Sie sind auf Seite 1von 29

TECHNICAL SEMINAR REPORT

ON

APPLICATION OF INTERNET OF THINGS IN


THE FIELD OF MEDICINE AND HEALTHCARE
Submitted By

C.Kalyani (11B81A0527)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CVR COLLEGE OF ENGINEERING


Autonomous Institute
Vastunagar , Mangalpally (v), Ibrahimpatanam (M), R.R.Dist-501 510, AP.
Ph.08414-252222, 252369/79

CERTIFICATE

This is to certify that the technical seminar report being submitted by


C.Kalyani (11B81A0527)

In partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science
and Engineering to Jawaharlal Nehru Technological University (JNTUH), Hyderabad is a bonafide work carried
out by her under my guidance and supervision. The results provided in this report have not been submitted to
any other university or institution for the award of any degree.

Prof. L. C. Siva Reddy


HOD CSE & vice Principal
CVR College of Engineering

ACKNOWLEDGEMENTS
We sincerely thank Dr. Nayanathara K Sattiraju, principal, CVR College of Engineering,
for her cooperation and encouragement.
We earnestly thank Prof. L. C. Siva Reddy, HOD, Department of CSE, CVR College of
Engineering, for giving timely cooperation and taking necessary action.
We express our sincere thanks and gratitude, Mr. N. Nagarjuna, Department of CSE, CVR
College of Engineering, for his valuable help and encouragement.

ABSTRACT:
In this paper, through the introduction of the Internet of Things technology, we propose a
new concept of the medical Internet of Things. Combing with the bottleneck and challenge
which the medical and health care information encountered, we analyse that the Internet of
Things has obvious advantages in the perceiving, transmission and application of
information, and it will have a broad prospect of application in the field of medical and health
care. With the strong support and guarantee for the Internet of Things technology, a kind of
intelligent, accessible and communicative system will be the inevitable trend of future
development. This article focuses on the specific application of the Internet of Things in the
field of medical and health care, including medical equipment and medication control,
medical information management, telemedicine and mobile medical care, personal health
management, etc.

INDEX
Pg.no.

1. INTRODUCTION

2. LITERATURE SURVEY

3. IOT IN HEALTHCARE

3.1REMOTE PATIENT MONITORING

3.2WEARABLE HEALTH MONITORS

10

3.3TELEHEALTH

11

4. ARCHITECTURE
4.1

12

edge layer

13

4.2 access gateway layer

13

4.3 middleware layer

13

4.4 application layer

13

5. TECHNOLOGIES USED IN IOT

14

6. SPECIFIC APPLICATIONS

23

7. CONCLUSION

27

8. LIST OF FIGURES

28

9. REFERENCES

29

1.INTRODUCTION

Internet of things:
The Internet of Things (IoT) is the network of physical objects or "things" embedded with
electronics, software, sensors and connectivity to enable it to achieve greater value and service
by exchanging data with other connected devices. Each thing is uniquely identifiable through its
embedded computing system but is able to interoperate within the existing Internet infrastructure.
It provides advance connectivity of devices than machine to machine connectivity,there by
ushering the automation in nearly all fields.
Things, in the IoT, can refer to a wide variety of devices such as heart monitoring
implants, biochip transponders on farm animals, electric clams in coastal waters,[3] automobiles
with built-in sensors, or field operation devices that assist fire-fighters in search and
rescue.[4] These devices collect useful data with the help of various existing technologies and
then autonomously flow the data between other devices. [5] Current market examples
include smart thermostat systems and washer/dryers that utilize wifi for remote monitoring.
The primary purpose of the paper is the use or applications of internet of things in various fields
and specially in the field of health care and medical science. These devices have varied
applications in the field of medical science and are discussed further.

2. LITERATURE SURVEY:
The history of internet of things dates back to early 1980s , The concept of a network of smart

devices was discussed as early as 1982, with a modified Coke machine at Carnegie Mellon
University becoming the first internet connected appliance,[8] able to report its inventory and
whether newly loaded drinks were cold. However, only in 1999 did the field start gathering
momentum. Bill Joy envisioned Device to Device (D2D) communication as part of his "Six Webs"
framework, presented at the World Economic Forum at Davos in 1999. It came into light in 1999,
through the Auto-ID Center at MIT and related market-analysis publications.
The primary technologies that is used in smart devices is RFID called as Radio Frequency
identification .Besides using RFID tagging the devices is also a technology ,others include near
field communication, barcodes, QR codes and digital watermarking .These devices have varied
applications and are used in different scenarios ,hence they also vary in their architecture
,protocols, and connectivity.
Integration with the Internet implies that devices will utilize an IP address as a unique identifier.
However, due to the limited address space of IPv4 (which allows for 4.3 billion unique
addresses), objects in the IoT will have to use IPv6 to accommodate the extremely large address
space required. Objects in the IoT will not only be devices with sensory capabilities, but also
provide actuation capabilities (e.g., bulbs or locks controlled over the Internet).[30] To a large
extent, the future of the Internet of Things will not be possible without the support of IPv6; and
consequently the global adoption of IPv6 in the coming years will be critical for the successful
development of the IoT in the future.
The discussion continues on usage of internet of things in various fields and especially in the
field of medical science ,its effect in the heathcare ,current trends and future scope and
enhancements.

3. IOT IN MEDICAL AND HEALTHCARE:


Medical and healthcare industry IoT will have many applications in the healthcare sector,
with the possibility of using the cell phone with RFID-sensor capabilities as a platform for
monitoring of medical parameters and drug delivery. The advantage gained is in prevention
and easy monitoring of diseases, ad hoc diagnosis and providing prompt medical attention in
cases of accidents. Implantable and addressable wireless devices can be used to store
health records that can save a patients life in emergency situations, especially for people
with diabetes, cancer, coronary Internet of Things 17 heart disease, stroke, chronic
obstructive pulmonary disease, cognitive impairments, seizure disorders and Alzheimers
disease. Edible, biodegradable chips can be introduced into human body for guided actions.
Paraplegic persons can have muscular stimuli delivered via an implanted smart thingcontrolled electrical simulation system in order to restore movement functions.
Pharmaceutical industry for pharmaceutical products, security and safety is of utmost
importance. In IoT paradigm, attaching smart labels to drugs, tracking them through the
supply chain and monitoring their status with sensors has many potential benefits. For
example, items requiring specific storage conditions, e.g. maintenance of a cool chain, can
be continuously monitored and discarded if conditions were violated during transport. Drug
tracking and e-pedigrees allow for the detection of counterfeit products and keep the supply
chain free of fraudsters. Counterfeiting is a common practice in this area as illustrated in
[25], and it particularly affects the developing countries. The smart labels on the drugs can
also directly benefit patients, e.g. by enabling storing of the package insert, informing
consumers of dosages and expiration dates, and assuring the authenticity of the medication.
In conjunction with a smart medicine cabinet that reads information transmitted by the drug
labels, patients can be reminded to take their medicine at appropriate intervals and patient
compliance can be monitored.
The use of internet of things in healthcare sector is improvising the lifestyle of people and
the way they look at the procedures in healthcare industry is going to change as IoT is in the
process to revolutionize the usage of smart devices making the people have an easier
access to their healthcare needs.
Internet of things usage in medical and healthcare can be majorly classified into three types
They are:

Remote Patient Monitoring (RPM)


Wearable devices and health monitors
Telemedicine

3.1 REMOTE PATIENT MONITORING:


Remote patient monitoring (RPM) is a technology to enable monitoring of patients outside of
conventional clinical settings (e.g. in the home), which may increase access to care and
decrease healthcare delivery costs.
Incorporating RPM in chronic disease management can significantly improve an individuals
quality of life. It allows patients to maintain independence, prevent complications, and
minimize personal costs. RPM facilitates these goals by delivering care right to the home. In
addition, patients and their family members feel comfort knowing that they are being
monitored and will be supported if a problem arises. This is particularly important when
patients are managing complex self-care processes such as home hemodialysis.[2]Key
features of RPM, like remote monitoring and trend analysis of physiological parameters,
enable early detection of deterioration; thereby, reducing number of emergency department
visits, hospitalizations, and duration of hospital stays.[3] The need for wireless mobility in
healthcare facilitates the adoption of RPM both in community and institutional settings. The
time saved as a result of RPM implementation increases efficiency, and allows healthcare
providers to allocate more time to remotely educate and communicate with patients.

3.2 WEARABLE HEALTH MONITORS AND DEVICES

These devices now play a crucial role in monitoring patients health conditions. These
devices now monitor various parameters and health conditions and transmit the data
through internet to various applications that analyse the data for various purposes.
Physiological data such as blood pressure and subjective patient data are collected by sensors
on peripheral devices. Examples of peripheral devices are: blood pressure cuff,pulse oximeter,
and glucometer. The data are transmitted to healthcare providers or third parties via wireless
telecommunication devices. The data are evaluated for potential problems by a healthcare
professional or via a clinical decision support algorithm, and patient, caregivers, and health
providers are immediately alerted if a problem is detected.[3]As a result, timely intervention
ensures positive patient outcomes. The newer applications also provide education, test and
medication reminder alerts, and a means of communication between the patient and the
provider.[3] The following section illustrates examples of RPM applications, but RPM is not limited
to those disease states.

Dementia and falls


For patients with dementia that are at risk for falls, RPM technology promotes safety and
prevents harm through continuous surveillance.[3] RPM sensors can be affixed to the individual or
their assistive mobility devices such as canes and walkers.[3] The sensors monitor an individuals
location, gait, linear acceleration and angular velocity, and utilize a mathematical algorithm to
predict the likelihood for falls, detect movement changes, and alert caregivers if the individual
has fallen.[3] Furthermore, tracking capabilities via Wi-Fi, global positioning system (GPS) or radio
frequency enables caregivers to locate wandering elders.

Diabetes
Diabetes management requires control of multiple parameters: blood pressure, weight, and
blood glucose. The real-time delivery of blood glucose and blood pressure readings enables
immediate alerts for patient and healthcare providers to intervene when needed. There is
evidence to show that daily diabetes management involving RPM is just as effective as usual
clinic visit every 3 months

Congestive heart failure


A systematic review of the literature on home monitoring for heart failure patients indicates that
RPM improves quality of life, improves patient-provider relationships, shortens duration of stay in
hospitals, decreases mortality rate, and reduces costs to the healthcare system.

10

3.3 TELEHEALTH
Telehealth is the delivery of health-related services and information via telecommunications
technologies. Telehealth could be as simple as two health professionals discussing a case over
the telephone or as sophisticated as doing robotic surgery between facilities at different ends of
the globe.
Telehealth is an expansion of telemedicine, and unlike telemedicine (which more narrowly
focuses on the curative aspect) it encompasses preventative, promotive and curativeaspects.
Originally used to describe administrative or educational functions related to telemedicine, today
telehealth stresses myriad technology solutions

Transmission of medical images for diagnosis (often referred to as store and forward
telehealth )

Teleconference between patient and healthcare provider for assessments and history taking

Groups or individuals exchanging health services or education live via videoconference (realtime telehealth)

Transmission of medical data for diagnosis or disease management (sometimes referred to


as remote monitoring)

Advice on prevention of diseases and promotion of good health by patient monitoring and
followup.

Health advice by telephone in emergent cases (referred to as teletriage).

Early adopter: Veterans Health Administration


The Veterans Health Administration (VHA), United States largest integrated healthcare system,
is highly involved in the implementation and evaluation of RPM technologies. It has expanded
use of RPM beyond common chronic disease applications, to post-traumatic stress disorder,
cancer and palliative care.[4] VHAs findings indicate improvements in a wide range of metrics,
including decrease in emergency department visits, hospitalizations, and nursing home
admissions.[4] Findings from the VHA Care Coordination/Home Telehealth program show that
RPM deployment resulted in significant savings to the organization.

Whole System Demonstrator Trial in UK


The UKs Department of Healths Whole System Demonstrator (WSD) launched in May 2008. It
is the largest randomised control trial of telehealth and telecare in the world, involving 6191
patients and 238 GP practices across three sites, Newham, Kent and Cornwall. The trials were
evaluated by: City University London, University of Oxford,University of Manchester, Nuffield
Trust, Imperial College London and London School of Economics.

11

4. ARCHITECTURE:

Implementation of IoT is based on an architecture consisting of several layers:


from the field data acquisition layer at the bottom to the application layer at the top. The
layered architecture is to be designed in a way that can meet the requirements of various
industries, enterprises, societies,
ties, institutes, governments
gover
etc.
.

Fig:

The architecture of IoT

The figure presents a generic layered architecture for


fo IoT.. The layered architecture has two
distinct divisions with an Internet layer in between to serve the purpose of a common media
for communication. The two lower layers contribute to data capturing while the two layers at
the top is responsible for Internet
rnet of Things .Layered
.Layered architecture of Internet of Things data
utilization in applications.

12

The layers are explained as following:

4.1 Edge layer:


This hardware layer consists of sensor networks, embedded systems, RFID tags and
readers or other soft sensors in different forms. These entities are the primary data sensors
deployed in the field. Many of these hardware elements provide identification and
information storage (e.g. RFID tags), information collection (e.g. sensor networks),
information processing (e.g. embedded edge processors), communication, control and
actuation.

4.2 Access gateway layer:


The first stage of data handling happens at this layer. It takes care of message routing,
publishing and subscribing and also performs cross platform communication, if required.

4.3 Middleware layer:


This is one of the most critical layers that operates in bidirectional mode. It acts as an
interface between the hardware layer at the bottom and the application layer at the top. It is
responsible for critical functions such as device management and information management
and also takes care of issues like data filtering, data aggregation, semantic analysis, access
control, information discovery such as EPC (Electronic Product Code) information service
and ONS (Object Naming Service).

4.4 Application layer:


This layer at the top of the stack is responsible for delivery of various applications to different
users in IoT. The applications can be from different industry verticals such as:
manufacturing, logistics, retail, environment, public safety, healthcare, food and drug etc.
With the increasing maturity of RFID technology, numerous applications are evolving which
will be under the umbrella of IoT.

13

5.TECHNOLOGIES INVOLVED IN IoT FOR MEDICALCARE:


The technologies that are used in internet of things are shown in the below figure. It has
many technologies though ,but the key technologies are classified according to the role they
play in internet of things.

14

Key Technologies Involved in Internet of Things :


IoT can only be realized by useful deployment of multiple technologies that covers in the

domain of Hardware, Software and extremely robust applications around each domain of
industries and operating sectors. In this context, this Section will present the technology
areas enabling the IoT and will identify the research and development challenges and
outline a roadmap for future research activities to provide practical and reliable solutions.
Some of the key technology areas that will enable IoT are:
1. Identification technology
2. IoT architecture technology
3. Communication technology
4. Network technology
5. Network discovery technology
6. Software and algorithms
7. Hardware technology
8. Data and signal processing technology
9. Discovery and search engine technology
10. Relationship network management technology
11. power and energy storage technology
12. security and privacy technologies
13. standardization
These key technology enablers are discussed briefly in the following subsections.

5.1 Identification technology


The function of identification is to map a unique identifier or UID (globally unique or unique
within a particular scope), to an entity so as to make it without ambiguity identifiable and
retrievable. UIDs may be built as a single quantity or out of a collection of attributes such
that the combination of their values is unique. In the vision of IoT, things have a digital
identity (described by unique identifiers), are identified with a digital name and the
relationships among things can be specified in the digital domain. IoT deployment will require the development of new technologies that need to address the global ID schemes,
identity management, identity encoding/encryption, authentication and repository
management using identification and addressing schemes and the creation of global
directory lookup services and discovery for IoT applications with various unique identifier
schemes.

15

5.2 IoT architecture technology:


The middleware (a software layer interposed between the technological and application
levels) architectures proposed in the last couple of years for IoT often follow the service
oriented architecture (SOA) approach. The adoption of the SOA principles allows for
decomposing complex and monolithic systems into applications consisting of ecosystem of
simpler and well-defined compo-nents. The use of common interfaces and standard
protocols gives a horizontal view of an enterprise system. Therefore, the development of
business process of designing workflows of coordinated services, which eventually are
associated with objects actions. An SOA approach also allows for software and hardware
reuse , because it does not impose a specific technology for service implementation . Figure
presents a generic SOA-based architecture for the IoT middle-ware. In the service oriented
architecture (SoA), it becomes imperative for the providers and requestors to communicate
meaningfully with each other despite the heterogeneous nature of the underlying information
structures, business artifacts, and other documents. This requirement is termed as semantic
in-teroperability. Often technology is perceived to be the biggest impediment to eective
collaboration and integration between requestors and providers; how-ever, it is usually the
problem of semantic interoperability which is the root cause. Semantic interoperability can
be achieved between heterogeneous in-formation systems (service providers and service
requestors) in a multitude of ways. On one extreme, development of comprehensive shared
information models can facilitate semantic interoperability among the participant applications and businesses. However, the problem with this approach is its rigidity, which
translates to inflexibility. On the other extreme, semantic interoperabil-ity can be achieved by
providing appropriate semantic mediators (translators) at each participants end to facilitate
the conversion to the information format which the participant understands. Most often
systems use a combination of context independent shared information models coupled with
context specific information specialization approaches to achieve semantic interoperability.
Scalability, modularity, extensibility and interoperability among heterogeneous things and
their environments are the key design requirements for IoT. Industry practitioners have
suggested leveraging work in the semantic web to devise comprehensive and open
ontologies to address the issue of semantic interoperability for dynamic binding based SOA .

5.3 Communication technology


The applications of IoT form an extensive design space with many dimensions that include
several issues and parameters some of which are mentioned below.
Deployment onetime, incremental or random.
Mobility occasional or continuous performed by either selected or all things in the selected
environment.
Cost, size, resources, and energy very much resource-constrained or un-limited
resources.
Heterogeneity a single type of thing or diverse sets of dierent properties and hierarchies.
Communication modality singel-hop or multi-hop communication.
16

Infrastructure dierent applications exclude, allow or require the use of fixed


infrastructure.
Network topology single hop, star, multi-hop, mesh or multi-tier.
Coverage- sparse, dense or redundant.
Connectivity continuous, occasional or sporadic.
Network size ranging from tens of nodes to thousands.
Lifetime few hours, several months to many years.
QoS requirements - real-time constraints, tamper resistance, unobtrusive-ness etc.
Such an extensive design space obviously makes IoT application development a
complicated process. One approach may be is to make the design for the most restrictive
point in the design space, e.g. minimum thing capabilities, high mobility etc. However, often
there is no such global minimum and it may be desirable to exploit the characteristics of the
various points in the design space. This implies that no single hardware and software
platform will be sucient to support the whole design space. Complex and heterogeneous
systems will be a natural requirement.

5.4 Networking technology


The IoT deployment requires developments of suitable network technology for implementing
the vision of IoT to reach out to objects in the physical world and to bring them into the
Internet. Technologies like RFID, short-range wireless communication and sensor networks
are means to achieve the network con-nectivity, while Internet protocol version 6 (IPv6), with
its expanded address space, enables addressing, connecting and tracking things.
In IoT paradigm, security, scalability, and cross platform compatibility be-tween diverse
networked systems will be essential requirements. In this context, the network technologies
has to oer solutions that can oer the viability of connecting almost anything to the network
at a reduced cost. The ubiquity of network access will also change the way information is
processed. Today, IP provides end to end communication between devices without any
require-ment of an intermediate protocol translation gateway. Protocol gateways are
inherently complex to design, manage, and deploy and with the end to end architecture of
IP, there are no protocol translation gateways involved.
New scalable architectures designed specifically for the ubiquitous sensor networks
communications will allow for networks of billions of devices. Im-provements in techniques
for secure and reliable wireless communication pro-tocols will enable mission-critical
applications for ubiquitous sensor networks based on wireless identifiable devices.

17

5.5 Network discovery mechanisms


In the IoT paradigm, the networks will dynamically change and continuously evolve. Also,
the things will have varying degrees of autonomy. New things will possibly be added and the
network topologies will be changing fast. In this sce-nario, automated discovery mechanisms
and mapping capabilities are essential for ecient network and communication
management.Without an automated discovery mechanism, it impossible to achieve a
scalable and accurate network management capability. Moreover, an automated network
discovery mecha-nism can dynamically assign roles to devices based on intelligent matching
against pre-set templates and attributes, automatically deploy and start ac-tive, passive or
performance monitors based on assigned roles and attributes, start, stop, manage and
schedule the discovery process and make changes to any role or monitoring profile at any
time or create new profiles as required.
Dynamic network discovery mechanisms enable interaction between devices that is not
pre-configured and hard coded as far as the addresses or service end-points are concerned.
Instead, they allow for dynamic, run-time configuration of connections, thereby enabling
mobile devices to form collaborative groups and adapt to changing contexts. Examples for
protocols for discovery on LAN level are WS-Discovery as a part of WSDD [16], Bonjour
[17] and SSDP as a part of UPnP [18].
Both passive and dynamic discovery mechanisms exist today and technolo-gies are
being developed to implement mechanisms real-time and dynamic dis-covery of network
data. All discovery services must be based on authentication mechanisms to address
privacy or security issues.

5.6 Softwares and algorithms


One of the most promising micro operating systems for constrained devices is Contiki [19].
It provides a full IP stack (both IPv4 and IPv6), supports a local flash file system, and
features a large development community and a comprehensive set of development tools.
One of challenges in building IoT ap-plications is how to design a common underlying
software fabric for dierent environments and how to build a coherent application out of a
large collection of diverse software modules. A substantial amount of research and development eort is currently focussed on service oriented computing for developing
distributed and federated applications to support interoperable machine-to-machine and
thing-to-thing interaction over a network. This is based on the Internet protocols, and on top
of that, defines new protocols to describe and address the service instances. Service
oriented computing loosely organizes the web services and makes it a virtual network.

18

5.7 Hardware
In the hardware front, research on nano-electronics devices is focussed on miniaturization,
low cost and increased functionality in design of wireless iden-tifiable systems.
Silicon IC technology will be used for designing systems with increased functionalities
and possessing enhanced non volatile memory for sensing and monitoring ambient
parameters. Further research is needed in various areas such as: ultra-low power, low
voltage and low leakage designs in submicron RF CMOS technologies, high-eciency DCDC power-management solutions, ul-tra low power, low voltage controllable nonvolatile
memory, integration of RF MEMS and MEMS devices etc. The focus of research will be
particularly on highly miniaturized integrated circuits that will include: (i) multi RF, adaptive
and reconfigurable front ends, (ii) HF/UHF/SHF/EHF, (iii) memory- EEPROM/FRAM/Polymer, (iv) multi communication protocols, (v) digital pro-cessing, and (vi)
security, including tamper-resistance countermeasures, and technology to thwart sidechannel attacks.
IoT will create new services and new business opportunities for system providers to
service the communication demands of potentially tens of billions of devices in future.
Following major trends are being observed in use of RFID tags.
Use of ultra low cost tags having very limited features is observed. While the information
is centralized on data servers managed by service operators, the value of information
resides in the data management operations. Use of low cost tags with enhanced features
such as extra memory and sensing capabili-ties is also observed. The information is
distributed both on centralized data servers and tags. The value resides in communication
and data management, including processing of data into actionable information. Use of
smart fixed or mobile tags and embedded systems is also witnessed. More functionalities
are brought into the tags bringing in local services. For such tags, information is centralized
in the tags, while the value resides in the communication man-agement to ensure security
and eective synchronization with the network.
Smart devices with enhanced inter-device communication will lead to smart systems,
which have high degrees of intelligence and autonomy enabling rapid deployment of IoT
applications and creation of new services.

5.8 Data and signal processing technology


Industrial bodies from dierent domains have realized the utility of XML as the underlying
language for standardization of business artifacts. Each industry vertical has come up with
standardization bodies to develop XML standards for its own purpose. The primary
objective of such eort is to develop a stan-dardized way to express the contract, trust,
process, workflow, message, and other data semantics in terms of XML nodes and
attributes for the nodes. These XML vocabularies are then published as generalized
document type def-inition (DTD) or XML schema for consumption by members of that
specific industry vertical. Since all members follow the same standardized DTD or schema,
the semantic interoperability is achieved.
19

Initiatives such as International Standard for Metadata Registries (ISO/IEC 11179) and its
implementation, e.g., the Universal Data Element Framework (UDEF) from OpenGroup aim
to support semantic interoperability between structured data that is expressed using dierent
schema and data dictionar-ies of vocabularies, by providing globally unique cross-reference
identifiers for data elements that are semantically equivalent, even though they may have
dierent names in dierent XML markup standards.
Finally, semantic web based standards from W3C like DAML (Darpa Agent Markup
Language), RDF (Resource Description Framework) and OWL (On-tology Working
Language) are useful in providing semantic foundations for dynamic situations involving
dynamic discovery of businesses and services.
The intelligent decision-making algorithms will need to trigger activities not on the basis
of a single event (such as an individual observation or sensor reading). Often these
algorithms will have to consider correlation among events which may possibly require
transformation of raw sensor data. Appropriate toolkits and frameworks already exist for
complex event processing, such as ESPER and DROOLS - and are likely to play useful
roles in formulating machine-readable rules for determining the trigger sequences of events
for a particular activity or process.

5.9 Discovery and search engine technologies


In IoT paradigm, information and services about things will be fragmented across many
entities and may be provided at class-level (i.e. common infor-mation and services for all
instances of things having the same class) or at serial-level (i.e. unique to an individual
thing), as well as being provided au-thoritatively by the creator of the thing or contributed by
other entities such as those who have interacted with an individual thing in the past.
IoT will also require the development of lookup or referral services to link things to
information and services and to support secure access to information and services in a way
that satisfies both the privacy of individuals and the confidentiality of business information.
Such a matching between requesters and providers of information services can be based
ontrust
relat
smart thing moves through the real world, it will encounter new environments, and both the
smart thing and other agents that are monitoring the thing will require lookup mechanisms in
order to discover what capabilities are available within the local environment of the thing.
Such capabilities may include avail-ability of sensors and actuators, network communication
interfaces, facilities for computation and processing of data into information as well as
facilities for onward transportation, handling, physical processing or alerting of a human
operator about problems.

20

5.10 Relationship network management technologies


IoT will require managing of networks that contain billons of heterogeneous things, and
where a wide variety of software, middleware and hardware de-vices exists. Network
management technologies will have to addresses several important issues including,
security, performance and reliability.
Network management involves managing distributed databases, reposito-ries, auto
polling of network devices, and real time graphical views of network topology changes and
trac. The network management service employs a va-riety of tools, applications, and
devices to assist monitori monitoring and maintaining the networks involved in IoT
applications. Similar to the social network ser-vices that are flourishing today on the web,
there would be a need for things in the network to form relationships with each other. These
relationships can be formal, such as membership within a federation, or they could be
loosely based alliances brought upon by an incident or an event.

5.11 Power and energy storage technologies


The autonomous things operating in the IoT applications and performing ei-ther sensing or
monitoring of the events need power and energy to perform the required job. Since the
environments have wide variations depending on where and how the thing is used, the
power collection methods may vary, e.g., RF, solar, sound, vibration, heat, etc. In situations
and locations where it is reasonable to have a large number of things with sensing
capabilities, use of mesh networks is a good proposition for increasing the communication
and power eciency by including the ability to forward transmissions from the closest thing.
The reader then only needs to be in range of the edge of the network.
Power and energy storage technologies are enablers for the deployment of IoT
applications. These technologies have to provide high power-density energy generation and
harvesting solutions which, when used with todays low power nano-electronics, will enable
us to design self-powered intelligent sensor-based wireless identifiabledevice.

21

5.12 Security and privacy technologies


Two major issues in IoT are privacy of the humans and confidentiality of the business
processes. Because of the scale of deployment, their mobility and often their relatively low
complexity, the cloud of things is hard to control. For ensuring confidentiality, a large number of
standard encryption technolo-gies exists for use. However, the main challenge is to make
encryption algo-rithms faster and less energy-consuming. Moreover, an ecient key distribution scheme should be in place for using an encryption scheme.
For small-scale systems, key distribution can happen in the factory or at the time of
deployment, but for ad-hoc networks, novel key distribution schemes have only been proposed
in recent years. For privacy, the situation is more serious; one of the reasons is the ignorance
(regarding privacy) of the gen-eral public. Moreover, privacy-preserving technology is still in its
infancy: the systems that do work are not designed for resource-restricted devices, and a
holistic view on privacy is still to be developed (e.g., the view on privacy throughout ones life).
The heterogeneity and mobility of things in the IoT will add complexity to the situation. Also
from a legal point of view, some issues remain far from clear and need legal interpretation;
examples include the impact of location on privacy regulation, and the issue of data ownership
in collaborative clouds of things Network and data anonymity can provide a basis for privacy,
but at the moment, these technologies are mainly supported by rather powerful equipment, in
terms of computing power and bandwidth. A similar argument can be made for authentication of
devices and establishing trust.

5.13 Standardization
Standards should be designed to support a wide range of applications and address common
requirements from a wide range of industry sectors as well as the needs of the environment,
society and individual citizens. Through con-sensus processes involving multiple stakeholders, it
will be possible to develop standardized semantic data models and ontologies, common
interfaces and protocols, initially defined at an abstract level, then with example bindings to
specific cross-platform, cross-language technologies such as XML, ASN.1, web services etc.
The use of semantic ontologies and machine-readable codification should help to overcome
ambiguities resulting from human error or dierences and misinterpretation due to dierent
human languages in dierent regions of the world, as well as assisting with cross-referencing to
additional information available through other systems.
Standards are required for bidirectional communication and information exchange among
things, their environment, their digital counterparts in the virtual cloud and entities that have an
interest in monitoring, controlling or assisting the things. In addition, the design of standards for
IoT needs to consider ecient and judicial use of energy and network capacity.

22

5. SPECIFIC APPLICATIONS IN HEALTHCARE INDUSTRY


Physiological data such as blood pressure and subjective patient data are collected by sensors on
peripheral devices. Examples of peripheral devices are: blood pressure cuff, pulse oximeter,
and glucometer. The data are transmitted to healthcare providers or third parties via wireless
telecommunication devices. The data are evaluated for potential problems by a healthcare
professional or via a clinical decision support algorithm, and patient, caregivers, and health providers
are immediately alerted if a problem is detected.[3]As a result, timely intervention ensures positive
patient outcomes. The newer applications also provide education, test and medication reminder
alerts, and a means of communication between the patient and the provider.[3] The following section
illustrates examples of RPM applications, but RPM is not limited to those disease states.

Currently there are many devices that are provided by corporate gaints in the field of healthcare.
Some of them that are currently in market are:

The IntelliVue MX40 from Philips Electronics tries to simplify some of that by putting
Philips telemetry into a compact wearable patient monitor that can be used to monitor
ambulatory patients and patients during transport.The MX40 allows patients to walk
around care settings and has a touchscreen display that lets clinicians see ECG, oxygen
saturation (SpO2), and other vital signs in real time with just a push of a button. The
device is also watertight to withstand patient showering, accidental immersion into water,
and disinfectant cleaning.

Zephyr Technology's BioHarness BT sensor technology is used by third-party makers of


products to add biometric monitoring capabilities to wearable fitness gear. An example of
that includes Under Armour's E39 electronic compression garment, which tracks the
wearer's measures, including breathing and heart rate data, which can be transmitted to
computers or mobile devices. Other measures BioHarness BT can monitor are blood
oxygen, ECG, and blood pressure. The device also can connect to smart phones for
transmission of the data to the Zephyr portal. From here, the data can be pushed to an
individual's personal electronic health records and dispatch and service center Web
applications.

BodyMedia and Avery Dennison Medical Solutions, a business unit of Avery Dennison
Corporation, have developed a disposable body motion monitoring patch they say offers
a comfortable, economical way to gather physiological data for health and wellness
initiatives.

23

The patch combines Avery Dennison Medical Solutions' proprietary MetriaTM Wearable
Sensor Technology in a skin-friendly patch with BodyMedia's proprietary algorithms and
body monitoring expertise, which are used in BodyMedia's previously announced
armband monitoring product. The new wearable patch initially will be used as an
evaluation tool for weight management and monitoring calorie burn, steps taken, activity
levels, and sleep patterns through multiple sensors that collect more than 5,000 data
points per minute, said BodyMedia. The patch allows that data to be uploaded to a
computer or mobile device for use as a guideline to determine the need for weight loss
and other wellness efforts.

The consumer-oriented Basis B1 wrist band--expected to become available in 2012-incorporates five sensors to provide a precise view of a person's health immediately and
over extended periods of time. The device includes: an optical blood flow sensor that
detects heart rate, through pulse or blood flow; a 3D accelerometer, a highly sensitive
sensor that detects the smallest movements, regardless of whether users are alert and
active or sleeping; a body temperature sensor to measure exertion during activity; an
ambient temperature sensor to detect the outside temperature and compare it to body
temperature to boost the accuracy of caloric burn calculations; and a galvanic skin
response sensor to measure the intensity of sweat output.

24

Nike FuelBand, a fitness monitoring wristband, captures and displays four different
metrics: time, calories, steps, and "NikeFuel," a metric coined by Nike that measures the
user's physical activity. NikeFuel is a proprietary technology that measures activity
through the movement of the user's wrist and uses algorithms based on oxygen kinetics.
Unlike calorie counts, which vary based on gender and body type, NikeFuel is "a
normalized score that awards all participants equal scoring for the same activity
regardless of their physical makeup," said the company. Nike FuelBand users also can
choose to also receive a calorie count to understand how many calories are burned
versus how much NikeFuel is earned.

The tiny Fitbit Ultra tracks a user's steps, distance, and sleep, as well as counting
calories burned. Wireless uploads are automatically sent to user's personal dashboard
on Fitbit's site, where free online tools show how the user's physical activities add up. An
iPhone app also lets users log workouts, diet, and food goals.
Fitbit Ultra not only holds an accelerometer but an altimeter that tracks the number of
stairs or hills climbed each day. To keep you going, the tracker also displays
motivational messages when you start moving.

25


BodyMedia's Link Armband, a body-monitoring armband equipped with Bluetooth
wireless technology, communicates directly with a smartphone app. The device provides
real-time, up-to-the minute streams of information such as caloric burn data, physical
activity level, and steps taken. The armband collects physiological data using four
sensors that capture more than 5,000 data readings every minute. The raw data
includes measurements of heat flux, skin temperature, motion, and galvanic skin
response. BodyMedia says proprietary algorithms convert these readings to capture key
parameters that directly affect people's health and wellness: calorie burn, physical
activity duration, steps taken, and sleep duration and efficiency.

26

6. CONCLUSION:

IOT is an emerging technology that would take over the currently used conventional methods in
the market. Market analysts see it as a future hope many drawbacks of current day devices and
technologies.
Projections for the growth of the telehealth market are optimistic, and much of this optimism is
predicated upon the increasing demand for remote medical care. According to a recent survey,
nearly three-quarters of U.S. consumers say they would use telehealth. At present, several
major companies along with a bevy of startups are working to develop a leading presence in the
field.In the UK, the Government's Care Services minister, Paul Burstow, has stated that
telehealth and telecare would be extended over the next five years (20122017) to reach three
million people.
According to Gartner, Inc. (a technology research and advisory corporation), there will be nearly
26 billion devices on the Internet of Things by 2020. ABI Research estimates that more than 30
billion devices will be wirelessly connected to the Internet of Things (Internet of Everything) by
2020. As per a recent survey and study done by Pew Research Internet Project, a large majority
of the technology experts and engaged Internet users who responded83 percentagreed
with the notion that the Internet/Cloud of Things, embedded and wearable computing (and the
corresponding dynamic systems [22]) will have widespread and beneficial effects by 2025. It is,
as such, clear that the IoT will consist of a very large number of devices being connected to the
Internet.
Many of the corporate companies are looking forward to internet of things used for medical
equipment and a smarter tomorrow for a greater percentage of success rate in healthcare
industry. some of these companies are Philips, Toshiba, google etc. these companies now hold
a greater stake in these markets for introducing smart medical equipment.
We can now look forward to the future of healthcare industry where there will be a less need of
going to clinics and hospitals and many of its services are made available through the
equipment enabled by IoT ,thereby reducing the medical bills, time monitored and also a safer
process with less probability of failure.

27

8.LIST OF FIGURES:

Architecture

12

Technologies used in IOT

14

Basis B1 wrist band

23

Fit Medical device

24

Bio media armband

26

28

9.REFERENCES:

1.

http://ieeexplore.ieee.org/search/searchresult.jsp?queryText=internet%20of%20things&newsearch=tru
e

2.

http://en.wikipedia.org/wiki/Internet_of_Things#Medical_and_healthcare_systems

3.

Health in Everyday Living Robert Wood Johnson Foundation primer

4.

Vavilis, S., Petkovi, M., & Zannone, N. (2012). Impact of ICT on home healthcare . In ICT Critical
Infrastructures and Society (pp. 111-122). Springer Berlin Heidelberg.

5.

Andreas Pierratos, MD. Nocturnal hemodialysis: dialysis for the new millennium Canadian Medical
Association Journal,

6.

"Focusing on Priority Populations: An Interview With Cecilia Rivera Casale, Senior Advisor for Minority
Health, AHRQ". Agency for Healthcare Research and Quality. 2013-04-017. Retrieved 2013-0827. Check date values in: |date= (help)

7.
8.

Overview for Healthcare Professionals, L.A. Care Health Plan. (2012).


"Statewide Telehealth Program Enhances Access to Care, Improves Outcomes for High-Risk
Pregnancies in Rural Areas". Agency for Healthcare Research and Quality. 2013-05-08.
Retrieved 2013-05-10.

9.

"Telehealth Improves Access and Quality of Care for Alaska Natives". Agency for Healthcare
Research and Quality. 2013-05-22. Retrieved 2013-05-22.

10. "Whole Systems Demonstrators An Overview of Telecare and Telehealth". 2009-06-11.

29

Das könnte Ihnen auch gefallen