Wearable IoT Data Architecture

被引:4
作者
Lomotey, Richard K. [1 ]
Pry, Joseph [1 ]
Sriramoju, Sumanth [1 ]
Kaku, Emmanuel [2 ]
Deters, Ralph [2 ]
机构
[1] Penn State Univ Beaver, Informat Sci & Technol, Monaca, PA 15061 USA
[2] Univ Saskatchewan, Dept Comp Sci, Saskatoon, SK, Canada
来源
2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES) | 2017年
关键词
IoT; Middleware; Wearables; Data Traceability; Healthcare; INTERNET; PRIVACY;
D O I
10.1109/SERVICES.2017.17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet-of-Things (IoT) devices can be employed to stream personal medical data (e.g., vitals) into healthcare information systems for the purposes of health monitoring and efficient diagnosis. A challenge however is when "dumb" terminals are employed for the data streaming process, it is difficult to determine the originating source. This makes it even harder to match personal data from incoming devices. This paper proposes a traceability route formation using a network graph based on techniques such as tuple of inputs and the Buchi automaton. This enabled the work to provide proper trace routes for the personal data from the originating source to the destination; which can be a health information system (HIS). The results from several empirical evaluations conducted in a real-world wearable IoT ecosystem prove the feasibility of the proposed work.
引用
收藏
页码:44 / 50
页数:7
相关论文
共 23 条
  • [1] Abu Ali N, 2015, IEEE CONF WIREL MOB, P9, DOI 10.1109/WiMOB.2015.7347934
  • [2] Ahlsen M., 2012, SERVICE ORIENTED MID
  • [3] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [4] Alharbe N., 2013, Proceedings of International Conference on Advances in Mobile Computing Multimedia - MoMM'13, P191, DOI [DOI 10.1145/2536853.2536904, 10.1145/2536853.2536904]
  • [5] [Anonymous], 2013, P INT WORKSH AD SEC
  • [6] [Anonymous], 2016, P 19 INT C EXT DAT T
  • [7] [Anonymous], M2M IOT SECURITY PRI
  • [8] [Anonymous], SECRET SHARING IOT H
  • [9] El Khaddar MA, 2014, 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), P461, DOI 10.1109/SAI.2014.6918228
  • [10] Preventing history forgery with secure provenance
    Hasan, Ragib
    Sion, Radu
    Winslett, Marianne
    [J]. ACM Transactions on Storage, 2009, 5 (04)