Advertisement

Medical cyber-physical systems: A survey

  • Nilanjan Dey
  • Amira S. Ashour
  • Fuqian Shi
  • Simon James Fong
  • João Manuel R. S. Tavares
Mobile & Wireless Health
Part of the following topical collections:
  1. Mobile & Wireless Health

Abstract

Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device’s network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.

Keywords

Networked medical device systems Wireless sensor networks Medical internet of things Body area networks Security assurance Patient monitoring 

Notes

Funding

We are the authors confirm no funding obtained.

Compliance with ethical standards

Conflict of interest

We are the authors confirm that no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
    Voit H (2013) An Arbitrated Networked Control Systems Approach to Cyber-Physical Systems (PhD Thesis), München, Technische Universität München, Diss.Google Scholar
  2. 2.
    Yi, M. Y., Fiedler, K. D., and Park, J. S., Understanding the role of individual innovativeness in the acceptance of it-based innovations: Comparative analyses of models and measures. Decis. Sci. 37(3):393–426, 2006.CrossRefGoogle Scholar
  3. 3.
    Raghupathi W, Raghupathi V, Big data analytics in healthcare: promise and potential. Health Information Science and Systems 2(1), 2014.Google Scholar
  4. 4.
    Haque, S. A., Aziz, S. M., and Rahman, M., Review of cyber-physical system in healthcare. Int. J. Distrib Sensor Netw. 10(4):217415, 2014.CrossRefGoogle Scholar
  5. 5.
    Hu L, Xie N, Kuang Z, Zhao K. Review of cyber-physical system architecture. InObject/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 15th IEEE International Symposium. IEEE. 25–30, 2012.Google Scholar
  6. 6.
    Li T. On coordination of cyber-physical systems (Doctoral dissertation, The Hong Kong Polytechnic University).Google Scholar
  7. 7.
    Baronchelli, A., Ferrer-i-Cancho, R., Pastor-Satorras, R., Chater, N., and Christiansen, M. H., Networks in cognitive science. Trends Cogn. Sci. 17(7):348–360, 2013.CrossRefPubMedGoogle Scholar
  8. 8.
    Liu, Z., Yang, D. S., Wen, D., Zhang, W. M., and Mao, W., Cyber-physical-social systems for command and control. IEEE Intell. Syst. 26(4):92–96, 2011.CrossRefGoogle Scholar
  9. 9.
    Rajkumar RR, Lee I, Sha L, Stankovic J. Cyber-physical systems: the next computing revolution. In Proceedings of the 47th Design Automation Conference. ACM. 731–736, 2010.Google Scholar
  10. 10.
    Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M., Internet of Things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7):1645–1660, 2013.CrossRefGoogle Scholar
  11. 11.
    Alam S, Chowdhury MM, Noll J. Senaas: An event-driven sensor virtualization approach for internet of things cloud. InNetworked Embedded Systems for Enterprise Applications (NESEA). IEEE International Conference. IEEE. 1–6, 2010.Google Scholar
  12. 12.
    Yilmaz, T., Foster, R., and Hao, Y., Detecting vital signs with wearable wireless sensors. Sensors 10(12):10837–10862, 2010.CrossRefPubMedPubMedCentralGoogle Scholar
  13. 13.
    Lee EA. Cyber physical systems: Design challenges. InObject oriented real-time distributed computing (isorc), 2008 11th ieee international symposium. . IEEE. 363–369, 2008.Google Scholar
  14. 14.
    Sampigethaya, K., and Poovendran, R., Aviation cyber–physical systems: Foundations for future aircraft and air transport. Proc. IEEE 101(8):1834–1855, 2013.CrossRefGoogle Scholar
  15. 15.
    Neuman C. Challenges in security for cyber-physical systems. In DHS Workshop on Future Directions in Cyber-Physical Systems Security. 22–24, 2009.Google Scholar
  16. 16.
    Baheti, R., and Gill, H., Cyber-physical systems. Impact Control Technol. 12:161–166, 2011.Google Scholar
  17. 17.
    Kocsis, I., Tóth, Á. R., Szatmári, Z., Dabóczi, T., Pataricza, A., and Guta, G., Towards cyber-physical system technologies over Apache VCL. Int. J. Cloud Comput. 5(1–2):91–111, 2016.CrossRefGoogle Scholar
  18. 18.
    Wan, J., Chen, M., Xia, F., Di, L., and Zhou, K., From machine-to-machine communications towards cyber-physical systems. Comput. Sc. Inform. Syst. 10(3):1105–1128, 2013.CrossRefGoogle Scholar
  19. 19.
    Zhuge H. The Knowledge Grid: Toward Cyber-Physical Society. World Scientific, 2012.Google Scholar
  20. 20.
    Horvath I. Beyond advanced mechatronics: new design challenges of Social-Cyber-Physical systems. InProceedings of the 1st Workshop on Mechatronic Design, Linz (Austria). ACCM Austrian Center of Competence in Mechatronics. 2012.Google Scholar
  21. 21.
    Caplan, M. Z., and Weissberg, R. P., Promoting social competence in early adolescence: Developmental considerations. Soc. Compet. Dev. Persp. 31:371–385, 1989.CrossRefGoogle Scholar
  22. 22.
    Ackerman, M. J., Filart, R., Burgess, L. P., Lee, I., and Poropatich, R. K., Developing next-generation telehealth tools and technologies: patients, systems, and data perspectives. Telemed. e-Health. 16(1):93–95, 2010.CrossRefGoogle Scholar
  23. 23.
    Arney D, Pajic M, Goldman JM, Lee I, Mangharam R, Sokolsky O. Toward patient safety in closed-loop medical device systems. InProceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems. ACM. 139–148, 2010.Google Scholar
  24. 24.
    Qian, L., Luo, Z., Du, Y., and Guo, L., Cloud computing: An overview. Cloud Comput.:626–631, 2009.Google Scholar
  25. 25.
    Alexander, K., and Clarkson, P. J., Good design practice for medical devices and equipment, Part II: design for validation. J. Med. Eng. Technol. 24(2):53–62, 2000.CrossRefPubMedGoogle Scholar
  26. 26.
    Goswami, S., Roy, P., Dey, N., and Chakraborty, S., Wireless body area networks combined with mobile cloud computing in healthcare: a survey. Class. Clust. Biomed. Sign. Proc. 7:388, 2016.Google Scholar
  27. 27.
    Lee I, Sokolsky O. Medical cyber physical systems. InDesign Automation Conference (DAC), 2010 47th ACM/IEEE. IEEE. 743–748, 2010.Google Scholar
  28. 28.
    Milenković, A., Otto, C., and Jovanov, E., Wireless sensor networks for personal health monitoring: Issues and an implementation. Comput. Commun. 29(13):2521–2533, 2006.CrossRefGoogle Scholar
  29. 29.
    Hackmann, G., Guo, W., Yan, G., Sun, Z., Lu, C., and Dyke, S., Cyber-physical codesign of distributed structural health monitoring with wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(1):63–72, 2014.CrossRefGoogle Scholar
  30. 30.
    Wang J, Abid H, Lee S, Shu L, Xia F. A secured health care application architecture for cyber-physical systems. arXiv preprint arXiv:1201.0213. 2011.Google Scholar
  31. 31.
    Banerjee A, Gupta SK, Fainekos G, Varsamopoulos G. Towards modeling and analysis of cyber-physical medical systems. InProceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM. 154, 2011.Google Scholar
  32. 32.
    Wu, F. J., Kao, Y. F., and Tseng, Y. C., From wireless sensor networks towards cyber physical systems. Pervasive Mob. Comput. 7(4):397–413, 2011.CrossRefGoogle Scholar
  33. 33.
    Taleb T, Bottazzi D, Guizani M, Nait-Charif H. Angelah: a framework for assisting elders at home. IEEE Journal on Selected Areas in Communications. 27(4), 2009.Google Scholar
  34. 34.
    Lee, I., Sokolsky, O., Chen, S., Hatcliff, J., Jee, E., Kim, B., King, A., Mullen-Fortino, M., Park, S., Roederer, A., and Venkatasubramanian, K. K., Challenges and research directions in medical cyber–physical systems. Proc. IEEE 100(1):75–90, 2012.CrossRefGoogle Scholar
  35. 35.
    Kammer D, Lunsford EM, inventors; Palmsource, Inc., assignee. Power-conserving intuitive device discovery technique in a bluetooth environment. United States patent US 6,950,645. 2005.Google Scholar
  36. 36.
    Fox, R. C., The evolution of medical uncertainty. The Milbank Memorial Fund Quarterly. Health Soc. 1:1–49, 1980.Google Scholar
  37. 37.
    Huebsch, N., and Mooney, D. J., Inspiration and application in the evolution of biomaterials. Nature 462(7272):426–432, 2009.CrossRefPubMedPubMedCentralGoogle Scholar
  38. 38.
    Idowu, S. A., Omotosho, O. J., Ojesanmi, O. A., and Maitanmi, S. O., Cyber-Physical Systems: A Framework for Prediction of Error in Smart Medical Devices. Am. J. Soft. Eng. Appl. 4(4):71–79, 2015.Google Scholar
  39. 39.
    Pattichis, C. S., Kyriacou, E., Voskarides, S., Pattichis, M. S., Istepanian, R., and Schizas, C. N., Wireless telemedicine systems: an overview. IEEE Ant. Propagation Mag. 44(2):143–153, 2002 Apr.CrossRefGoogle Scholar
  40. 40.
    Levin, E., Pieraccini, R., and Eckert, W., A stochastic model of human-machine interaction for learning dialog strategies. IEEE Trans Speech Audio Proc. 8(1):11–23, 2000.CrossRefGoogle Scholar
  41. 41.
    Jiang, Z., Pajic, M., and Mangharam, R., Cyber–physical modeling of implantable cardiac medical devices. Proc. IEEE 100(1):122–137, 2012.CrossRefGoogle Scholar
  42. 42.
    Otto, C., Milenkovic, A., Sanders, C., and Jovanov, E., System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob Mult. 1(4):307–326, 2006.Google Scholar
  43. 43.
    Tong, G. A., Li, S., Wu, W., and Du, D. Z., Effector Detection in Social Networks. IEEE Trans. Comput. Soc. Syst. 3(4):151–163, 2016.CrossRefGoogle Scholar
  44. 44.
    Nasim, M., Charbey, R., Prieur, C., and Brandes, U., Investigating Link Inference in Partially Observable Networks: Friendship Ties and Interaction. IEEE Trans. Comput. Soc. Syst. 3(3):113–119, 2016.CrossRefGoogle Scholar
  45. 45.
    Shmueli, E., Singh, V. K., Lepri, B., and Pentland, A., Sensing, understanding, and shaping social behavior. IEEE Trans. Comput. Soc. Syst. 1(1):22–34, 2014.CrossRefGoogle Scholar
  46. 46.
    Farasat, A., Gross, G., Nagi, R., and Nikolaev, A. G., Social network analysis with data fusion. IEEE Trans. Comput. Soc. Syst. 3(2):88–99, 2016.CrossRefGoogle Scholar
  47. 47.
    Guzman, J. D., Deckro, R. F., Robbins, M. J., Morris, J. F., and Ballester, N. A., An analytical comparison of social network measures. IEEE Trans. Comput. Soc. Syst. 1(1):35–45, 2014.CrossRefGoogle Scholar
  48. 48.
    Yamin, M., and Sen, A. A., Improving Privacy and Security of User Data in Location Based Services. In. J. Ambient Comput. Intel. (IJACI). 9(1):19–42, 2018.CrossRefGoogle Scholar
  49. 49.
    Belgharb, K., and Boufaida, M., Using Event B to Specify Context Awareness for Service Discovery in Pervasive Environments. In. J. Ambient Comput. Intel. (IJACI). 8(1):1–22, 2017.CrossRefGoogle Scholar
  50. 50.
    Sawlikar, A. P., Khan, Z. J., and Akojwar, S. G., Efficient energy saving cryptographic techniques with software solution in wireless network. Int. J. Synth. Emotions (IJSE). 7(2):78–96, 2016.CrossRefGoogle Scholar
  51. 51.
    Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., and Barde, S. S., Framework for Threat Analysis and Attack Modelling of Network Security Protocols. Int. J. Synth. Emotions (IJSE). 8(2):62–75, 2017.CrossRefGoogle Scholar
  52. 52.
    Zhang, W., Qi, Q., and Deng, J., Building Intelligent Transportation Cloud Data Center Based on SOA. In. J. Ambient Comput. Intel. (IJACI). 8(2):1–1, 2017.CrossRefGoogle Scholar
  53. 53.
    Jain, A., and Bhatnagar, V., Concoction of Ambient Intelligence and Big Data for Better Patient Ministration Services. In. J. Ambient Comput. Intel. (IJACI). 8(4):19–30, 2017.CrossRefGoogle Scholar
  54. 54.
    Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE. Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. InIntelligent techniques in signal processing for multimedia security. Springer, Cham. 133–149, 2017.Google Scholar
  55. 55.
    Rajeswari P, Raju SV, Ashour AS, Dey N. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing. InIntelligent techniques in signal processing for multimedia security. . Springer, Cham. 469–485, 2017.Google Scholar
  56. 56.
    Koukopoulos, D., and Koukoulis, K., A Trustworthy System with Mobile Services Facilitating the Everyday Life of a Museum. In. J. Ambient Comput. Intel. (IJACI). 9(1):1–8, 2018.CrossRefGoogle Scholar
  57. 57.
    Roy P, Patra N, Mukherjee A, Ashour AS, Dey N, Biswas SP. Intelligent traffic monitoring system through auto and manual controlling using PC and Android Application. InApplied video processing in surveillance and monitoring systems. IGI Global. 244–262, 2017.Google Scholar
  58. 58.
    Kamal, S., Dey, N., Ashour, A. S., Ripon, S., Balas, V. E., and Kaysar, M. S., FbMapping: An automated system for monitoring Facebook data. Neural Netw. World. 27(1):27, 2017.CrossRefGoogle Scholar
  59. 59.
    Wang, D., Li, Z., Cao, L., Balas, V. E., Dey, N., Ashour, A. S., McCauley, P., Dimitra, S. P., and Shi, F., Image fusion incorporating parameter estimation optimized Gaussian mixture model and fuzzy weighted evaluation system: A case study in time-series plantar pressure data set. IEEE Sensors J. 17(5):1407–1420, 2017.CrossRefGoogle Scholar
  60. 60.
    Li, Z., Dey, N., Ashour, A. S., Cao, L., Wang, Y., Wang, D., McCauley, P., Balas, V. E., Shi, K., and Shi, F., Convolutional Neural Network Based Clustering and Manifold Learning Method for Diabetic Plantar Pressure Imaging Dataset. J. Med. Imaging Health Inform. 7(3):639–652, 2017.CrossRefGoogle Scholar
  61. 61.
    Wang C, Li Z, Dey N, Ashour A, Fong S, Sherratt RS, Wu L, Shi F. Histogram of oriented gradient based plantar pressure image feature extraction and classification employing fuzzy support vector machine. Journal of Medical Imaging and Health Informatics. 2017.Google Scholar
  62. 62.
    Kamal, M. S., Parvin, S., Ashour, A. S., Shi, F., and Dey, N., De-Bruijn graph with MapReduce framework towards metagenomic data classification. Int. J. Inf. Technol. 9(1):59–75, 2017.Google Scholar
  63. 63.
    Kamal, S., Dey, N., Nimmy, S. F., Ripon, S. H., Ali, N. Y., Ashour, A. S., Karaa, W. B., Nguyen, G. N., and Shi, F., Evolutionary framework for coding area selection from cancer data. Neural Comput. & Applic. 29(4):1015–1037, 2018.CrossRefGoogle Scholar
  64. 64.
    Kamal, M. S., Chowdhury, L., Khan, M. I., Ashour, A. S., Tavares, J. M., and Dey, N., Hidden Markov model and Chapman Kolmogrov for protein structures prediction from images. Comput. Biol. Chem. 68:231–244, 2017.CrossRefPubMedGoogle Scholar
  65. 65.
    Dey N, Dey G, Chakraborty S, Chaudhuri SS. Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring. InConcepts and trends in healthcare information systems. Springer, Cham. 205–229, 2014.Google Scholar
  66. 66.
    Dey N, Ashour AS, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien AE. Watermarking in Biomedical Signal Processing. InIntelligent Techniques in Signal Processing for Multimedia Security. Springer, Cham. 345–369, 2017.Google Scholar
  67. 67.
    Li W, Meng W, Su C, Kwok LF. Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access. 2018.Google Scholar
  68. 68.
    Fu Z, Guo C, Ren S, Ou Y, Sha L. Modeling and Integrating Human Interaction Assumptions in Medical Cyber-Physical System Design. In2017 I.E. 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE. 373–378, 2017.Google Scholar
  69. 69.
    Jiang, Y., Song, H., Wang, R., Gu, M., Sun, J., and Sha, L., Data-centered runtime verification of wireless medical cyber-physical system. IEEETtrans. Ind. Info. 13(4):1900–1909, 2017.CrossRefGoogle Scholar
  70. 70.
    Gu, L., Zeng, D., Guo, S., Barnawi, A., and Xiang, Y., Cost efficient resource management in fog computing supported medical cyber-physical system. IEEE Trans. Emerg. Topics Comput. 5(1):108–119, 2017.CrossRefGoogle Scholar
  71. 71.
    Fu Z, Guo C, Ren S, Jiang Y, Sha L. Modeling and integrating physical environment assumptions in medical cyber-physical system design. InProceedings of the Conference on Design, Automation & Test in Europe. European Design and Automation Association. 1619–1622, 2017.Google Scholar
  72. 72.
    Kocabas, O., Soyata, T., and Aktas, M. K., Emerging security mechanisms for medical cyber physical systems. IEEE/ACM Trans. Comput Biol. Bioinform. 13(3):401–416, 2016.CrossRefPubMedGoogle Scholar
  73. 73.
    Mitchell, R., and Chen, R., Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12(1):16–30, 2015.CrossRefGoogle Scholar
  74. 74.
    Rao, A., Carreón, N., Lysecky, R., and Rozenblit, J., Probabilistic Threat Detection for Risk Management in Cyber-physical Medical Systems. IEEE Softw. 35(1):38–43, 2018.CrossRefGoogle Scholar
  75. 75.
    Larson, B. R., Zhang, Y., Barrett, S. C., Hatcliff, J., and Jones, P. L., Enabling safe interoperation by medical device virtual integration. IEEE Des. Test. 32(5):74–88, 2015.CrossRefGoogle Scholar
  76. 76.
    Ray, A., and Cleaveland, R., Security Assurance Cases for Medical Cyber–Physical Systems. IEEE Des. Test. 32(5):56–65, 2015.CrossRefGoogle Scholar
  77. 77.
    Xu, Q., Ren, P., Song, H., and Du, Q., Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions. IEEE Int. Things J. 4(6):1924–1933, 2017.CrossRefGoogle Scholar
  78. 78.
    Bernardeschi C, Domenici A, Masci P. A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems. IEEE Transactions on Software Engineering. 14, 2017.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information TechnologyTechno India College of TechnologyKolkataIndia
  2. 2.Department of Electronics and Electrical Communications Engineering, Faculty of EngineeringTanta UniversityTantaEgypt
  3. 3.College of Information & EngineeringWenzhou Medical UniversityWenzhouPeople’s Republic of China
  4. 4.Department of Computer and Information Science Data Analytics and Collaborative Computing Laboratory University of MacauTaipaPeople’s Republic of China
  5. 5.Instituto de Ciência e Inovação em Engenharia Mecânica e Engenharia Industrial, Departamento de Engenharia Mecânica, Faculdade de EngenhariaUniversidade do PortoPortoPortugal

Personalised recommendations