The impact of Internet of Things has been revolutionized in all fields of life, but its impact on the healthcare system has been significant due to its cutting edge transition. The role of Internet of Things becomes more dominant when it is supported by the features of mobile computing. The mobile computing extends the functionality of IoT in healthcare environment by bringing a massive support in the form of mobile health (m-health). In this research, a systematic literature review protocol is proposed to study how mobile computing assists IoT applications in healthcare, contributes to the current and future research work of IoT in the healthcare system, brings privacy and security in health IoT devices, and affects the IoT in the healthcare system. Furthermore, the intentions of the paper are to study the impacts of mobile computing on IoT in healthcare environment or smart hospitals in light of our systematic literature review protocol. The proposed study reports the papers that were included based on filtering process by title, abstract, and contents, and a total of 116 primary studies were included to support the proposed research. These papers were then analysed for research questions defined for the proposed study.
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research. INDEX TERMS Internet of Things devices, Security, Mobile Computing, Mobile applications, Smartphone. I. Research Questions Keywords What are the security problems and challenges faced by IoT devices in the network? Inclusion Criteria Research papers published in English language were included Primary studies i.e. original research papers were selected Research papers, book chapters or magazines relevant to our main topic were selected Research papers ranges in years from 2011 to 2019 were included for the studies Exclusion Criteria Papers written other than English language are not included Papers did not answer research questions or did not define the topic properly were excluded Gray papers were excluded Elimination of duplicated papers Research papers with less than three pages were removed
Security has become a vital factor for any Internet of things network but it is of paramount importance for Internet of Health Things (IoHT). IoHT also known as Internet of Medical Things (IoMT) is integration of IoT and healthcare environment, where fragile data related to the patients is transmitted from IoT devices to server. During this transmission, if, any eavesdropping or intrusion occurs then it will not only lead to the serious mutilation of entire network but this data will be handled maliciously for wrong doings as well. Therefore, a proper security is indispensable for IoHT based equipments due to exposure to different attacks. Security of IoHT has been the burning issue in last couple of years. In this regard different security models, surveys, frameworks have been presented. In this paper, a proposed Identified Security Attributes (ISA) framework is presented to evaluate the security features of IoHT based device in healthcare environment. The proposed framework uses hybrid MCDM methods such as Analytical Hierarchical Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). This framework works in two phase: in first phase the weights of attributes are derived by using AHP method and in second phase security assessment of alternatives is performed based upon security criteria by using TOPSIS method. The outcomes of proposed security assessment framework demonstrate that the reliable and secure alternative among alternatives is selected in IoMT system. This approach can be used as a guideline for future use in IoMT systems or any other IoT based domain. To the best of our knowledge, it is novel approach to address the security assessment of IoT and these MCDM methods have never been used before for assessment and decision making in IoHT system for security.
C-C Chemokine receptor 6 (CCR6), an important protein in inflammatory and immunological responses, has been previously reported to be associated with rheumatoid arthritis (RA). Therefore, in order to replicate these findings, a case-control study was conducted on 500 subjects (including 250 RA patients and 250 healthy controls) of Pakistani origin. The aim of this study was to determine the association of CCR6 rs3093024 variant with RA and identify its role in splicing events using bioinformatics tools. The clinical and demographic characteristics of the patients were collected using a well-designed questionnaire. The genotype frequencies of CCR6 rs3093024 variant were determined using tetra-primer ARMS-PCR (amplification of refractory mutation system-polymerase chain reaction) method. A significant difference was found between CCR6 rs3093024 genotype frequencies [ P = 0.0016, χ 2 = 12.915]. Similarly, a significant difference in the allele frequencies between RA patients and healthy controls was also observed [ P = 0.0003 and OR (95% CI) = 0.63 (0.49–0.80)]. The stratification of patients showed that there was a significant increase in AA genotype against AG + GG in patients [ P = 0.0014, OR (95% CI) = 2.0 (1.32–3.02)]. Furthermore, using bioinformatics analysis, it was found that CCR6 rs3093024 variant might create a potential splicing enhancer motif (SF2/ASF (IgM-BRCA1) with score of 77.92; Threshold 70.53), which might have important impact on the product of this gene. This study suggests that the A variant of CCR6 rs3093024 variant is significantly associated with RA-risk and its G variant is protective in Pakistani population but a multi-cohort large sized population study is needed to elucidate these results. Moreover, functional studies are needed to highlight the effects of this polymorphism on the function of CCR6 gene.
Previously, we observed increased transcription levels of specific cytochrome P450 monooxygenase (P450) and adenosine triphosphate binding cassette (ABC) transporter genes in human body lice, Pediculus humanus humanus, following exposure to ivermectin using the non-invasive induction assay, which resulted in tolerance. To confirm the roles of these genes in induction and tolerance, the robust genetic model insect Drosophila melanogaster was chosen. Orthologous genes corresponding to the body louse P450 (Cyp9f2, Cyp6g2 and Cyp9h1) and ABC transporter (Mrp1, GC1824 as an ABCB type and CG3327 as an ABCG type) genes were selected for in vivo bioassay. Following a brief treatment with a sublethal dose of ivermectin, the mortality response was significantly slower, indicating the presence of tolerance. Concurrently, the transcription levels of Cyp9f2 and Mrp1 at 3 h and those of Cyp6g2, Cyp9h1, Mrp1, CG1824 and CG3327 at 6 h post-treatment were upregulated, indicating gene induction. In behavioural bioassay using GAL4/UAS-RNA interference transgenic fly lines, increased susceptibility to ivermectin was observed following heat shock in the Cyp9f2 , Cyp6g2 , Cyp9h1 , Mrp1 or CG3327-knockdown flies. Considering that these five genes are orthologous to those which had the largest over-expression level following ivermectin-induced tolerance in the body louse, the current results suggest that they are also associated with ivermectin detoxification in D. melanogaster and that body lice and D. melanogaster are likely to share, in part, similar mechanisms of tolerance to ivermectin.
The present study was designed to measure the mean values of body mass index (BMI), random blood sugar/ fast ing blood sugar (RBS/FBS) tests, and Hb A 1c and to investigate the role of a genetic variant rs1544410 in the VDR gene in a Pakistani cohort. For this purpose, a total of 917 samples including 469 diabetes mellitus type 2 (T2DM), 145 DM type 1 (T1DM), and 303 healthy control were collected. Out of the total sample set, 500 individuals (250 T2DM cases and 250 controls) were genotyped for rs1544410. It was found that 65 (26.0%) cases and 32 (12.8%) controls had homozygous AA, while 69 (27.6%) cases and 139 (55.6%) controls had heterozygous AG, and 116 (46.4%) cases and 79 (31.6%) controls had homozygous GG (χ 2 = 41.81, p = 0.0001). In addition, a similar distribution of allele frequency was determined in cases and controls [p value = 0.866; odds ratio (OR) = 0.967; relative risk (RR) = 1.034]. A significant difference was observed in homozygous dominant [OR = 2.394 (1.501-3.816); RR = 1.46 (1.225-1.740); p = 0.003] and homozygous recessive models [OR = 2.970 (2.086-4.227); RR = 1.798 (1.501-2.154); p = <0.0001] analysis of rs1544410 in the VDR gene. These findings suggest that the VDR gene is associated with T2DM and genotype GG of ge-netic variant rs1544410 is the susceptible genotype in our Pakistani cohort.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.