Internet of Things: A Survey for the Individuals' E-Health Applications
Authors
Abstract:
In today's world, the Internet of Things (IoT), which is a fairly new technology, has become a popular topic for discussion. Meanwhile, the increasing demand for personalized healthcare with the assistance of new technologies has created new applications called e-health IoT applications; however, researchers are still attempting to find its applications, therefore they have not been able to focus on comparing these applications. We have aimed at understanding the benefits of e-health IoT applications in comparison to one another. Therefore, this study is an attempt to provide a list of e-health IoT applications for individuals and to prioritize them. The Fuzzy Analytical Hierarchy Process (FAHP) method has been used, which is a method for Multi-Criteria Decision Making (MCDM) and a useful tool for prioritizing multiple alternatives based on criteria. Eight important criteria, based on a comprehensive literature review and experts’ opinions, were determined. Then, by using the FAHP method, the weight of each criterion was calculated. As a result, seven applications identified for individuals were prioritized based on the weight of each criterion and the score of each application in each criterion. Health Effectiveness, Empowerment, Safety, Privacy, and Peace of Mind are the most important criteria in e-health IoT applications for individuals; Cost Saving, round-the-clock Access, and Time-Saving are in the next levels of importance. The results also show that Chronic disease management, Medication reminders, Health monitoring, Air quality, Fall detection, Sleep control and Fitness were respectively ranked as first, second, third, fourth, fifth, sixth and seventh among the IoT applications.
similar resources
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
full textA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
full textThe internet of things: a survey
This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the Next Generation Internet), and distributed intelligence for smart objects are just the mos...
full textThe Internet of Things: A survey
This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the Next Generation Internet), and distributed intelligence for smart objects are just the mos...
full textA security survey of middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. The purpose of this paper is to review the current literature on the challenges and approaches to security and privacy in the Internet of Things, with an especial focus on how these aspects are handled in IoT middleware. We f...
full textMy Resources
Journal title
volume 11 issue 1
pages 102- 129
publication date 2019-05-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023