Abstract:With the increasing demands on quality healthcare and the raising cost of care, pervasive healthcare is considered as a technological solutions to address the global health issues. In particular, the recent advances in Internet of Things have led to the development of Internet of Medical Things (IoMT). Although such low cost and pervasive sensing devices could potentially transform the current reactive care to preventative care, the security and privacy issues of such sensing system are often overlooked. As th… Show more
“… Security Confidentiality Integrity Availability Authenticity Key management methods Kaushik et al. (2019) ; Sun et al. (2019) ; Zhang et al., 2018 Shen et al.…”
Section: Iomt Securitymentioning
confidence: 99%
“…(2019) ; Rahman and Mohsenian-Rad (2012) Meng et al. (2020) Authentication methods Sun et al. (2019) Sun et al.…”
Section: Iomt Securitymentioning
confidence: 99%
“…(2020) Authentication methods Sun et al. (2019) Sun et al. (2019) Yaacoub et al., 2020 ); Sun et al.…”
Section: Iomt Securitymentioning
confidence: 99%
“…For example, assaults on implantable devices, such as brain implants, have been reported to lead to death ( Nanayakkara et al., 2019 ; Rathore et al., 2019 ). The US Food & Drug Administration (FDA) has recently revised the electronic safety guidelines on medical equipment applications of 2018 with updated advice on securing patient data on such devices and systems ( Sun et al., 2019 ). Cyber threats on medical systems and hospitals are still on the rise, with IoT-based healthcare organizations and investors scrambling to identify the most important privacy and to tackle security problems.…”
Section: Iomt Securitymentioning
confidence: 99%
“… Attack Attack vector Reference DoS attacks Cloud Services, Databases Rathore et al. (2019) ; Sun et al. (2019) ; Yaacoub et al.…”
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology. Furthermore, the development of new IoMT technologies merge with Artificial Intelligence, Big Data and Blockchain offers more viable solutions. Hence, this paper highlights the IoMT architecture, applications, technologies, and security developments that have been made with respect to IoMT in combating COVID-19. Additionally, this paper provides useful insights into specific IoMT architecture models, emerging IoMT applications, IoMT security measurements, and technology direction that apply to many IoMT systems within the medical environment to combat COVID-19.
“… Security Confidentiality Integrity Availability Authenticity Key management methods Kaushik et al. (2019) ; Sun et al. (2019) ; Zhang et al., 2018 Shen et al.…”
Section: Iomt Securitymentioning
confidence: 99%
“…(2019) ; Rahman and Mohsenian-Rad (2012) Meng et al. (2020) Authentication methods Sun et al. (2019) Sun et al.…”
Section: Iomt Securitymentioning
confidence: 99%
“…(2020) Authentication methods Sun et al. (2019) Sun et al. (2019) Yaacoub et al., 2020 ); Sun et al.…”
Section: Iomt Securitymentioning
confidence: 99%
“…For example, assaults on implantable devices, such as brain implants, have been reported to lead to death ( Nanayakkara et al., 2019 ; Rathore et al., 2019 ). The US Food & Drug Administration (FDA) has recently revised the electronic safety guidelines on medical equipment applications of 2018 with updated advice on securing patient data on such devices and systems ( Sun et al., 2019 ). Cyber threats on medical systems and hospitals are still on the rise, with IoT-based healthcare organizations and investors scrambling to identify the most important privacy and to tackle security problems.…”
Section: Iomt Securitymentioning
confidence: 99%
“… Attack Attack vector Reference DoS attacks Cloud Services, Databases Rathore et al. (2019) ; Sun et al. (2019) ; Yaacoub et al.…”
In many countries, the Internet of Medical Things (IoMT) has been deployed in tandem with other strategies to curb the spread of COVID-19, improve the safety of front-line personnel, increase efficacy by lessening the severity of the disease on human lives, and decrease mortality rates. Significant inroads have been achieved in terms of applications and technology, as well as security which have also been magnified through the rapid and widespread adoption of IoMT across the globe. A number of on-going researches show the adoption of secure IoMT applications is possible by incorporating security measures with the technology. Furthermore, the development of new IoMT technologies merge with Artificial Intelligence, Big Data and Blockchain offers more viable solutions. Hence, this paper highlights the IoMT architecture, applications, technologies, and security developments that have been made with respect to IoMT in combating COVID-19. Additionally, this paper provides useful insights into specific IoMT architecture models, emerging IoMT applications, IoMT security measurements, and technology direction that apply to many IoMT systems within the medical environment to combat COVID-19.
Exercise is critical to children's mental and physical health. However, improper exercise can be counterproductive. [1] Research shows that excessive exercise can cause stress fractures, ligamentous injuries, and knee articular cartilage damage in children, while lack of exercise can lead to obesity and even depression. [2] Therefore, it is necessary to provide children with professional coaches and health advisers. However, professional guidance is expensive and impractical in rural or underdeveloped areas where health infrastructure is weak and professional coaches are not available. [3] Recently, the issue became more obvious because the coronavirus pandemic quarantined children from their schools' athletic facilities, leaving them with less professional guidance from their teachers. [4] Fortunately, wearable devices (e.g., smartwatches or smart-bands) can provide motion monitoring and exercise advice to people who do not have access to professional coaches and health advisers at a low cost and with good accessibility. [5,6] However, children are often ignored in the design of these devices. Wearable devices and algorithms developed for children lack diversity and function, forcing them to use commercial adult devices or algorithms to get high-quality remote exercise guidance. [7] Utilizing adult devices or algorithms on children faces two severe problems. First, human physical characteristics show variability in different activities. It is hard to build an age group recognition model robust to multiple activities. Second, due to the physiological differences between children and adults, human activity recognition algorithms developed on adults work poorly on children, making motion monitoring inaccurate. [8] Previous research reports a 10.8%-27.1% recognition decrease when using a model trained by adult data to recognize child activity. [9] Providing exercise advice through wearable fitness devices requires three steps: 1) recognizing the user's current activity; 2) monitoring duration or intensity; and 3) providing advice based on the user's age group characteristics and data collected in step 1 and 2. Therefore, incorrect activity recognition and exercise standard misuse will lead to improper exercise advice and can cause excessive exercise or lack of exercise, which would finally lead to harm for the children. [10] In addition, lots of
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.