About the Editor |
|
xxi | |
Preface |
|
xxiii | |
|
1 Security and privacy requirements in 5G healthcare |
|
|
1 | (34) |
|
|
|
|
2 | (8) |
|
1.1.1 How will 5G affect health-care system? |
|
|
5 | (3) |
|
1.1.2 Integration of blockchain, 5G and healthcare |
|
|
8 | (2) |
|
1.1.3 Contributions of this chapter |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.3 Challenges associated with the present healthcare system |
|
|
11 | (3) |
|
1.3.1 Challenges with health records |
|
|
11 | (1) |
|
1.3.2 Universal access limitations |
|
|
11 | (1) |
|
1.3.3 Long-term constant care burden |
|
|
11 | (1) |
|
1.3.4 Challenges for aging populations |
|
|
12 | (1) |
|
1.3.5 Limitation of the resources |
|
|
12 | (1) |
|
1.3.6 Problems associated with healthcare information systems |
|
|
13 | (1) |
|
1.3.7 Lack of data driven |
|
|
13 | (1) |
|
1.3.8 Healthcare disparities |
|
|
13 | (1) |
|
1.3.9 Standardization and interoperability |
|
|
14 | (1) |
|
1.3.10 Effective regulation |
|
|
14 | (1) |
|
1.3.11 Data privacy and research needs |
|
|
14 | (1) |
|
|
14 | (4) |
|
|
16 | (1) |
|
|
16 | (1) |
|
1.4.3 Big multiple input/output system |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
1.4.6 Software-defined networks |
|
|
18 | (1) |
|
1.5 Technical challenges and the path to 5G |
|
|
18 | (2) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
1.7 5G and healthcare opportunities |
|
|
22 | (7) |
|
1.7.1 Fast and intelligent networks |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
1.7.4 Applications of 5G in healthcare |
|
|
23 | (4) |
|
1.7.5 Impact of 5G on medical access, quality, and cost |
|
|
27 | (1) |
|
1.7.6 The impact of 5G on healthcare |
|
|
27 | (2) |
|
|
29 | (6) |
|
|
30 | (5) |
|
2 Ethical and legal aspects of using blockchain technology for 5G-based health-care systems |
|
|
35 | (18) |
|
|
|
|
|
|
36 | (1) |
|
2.1.1 Research contribution |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
2.2 Blockchain technology and 5G in healthcare |
|
|
37 | (2) |
|
|
38 | (1) |
|
2.2.2 Augmented and virtual reality |
|
|
38 | (1) |
|
|
39 | (1) |
|
2.2.4 5G on mobile app development |
|
|
39 | (1) |
|
2.3 Issues of privacy and security |
|
|
39 | (2) |
|
2.4 Security spectrum of 5G-enabled devices |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
2.4.3 No single point of failure |
|
|
42 | (1) |
|
2.5 Key issues and stakeholders |
|
|
42 | (2) |
|
2.5.1 Tweaking of IoT devices |
|
|
42 | (1) |
|
2.5.2 No protocol right now to govern them all |
|
|
43 | (1) |
|
|
43 | (1) |
|
2.5.4 Energy inefficiency |
|
|
44 | (1) |
|
2.5.5 High-altitude limitations |
|
|
44 | (1) |
|
2.5.6 Man-in-the-middle attack |
|
|
44 | (1) |
|
2.6 Trust and regulations |
|
|
44 | (1) |
|
2.7 Regulatory bodies and the role of the government |
|
|
45 | (1) |
|
|
45 | (2) |
|
|
46 | (1) |
|
|
46 | (1) |
|
2.8.3 Security and privacy |
|
|
46 | (1) |
|
|
46 | (1) |
|
2.8.5 Training and education challenges |
|
|
47 | (1) |
|
|
47 | (6) |
|
|
47 | (6) |
|
3 Blockchain-based 5G-enabled health-care system: an analysis of security and privacy issues |
|
|
53 | (30) |
|
|
|
54 | (7) |
|
|
54 | (2) |
|
3.1.2 Types of blockchain |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (3) |
|
3.2 Blockchain integration with 5G |
|
|
61 | (1) |
|
3.2.1 Blockchain for 5G advancements |
|
|
62 | (1) |
|
3.3 Need of blockchain in healthcare |
|
|
62 | (3) |
|
3.4 Blockchain-based health-care system |
|
|
65 | (2) |
|
3.5 Security and privacy properties requirements in healthcare |
|
|
67 | (5) |
|
3.6 Security and privacy techniques |
|
|
72 | (4) |
|
3.7 Healthcare-based application in blockchain |
|
|
76 | (3) |
|
|
79 | (4) |
|
|
79 | (4) |
|
4 Enhanced blockchain technology associated with IoT for secure and privacy communications in 5G |
|
|
83 | (32) |
|
|
|
|
|
|
84 | (2) |
|
4.2 Design process of blockchain-based systems |
|
|
86 | (1) |
|
4.3 IoT - with 5G and blockchain |
|
|
87 | (3) |
|
4.3.1 Requirements of IoT |
|
|
88 | (1) |
|
|
89 | (1) |
|
4.3.3 Impact of blockchain technology on digital commerce |
|
|
89 | (1) |
|
4.3.4 Impact of blockchain on IoT |
|
|
89 | (1) |
|
4.4 5G technology for greater connectivity |
|
|
90 | (3) |
|
4.4.1 Mobile payment networks to worldwide communication |
|
|
90 | (1) |
|
4.4.2 How blockchain and 5G help secure versatile banking |
|
|
90 | (1) |
|
4.4.3 How will 5G WiFi enhance blockchain-based crypto assets? |
|
|
91 | (1) |
|
4.4.4 Scaling of blockchain functionality by 5G |
|
|
92 | (1) |
|
4.4.5 5G for boosting keen agreements credibility |
|
|
92 | (1) |
|
4.4.6 How 5G will increase network volume for blockchain improvement? |
|
|
92 | (1) |
|
4.4.7 Will 5G bargain blockchain innovation's latent capacities? |
|
|
93 | (1) |
|
4.5 5G-based blockchain distributed ledger technology |
|
|
93 | (1) |
|
4.6 Secure mobile banking using 5G and blockchain |
|
|
94 | (1) |
|
4.7 5G benefits to blockchain and crypto users |
|
|
94 | (3) |
|
4.7.1 5G affect on revolutionizing blockchain |
|
|
95 | (1) |
|
4.7.2 How 5G authorizes smart contracts |
|
|
96 | (1) |
|
4.8 Blockchain in defense to secure communications |
|
|
97 | (1) |
|
4.9 Key issues in blockchain in communications |
|
|
98 | (1) |
|
4.10 5G challenges facing deployment |
|
|
99 | (4) |
|
4.11 New opportunities for 5G applications |
|
|
103 | (1) |
|
4.12 Blockchain works to secure communications |
|
|
103 | (3) |
|
4.12.1 Centralized, distributed, and decentralization networking |
|
|
103 | (1) |
|
4.12.2 Coding modern coding is furthermore |
|
|
104 | (1) |
|
4.12.3 Vulnerabilities in existing communications protocols |
|
|
104 | (1) |
|
4.12.4 Weaknesses in packetization |
|
|
104 | (1) |
|
4.12.5 Securing community packets with blockchain |
|
|
105 | (1) |
|
4.12.6 Weaknesses in net protocol addresses |
|
|
105 | (1) |
|
4.12.7 Protecting IP addresses with decentralized communications |
|
|
106 | (1) |
|
4.13 Propose framework along with blockchain technology |
|
|
106 | (1) |
|
|
107 | (1) |
|
4.15 Chapter summary and conclusions |
|
|
108 | (7) |
|
|
109 | (6) |
|
5 5G-driven radio framework for proficient smart health-care institutions |
|
|
115 | (16) |
|
|
|
|
|
116 | (1) |
|
5.2 Motivation and contribution |
|
|
117 | (1) |
|
5.3 Waveform techniques for 5G |
|
|
118 | (4) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (3) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (4) |
|
|
128 | (3) |
|
6 Traditional vs. the blockchain-based architecture of 5G healthcare |
|
|
131 | (38) |
|
|
|
|
|
|
131 | (3) |
|
|
132 | (1) |
|
6.1.2 Structure of the chapter |
|
|
132 | (2) |
|
6.2 5G-based smart healthcare industry: challenges, benefits, and use cases |
|
|
134 | (4) |
|
6.2.1 5G healthcare challenges |
|
|
135 | (1) |
|
6.2.2 5G Healthcare benefits |
|
|
136 | (1) |
|
6.2.3 5G Healthcare use cases |
|
|
137 | (1) |
|
6.3 Traditional 5G healthcare architecture |
|
|
138 | (5) |
|
6.3.1 5G Healthcare overall architecture |
|
|
139 | (1) |
|
6.3.2 5G Healthcare infrastructure architecture |
|
|
140 | (2) |
|
6.3.3 5G Healthcare RAN architecture |
|
|
142 | (1) |
|
6.3.4 5G Healthcare core network architecture |
|
|
143 | (1) |
|
6.4 Blockchain-based 5G healthcare architecture |
|
|
143 | (11) |
|
|
145 | (1) |
|
6.4.2 The components of a blockchain |
|
|
146 | (1) |
|
6.4.3 The components of blockchain block |
|
|
147 | (1) |
|
6.4.4 The blockchain-based architecture of 5G healthcare |
|
|
148 | (6) |
|
6.5 Comparative analysis: traditional vs. blockchain-based architecture of 5G healthcare |
|
|
154 | (9) |
|
6.5.1 Healthcare requirements |
|
|
154 | (2) |
|
6.5.2 5G opportunities for healthcare requirements |
|
|
156 | (2) |
|
6.5.3 Blockchain opportunities for healthcare requirements |
|
|
158 | (1) |
|
6.5.4 Blockchain to support 5G healthcare architecture functions |
|
|
159 | (3) |
|
6.5.5 Blockchain-based 5G healthcare architecture use cases |
|
|
162 | (1) |
|
|
163 | (6) |
|
|
164 | (5) |
|
7 Integrating blockchain technology in 5G-enabled smart healthcare: A SWOT Analysis |
|
|
169 | (28) |
|
|
|
|
|
|
170 | (2) |
|
7.1.1 Motivation of the chapter |
|
|
172 | (1) |
|
7.1.2 Contribution of the chapter |
|
|
172 | (1) |
|
7.1.3 Organization of the chapter |
|
|
172 | (1) |
|
7.2 Overview of blockchain technology |
|
|
172 | (5) |
|
7.2.1 Blockchain structure |
|
|
173 | (1) |
|
7.2.2 Key characteristics of blockchain |
|
|
174 | (1) |
|
7.2.3 Applications of blockchain in healthcare |
|
|
175 | (2) |
|
7.3 Overview of 5G networks |
|
|
177 | (5) |
|
7.3.1 Relevance of 5G in the healthcare sector |
|
|
179 | (1) |
|
7.3.2 Performance driving with 5G |
|
|
179 | (2) |
|
7.3.3 Advance features of 5G technology |
|
|
181 | (1) |
|
7.3.4 Potential applications of 5G technologies |
|
|
182 | (1) |
|
7.4 Potentials of integrating blockchain and 5G technology |
|
|
182 | (5) |
|
7.5 Perceptual overview of integrating blockchain and 5G technology in the healthcare sector |
|
|
187 | (3) |
|
7.5.1 Challenges of incorporating 5G and blockchain in the healthcare sector |
|
|
188 | (2) |
|
|
190 | (2) |
|
7.6.1 Characteristics of mobile application interactions between 5G and blockchain technology for serving the patient requirement |
|
|
191 | (1) |
|
7.6.2 Challenges arise in mobile application interactions between 5G and blockchain technology for serving the patient requirement |
|
|
192 | (1) |
|
7.7 SWOT analysis of incorporating blockchain and 5G technologies in the Healthcare sector |
|
|
192 | (1) |
|
|
192 | (5) |
|
|
194 | (3) |
|
8 Architectural framework of 5G-based smart healthcare system using blockchain technology |
|
|
197 | (30) |
|
|
|
|
|
|
197 | (5) |
|
8.1.1 Overview of blockchain for healthcare |
|
|
198 | (1) |
|
|
199 | (1) |
|
8.1.3 Implication of 5G in healthcare |
|
|
200 | (2) |
|
8.2 Traditional architecture - SHS using blockchain |
|
|
202 | (6) |
|
8.2.1 Basic architecture of SHS |
|
|
202 | (2) |
|
8.2.2 Architectural structure of blockchain |
|
|
204 | (3) |
|
8.2.3 SHS architecture using blockchain |
|
|
207 | (1) |
|
8.3 5G-based smart healthcare architecture using blockchain |
|
|
208 | (10) |
|
|
208 | (1) |
|
|
209 | (1) |
|
8.3.3 Design objectives of SHS |
|
|
210 | (1) |
|
|
211 | (4) |
|
8.3.5 Blockchain in smart healthcare |
|
|
215 | (1) |
|
8.3.6 5G-based architecture for SHS using blockchain |
|
|
215 | (1) |
|
8.3.7 Smart health devices and their significance |
|
|
216 | (2) |
|
8.4 Privacy and security in 5G-based SHS |
|
|
218 | (1) |
|
8.5 Advantages of 5G-based architecture in SHS |
|
|
218 | (2) |
|
8.6 Open research issues and challenges |
|
|
220 | (7) |
|
|
221 | (6) |
|
9 Application of millimeter wave (mm-Wave)-based device-to-device (D2D) communication in 5G healthcare |
|
|
227 | (22) |
|
|
|
|
|
228 | (1) |
|
|
228 | (1) |
|
9.2 Introduction to D2D communication technology |
|
|
229 | (6) |
|
9.2.1 D2D-assisted cellular communication |
|
|
230 | (1) |
|
9.2.2 D2D communication in LTE advanced |
|
|
231 | (1) |
|
9.2.3 Technical aspects of D2D communication |
|
|
232 | (1) |
|
9.2.4 MM Wave for D2D communication |
|
|
232 | (1) |
|
9.2.5 MM Wave communication features |
|
|
233 | (2) |
|
9.3 Introduction to wireless body area network (WBAN) |
|
|
235 | (5) |
|
9.3.1 Wireless personal area network (WPAN)Avireless local area network (WLAN) |
|
|
237 | (1) |
|
9.3.2 WBAN design requirements |
|
|
238 | (1) |
|
9.3.3 mmWave in wireless body area network |
|
|
239 | (1) |
|
9.4 5G-based internet of medical things (IoMT) |
|
|
240 | (3) |
|
|
242 | (1) |
|
|
243 | (2) |
|
9.5.1 Security issues in 5G-D2D-based WBAN |
|
|
243 | (1) |
|
9.5.2 Propagation losses in mm Wave communication |
|
|
243 | (1) |
|
9.5.3 Impact of mmWave radiations on human health |
|
|
243 | (2) |
|
|
245 | (4) |
|
|
245 | (4) |
|
10 Security and privacy in health data storage and its analytics |
|
|
249 | (38) |
|
|
|
|
|
249 | (2) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (3) |
|
10.2.1 Application intelligence |
|
|
252 | (1) |
|
10.2.2 Network intelligence |
|
|
252 | (1) |
|
10.2.3 Phases in data analytic |
|
|
252 | (2) |
|
|
254 | (1) |
|
10.3.1 Hadoop distributed file system |
|
|
254 | (1) |
|
|
254 | (1) |
|
10.3.3 Complex event processing |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (7) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
10.4.5 On-premise data storage |
|
|
256 | (1) |
|
|
256 | (6) |
|
|
262 | (1) |
|
10.5 Introduction to security and privacy |
|
|
262 | (1) |
|
10.6 Security threats in a wireless communication system |
|
|
263 | (3) |
|
10.6.1 Rogue access points |
|
|
264 | (1) |
|
10.6.2 Denial of Service (DOS) |
|
|
264 | (1) |
|
10.6.3 Configuration problems |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
10.7 E2E security solution for 5G |
|
|
266 | (1) |
|
10.8 Privacy challenges in 5G networks |
|
|
266 | (2) |
|
10.8.1 Loss of data ownership |
|
|
267 | (1) |
|
10.8.2 Location of legal disputes |
|
|
267 | (1) |
|
10.8.3 Shared environment |
|
|
267 | (1) |
|
|
267 | (1) |
|
10.8.5 Providing information for third party |
|
|
268 | (1) |
|
10.9 Privacy solutions for 5G |
|
|
268 | (1) |
|
10.9.1 Privacy-aware routing mechanisms by using SDN |
|
|
268 | (1) |
|
10.9.2 Hybrid cloud approach |
|
|
268 | (1) |
|
10.9.3 Service-oriented privacy preserving, mechanism |
|
|
269 | (1) |
|
10.10 Privacy and security concerns in healthcare data |
|
|
269 | (2) |
|
10.10.1 Importance of security and privacy in healthcare data |
|
|
269 | (1) |
|
10.10.2 Sharing data in cloud |
|
|
269 | (1) |
|
10.10.3 Data administration and laws |
|
|
270 | (1) |
|
|
270 | (1) |
|
10.10.5 Medical identity theft |
|
|
270 | (1) |
|
|
270 | (1) |
|
10.10.7 Incorrect diagnosis and treatment |
|
|
270 | (1) |
|
10.10.8 Denial of valid insurance claims |
|
|
270 | (1) |
|
10.10.9 Employment issues |
|
|
270 | (1) |
|
10.11 Security of healthcare data |
|
|
271 | (8) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
10.11.4 Online systems protection |
|
|
271 | (1) |
|
|
272 | (1) |
|
10.11.6 Healthcare data security life cycle |
|
|
272 | (1) |
|
10.11.7 Technologies used for security of healthcare data |
|
|
273 | (2) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
276 | (3) |
|
10.12 Privacy of healthcare data |
|
|
279 | (3) |
|
10.12.1 Data protection laws |
|
|
279 | (1) |
|
10.12.2 HIPAA Act, Patient Safety and Quality Improvement Act (PSQIA), and HITECH Act |
|
|
279 | (1) |
|
10.12.3 IT Act and IT (Amendment) Act |
|
|
279 | (1) |
|
|
279 | (1) |
|
10.12.5 Data Protection Act (DPA) |
|
|
280 | (1) |
|
10.12.6 Data protection directive |
|
|
280 | (1) |
|
10.12.7 The 09-08 Act, dated 18 February 2009 |
|
|
280 | (1) |
|
10.12.8 Methods of privacy preservation for healthcare data |
|
|
280 | (1) |
|
10.12.9 A privacy framework for healthcare data in cloud computing |
|
|
281 | (1) |
|
|
282 | (5) |
|
|
283 | (4) |
|
11 Artificial intelligence and machine learning techniques for diabetes healthcare |
|
|
287 | (28) |
|
|
|
|
|
|
288 | (1) |
|
11.1.1 Research contribution |
|
|
289 | (1) |
|
11.2 Data science healthcare applications overview |
|
|
289 | (1) |
|
|
290 | (3) |
|
11.3.1 Healthcare management and health informatics |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
11.4 Diabetes mellitus and its complication |
|
|
293 | (2) |
|
11.5 Deep learning model for prediction of diabetes retinopathy |
|
|
295 | (5) |
|
11.5.1 Diabetic retinopathy |
|
|
297 | (1) |
|
11.5.2 Methodology for deep learning model |
|
|
297 | (3) |
|
11.6 Results and discussion |
|
|
300 | (1) |
|
11.7 Machine learning model for prediction of diabetes mellitus |
|
|
301 | (8) |
|
11.7.1 Description of the dataset |
|
|
302 | (1) |
|
11.7.2 Knowledge base designing |
|
|
303 | (1) |
|
11.7.3 Knowledge base as a dataset |
|
|
303 | (4) |
|
11.7.4 Results and discussion |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (6) |
|
|
310 | (5) |
|
12 Analytics for data security and privacy in 5G healthcare services |
|
|
315 | (32) |
|
|
|
|
316 | (3) |
|
12.2 IoMT security and privacy architecture model |
|
|
319 | (5) |
|
12.2.1 Awareness or perception level |
|
|
320 | (1) |
|
12.2.2 Communication layer |
|
|
321 | (2) |
|
|
323 | (1) |
|
12.2.4 Software or application layer |
|
|
324 | (1) |
|
12.3 Suggested taxonomy for IoT-based receptors within the electronic healthcare system domain |
|
|
324 | (1) |
|
12.4 Taxonomy of IoT security |
|
|
325 | (3) |
|
|
326 | (1) |
|
|
326 | (1) |
|
12.4.3 Institute of Electrical and electronics engineers standards |
|
|
326 | (1) |
|
|
327 | (1) |
|
12.4.5 Technical knowledge |
|
|
328 | (1) |
|
12.5 S-health framework and techniques |
|
|
328 | (4) |
|
12.6 Identified issues and solutions |
|
|
332 | (3) |
|
12.6.1 Summary of analyzed effort held through this particular research |
|
|
335 | (1) |
|
12.7 Open issues and challenges |
|
|
335 | (4) |
|
12.8 Conclusions and open research issues in future |
|
|
339 | (8) |
|
|
340 | (7) |
|
13 Contactless attendance system: a healthcare approach to prevent spreading of covid-19 |
|
|
347 | (28) |
|
|
|
|
|
|
|
348 | (1) |
|
13.1.1 Traditional attendance system |
|
|
348 | (1) |
|
13.1.2 Automated attendance system |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (5) |
|
13.2.1 5G and covid-19 blockchain: value and importance |
|
|
353 | (1) |
|
|
354 | (2) |
|
13.3.1 Student and capture image |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
13.3.5 Database of students' images |
|
|
356 | (1) |
|
13.3.6 Record attendance and attendance system |
|
|
356 | (1) |
|
|
356 | (2) |
|
13.4.1 Object localization |
|
|
357 | (1) |
|
13.4.2 Classification with localization |
|
|
357 | (1) |
|
13.4.3 Landmark detection |
|
|
358 | (1) |
|
|
358 | (3) |
|
13.5.1 Training set creation and training |
|
|
358 | (1) |
|
13.5.2 Sliding window technique |
|
|
358 | (1) |
|
13.5.3 Fully connected layers to convolutional layers |
|
|
358 | (1) |
|
13.5.4 Convolution implementation of sliding windows [ 29] |
|
|
359 | (1) |
|
13.5.5 Drawing bounding boxes |
|
|
359 | (1) |
|
13.5.6 Intersection over Union (IoU) |
|
|
359 | (1) |
|
13.5.7 Non-max suppression |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (8) |
|
|
362 | (1) |
|
13.6.2 Face verification vs. face recognition |
|
|
362 | (1) |
|
13.6.3 Processes involved in face recognition |
|
|
363 | (1) |
|
13.6.4 One-shot learning problem |
|
|
363 | (1) |
|
|
364 | (1) |
|
13.6.6 Identifying the model |
|
|
364 | (1) |
|
13.6.7 Training the model-triplet loss [ 20] |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (2) |
|
13.6.10 Recording attendance |
|
|
368 | (1) |
|
13.7 Attendance and visitor management |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (2) |
|
|
370 | (1) |
|
13.8.2 Image classification and recognition |
|
|
370 | (1) |
|
13.8.3 Storage of the attendance date and time |
|
|
370 | (1) |
|
13.8.4 Better system with liveness detection |
|
|
370 | (1) |
|
13.8.5 Practical usage of the system |
|
|
370 | (1) |
|
13.8.6 Online database and user interaction |
|
|
371 | (1) |
|
13.8.7 Communicating with the user |
|
|
371 | (1) |
|
|
371 | (4) |
|
|
372 | (3) |
|
14 Blockchain-based smart contracts for e-healthcare management 4.0 |
|
|
375 | (22) |
|
|
|
Harsha Surya Abhishek Kota |
|
|
Vedantham Hanumath Sreeman |
|
|
|
|
375 | (4) |
|
14.1.1 Evolution of Health care 1.0 to 4.0 |
|
|
376 | (1) |
|
14.1.2 Blockchain in health-care applications used for preventing diseases |
|
|
377 | (2) |
|
14.2 Related works on blockchain technology in health-care sectors |
|
|
379 | (1) |
|
14.3 Blockchain-based health-care and management applications |
|
|
379 | (2) |
|
14.4 Benefits of blockchain technology in the health-care industry |
|
|
381 | (1) |
|
14.5 Ethereum-system design |
|
|
382 | (1) |
|
14.6 5G networks and Ethereum for the health-care sector |
|
|
383 | (1) |
|
14.6.1 Challenges in the health-care sector |
|
|
384 | (1) |
|
14.7 Real-time examples of Ethereum in the health-care sector |
|
|
384 | (1) |
|
14.8 5G networks and smart contracts |
|
|
384 | (1) |
|
14.9 Advantages of smart contracts |
|
|
385 | (1) |
|
14.10 Choosing the smart contract platform |
|
|
386 | (1) |
|
14.11 Applications of smart contracts in health care |
|
|
386 | (1) |
|
14.12 Case study-design and architecture |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
14.13 System implementation |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (2) |
|
14.14.1 Performance evaluation |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
392 | (5) |
|
|
393 | (4) |
|
15 An amalgamation of blockchain, Internet of Medical Things and 5G technologies for the Healthcare 4.0 ecosystem |
|
|
397 | (54) |
|
|
|
|
398 | (4) |
|
15.1.1 Motivation and significance for the study |
|
|
398 | (1) |
|
15.1.2 Market potential for the health-care industry |
|
|
398 | (1) |
|
15.1.3 Overview of blockchain, 5G and IoMT technologies |
|
|
398 | (2) |
|
15.1.4 Organization of the chapter |
|
|
400 | (1) |
|
15.1.5 Authors' research contribution |
|
|
401 | (1) |
|
15.1.6 Taxonomy and acronyms |
|
|
402 | (1) |
|
15.2 Review of recent literature |
|
|
402 | (23) |
|
|
403 | (8) |
|
15.2.2 Survey on web portals and mobile apps literature |
|
|
411 | (7) |
|
15.2.3 Healthcare 4.0 ecosystem |
|
|
418 | (1) |
|
|
418 | (7) |
|
15.2.5 Comparative analysis of survey papers with specific parameters |
|
|
425 | (1) |
|
15.2.6 Findings from literature survey |
|
|
425 | (1) |
|
15.3 Architecture of the Healthcare 4.0 ecosystem |
|
|
425 | (12) |
|
15.4 Research issues, implementation challenges, and future directions |
|
|
437 | (3) |
|
15.4.1 Research issues in IoMT and Healthcare 4.0 |
|
|
437 | (3) |
|
15.5 A Healthcare 4.0 ecosystem platforms and tools case study |
|
|
440 | (3) |
|
15.5.1 Qualcomm Life-Capsule |
|
|
440 | (1) |
|
15.5.2 Phillips HealthSuite |
|
|
441 | (1) |
|
15.5.3 GDm-Health system for gestational diabetes mellitus |
|
|
442 | (1) |
|
15.5.4 Medtronic insulin pump |
|
|
442 | (1) |
|
15.5.5 Medtronic carelink |
|
|
442 | (1) |
|
|
443 | (8) |
|
|
444 | (7) |
|
16 Detection of COVID-19 and its symptoms using chest X-rays for health care |
|
|
451 | (30) |
|
|
|
|
|
|
|
451 | (4) |
|
|
454 | (1) |
|
16.1.2 Importance of blockchain in 5G and COVID-19 |
|
|
454 | (1) |
|
16.1.3 Research contributions |
|
|
455 | (1) |
|
16.1.4 Organization of the chapter |
|
|
455 | (1) |
|
|
455 | (1) |
|
|
456 | (4) |
|
16.3.1 Current methodology |
|
|
456 | (3) |
|
|
459 | (1) |
|
16.4 Theoretical background |
|
|
460 | (6) |
|
|
460 | (6) |
|
16.5 Experimental Analysis |
|
|
466 | (7) |
|
16.5.1 Importing the dataset |
|
|
466 | (1) |
|
16.5.2 Pre-processing of the data |
|
|
467 | (2) |
|
16.5.3 Splitting the training and test data |
|
|
469 | (1) |
|
16.5.4 Architecture of CNN |
|
|
469 | (3) |
|
|
472 | (1) |
|
|
472 | (1) |
|
16.5.7 Graphical plot of accuracy and loss function |
|
|
472 | (1) |
|
16.6 Results and discussion |
|
|
473 | (2) |
|
16.7 Blockchain for integration with 5G networks and handling COVID-19 |
|
|
475 | (1) |
|
16.8 Research opportunities and open issues |
|
|
476 | (1) |
|
16.9 Conclusion and future scope |
|
|
477 | (4) |
|
|
477 | (4) |
|
17 Security and privacy control in 5G-enabled health care using blockchain |
|
|
481 | (26) |
|
|
|
|
|
481 | (3) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (12) |
|
|
485 | (2) |
|
|
487 | (1) |
|
|
487 | (2) |
|
17.2.4 Blockchain technology |
|
|
489 | (2) |
|
17.2.5 Evolution of blockchain |
|
|
491 | (3) |
|
17.2.6 Blockchain for 5G-enabled health care |
|
|
494 | (2) |
|
17.3 Current issues and challenges in 5G-enabled health care |
|
|
496 | (2) |
|
17.3.1 Technological challenges |
|
|
496 | (1) |
|
|
497 | (1) |
|
17.4 Security and privacy concerns in 5G-enabled health care |
|
|
498 | (2) |
|
17.5 Existing blockchain-based security solutions for health care |
|
|
500 | (1) |
|
17.5.1 Challenges of blockchain with 5G-enabled SH |
|
|
501 | (1) |
|
|
501 | (6) |
|
|
504 | (3) |
|
18 M2M for health care with blockchain security aspects |
|
|
507 | (30) |
|
|
|
|
|
|
507 | (4) |
|
18.2 State of the art: blockchain and M2M |
|
|
511 | (4) |
|
18.2.1 Background of the M2M network |
|
|
511 | (1) |
|
18.2.2 Background of blockchain |
|
|
511 | (1) |
|
18.2.3 Integration of blockchain and M2M |
|
|
512 | (1) |
|
18.2.4 Literature survey/related work |
|
|
513 | (2) |
|
18.3 Blockchain for M2M-enabling technologies |
|
|
515 | (2) |
|
18.3.1 Communication blockchain design in the public network area |
|
|
516 | (1) |
|
18.3.2 Communication blockchain design in the private network area |
|
|
516 | (1) |
|
18.4 Challenges and proposed solutions of M2M |
|
|
517 | (8) |
|
18.4.1 Physical random access channel (PARCH) overload problem |
|
|
517 | (2) |
|
18.4.2 Inefficient radio resource utilization and allocation |
|
|
519 | (1) |
|
18.4.3 Clustering techniques |
|
|
520 | (3) |
|
18.4.4 QoS provisioning for M2M device communication |
|
|
523 | (1) |
|
18.4.5 Cheap price and low power requirements for devices |
|
|
523 | (1) |
|
18.4.6 Security and privacy |
|
|
523 | (2) |
|
18.5 M2M implementation in health-care-a future direction |
|
|
525 | (6) |
|
18.5.1 Predictive maintenance of medical devices by employing M2M |
|
|
526 | (1) |
|
18.5.2 Intelligent manufacturing by M2M |
|
|
526 | (1) |
|
18.5.3 M2M creates smart hospitals |
|
|
527 | (1) |
|
18.5.4 M2M provisions automatic alerting systems |
|
|
527 | (1) |
|
18.5.5 Emergency medical services possible via M2M |
|
|
527 | (1) |
|
18.5.6 Remote vital sign monitoring from a hospital environment through M2M |
|
|
527 | (1) |
|
18.5.7 Post-marketing surveillance of medical devices |
|
|
527 | (1) |
|
18.5.8 Security and interoperability in health care |
|
|
528 | (2) |
|
18.5.9 Use cases of blockchain-based M2M-enabled health-care applications |
|
|
530 | (1) |
|
|
531 | (6) |
|
|
531 | (6) |
Index |
|
537 | |