Skip to main content

Advertisement

Log in

Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users’ entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher’s interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Zanella, A., Bui, N., Castellani, A., Vangelista, L., and Zorzi, M., Internet of Things for Smart Cities. IEEE Internet Things J. 1(1):22–32, 2014.

    Google Scholar 

  2. Tian, C., Chen, X., Guo, D., Sun, J., and Liu, L., Analysis and design of security in Internet of things. 2015 8th Int., 2015.

  3. Zhang, X. M., and Zhang, N., An open, secure and flexible platform based on internet of things and cloud computing for ambient aiding living and telemedicine. In: 2011 International Conference on Computer and Management, CAMAN 2011, pp. 1–4, 2011.

  4. Stowe, S., and Harding, S., Telecare, telehealth and telemedicine. European Geriatric Medicine 1(3. No longer published by Elsevier):193–197, 2010.

    Google Scholar 

  5. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., and Priyan, M. K., Centralized fog computing security platform for IoT and cloud in healthcare system. In: The Convergence of Big Data and, IGI Global, pp. 141–154, 2017.

  6. Rajan, S. P., Review and investigations on future research directions of mobile based telecare system for cardiac surveillance. Rev. Mex. Trastor. Aliment. 13(4):454–460, 2015.

    Google Scholar 

  7. Negra, R., Jemili, I., and Belghith, A., Wireless Body Area Networks : Applications and technologies. Procedia - Procedia Comput. Sci. 83:1274–1281, 2016.

    Google Scholar 

  8. Martin, S., Kelly, G., Kernohan, W. G., McCreight, B., and Nugent, C., Smart home technologies for health and social care support. Cochrane Database of Systematic Reviews, 2008.

  9. Jacobsson, A., Boldt, M., and Carlsson, B., A risk analysis of a smart home automation system. Elsevier 56:719–733, 2016.

    Google Scholar 

  10. Aggidis, A. G. A., Newman, J. D., and Aggidis, G. A., Investigating pipeline and state of the art blood glucose biosensors to formulate next steps. Biosens. Bioelectron. 74:243–262, 2015.

    CAS  PubMed  Google Scholar 

  11. Woznowski, P., Kaleshi, D., Oikonomou, G., and Craddock, I., Classification and suitability of sensing technologies for activity recognition. Comput. Commun. 89–90:34–50, 2016.

    Google Scholar 

  12. Albahri, A. S., Zaidan, A. A., Albahri, O. S., Zaidan, B. B., and Alsalem, M. A., Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects. J. Med. Syst. 42(8):137, 2018.

    CAS  PubMed  Google Scholar 

  13. Albahri, O. S., Zaidan, A. A., Zaidan, B. B., Hashim, M., Albahri, A. S., and Alsalem, M. A., Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects. J. Med. Syst. 42(9):164, 2018.

    CAS  PubMed  Google Scholar 

  14. Rahmani, A. M. et al., Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Futur. Gener. Comput. Syst. 78(2):641–658, 2018.

    Google Scholar 

  15. Albahri, O. S. et al., Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations. J. Med. Syst. 42(5):80, May 2018.

    CAS  PubMed  Google Scholar 

  16. Sakr, S., and Elgammal, A., Towards a Comprehensive Data Analytics Framework for Smart Healthcare Services. Big Data Res. 4:44–58, 2016.

    Google Scholar 

  17. Hindia, M. N., Rahman, T. A., Ojukwu, H., Hanafi, E. B., and Fattouh, A., Enabling remote health-caring utilizing IoT concept over LTE-femtocell networks. PLoS One 11(5):e0155077, 2016.

    CAS  PubMed  PubMed Central  Google Scholar 

  18. Gómez, J., Oviedo, B., and Zhuma, E., Patient Monitoring System Based on Internet of Things. Procedia Comput. Sci. 83:90–97, 2016.

    Google Scholar 

  19. Hussain, A., Wenbi, R., Da Silva, A. L., Nadher, M., and Mudhish, M., Health and emergency-care platform for the elderly and disabled people in the Smart City. J. Syst. Softw. 110:253–263, 2015.

    Google Scholar 

  20. Kumar, N., Kaur, K., Jindal, A., and Rodrigues, J. J. P. C., Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV) environment. Digit. Commun. Networks 1(3):191–203, 2015.

    Google Scholar 

  21. Zanjal, S. V., and Talmale, G. R., Medicine Reminder and Monitoring System for Secure Health Using IOT. Phys. Procedia 78:471–476, 2016.

    Google Scholar 

  22. Kalid, N. et al., Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization ‘Large Scales Data’ Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology. J. Med. Syst. 42(4):69, 2018.

    PubMed  Google Scholar 

  23. Courtney, K. L., Demiris, G., Rantz, M., and Skubic, M., Needing smart home technologies: The perspective of older adults in continuing care retirement communities. Radcliffe Medical Press, 2008.

  24. Alaa, M., Zaidan, A. A., Zaidan, B. B., Talal, M., and Kiah, M. L. M., A review of smart home applications based on Internet of Things. J. Netw. Comput. Appl. 97. Academic Press:48–65, 2017.

    Google Scholar 

  25. Zaidan, A. A. et al., A survey on communication components for IoT-based technologies in smart homes. Telecommun. Syst. 69(1):1–25, 2018.

    Google Scholar 

  26. Zaidan, A. A. and Zaidan, B. B., A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations. Artificial Intelligence Review, Springer Netherlands, pp. 1–25, 2018.

  27. Gaikwad, P. P., Gabhane, J. P., and Golait, S. S., 3-level secure Kerberos authentication for smart home systems using IoT. In: Proc. 2015 1st Int. Conf. Next Gener. Comput. Technol. NGCT 2015, pp. 262–268, 2016.

  28. Alohali, B., Merabti, M., and Kifayat, K., A secure scheme for a smart house based on Cloud of Things (CoT). 2014 6th Comput. Sci. Electron. Eng. Conf. CEEC 2014 - Conf. Proc., pp. 115–120, 2014.

  29. Le Vinh, T., Bouzefrane, S., Farinone, J., Attar, A., and Kennedy, B. P., Middleware to Integrate Mobile Devices, Sensors and Cloud Computing. Procedia Comput. Sci. 52:234–243, 2015.

    Google Scholar 

  30. Kirkham, T., Armstrong, D., Djemame, K., and Jiang, M., Risk driven Smart Home resource management using cloud services. Futur. Gener. Comput. Syst. 38: 2013.

  31. Tao, M., Zuo, J., Liu, Z., Castiglione, A., and Palmieri, F., Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes. Futur. Gener. Comput. Syst. 78:1040–1051, 2018.

    Google Scholar 

  32. Chifor, B. C., Bica, I., Patriciu, V. V., and Pop, F., A security authorization scheme for smart home Internet of Things devices. Futur. Gener. Comput. Syst. 86:740–749, 2018.

    Google Scholar 

  33. Moosavi, S. R. et al., SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science 52(1):452–459, 2015.

    Google Scholar 

  34. Yuan, X. and Peng, S., A research on secure smart home based on the Internet of Things. In: 2012 IEEE International Conference on Information Science and Technology, pp. 737–740, 2012.

  35. You-Guo, L., and Ming-Fu, J., The reinforcement of communication security of the internet of things in the field of intelligent home through the use of middleware. In: Proceedings - 2011 4th International Symposium on Knowledge Acquisition and Modeling, KAM 2011, pp. 254–257, 2011.

  36. Witkovski, A., Santin, V., Abreu, J. M., Management, and undefined 2015. An IdM and key-based authentication method for providing single sign-on in IoT, 2015. researchgate.net.

  37. Rajiv, P., Raj, R., and Chandra, M., Email based remote access and surveillance system for smart home infrastructure. Perspect. Sci. 8:459–461, 2016.

    Google Scholar 

  38. Santoso, F. K. and Vun, N. C. H., Securing IoT for smart home system. Proc. Int. Symp. Consum. Electron. ISCE, 2015, 2015.

  39. D. Yunge, P. Kindt, M. B.-… (HPCC), 2015 IEEE 7th, and U. Hybrid apps: Apps for the internet of things, 2015. ieeexplore.ieee.org .

  40. Jiang, T., Yang, M., and Zhang, Y., Research and implementation of M2M smart home and security system. Secur. Commun. Networks 8(16):2704–2711, 2015.

    Google Scholar 

  41. Lin, H., and Bergmann, N. W., IoT privacy and security challenges for smart home environments. Information. 7(3), 2016.

  42. S. Tanwar, P. Patel, K. Patel, … S. T.-C., and undefined, An advanced Internet of Thing based security alert system for smart home, 2017. Ieeexplore.Ieee.Org .

  43. A. A.-P. C. Science and undefined, Cyber security challenges within the connected home ecosystem futures. Elsevier, 2015.

  44. Li, F., Wan, Z., Xiong, X., and Tan, J., Research on sensor-gateway-terminal security mechanism of smart home based on IOT. Internet of Things, 2012.

  45. Furfaro, A., Argento, L., Parise, A., and Piccolo, A., Using virtual environments for the assessment of cyberseturity issues in IoT scenarios. Simul. Model. Pract. Theory 73:43–54, 2017.

    Google Scholar 

  46. M. S.-I. S. I. M. & I. Forensics and undefined, Smart home definition and security threats, 2015. Ieeexplore.Ieee.Org .

  47. Lee, C., Zappaterra, L., Choi, K., and Choi, H., Securing smart home : Technologies, security challenges , and security requirements. In: Workshop on Security and Privacy in Machine-to-Machine Communications (M2MSec’14), pp. 67–72, 2014.

  48. Matharu, G. S., Upadhyay, P., and Chaudhary, L., The Internet of Things: Challenges & security issues. In: 2014 International Conference on Emerging Technologies (ICET), pp. 54–59, 2014.

  49. Jacobsson, A. and Davidsson, P., Towards a model of privacy and security for smart homes. IEEE World Forum Internet Things, WF-IoT 2015 - Proc., pp. 727–732, 2016.

  50. Suryani, V., Sulistyo, S., and Widyawan, A survey on trust in internet of things. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp. 1–6, 2016.

  51. Sain, M, Kang, Y. J., and Lee, H. J., Survey on security in Internet of Things: State of the art and challenges. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 699–704, 2017.

  52. Bastos, D., Shackleton, M., and El-Moussa, F., Internet of things: A survey of technologies and security risks in smart home and city environments. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 7–30, 2018.

  53. Han, J. H., Jeon, Y., and Kim, J., Security considerations for secure and trustworthy smart home system in the IoT environment. Int. Conf. ICT Converg. 2015 Innov. Towar. IoT, 5G, Smart Media Era, ICTC 2015, pp. 1116–1118, 2015.

  54. Peng, Z., Kato, T., Takahashi, H., and Kinoshita, T., Intelligent home security system using agent-based IoT devices. ieeexplore.ieee.org , pp. 313–314, 2015.

  55. Datta, S. K., Towards securing discovery services in Internet of Things. In: 2016 IEEE International Conference on Consumer Electronics, ICCE 2016, pp. 506–507, 2016.

  56. Kim, Y. P., Yoo, S., and Yoo, C., DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things. 2015 IEEE Int. Conf. Consum. Electron. ICCE 2015, pp. 196–197, 2015.

  57. Ren, W., Ren, Y., Wu, M. E., and Lee, C. J., A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring. In: Proceedings - 2015 3rd International Conference on Robot, Vision and Signal Processing, RVSP 2015, pp. 130–133, 2016.

  58. Shivraj, V. L., Rajan, M. A., Singh, M., and Balamuralidhar, P., One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1–6, 2015.

  59. Yang, L., Seasholtz, C., Luo, B., and Li, F., Hide your hackable smart home from remote attacks: The multipath onion IoT Gateways, pp. 575–594, 2018.

  60. Sanchez, I., et al., Privacy leakages in Smart Home wireless technologies. Proc. - Int. Carnahan Conf. Secur. Technol. 2014, 2014.

  61. Min, B. and Varadharajan, V., Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT). In: Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, vol. 2016, pp. 80–89, 2016.

  62. Jacobsson, A., Boldt, M., and Carlsson, B., On the Risk Exposure of Smart Home Automation Systems. 2014 Int. Conf. Futur. Internet Things Cloud, pp. 183–190, 2014.

  63. Wurm, J., Hoang, K., Arias, O., Sadeghi, A. R., and Jin, Y., Security analysis on consumer and industrial IoT devices. Proc. Asia South Pacific Des. Autom. Conf. ASP-DAC, vol. 25–28, pp. 519–524, 2016.

  64. Rahman, R. A. and Shah, B., Security analysis of IoT protocols: A focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016, pp. 172–178, 2016.

  65. Bao, H., Chong, A. Y. L., Ooi, K. B., and Lin, B., Are Chinese consumers ready to adopt mobile smart home? An empirical analysis. Int. J. Mob. Commun. 12(5):496, 2014.

    Google Scholar 

  66. Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., and Fu, X., Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System. IEEE Internet Things J. 4(6):1899–1909, 2017.

    Google Scholar 

  67. Liu, J., Zhang, C., and Fang, Y., EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis. IEEE Internet Things J. 5(2):1206–1217, 2018.

    Google Scholar 

  68. Ukil, A., Bandyopadhyay, S., and Pal, A., Privacy for IoT: Involuntary privacy enablement for smart energy systems. IEEE International Conference on Communications 2015:536–541, 2015.

    Google Scholar 

  69. Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., and Mehani, O., Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015, pp. 163–167, 2015.

  70. Greensmith, J., Securing the Internet of Things with Responsive Artificial Immune Systems. Proc. 2015 Genet. Evol. Comput. Conf. - GECCO ‘15, pp. 113–120, 2015.

  71. S. Errapotu, J. Wang, Y. Gong, … J. C.-I. I. of, and U, SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT, 2018. ieeexplore.ieee.org .

  72. Vinayaga Sundaram, B., Ramnath, M., Prasanth, M., and Varsha Sundaram, J., Encryption and hash based security in Internet of Things. In: 2015 3rd International Conference on Signal Processing, Communication and Networking, ICSCN 2015, pp. 1–6, 2015.

  73. Huth, C., Zibuschka, J., Duplys, P., and Güneysu, T., Securing systems on the Internet of Things via physical properties of devices and communications. In: 9th Annual IEEE International Systems Conference, SysCon 2015 - Proceedings, pp. 8–13, 2015.

  74. Huth, C., Duplys, P., and Guneysu, T., Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, 2016.

  75. Bergmann, O., Gerdes, S., Schäfer, S., Junge, F., and Bormann C., Secure bootstrapping of nodes in a CoAP network. In: 2012 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2012, pp. 220–225, 2012.

  76. Elkhodr, M., Shahrestani, S., and Cheung, H., A Smart Home Application Based on the Internet of Things Management Platform. In: 2015 IEEE International Conference on Data Science and Data Intensive Systems, pp. 491–496, 2015.

  77. Fisher, R. and Hancke, G. P., DTLS for lightweight secure data streaming in the internet of things. In: Proceedings - 2014 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2014, pp. 585–590, 2014.

  78. Amin, R., Kumar, N., Biswas, G. P., Iqbal, R., and Chang, V., A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Futur. Gener. Comput. Syst. Int. J. Escience 78:1005–1019, 2018.

    Google Scholar 

  79. Song, T., Li, R., Mei, B., Yu, J., Xing, X., and Cheng, X., A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes. In: 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), pp. 519–524, 2016.

  80. Adiono, T., Marthensa, R., Muttaqin, R., Fuada, S., Harimurti, S., and Adijarto, W., Design of database and secure communication protocols for Internet-of-things-based smart home system. IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON, vol. 2017, pp. 1273–1278, 2017.

  81. Y. Chao, M. Jianfeng, D. X.-J. of Communications, and undefined, A New Evaluation Model for Security Protocols. Citeseer, 2011.

  82. Getz, K. A., Wenger, J., Campo, R. A., Seguine, E. S., and Kaitin, K. I., Assessing the impact of protocol design changes on clinical trial performance. Am. J. Ther. 15(5):450–457, 2008.

    PubMed  Google Scholar 

  83. Nadeem, A. and Javed, M. Y., A performance comparison of data encryption algorithms. In: 2005 International Conference on Information and Communication Technologies, pp. 84–89, 2005.

  84. Beckers, K., Pattern and Security Requirements. 2015.

  85. Michael, K., The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Comput. Secur. 31(4):634–635, 2012.

    Google Scholar 

  86. Boritz, J. E., IS practitioners’ views on core concepts of information integrity. Int. J. Account. Inf. Syst. 6(4):260–279, 2005.

    Google Scholar 

  87. Loukas, G., and Öke, G., Protection against denial of service attacks: A survey. Comput. J. 53(7):1020–1037, 2010.

    Google Scholar 

  88. Suryadevara, J., Sunil, B., and Kumar, N., Secured multimedia authentication system for wireless sensor network data related to Internet of Things. In: 2013 Seventh International Conference on Sensing Technology (ICST), pp. 109–115, 2013.

  89. Xie, X., Deng, D., and Deng, X., Design of embedded gateway software framework for heterogeneous networks interconnection. Proc. 2011 Int. Conf. Electron. Optoelectron., vol. 2, no. ICEOE, pp. V2–306-V2–309, 2011.

  90. Peretti, G., Lakkundi, V., and Zorzi, M., BlinkToSCoAP: An end-to-end security framework for the Internet of Things. 2015 7th Int. Conf. Commun. Syst. Networks, COMSNETS 2015 - Proc., pp. 1–6, 2015.

  91. R. Neisse, G. Steri, I. Fovino, G. B.-C. & Security, and undefined, SecKit: a model-based security toolkit for the internet of things. Elsevier, 2015.

  92. Yoshigoe, K., Dai, W., Abramson, M., and Jacobs, A., Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: Proceedings of 2015 TRON Symposium, TRONSHOW 2015, 2016.

  93. Cebrat, G., Secure web based home automation: Application layer based security using embedded programmable logic controller. In: 2014 2nd International Conference on Information and Communication Technology, ICoICT 2014, pp. 302–307, 2014.

  94. Pacheco, J. and Hariri, S., IoT security framework for smart cyber infrastructures. In: Proceedings - IEEE 1st International Workshops on Foundations and Applications of Self-Systems, FAS-W 2016, pp. 242–247, 2016.

  95. Baruah, B., and Dhal, S., A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System. Comput. Secur. 77:21–35, 2018.

    Google Scholar 

  96. Dorri, A., Kanhere, S. S., Jurdak, R., and Gauravaram, P., Blockchain for IoT security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623, 2017.

  97. Ge, M., Hong, J. B., Guttmann, W., and Kim, D. S., A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83:12–27, 2017.

    Google Scholar 

  98. Kalyanasundaramf, B., and Schnitgerf, G., THE PROBABILISTIC COMMUNICATION COMPLEXITY OF SET INTERSECTION*. SIAM J. Disc. MATH 5(4):545–557, 1992.

    Google Scholar 

  99. Ahmed, M. A. et al., A Review on Systems-Based Sensory Gloves for Sign Language Recognition State of the Art between 2007 and 2017. Sensors 18(7):2208, 2018.

    Google Scholar 

  100. Zaidan, A. A., et al., A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution. Health Technol. (Berl)., 2018.

  101. Alsalem, M. A. et al., Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects. J. Med. Syst. 42(11):204, 2018.

    CAS  PubMed  Google Scholar 

  102. Alsalem, M. A. et al., A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations. Comput. Methods Prog. Biomed. 158:93–112, 2018.

    CAS  Google Scholar 

  103. Zughoul, O., et al., Comprehensive Insights into the Criteria of Student Performance in Various Educational Domains. IEEE Access, 2018.

  104. Mohsin, A. H. et al., Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review. J. Med. Syst. 42(12):238, 2018.

    CAS  PubMed  Google Scholar 

  105. Mohsin, A. H., et al., Real-time Medical Systems based on Human Biometric Steganography: A Systematic Review. J. Med. Syst. 42(12), 2018.

  106. Yas, Q. M. et al., A systematic review on smartphone skin cancer apps: coherent taxonomy, motivations, open challenges and recommendations, and new research direction. Journal of Circuits, Systems and Computers 27(05):1830003, 2018.

    Google Scholar 

  107. Hamada, M. et al., A Systematic Review for Human EEG Brain Signals Based Emotion Classification, Feature Extraction, Brain Condition, Group Comparison. J. Med. Syst. 42(9):162, 2018.

    PubMed  Google Scholar 

  108. Tareq, Z., et al., A review of disability EEG based wheelchair control system: Coherent taxonomy, open challenges and recommendations. Computer methods and programs in biomedicine, 2018.

  109. Zaidan, B. B. et al., Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol. 7(3):382–387, 2011.

    Google Scholar 

  110. Mat Kiah, M. L. et al., Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. J. Med. Syst. 38(10):133, 2014.

    CAS  PubMed  Google Scholar 

  111. Kalid, N. et al., Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related ‘Big Data’ Using Body Sensors information and Communication Technology. J. Med. Syst. 42(2):30, 2018.

    Google Scholar 

  112. Salman, O. H. et al., Novel Methodology for Triage and Prioritizing Using ‘Big Data’ Patients with Chronic Heart Diseases Through Telemedicine Environmental. Int. J. Inf. Technol. Decis. Mak. 16(05):1211–1245, 2017.

    Google Scholar 

  113. Hussain, M., et al., Conceptual framework for the security of mobile health applications on Android platform. Telematics and Informatics, 2018.

  114. Hussain, M. et al., A security framework for mHealth apps on Android platform. Comput. Secur. 75:191–217, 2018.

    Google Scholar 

  115. Alanazi, H. O. et al., Secure topology for electronic medical record transmissions. Int. J. Pharmacol. 6(6):954–958, 2010.

    Google Scholar 

  116. Alanazi, H. O. et al., Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. Journal of Medicinal Plants Research 4(19):2059–2074, 2010.

    Google Scholar 

  117. Nabi, M. S. A. et al., Suitability of using SOAP protocol to secure electronic medical record databases transmission. Int. J. Pharmacol. 6(6):959–964, 2010.

    Google Scholar 

  118. Mat Kiah, M. L. et al., An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1. J. Med. Syst. 37(5):9971, 2013.

    Google Scholar 

  119. Alanazi, H. O. et al., Meeting the security requirements of electronic medical records in the ERA of high-speed computing. J. Med. Syst. 39(1):165, 2015.

    CAS  PubMed  Google Scholar 

  120. Iqbal, S., et al., Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients. Health Technol. (Berl)., 2018.

  121. Enaizan, O., et al., Electronic Medical Record Systems: Decision Support Examination Framework for Individual, Security and Privacy Concerns Using Multi-Perspective Analysis. J. Health Technol. pp 1–28, 2018.

  122. Zaidan, A. A. et al., Multi-criteria analysis for OS-EMR software selection problem: A comparative study. Decis. Support. Syst. 78:15–27, 2015.

    Google Scholar 

  123. Kiah, M. L. M. et al., Open source EMR software: Profiling, insights and hands-on analysis. Comput. Methods Prog. Biomed. 117(2):360–382, 2014.

    CAS  Google Scholar 

  124. Zaidan, A. A. et al., Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J. Biomed. Inform. 53:390–404, 2015.

    CAS  PubMed  Google Scholar 

  125. Zaidan, B. et al., Enhancement of the amount of hidden data and the quality of image. Kuala Lumpur: Faculty of Computer Science and Information Technology, University of Malaya.

  126. Zaidan, A. A. et al., Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Netw. Secur. 1(1):1985–1553, 2009.

    Google Scholar 

  127. Naji, A. W. et al., Challenges of hidden data in the unused area two within executable files. J. Comput. Sci. 5(11):890, 2009.

    Google Scholar 

  128. Hameed, S. A. et al., Novel Simulation Framework of Three-Dimensional Skull Bio-Metric Measurement. Int. J. Comput. Sci. Eng. 1(3):269–274, 2009.

    Google Scholar 

  129. Naji, A. W. et al., New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques. Proceeding of World Academy of Science Engineering and Technology (WASET) 56:493–497, 2009.

    Google Scholar 

  130. Majeed, A. et al., Novel approach for high secure and high rate data hidden in the image using image texture analysis. International Journal of Engineering and Technology 1(2):63–69, 2009.

    Google Scholar 

  131. Zaidan, A. A., et al., Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography. International Association of Computer Science and Information Technology (IACSIT), indexing by Nielsen, Thomson ISI (ISTP), IACSIT Database, British Library and EI Compendex, 20, 2009.

  132. Naji, A. W. et al., New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique. International Journal of Computer Science and Network Security (IJCSNS) 9(7):218–224, 2009.

    Google Scholar 

  133. Zaidan, B. B. et al., New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. Int. J. Comput. Sci. Eng. 1(3):263–268, 2009.

    Google Scholar 

  134. Naji, A. W. et al., (2009). "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File. In: Computer Science and Information Technology-Spring Conference. IACSITSC'09. International Association of (pp. 405–409). IEEE, 2009.

  135. Khalifa, O. O. et al., Novel approach of hidden data in the (unused area 2 within EXE file) using computation between cryptography and steganography. International Journal of Computer Science and Network Security (IJCSNS) 9(5):294–300, 2010.

    Google Scholar 

  136. Zaidan, A. A. et al., High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Academy of Science Engineering and Technology (WASET) 54:468–479, 2009.

    Google Scholar 

  137. Zaidan, B. B., et al., An empirical study for impact of the increment the size of hidden data on the image texture. ICFCC09, 2009.

  138. Eltahir, M. E. et al., High rate video streaming steganography. In: Information Management and Engineering, 2009. ICIME'09. International Conference on (pp. 550–553). IEEE, 2009.

  139. Zaidan, A. A., et al., Approved undetectable-antivirus steganography for multimedia information in PE-file. In: International Conference on IACSIT Spring Conference (IACSIT-SC09), Advanced Management Science (AMS), Listed in IEEE Xplore and be indexed by both EI (Compendex) and ISI Thomson (ISTP), Session (Vol. 9, pp. 425–429), 2009.

  140. Naji, A. W., et al., "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File. In: Computer Science and Information Technology-Spring Conference, 2009. IACSITSC'09. International Association of (pp. 410–413). IEEE, 2009.

  141. Taqa, A. et al., New framework for high secure data hidden in the MPEG using AES encryption algorithm. International Journal of Computer and Electrical Engineering (IJCEE) 1(5):566–571, 2009.

    Google Scholar 

  142. Zaidan, B. B. et al., Stego-image vs stego-analysis system. International Journal of Computer and Electrical Engineering 1(5):572, 2009.

    Google Scholar 

  143. Zaidan, A. A. et al., New technique of hidden data in pe-file with in unused area one. International Journal of Computer and Electrical Engineering (IJCEE) 1(5):669–678, 2009.

    Google Scholar 

  144. Jalab, H., et al., Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. arXiv preprint arXiv:0912.3986, 2009.

  145. Ahmed, M. A. et al., A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Appl. Sci. 10(1):59–64, 2010.

    Google Scholar 

  146. Al-Frajat, A. K. et al., Hiding data in video file: An overview. Journal of Applied Sciences (Faisalabad) 10(15):1644–1649, 2010.

    Google Scholar 

  147. Zaidan, A. A. et al., Novel approach for high (secure and rate) data hidden within triplex space for executable file. Sci. Res. Essays 5(15):1965–1977, 2010.

    Google Scholar 

  148. Alam, G. M. et al., Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays 5(21):3254–3260, 2010.

    Google Scholar 

  149. Hameed, S. A. et al., An accurate method to obtain bio-metric measurements for three dimensional skull. J. Appl. Sci. 10(2):145–150, 2010.

    Google Scholar 

  150. Naji, A. W. et al., Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proceeding of World Academy of Science Engineering and Technology (WASET) 56(5):498–502, 2010.

    Google Scholar 

  151. Naji, A. W., et al., Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques. arXiv preprint arXiv:0908.0216, 2009.

  152. Zaidan, B. B. et al., On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences(Faisalabad) 10(15):1650–1655, 2010.

    Google Scholar 

  153. Hmood, A. K. et al., An overview on hiding information technique in images. Journal of Applied Sciences(Faisalabad) 10(18):2094–2100, 2010.

    Google Scholar 

  154. Hamdan, A. et al., New frame work of hidden data with in non multimedia file. Int. J. Comput. Netw. Secur. 2(1):46–54, 2010.

    Google Scholar 

  155. Jalab, H. A. et al., New design for information hiding with in steganography using distortion techniques. International Journal of Engineering and Technology 2(1):72, 2010.

    Google Scholar 

  156. Abomhara, M. A. S., Enhancing selective encryption for H. 264/AVC using advanced encryption standard (Doctoral dissertation, University of Malaya), 2011.

  157. Zaidan, A. A., et al., Securing cover-file without limitation of hidden data size using computation between cryptography and steganography. In: Proceedings of the World Congress on Engineering (Vol. 1, pp. 1–7), 2009.

  158. Zaidan, B. et al., Quality of Image vs. Quantity of Data Hidden in the Image. IPCV 6:343–350, 2009.

    Google Scholar 

  159. Othman, F., et al., An extensive empirical study for the impact of increasing data hidden on the images texture. In: Future Computer and Communication, 2009. ICFCC 2009. International Conference on (pp. 477–481). IEEE, 2009.

  160. Islam, R., et al., New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques. arXiv preprint arXiv:1002.2416, 2010.

  161. Elnajjar, M., et al., Optimization digital image watermarking technique for patent protection. arXiv preprint arXiv:1002.4049, 2010.

  162. Alanazi, H., et al., Intrusion detection system: overview. arXiv preprint arXiv:1002.4047, 2010.

  163. Zaidan, B. B. et al., Towards corrosion detection system. International Journal of Computer Science Issues (IJCSI) 7(3):46, 2010.

    Google Scholar 

  164. Zaidan, A. A. et al., A New System for Hiding Data within (Unused Area Two+ Image Page) of Portable Executable File Using Statistical Technique and Advance Encryption Standared. International Journal of Computer Theory and Engineering 2(2):218, 2010.

    Google Scholar 

  165. Alanazi, H., et al., New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files. arXiv preprint arXiv:1003.4084, 2010.

  166. Alanazi, H., et al., New comparative study between DES, 3DES and AES within nine factors. arXiv preprint arXiv:1003.4085, 2010.

  167. Al-Ani, Z. K., et al., Overview: Main fundamentals for steganography. arXiv preprint arXiv:1003.4086, 2010.

  168. Hmood, A. K. et al., On the capacity and security of steganography approaches: An overview. Journal of Applied Sciences (Faisalabad) 10(16):1825–1833, 2010.

    Google Scholar 

  169. Abomhara, M. et al., Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. Journal of Applied Sciences (Faisalabad) 10(15):1656–1661, 2010.

    Google Scholar 

  170. Hmood, A. K. et al., On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. International Journal of Physical Sciences 5(7):1054–1062, 2010.

    Google Scholar 

  171. Yahya, A. N., et al., A new system for hidden data within header space for EXE-File using object oriented technique. In: Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Vol. 7, pp. 9–13). IEEE, 2010.

  172. Zaidan, A. A. et al., Investigate the capability of applying hidden data in text file: An overview. Journal of Applied Sciences (Faisalabad) 10(17):1916–1922, 2010.

    Google Scholar 

  173. Zaidan, B. B. et al., StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. International Journal of Physical Sciences 5(11):1796–1806, 2010.

    Google Scholar 

  174. Zaidan, A. A. et al., Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. International Journal of Physical Sciences 5(11):1776–1786, 2010.

    Google Scholar 

  175. Raad, M. et al., Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing. Afr. J. Bus. Manag. 4(11):2362–2367, 2010.

    Google Scholar 

  176. Salem, Y. et al., A review on multimedia communications cryptography. Res. J. Inf. Technol. 3:146–152, 2011.

    Google Scholar 

  177. Mat Kiah, M. L. et al., A review of audio based steganography and digital watermarking. International Journal of Physical Sciences 6(16):3837–3850, 2011.

    Google Scholar 

  178. Watari, M. A. et al., Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A review. Asian Journal of Scientific Ressearch 8:80–94, 2013.

    Google Scholar 

  179. Hussain, M. et al., The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive and Mobile Computing 25:1–25, 2016.

    Google Scholar 

  180. Zaidan, A. A. et al., Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processing and naive Bayesian classifier. Afr. J. Bus. Manag. 5(2):596–607, 2011.

    Google Scholar 

  181. Zaidan, A. A. et al., Commercialization Strategy and Implementation Plans for the Proposed Vitual Anti-Spam System based on Feasibility Study. Asian Journal of Scientific Research 8(3):403–412, 2015.

    Google Scholar 

  182. Medani, A. et al., Review of mobile short message service security issues and techniques towards the solution. Sci. Res. Essays 6(6):1147–1165, 2011.

    Google Scholar 

  183. Al-Bakri, S. H. et al., Securing peer-to-peer mobile communications using public key cryptography: New security strategy. International Journal of Physical Sciences 6(4):930–938, 2011.

    Google Scholar 

  184. Naji, A. W. et al., Security improvement of credit card online purchasing system. Sci. Res. Essays 6(16):3357–3370, 2011.

    Google Scholar 

  185. Abomhara, M. et al., An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): Selective cryptography. International Journal of the Physical Sciences 6(16):4053–4063, 2011.

    Google Scholar 

  186. Nabi, M. S., et al., Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. In: Future Generation Communication Technology (FGCT), 2013 Second International Conference on (pp. 93–97). IEEE, 2013.

  187. Zaidan, B. B. et al., A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data’. Softw. - Pract. Exp. 47(10):1365–1392, 2017.

    Google Scholar 

  188. Zaidan, B. B., and Zaidan, A. A., Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques. J. Circuits, Syst. Comput. 26(07):1750116, 2017.

    Google Scholar 

  189. Zaidan, B. B. et al., A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques. Int. J. Inf. Technol. Decis. Mak.:1–42, 2017.

  190. Zaidan, B. B., and Zaidan, A. A., Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques. Meas. J. Int. Meas. Confed. 117:277–294, 2018.

    Google Scholar 

  191. Ali, A. H. et al., High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl. 77(23):31487–31516, 2018.

    Google Scholar 

  192. Abdul-Talib, Y. Y., et al., Optimizing security and flexibility by designing a high security system for e-government servers. ICOCI09, Univ. Utara Malaysia, pp. 355–358, 2009.

  193. Zaidan, B. B. et al., A security framework for nationwide health information exchange based on telehealth strategy. J. Med. Syst. 39(5):51, 2015.

    CAS  PubMed  Google Scholar 

  194. Kiah, M. L. M. et al., MIRASS: medical informatics research activity support system using information mashup network. J. Med. Syst. 38(4):37, 2014.

    CAS  PubMed  Google Scholar 

  195. Zaidan, A. A. et al., Challenges, Alternatives, and Paths to Sustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools. J. Med. Syst. 39(2):7, 2015.

    CAS  PubMed  Google Scholar 

  196. Abdulnabi, M. et al., A distributed framework for health information exchange using smartphone technologies. J. Biomed. Inform. 69:230–250, 2017.

    PubMed  Google Scholar 

  197. Nidhal, S. et al., Computerized algorithm for fetal heart rate baseline and baseline variability estimation based on distance between signal average and alpha value. Int. J. Pharmacol. 7(2):228–237, 2011.

    Google Scholar 

  198. Hussain, M. et al., The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations. Comput. Methods Prog. Biomed. 122(3):393–408, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Zaidan.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Ethical approval

All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Declaration of Helsinki and its later amendments or comparable ethical standards.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Talal, M., Zaidan, A.A., Zaidan, B.B. et al. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review. J Med Syst 43, 42 (2019). https://doi.org/10.1007/s10916-019-1158-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-019-1158-z

Keywords

Navigation