scholarly journals Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Tarek Frikha ◽  
Ahmed Chaari ◽  
Faten Chaabane ◽  
Omar Cheikhrouhou ◽  
Atef Zaguia

Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection with the proposed IoT blockchain platform. The use of these devices helps us in extracting an amount of highly valuable heath data that are filtered, analyzed, and stored in electronic health records (EHRs). Different actors of the platform, coaches, patients, and doctors, collaborate to provide an on-time diagnosis and treatment for various diseases in an easy and cost-effective way. Our main purpose is to provide a distributed, secure, and authorized access to these sensitive data using the Ethereum blockchain technology. We have designed an integrated low-powered IoT blockchain platform for a healthcare application to store and review EHRs. This architecture, based on the blockchain Ethereum, includes a web and mobile application allowing the patient as well as the medical and paramedical staff to have a secure access to health information. The Ethereum node is implemented on an embedded platform, which should provide an efficient, flexible, and secure system despite the limited resources and low power consumption of the multiprocessor platform.

Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 329
Author(s):  
Shen-Tsu Wang ◽  
Meng-Hua Li ◽  
Chun-Chi Lien

Blockchain technology has been applied to logistics tracking, but it is not cost-effective. The development of smart lockers has solved the problem of repeated distribution to improve logistics efficiency, thereby becoming a solution with convenience and privacy compared to the in-store purchase and pickup alternative. This study prioritized the key factors of smart lockers using a simulated annealing–genetic algorithm by fractional factorial design (FFD-SAGA) and grey relational analysis, and investigated the main users of smart lockers by grey multiple attribute decision analysis. The results show that the Web application programming interface (API) concatenation and money flow provider are the key success factors of smart lockers, and office workers are the main users of the lockers. Hence, how to better meet the needs of office workers will be an issue of concern for service providers.


2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S34-S34
Author(s):  
Stephen C Jennings ◽  
Kenneth Manning ◽  
Oliver Massey ◽  
Janet Prvu Bettger ◽  
Candace S Brown ◽  
...  

Abstract Rural Veterans often lack access to health care. Veterans Affairs (VA) supports telehealth technologies to provide services remotely that are comparable to onsite in-person care. We piloted VA Video Connect (VVC), to deliver an interactive exercise program for Veterans modeled on the VA Gerofit Program, a successful facility-based exercise program. VVC connects an exercise physiologist directly to the home with smart devices. Invitations to join Gerofit were mailed to 216 rural Veterans. Of 17 respondents, 7 (mean age 68) agreed to VVC tele-exercise 1x week for 12 weeks. Two Veterans were lost to follow-up prior to enrollment. Baseline VVC assessments (N=5) were indicative of high functional impairment in comparison to age-based norms: 2-minute step test (67.2 steps, 5th%tile), 30-second chair stands (12.4 stands, 26th%tile), and 30-second arm curls (15.3 curls, 25th%tile). Feasibility, barriers, and program impact will be discussed. Functional impairment indicates need for telehealth to reach Rural Veterans.


Author(s):  
Varsha R ◽  
Meghna Manoj Nair ◽  
Siddharth M. Nair ◽  
Amit Kumar Tyagi

The Internet of Things (smart things) is used in many sectors and applications due to recent technological advances. One of such application is in the transportation system, which is of primary use for the users to move from one place to another place. The smart devices which were embedded in vehicles are useful for the passengers to solve his/her query, wherein future vehicles will be fully automated to the advanced stage, i.e. future cars with driverless feature. These autonomous cars will help people a lot to reduce their time and increases their productivity in their respective (associated) business. In today’s generation and in the near future, privacy preserving and trust will be a major concern among users and autonomous vehicles and hence, this paper will be able to provide clarity for the same. Many attempts in previous decade have provided many efficient mechanisms, but they all work only with vehicles along with a driver. However, these mechanisms are not valid and useful for future vehicles. In this paper, we will use deep learning techniques for building trust using recommender systems and Blockchain technology for privacy preserving. We also maintain a certain level of trust via maintaining the highest level of privacy among users living in a particular environment. In this research, we developed a framework that could offer maximum trust or reliable communication to users over the road network. With this, we also preserve privacy of users during traveling, i.e., without revealing identity of respective users from Trusted Third Parties or even Location Based Service in reaching a destination. Thus, Deep Learning based Blockchain Solution (DLBS) is illustrated for providing an efficient recommendation system.


There are many integrated perimeter security solutions available, the main objective of this paper is to provide cost effective solution. This paper mainly focuses on design of a Low-cost vibration module with RS485 interface, Controller hub with RS485 interface and Ethernet interface and a Command Centre server. The platform consists of RS485 daisy chained vibration sensor network connected to control server via Controller hub. It is designed to pin point the area of intrusion and cueing the camera to that specified location. It can be integrated with smart devices like PTZ/Thermal/IR cameras or radars. Each daisy chain consists of 250 sensors with each sensor 3 metres apart, each ethernet hub can handle 2 daisy chains. The Controller hub gets vibration sensor information via RS485 and transmits data to Command centre using TCP/IP protocol. The Controller centre identifies the location of the sensor and moves the PTZ camera to the specific location and live streams the data to the user.


Voting is important for any democratic country. It can be considered as one of the major factors that make a government for the people and by the people. The most common methods of voting that currently exist are ballot-based voting, purely electronic methods, and Electronic Voting Machines, among others. Over the years, it has been a challenge to build a secure E-voting program that provides the privacy of current voting systems while offering a means of accountability and versatility. Using blockchain technology and cryptography we can make the process of elections as open and cost-effective as possible. In this review paper we discuss a new, blockchain-based electronic voting system that addresses some of the limitations in existing systems and evaluates some of the popular systems designed to create a blockchain-based e-voting system.


1986 ◽  
Vol 21 (1) ◽  
pp. 5-14
Author(s):  
Benjamin G. Walker

The protection of data in computer-based systems is a serious and growing problem. It is one of the most challenging technical problems in the field of computer science today. The objective of this paper is to provide a technical overview of the problem and to suggest some steps that need to be taken to assure progress in the field toward cost-effective systems that provide adequate protection.The Problem: Protecting the privacy of data in computer systems involves establishing safeguards against accidental disclosure as well as protection against a deliberate attack. During system failures and restart procedures errors in coding procedures often cause data to be stored in the wrong files or put sensitive data out on the printer along with diagnostic information intended for maintenance personnel. You have probably had the experience at some time of being wired into someone else's telephone conversation.


Author(s):  
Yessenia Berenice Llive ◽  
Norbert Varga ◽  
László Bokor

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.


Agronomy ◽  
2020 ◽  
Vol 10 (7) ◽  
pp. 936 ◽  
Author(s):  
Radu L. Sumalan ◽  
Nicoleta Stroia ◽  
Daniel Moga ◽  
Vlad Muresan ◽  
Alexandru Lodin ◽  
...  

This paper presents the development of a cost-effective automatic system for greenhouse environment control. The architectural and functional features were analyzed in the context of the realization of a controlled-environment agricultural system through all its stages: installation, deployment of the software, integration, maintenance, crop control strategy setup and daily operation of the grower. The proposed embedded platform provides remote monitoring and control of the greenhouse environment and is implemented as a distributed sensing and control network integrating wired and wireless nodes. All nodes were built with low-cost, low-power microcontrollers. The key issues that were addressed include the energy-efficient control, the robustness of the distributed control network to faults and a low-cost hardware implementation. The translation of the supervisory growth-planning information to the operational (control network) level is achieved through a specific architecture residing on a crop planning module (CPM) and an interfacing block (IB). A suite of software applications with flows and interfaces developed from a grower-centric perspective was designed and implemented on a multi-tier architecture. The operation of the platform was validated through implementation of sensing and control nodes, application of software for configuration and visualization, and deployment in typical greenhouses.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1339
Author(s):  
Willy Anugrah Cahyadi ◽  
Yeon Ho Chung ◽  
Zabih Ghassemlooy ◽  
Navid Bani Hassan

Optical wireless communications (OWC) are emerging as cost-effective and practical solutions to the congested radio frequency-based wireless technologies. As part of OWC, optical camera communications (OCC) have become very attractive, considering recent developments in cameras and the use of fitted cameras in smart devices. OCC together with visible light communications (VLC) is considered within the framework of the IEEE 802.15.7m standardization. OCCs based on both organic and inorganic light sources as well as cameras are being considered for low-rate transmissions and localization in indoor as well as outdoor short-range applications and within the framework of the IEEE 802.15.7m standardization together with VLC. This paper introduces the underlying principles of OCC and gives a comprehensive overview of this emerging technology with recent standardization activities in OCC. It also outlines the key technical issues such as mobility, coverage, interference, performance enhancement, etc. Future research directions and open issues are also presented.


Sign in / Sign up

Export Citation Format

Share Document