The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has considerably bounded and dispersed communication components. mHealth, an attractive part in telemedicine architecture, plays an imperative role in patient security and privacy and adapts different sensing technologies through many built-in sensors. This study aims to improve sensor-based defence and attack mechanisms to ensure patient privacy in client side when using mHealth. Thus, a multilayer taxonomy was conducted to attain the goal of this study. Within the first layer, real-time remote monitoring studies based on sensor technology for telemedicine application were reviewed and analysed to examine these technologies and provide researchers with a clear vision of security- and privacy-based sensors in the telemedicine area. An extensive search was conducted to find articles about security and privacy issues, review related applications comprehensively and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were investigated for articles on mHealth in telemedicine-based sensor. A total of 3064 papers were collected from 2007 to 2017. The retrieved articles were filtered according to the security and privacy of sensor-based telemedicine applications. A total of 19 articles were selected and classified into two categories. The first category, 57.89% (n = 11/19), included survey on telemedicine articles and their applications. The second category, 42.1% (n = 8/19), included articles contributed to the three-tiered architecture of telemedicine. The collected studies improved the essential need to add another taxonomy layer and review the sensor-based smartphone authentication studies. This map matching for both taxonomies was developed for this study to investigate sensor field comprehensively and gain access to novel risks and benefits of the mHealth security in telemedicine application. The literature on sensor-based smartphones in the second layer of our taxonomy was analysed and reviewed. A total of 599 papers were collected from 2007 to 2017. In this layer, we obtained a final set of 81 articles classified into three categories. The first category of the articles [86.41% (n = 70/81)], where sensor-based smartphones were examined by utilising orientation sensors for user authentication, was used. The second category [7.40% (n = 6/81)] included attack articles, which were not intensively included in our literature analysis. The third category [8.64% (n = 7/81)] included 'other' articles. Factors were considered to understand fully the various contextual aspects of the field in published studies. The characteristics included the motivation and challenges related to sensor-based authentication of smartphones encountered by researchers and the recommendations to strengthen this critical area of research. Finally, many studies on the sensor-based smartphone in the second layer have focused on enhancing accurate authentication because sensor-based smartphones require sensors that could authentically secure mHealth.
Developing countries are exploring the role of telehealth to overcome the challenges of providing adequate health care services. However, this process faces disparities, and no complementarity in telehealth policy development. Telehealth has the potential to transcend geopolitical boundaries, yet telehealth policy developed in one jurisdiction may hamper applications in another. Understanding such policy complexities is essential for telehealth to realize its full global potential. This study investigated 12 East Asian countries that may represent a microcosm of the world, to determine if the telehealth policy response of countries could be categorized, and whether any implications could be identified for the development of complementary telehealth policy. The countries were Cambodia, China, Hong Kong, Indonesia, Japan, Malaysia, Myanmar, Singapore, South Korea, Taiwan, Thailand, and Vietnam. Three categories of country response were identified in regard to national policy support and development. The first category was "None" (Cambodia, Myanmar, and Vietnam) where international partners, driven by humanitarian concerns, lead telehealth activity. The second category was "Proactive" (China, Indonesia, Malaysia, Singapore, South Korea, Taiwan, and Thailand) where national policies were designed with the view that telehealth initiatives are a component of larger development objectives. The third was "Reactive" (Hong Kong and Japan), where policies were only proffered after telehealth activities were sustainable. It is concluded that although complementarity of telehealth policy development is not occurring, increased interjurisdictional telehealth activity, regional clusters, and concerted and coordinated effort amongst researchers, practitioners, and policy makers may alter this trend.
Telemedicine is fast becoming popular in many countries in the world. It has several advantages such as being cost saving and providing better access to health care in the remote areas in many parts of the world. However, it has some disadvantages as well. One of the major problems is the problem of patients' rights and confidentiality in the use of telemedicine. There are no standard guidelines and procedures in the practice of telemedicine as yet. Both the patient and the physician are unsure of the standard of practice and how to maintain confidentiality. The patient is uncertain as to how to protect her/his rights in the use of telemedicine. The issue of litigation is also unclear as to where the physician is practicing when he/she uses telemedicine. Is she/he practicing in the country where the patient is or is the physician practicing in the country of her/his origin? These issues need to be addressed urgently so that telemedicine will have standards of ethical practice and the patient's rights and confidentiality will be protected.
The development of wireless body area sensor networks is imperative for modern telemedicine. However, attackers and cybercriminals are gradually becoming aware in attacking telemedicine systems, and the black market value of protected health information has the highest price nowadays. Security remains a formidable challenge to be resolved. Intelligent home environments make up one of the major application areas of pervasive computing. Security and privacy are the two most important issues in the remote monitoring and control of intelligent home environments for clients and servers in telemedicine architecture. The personal authentication approach that uses the finger vein pattern is a newly investigated biometric technique. This type of biometric has many advantages over other types (explained in detail later on) and is suitable for different human categories and ages. This study aims to establish a secure verification method for real-time monitoring systems to be used for the authentication of patients and other members who are working in telemedicine systems. The process begins with the sensor based on Tiers 1 and 2 (client side) in the telemedicine architecture and ends with patient verification in Tier 3 (server side) via finger vein biometric technology to ensure patient security on both sides. Multilayer taxonomy is conducted in this research to attain the study's goal. In the first layer, real-time remote monitoring studies based on the sensor technology used in telemedicine applications are reviewed and analysed to provide researchers a clear vision of security and privacy based on sensors in telemedicine. An extensive search is conducted to identify articles that deal with security and privacy issues, related applications are reviewed comprehensively and a coherent taxonomy of these articles is established. ScienceDirect, IEEE Xplore and Web of Science databases are checked for articles on mHealth in telemedicine based on sensors. A total of 3064 papers are collected from 2007 to 2017. The retrieved articles are filtered according to the security and privacy of telemedicine applications based on sensors. Nineteen articles are selected and classified into two categories. The first category, which accounts for 57.89% (n = 11/19), includes surveys on telemedicine articles and their applications. The second category, accounting for 42.1% (n = 8/19), includes articles on the three-tiered architecture of telemedicine. The collected studies reveal the essential need to construct another taxonomy layer and review studies on finger vein biometric verification systems. This map-matching for both taxonomies is developed for this study to go deeply into the sensor field and determine novel risks and benefits for patient security and privacy on client and server sides in telemedicine applications. In the second layer of our taxonomy, the literature on finger vein biometric verification systems is analysed and reviewed. In this layer, we obtain a final set of 65 articles classified into four categories. In the first category, 80% (n = 52/65) of the articles focus on development and design. In the second category, 12.30% (n = 8/65) includes evaluation and comparative articles. These articles are not intensively included in our literature analysis. In the third category, 4.61% (n = 3/65) includes articles about analytical studies. In the fourth category, 3.07% (n = 2/65) comprises reviews and surveys. This study aims to provide researchers with an up-to-date overview of studies that have been conducted on (user/patient) authentication to enhance the security level in telemedicine or any information system. In the current study, taxonomy is presented by explaining previous studies. Moreover, this review highlights the motivations, challenges and recommendations related to finger vein biometric verification systems and determines the gaps in this research direction (protection of finger vein templates in real time), which represent a new research direction in this area.
The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial information. Examples of mobile malware include root exploit, botnets, and Trojans and root exploit is one of the most dangerous malware. It compromises the operating system kernel in order to gain root privileges which are then used by attackers to bypass the security mechanisms, to gain complete control of the operating system, to install other possible types of malware to the devices, and finally, to steal victims' private keys linked to the blockchain. For the purpose of maximizing the security of the blockchain-based medical data management (BMDM), it is crucial to investigate the novel features and approaches contained in root exploit malware. This study proposes to use the bio-inspired method of practical swarm optimization (PSO) which automatically select the exclusive features that contain the novel android debug bridge (ADB). This study also adopts boosting (adaboost, realadaboost, logitboost, and multiboost) to enhance the machine learning prediction that detects unknown root exploit, and scrutinized three categories of features including (1) system command, (2) directory path and (3) code-based. The evaluation gathered from this study suggests a marked accuracy value of 93% with Logitboost in the simulation. Logitboost also helped to predicted all the root exploit samples in our developed system, the root exploit detection system (RODS).
The Internet of Things (IoT) has been identified in various applications across different domains, such as in the healthcare sector. IoT has also been recognised for its revolution in reshaping modern healthcare with aspiring wide range prospects, including economical, technological and social. This study aims to establish IoT-based smart home security solutions for real-time health monitoring technologies in telemedicine architecture. A multilayer taxonomy is driven and conducted in this study. In the first layer, a comprehensive analysis on telemedicine, which focuses on the client and server sides, shows that other studies associated with IoT-based smart home applications have several limitations that remain unaddressed. Particularly, remote patient monitoring in healthcare applications presents various facilities and benefits by adopting IoT-based smart home technologies without compromising the security requirements and potentially large number of risks. An extensive search is conducted to identify articles that handle these issues, related applications are comprehensively reviewed and a coherent taxonomy for these articles is established. A total number of (n = 3064) are gathered between 2007 and 2017 for most reliable databases, such as ScienceDirect, Web of Science and Institute of Electrical and Electronic Engineer Xplore databases. Then, the articles based on IoT studies that are associated with telemedicine applications are filtered. Nine articles are selected and classified into two categories. The first category, which accounts for 22.22% (n = 2/9), includes surveys on telemedicine articles and their applications. The second category, which accounts for 77.78% (n = 7/9), includes articles on the client and server sides of telemedicine architecture. The collected studies reveal the essential requirement in constructing another taxonomy layer and review IoT-based smart home security studies. Therefore, IoT-based smart home security features are introduced and analysed in the second layer. The security of smart home design based on IoT applications is an aspect that represents a crucial matter for general occupants of smart homes, in which studies are required to provide a better solution with patient security, privacy protection and security of users' entities from being stolen or compromised. Innovative technologies have dispersed limitations related to this matter. The existing gaps and trends in this area should be investigated to provide valuable visions for technical environments and researchers. Thus, 67 articles are obtained in the second layer of our taxonomy and are classified into six categories. In the first category, 25.37% (n = 17/67) of the articles focus on architecture design. In the second category, 17.91% (n = 12/67) includes security analysis articles that investigate the research status in the security area of IoT-based smart home applications. In the third category, 10.44% (n = 7/67) includes articles about security schemes. In the fourth category, 17.91% (n = 12/67) comprises security examination. In the fifth category, 13.43% (n = 9/67) analyses security protocols. In the final category, 14.92% (n = 10/67) analyses the security framework. Then, the identified basic characteristics of this emerging field are presented and provided in the following aspects. Open challenges experienced on the development of IoT-based smart home security are addressed to be adopted fully in telemedicine applications. Then, the requirements are provided to increase researcher's interest in this study area. On this basis, a number of recommendations for different parties are described to provide insights on the next steps that should be considered to enhance the security of smart homes based on IoT. A map matching for both taxonomies is developed in this study to determine the novel risks and benefits of IoT-based smart home security for real-time remote health monitoring within client and server sides in telemedicine applications.
BACKGROUND: Research on patient care has identified substantial variations in the quality and safety of healthcare and the considerable risks of iatrogenic harm as significant issues. These failings contribute to the high rates of potentially avoidable morbidity and mortality and to the rising levels of healthcare expenditure seen in many health systems. There have been substantial developments in information technology in recent decades and there is now real potential to apply these technological developments to improve the provision of healthcare universally. Of particular international interest is the use of eHealth applications. There is, however, a large gap between the theoretical and empirically demonstrated benefits of eHealth applications. While these applications typically have the technical capability to help professionals in the delivery of healthcare, inadequate attention to the socio-technical dimensions of their use can result in new avoidable risks to patients.
RESULTS AND DISCUSSION: Given the current lack of evidence on quality and safety improvements and on the cost-benefits associated with the introduction of eHealth applications, there should be a focus on implementing more mature technologies; it is also important that eHealth applications should be evaluated against a comprehensive and rigorous set of measures, ideally at all stages of their application life cycle.
INTRODUCTION: Telehealth has been widely promoted as a technology to make healthcare more effective and affordable. However, current telehealth systems suffer from vendor lock-in and high cost, and are designed for managing chronic diseases rather than preventing them.
METHODS: We address shortcomings of existing consumer-level health informatics applications in supporting senior health consumers, and provide designers of such systems with a design framework. We assess the feasibility of patient-centred health management systems (HMSs) that are designed based on the proposed framework. In contrast to traditional telehealth, HMSs are patient centred and aim at enabling health consumers to take control of their own health by providing functionality for health self-management. Quantitative and qualitative methods were adopted in evaluating a prototype HMS.
RESULTS: Senior healthcare consumers viewed our HMS prototype positively, and experienced a positive change in their attitude towards their health. We identified requirements and challenges for HMSs. In particular, participants indicated that social networking features must have a clear purpose beyond simple broadcasting of emotions and opinions.
DISCUSSION: Our study indicates that seniors are able and motivated to leverage a web-based patient-centred HMS, provided that there are suitable health support applications tailored to their needs. This could be achieved by making it attractive for third party application developers to contribute HMS content.
KEYWORDS: Telehealth; Web 2.0 technologies; gerontechnology; health management system; patient empowerment; social networking
We determined the impact of a remote blood glucose telemonitoring program with feedback in type 2 diabetes mellitus patients fasting during Ramadan compared to conventional self-monitoring method. A twelve-week cluster randomised study, with 85 participants who wish to fast for at least 15 days during Ramadan was conducted. Self-measurement and transmission of blood glucose results were performed six times daily during Ramadan. Results were transmitted to a secure website for review with feedback from case manager if necessary. The control group received usual care. The main outcome was the number of participants experiencing hypoglycaemia during Ramadan and at the end of the study. During Ramadan, the number of participants reporting hypoglycaemia was significantly lower in the telemonitoring group [Odds ratio (OR): 0.186, 95% confidence interval: 0.04-0.936; p = 0.04]. Similarly, the proportion of participants reporting symptomatic hypoglycaemia at the end of the study was significantly lower in the telemonitoring group (OR: 0.257, 95% CI: 0.07-0.89; p = 0.03). A reduction of 1.07% in glycated haemoglobin levels was observed in the telemonitoring group compared to 0.24% in the control group (p