An Internet of Healthcare Things (IoHT)-Based Healthcare Monitoring System

  • Harleen Kaur
  • Mohd. Atif
  • Ritu Chauhan
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 109)


In current times, there is a demand for a system with its associated devices, individuals, times, places, and networks fully integrated in the IoT. Internet of things has developed a health tracking device to be the closing blocks. The aim of an effective IoT healthcare gadget is to provide the current time to track patient medical conditions, prevent critical situations, and improve the comfort of the clever IoT environment. The fields of technological expertise and electronics have fused into the Internet of healthcare things (IoHT), one of the most exemplary technological progresses. Despite the fact that IoHT’s effect in health care was still widespread in its initial areas. In order to gain exquisite healthcare, this paper aims to check and understand IoHT programs.


Internet of healthcare things (IoHT) Radio-frequency identification (RFID) Wireless sensor networks (WSN) Micro-electrical mechanical systems (MEMS) 


  1. 1.
    Bagci IE, Raza S, Roedig U, Voigt T (2016) Fusion: coalesced confidential storage and communication framework for the IoT. Sec Commun Netw, pp 2656–2673Google Scholar
  2. 2.
    Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wireless Personal Commun, pp 49–69Google Scholar
  3. 3.
    Korteum G, Kawsar F, Fitton D, Sundramoorthy V (2010) Smart objects as building blocks for the internet of things, pp 44–51Google Scholar
  4. 4.
    Liang X, Xu i, Shen Q, Lu R, Lin X, Shen XS, Zhuang W (2012) Exploiting prediction to enable secure and reliable routing in wireless body area networks, pp 388–396Google Scholar
  5. 5.
    Benssalah M, Djeddou M, Drouiche K (2016) Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments. Sec Commun Netw, pp 4924–4948CrossRefGoogle Scholar
  6. 6.
    He D, Kumar N, Chen J, Lee C, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Syst, pp 49–60Google Scholar
  7. 7.
    Gope P, Hwang T (2016) BSN-care: a secure IoT-based modernhealthcare system using body sensor network, pp 1368–1376Google Scholar
  8. 8.
    Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) Anew authentication protocol for healthcare applications using wirelessmedical sensor networks with user anonymity. Sec Commun Netw, pp 2643–2655CrossRefGoogle Scholar
  9. 9.
    Alamr AA, Kausar F, Kim J, Seo C (2016) A secure ECC based RFID mutual authentication protocol for internet of things. J Supercomput, pp 1–14Google Scholar
  10. 10.
    Garkoti G, Peddoju SK, Balasubramanian R (2014) Detection of insider attacks in cloud based e-healthcare environment. Int Conf Inf Technol, pp 195–200Google Scholar
  11. 11.
    Ko H, Song MB (2015) A study on the secure user profiling structure and procedure for home healthcare systems. J Med Syst, pp 1–9Google Scholar
  12. 12.
    Cvitic I, Vujic M, Husnjak S (2016) Classification of security risks in the IoT environment. In: Proceedings of the 26th DAAAM international symposium on intelligent manufacturing and automation, pp 0731–0740Google Scholar
  13. 13.
    Choi J, In Y, Park C, Seok S, Seo H, Kim H (2016) Secure IoT framework and 2D architecture for End-To-End security, pp 1–15Google Scholar
  14. 14.
    Bruce N, Sain M, Lee HJ (2014) A support middleware solutionfor e-healthcare system security. In: 16th international conference on advanced communication technologyGoogle Scholar
  15. 15.
    Chi L, Hu L, Li H, Sun Y, Yuan W, Chu J (2013) Improvedenergy-efficient access control scheme for wireless sensor networks basedon elliptic curve cryptography. Sensor Lett, pp 953–957Google Scholar
  16. 16.
    Islam SMR, Kwak D, Kabir MH, Hossain M, Kyung-Sup Kwak, KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access, pp 678–708Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Harleen Kaur
    • 1
  • Mohd. Atif
    • 1
  • Ritu Chauhan
    • 2
  1. 1.Department of Computer Science and EngineeringSchool of Engineering Sciences and Technology, JamiaHamdardNew DelhiIndia
  2. 2.Centre for Computational Biology and BioinformaticsAmity UniversityNoidaIndia

Personalised recommendations