systems Coordinating Group, B High-confidence medical devices: Cyber-physical systems for 21st century health care. A research and development needs report, NCO/NITRD (2009)

    Google Scholar 

  32. Goodman, C.: Food and Drug Administration Center for Devices and Radiological Health (1988)

    Google Scholar 

  33. Alexander, K., Clarkson, P.J.: Good design practice for medical devices and equipment, Part II: design for validation. J. Med. Eng. Technol. 24(2), 53–62 (2000)

    Article  Google Scholar 

  34. Ackerman, M.J., Filart, R., Burgess, L.P., Lee, I., Poropatich, R.K.: Developing next-generation telehealth tools and technologies: patients, systems, and data perspectives. Telemed. e-Health 16(1), 93–95 (2010)

    Article  Google Scholar 

  35. Halperin, D., Heydt-Benjamin, T.S., Fu, K., Kohno, T., Maisel, W.H.: Security and privacy for implantable medical devices. IEEE Pervasive Comput. 1, 30–39 (2008)

    Article  Google Scholar 

  36. Arney, D., Venkatasubramanian, K.K., Sokolsky, O., Lee, I.: Biomedical devices and systems security. In: 2011 Annual International Conference of the Engineering in Medicine and Biology Society, EMBC, pp. 2376–2379. IEEE (2011)

    Google Scholar 

  37. Venkatasubramanian, K.K., Gupta, S.K.S., Jetley, R.P., Jones, P.L.: Interoperable medical devices. IEEE Pulse 1(2), 16–27 (2010)

    Article  Google Scholar 

  38. Denning, T., Fu, K., Kohno, T.: Absence makes the heart grow fonder: new directions for implantable medical device security. In: HotSec (2008)

    Google Scholar 

  39. Kifayat, K., Merabti, M., Younis, Y.A.: Secure Cloud Computing for Critical Infrastructure: A Survey (2012)

    Google Scholar 

  40. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  41. Ficco, M., Rak, M.: Stealthy denial of service strategy in cloud computing. IEEE Trans. Cloud Comput. 3(1), 80–94 (2015)

    Article  Google Scholar 

  42. Sankar, K., Kannan, S., Jennifer, P.: On-demand security architecture for cloud computing. Middle-East J. Sci. Res. 20(2), 241–246 (2014)

    Google Scholar 

  43. Liu, B., Bi, J., Vasilakos, A.V.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Secur. 9(3), 436–450 (2014)

    Article  Google Scholar 

  44. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  45. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., Inácio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)

    Article  Google Scholar 

  46. Hashizume, K., Rosado, D.G., Fernndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1–13 (2013)

    Article  Google Scholar 

  47. Bilal, K., Malik, S.U.R., Khan, S.U., Zomaya, A.Y.: Trends and challenges in cloud data centers. IEEE Cloud Comput. Mag. 1(1), 10–20 (2014)

    Article  Google Scholar 

  48. Neng-Hai, Y., Hao, Z., Xu, J., Zhang, W., Zhang, C.: Review of cloud computing security. Acta Electron. Sinica 41(2), 371–381 (2013)

    Google Scholar 

  49. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1(1), 11 (2012)

    Article  Google Scholar 

  50. Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 401–412. ACM (2011)

    Google Scholar 

  51. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)

    Article  Google Scholar 

  52. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)

    Article  Google Scholar 

  53. Owasp.org. https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf (2018). Accessed 31 Dec 2018

  54. Islam, S.R., Kwak, D., Kabir, M.H., Hossain, M., Kwak, K.S.: The internet of things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015)

    Article  Google Scholar 

  55. Zia, T., Zomaya, A.: Security issues in wireless sensor networks. In: Proceedings of the IEEE International Conference on Systems and Networks Communications, October 2006, p. 40 (2006)

    Google Scholar 

  56. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaime Ibarra Jimenez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jimenez, J.I., Jahankhani, H., Kendzierskyj, S. (2020). Health Care in the Cyberspace: Medical Cyber-Physical System and Digital Twin Challenges. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds) Digital Twin Technologies and Smart Cities. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-18732-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-18732-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-18731-6

  • Online ISBN: 978-3-030-18732-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics