Skip to main content

Advertisement

Log in

A secured internet of robotic things (IoRT) for long-term care services in a smart building

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

A Correction to this article was published on 11 November 2022

This article has been updated

Abstract

Long-term care refers to any support, both medical and non-medical, provided to the elderly with a chronic illness or disability due to physical or mental conditions. Since the cost of long-term care insurance is not inexpensive, low-cost devices and sensors can be used to create medical assistance systems to reduce human maintenance costs. The requirement of security and privacy under healthcare information protection is a critical issue for internet of medical things (IoMT) data transmission. In this paper, we designed an IoMT security robot for a long-term care system. The goal of this IoMT security robot is to provide secure transmission of the residents’ private information. It is composed of three layers, namely, collection, encryption, and transmission. The function of the IoMT security robot is to first collect data from the patient or the elderly, then provide efficient data encryption, and deliver secured data transmission mechanisms to send the valuable data to the cloud. This IoMT security robot also has a server authentication mechanism, and a support IoT and IoMT devices inspection function. Our evaluation results showed that even when we utilized a low power consumption device like Raspberry Pi, AES algorithm achieved an encrypt and decrypt of 100–100 K bytes under 9 ms, which is a lot better than ECC, which takes about 104 ms. Further, we found that the AES only takes 0.00015 s to decrypt 100 Bytes data, which is way faster than the ECC algorithm, which takes 0.09 s.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Data generated during the current study are available from the corresponding author on reasonable request.

Change history

References

  1. COVID-19 infection prevention and control : preparedness checklist for long-term care facilities https://iris.wpro.who.int/handle/10665.1/14569. Accessed 6 May 2021

  2. Wu F, Qiu C, Wu T, Yuce MR (2021) Edge-based hybrid system implementation for long-range safety and healthcare IoT applications. IEEE Internet Things J 8(12):9970–9980

    Article  Google Scholar 

  3. Mir U, Abbasi U, Mir T, Kanwal S, Alamri S (2021) Energy management in long-term care environments and homes: current approaches a hypothetical solution and open issues and challenges. IEEE Access 9:94132–94148

    Article  Google Scholar 

  4. How the Internet of Medical Things Is Transforming Healthcare, Kajeet, Bethesda, MD, USA. Accessed 18 Nov 2020

  5. 2020 Vision: A Review of Major IT & Cyber Security Issues Affecting Healthcare. CyberMDX, New York, NY, USA. Accessed 18 Nov 2020

  6. Maddox W. Why Medical Data Is 50 Times More Valuable Than a Credit Card. Accessed 18 Nov 2020

  7. Information Assurance, United States Naval Acad., Annapolis, MD, USA. Accessed 18 Nov 2020

  8. Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: limitations, issues and recommendations. Future Gener Comput Syst 105(C):581–606

    Article  Google Scholar 

  9. Vyas A, Pal S (2020) Preventing security and privacy attacks in WBAN. Handbook of Computer Networks and Cyber Security, Springer, pp 201–225

    Google Scholar 

  10. Pesapane F, Suter MB, Codari M, Patella F, Volonté C, Sardanelli F (2020) Chapter 52—Regulatory issues for artificial intelligence in radiology. Precision Medicine for Investigators, Practitioners and Providers. Academic, London, pp 533–543

    Book  Google Scholar 

  11. Aman AHM, Yadegaridehkordi E, Attarbashi ZS, Hassan R, Park Y-J (2020) A survey on trend and classification of internet of things reviews. IEEE Access 8:111763–111782

    Article  Google Scholar 

  12. Sheng T-J (2020) An internet of things based smart waste management system using LoRa and tensorflow deep learning model. IEEE Access 8:148793–148811

    Article  Google Scholar 

  13. Sadhukhan D, Ray S, Biswas GP, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77:1114–1151

    Article  Google Scholar 

  14. Touqeer H, Zaman S, Amin R, Hussain M, Al-Turjman F, Bilal M (2021) Smart home security: challenges, issues and solutions at different IoT layers. J Supercomput 77:14053–14089

    Article  Google Scholar 

  15. Jensen KL, Pedersen CF, Larsen LB (2007) Diasnet mobile—a personalized mobile diabetes management and advisory service. In: Afhandling præsenteret på second international workshop on personalisation for e-health in conjunction with user modelling

  16. Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:1–20

    Article  Google Scholar 

  17. Prasetyo H, Hsia C-H (2019) Lossless progressive secret sharing for grayscale and color images. Multimed Tools Appl 78(17):24837–24862

    Article  Google Scholar 

  18. Data protection in the EU,https://ec.europa.eu/info/law/law-topic/data-protection/data-protection-eu_en. Accessed 6 May 2020

  19. HL7. Standard: Refinement, Constraint and Localization, Release 2. http://www.hl7.org/implement/standards/ansiapproved.cfm. Accessed 5 May 2019

  20. Afanasyev I, Mazzara M, Chakraborty S, Zhuchkov N, Maksatbek A, Yesildirek A, Kassab M, Distefano S (2019) Towards the internet of robotic things: analysis architecture components and challenges. In: IEEE International Conference on Developments in Esystems Engineering, pp 3–8

  21. Kehoe B, Patil S, Abbeel P, Goldberg K (2015) A survey of research on cloud robotics and automation. IEEE Trans Autom Sci Eng 12(2):398–409

    Article  Google Scholar 

  22. Dragoni N, Giaretta A, Mazzara M (2016) The internet of hackable things. In: International Conference in Software Engineering for De-Fence Applications, pp 129–140

  23. Grieco LA, Rizzo A, Colucci S, Sicari S, Piro G, Paola DD, Boggia G (2014) Iot-aided robotics applications: technological implications, target domains and open issues. Comput Commun 54:32–47

    Article  Google Scholar 

  24. Hu G, Tay WP, Wen Y (2012) Cloud robotics: architecture, challenges and applications. IEEE Network 26(3):21–28

    Article  Google Scholar 

  25. Donno MD, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come from clouds: Security of cloud computing in the iot era. Future Internet 11(6):127

    Article  Google Scholar 

Download references

Funding

This work was partially supported by the Ministry of Science and Technology, Taiwan, R.O.C. under Grant No. MOST 111-2221-E-197-020-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-Hsien Hsia.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: In this article the affiliation details for the authors were incorrectly given. The correct is: Shih‑Hao Chang belongs to affiliation 1, Chih‑Hsien Hsia belongs to affiliations 2,3 and Wei‑Zhi Hong belongs to affiliation 4.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, SH., Hsia, CH. & Hong, WZ. A secured internet of robotic things (IoRT) for long-term care services in a smart building. J Supercomput 79, 5276–5290 (2023). https://doi.org/10.1007/s11227-022-04845-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04845-1

Keywords