ChapterPDF Available

Privacy and Security of IoT Based Healthcare Systems: Concerns, Solutions, and Recommendations

Authors:

Abstract and Figures

Although emerging IoT paradigms in sleep tracking have a substantial contribution to enhancing current healthcare systems, there are several privacy and security considerations that end-users need to consider. End-users can be susceptible to malicious threats when they allow permission to potentially vulnerable or leaky third-party apps. Since the data is migrated to the cloud, it goes over insecure communication channels, all of which have their security concerns. Moreover, there are alternative data violation concerns when the data projects into the proprietor’s cloud storage facility. In this study, we present some of the existing IoT sleep trackers, also we discuss the most common features associated with these sleep trackers. As the majority of end-users are not aware of the privacy and security concerns affiliated with emerging IoT sleep trackers. We review existing solutions that can apply to IoT sleep tracker architecture. Also, we describe a deployed IoT platform that can address these concerns. Finally, we provide some of the recommendations to end-users and service providers to ensure a safer approach while leveraging the IoT sleep tracker in caregiving. This incorporates recommendations for software updates, awareness programs, software installation, and social engineering.
Content may be subject to copyright.
Privacy and Security of IoT Based
Healthcare Systems: Concerns, Solutions,
and Recommendations
Ibrahim Sadek1(B
), Shafiq Ul Rehman2,Josu´eCodjo
3,
and Bessam Abdulrazak3
1Faculty of Engineering, Biomedical Engineering Department,
Helwan University, Cairo, Egypt
ibrahim ibrahim@h-eng.helwan.edu.eg
2ST Electronics-SUTD Cyber Security Laboratory,
Singapore University of Technology and Design, Singapore, Singapore
3epartement d'Informatique, Facult´e des sciences,
Universit´e de Sherbrooke (UdeS), Sherbrooke, Canada
Abstract. Although emerging IoT paradigms in sleep tracking have a
substantial contribution to enhancing current healthcare systems, there
are several privacy and security considerations that end-users need to
consider. End-users can be susceptible to malicious threats when they
allow permission to potentially vulnerable or leaky third-party apps.
Since the data is migrated to the cloud, it goes over insecure commu-
nication channels, all of which have their security concerns. Moreover,
there are alternative data violation concerns when the data projects into
the proprietor’s cloud storage facility. In this study, we present some of
the existing IoT sleep trackers, also we discuss the most common features
associated with these sleep trackers. As the majority of end-users are not
aware of the privacy and security concerns affiliated with emerging IoT
sleep trackers. We review existing solutions that can apply to IoT sleep
tracker architecture. Also, we describe a deployed IoT platform that can
address these concerns. Finally, we provide some of the recommendations
to end-users and service providers to ensure a safer approach while lever-
aging the IoT sleep tracker in caregiving. This incorporates recommen-
dations for software updates, awareness programs, software installation,
and social engineering.
1 Introduction
The 2019 “World Economic Forum” global risk report1has nominated cyber
attacks and data breaches as the fourth and fifth deliberate risks facing the
world today. It is the second year in a row that these threats feature in the top
five list of risks. Healthcare, among others, was offended with more cybersecu-
rity breaches, in which several situations can lead to these breaches, for example,
1World Economic Forum. The Global Risks Report 2019. Retrieved May 29, 2019,
from https://www.weforum.org/reports/the-global-risks-report-2019.
c
The Author(s) 2019
J. Pag´an et al. (Eds.): ICOST 2019, LNCS 11862, pp. 3–17, 2019.
https://doi.org/10.1007/978-3-030-32785-9_1
4 I. Sadek et al.
credential-stealing malware, an insider who either systematically or accidentally
unveils patient data, or lost laptops or other mobile devices. On the illegal mar-
ket, “Protected Health Information” (PHI) is more important than credit card
credentials or even personally identifiable information. Hence, there is a higher
motivation for cybercriminals to target medical databases, and so they can sell
the PHI or adapt it for their benefits.
Throughout the world, healthcare challenges can exist in different shapes and
forms. Subsequently, this presents tremendous pressure on the current system.
Even though every society faces various demands and encounters several effects,
it is still practicable to determine the overall global risk to current healthcare
systems. These demands are a fundamental starting point for the work ahead.
Population aging, the prevalence of chronic diseases, shortage of healthcare spe-
cialists, and the unpredictable rise of healthcare costs, among other reasons,
are the considerable challenges facing today’s healthcare systems. For dealing
with these issues, public and private sector players should collaborate to find
more innovative and affordable methods that can be deployed in out-of-hospital
environments [14]. Healthcare IoT based systems are multiples and vary from
wearable to mobile sensors going through actuators, that acquire patient biosig-
nals, motion, or contextual information. Amongst those systems, we have Zio
Patch depicted in [24] which measures heart rate and electrocardiogram (ECG)
and Myo [9] which is a motion controller used in orthopedics for patients who
need to exercise after a fracture. None of the above performs in multiple infor-
mation gathering. Therefore, we have systems, which can combine biosignals,
motion, and contextual information such as sleep trackers.
In this paper, we focus on sleep tracking as a significant vector of quality of
life. Sleep is crucial to our health and sleep disorders can often be a symptom of
a disease; or likewise may be a signal of a subsequent illness such as depression.
As a result, assessment of sleep is a fundamental component of any health check.
Understanding cardiovascular and respiratory systems are essential for analyzing
sleep and sleep cycles. This is because the active processes in the human body
are different in sleep and wakefulness.
Nowadays, we can render the Internet of Things (IoT) and Cloud services
to improve access to caregiving by remotely strengthen the quality of caregiving
and above all cut down the cost of caregiving. As different sleep trackers, i.e.,
IoT devices are used to collect the user data and transfer it to the cloud. The
collected data is later being analyzed by sleep experts to enhance these devices
for better results. According to the “ABI Research” report2currently, there are
over 10 billion wirelessly connected IoT devices, and by 2020, the number will
exceed 30 billion devices. Some of these devices will fall within the category of
sleep-tracking devices. Nevertheless, these emerging technologies are vulnerable
to adversarial attacks because of their design. The data breach can have severe
consequences both on individual users and the company’s reputation. Moreover,
2ABI Research. Over 30 Billion Devices Will Wirelessly Connect to the Internet of
Everything in 2020. Retrieved May 29, 2019, from https://www.abiresearch.com/
press/more-than-30-billion- devices-will-wirelessly-conne/.
Security and Privacy of IoT Based Healthcare Systems 5
compromised IoT sleep tracking devices can allow intruders to monitor the user’s
private lives actively.
The main contribution of this study is to highlight the privacy and security
concerns of IoT sleep trackers and provide an insight into how precise mech-
anisms or approaches can be applied to prevent or mitigate such adversarial
attempts. We anticipate this research to guide future researchers to use and
apply specific solutions for IoT in healthcare problems based on the proposed
approaches and mechanisms by security experts.
The rest of the paper is organized as follows: IoT sleep trackers and their
types are described in Sect. 2. We state the security and privacy issues that are
associated with IoT sleep trackers in Sect. 3. We present some existing solutions
in Sect. 4, then we depict an IoT based case study in Sect. 5, while we mention
the recommendations in Sect. 6. We outline the conclusion in Sect.7.
2 IoT Sleep Trackers
The healthcare system desperately needs reform to rein in costs, improve quality,
and expand access. Medical diagnosis consumes a large part of hospital bills.
Technology can move medical check routines from a hospital (hospital-centered)
to the home (home-centered) of the patient. A new paradigm, known as the
IoT, widely applies in many areas, including healthcare. The full application
of this paradigm in healthcare is a mutual hope, as it enables medical centers
to function more efficiently and patients to receive better treatment. There are
unique benefits with the use of this technology that could improve the quality
and efficiency of treatments and thus improve patient health.
IoT technology permits and facilitates remote monitoring of patients who
do not have ready access to adequate health monitoring. Likewise, it helps to
thoroughly reduce costs and promote health by increasing the availability and
quality of care [12]. The IoT is a network of smart devices and other objects inte-
grated with electronics, software, sensors, and network connectivity that permit
these objects to get and exchange data. The concept of IoT provides health-
care professionals and caregivers to access a patient’s medical history, vitals, lab
results, medical and prescription histories either on-site or remotely via tablets
or smartphones. Patients can be observed and notified from anywhere [9]. We
can use IoT based solutions to record patient health data securely from several
sensors, apply complicated algorithms to analyze the data and then distribute
it through wireless connectivity with medical specialists who can make suitable
health recommendations [21].
Typically, examining a person’s sleep requires an overnight sleep test (Fig.1)
or polysomnography (PSG) that allows the monitoring of several physiological
functions besides sleep cycles [4,22]. Although the PSG, or as known as the gold
standard for sleep monitoring, provides real-time and accurate information about
sleep, it is cumbersome, expensive, and time-consuming. Thus, the healthcare
community is inquiring novel nonintrusive solutions that can improve the quality
of healthcare for the patient while sustaining the cost of the service provided [19].
6 I. Sadek et al.
Fig. 1. An illustration of the location of the various electrodes and sensors used during
the overnight sleep. Adapted from: mattressclarity.com
Actigraph is a very famous example that can be used for sleep analysis. The
device is not as accurate as of the PSG. However, its information, which is based
on the users’ activity, is critical for healthcare professionals to interpret and
analyze the sleep behavior of the users. As hardware and software technology
is advancing quickly, several devices and mobile apps have been developed for
general healthcare monitoring, including sleep. These devices could be wear-
ables such as bracelets, smart-watches, smart-shirts, or smart-rings (Fig. 2)or
non-wearable like bed-sensors that can be installed underneath the user’s bed
mattress (Fig. 3).
Sleep monitoring is described as getting qualitative sleep metrics by moni-
toring a person’s sleep during the night. These serve two functions. One is to
formulate an objective view of the quality of a person’s sleep, while the other
role is to determine the trends in sleep. Respiratory rate and body movements
are considered the most detailed measurements for sleep monitoring during the
sleeping session. The respiratory rate and respiratory rate variability are used
for rapid eye movement (REM) sleep identification, while the movement metrics
are utilized to discriminate between deep sleep, light sleep, and then waking
stages of sleep. We can also extract several sleep parameters, for example, the
duration of a sleep period, the number of awakenings, duration of disturbed
sleep periods, and the time required to fall asleep. In recent years, various sen-
sor technologies have been exploited, especially to monitor sleep-wake patterns
simultaneously with the gold standard PSG and actigraphy; these sensor tech-
nologies are commonly denoted as consumer sleep tracking devices. Consumer
sleep tracking devices are just like actigraphs because they allow users to be
mobile and sleep as usual while being monitored closely.
Most of the consumer sleep monitors pretend to help provide information
about sleep duration and quality of sleep, enabling subjects to awaken only
from the light sleep. Typically, the data gained from consumer sleep tracking
devices are not intended for routine diagnosis of sleep disorders. However, scien-
tific improvements in hardware and software, accessibility, and ready availability
Security and Privacy of IoT Based Healthcare Systems 7
Fig. 2. Illustrations for wearable sleep trackers; (a) smart-shirt, (b) smart-bracelet,
and (c) smart-watch. Icons made by Freepik from: flaticon.com
Fig. 3. Some examples of non-wearables sleep trackers; (a) Beautyrest c
2019 Simmons
Bedding Company LLC, (b) EarlySense c
2019 Early Sense, and (c) Withings c
2019
Withings.
allow the public to adopt them for clinical purposes. These devices include Emfit
QS,Beddit,Withings,Sleepace Reston,Beautyrest,andJuvo. Figure 3shows
three examples of existing bed-based sleep trackers.
These sensors are designed and packaged in a way that makes them invisible
to the subjects. For instance, we can easily integrate them into home furniture
such as beds, pillows, chairs, or even weighing scales [26]. These sensors technolo-
gies are preferred than those popular sensors (e.g., ECG) when we are considering
long-term (trend over time, early detection and intervention by sending alarms
to family members or caregivers through well-designed user interfaces), mobile,
convenient and practical (aging-in-place, senior activity centers). However, in
critical situations, gold-standard methods should be considered [20].
Most of the existing products implement the piezoelectric technology for
nonintrusive monitoring of vital signs (for example, Beddit,Withings,Sleep-
ace Reston,andBeautyrest) which shows the popularity and suitability of the
piezoelectric material for measuring the slight vibrations caused by the heart
movements that is transmitted through the bed mattress. Another famous sleep
tracker sensor using a piezoelectric sensor is EarlySense. The system can report
information about heart rate, respiration, snoring, coughing, and movement. A
8 I. Sadek et al.
recent study showed good agreement between EarlySense and the gold standard
PSG for sleep staging [23]. The device provided promising results for sleep apnea
detection [7].
On the one hand, there are some standard features that these sensors claim
to measure, such as heart rate, respiration, sleep and wake-up time, and sleep
interruptions. There are several publications in the existing literature that can
support these claims, as mentioned in [20].
Insufficient publications are available in existing literature that can support
other claims such as sleep efficiency (i.e., the time in bed spent asleep before
waking up), sleep score (i.e., summarizes your night’s sleep quality and quantity
in a single number, it takes your sleep time, sleep efficiency, restfulness, snoring,
and heart rate into account), smart alarm (i.e., to awaken the wearer at an
optimal time within a time-window that ends in the final alarm setting) and sleep
stages. For example, to get accurate results about the different stages of sleep, the
patient should undergo a full-night sleep study or as known as polysomnography
[25]. It seems that Emfit QS is the only device claiming to measure heart rate
variability. Similarity, Withings is claiming to measure a breathing disturbance
metric that can contribute to identifying abnormal sleep patterns such as apneas.
A power supply is required for operating most of these sensors. However, Sleepace
Reston is a battery-powered. It is worth mentioning that these sensors are only
designed to monitor a single person overnight. However, the BeautyRest sleep
tracker comes with two sensors, so couples can independently track their sleep.
Having said that, although the security and privacy feature of these sensors
are essential, most of the end-users might not fully know of weaknesses and
potential risks in their existing devices. Therefore, we present in the ensuing
sections, the security and privacy features associated with existing IoT sleep
trackers.
3 Privacy and Security Concerns
According to Deborah Lupton’s report3, during her Research she found there
are risks associated with data collection (a) from IoT tracking devices such as
devices’ storage, (b) while transmitting it over the network and (c) finally, in the
cloud where data is stored for analyses. The same risk applies to the IoT Sleep
Tracker Architecture, where these devices are being used for collecting data while
users are asleep, later transmitted to cloud via wireless communication.
Sleep tracking devices aid us in practical applications in gaining quality
sleep, thus improving our lives by measuring our heart rates and movements
as described in Sect. 2. However, they can possess severe security and privacy
risks. Since the sleep tracker users can become a victim to malware by down-
loading the insecure third-party apps and thus gives permission to the potential
adversary to access the device remotely, Later, the users operate these sleep
3The Irish Times. Fitness trackers run into resistance over data security concerns.
Retrieved May 29, 2019, from https://www.irishtimes.com/business/technology/
fitness-trackers-run-into-resistance-over-data-security-concerns-1.3119483.
Security and Privacy of IoT Based Healthcare Systems 9
trackers knowingly or unknowingly in their private places, i.e., home, consider-
ing their devices are secure enough to be compromised. Mostly IoT sleep-tracking
devices communicate over the public networks. As the data is being transferred
to the cloud, the adversary can intercept over the communication channel by
carrying out various attacks such as Botnet, Denial of Service (DoS) and Man
in the Middle (MITM) attacks. Moreover, there are data breach concerns, as
the adversary can remotely access the data stored in the cloud by compromising
it via malicious software. Once the device/storage is hacked, a hacker can gain
the user’s confidential data about sleeping habits such as sleep talking, snoring
sounds, and sensual activities. Such a data breach can have a severe impact on
the user’s reputation. Besides, a hacker can induce the noise by speaking or pro-
ducing some sounds to disturb the user while asleep, which can consequently
result in inadequate sleep.
Fig. 4. An illustration of a sleep-tracking mat as an example of an IoT device in a
medical setting and how an attacker can exploit the several stages of data processing,
i.e., from data acquisition to end-users.
Similarly, there is a risk of data profiling which is defined as “collecting a
person’s behavior and analyzing psychological characteristics to predict or assess
10 I. Sadek et al.
their ability in a certain sphere or to identify a particular group of people.” This
means the data generated by the sleep tracker devices can be exploited to create
profiles of such device users, which can be afterward used for target advertise-
ments. The reason being that an individual’s data is collected through wirelessly
connected devices means there is a need for advanced measures to ensure the
security and privacy of end-users. Research has shown [1], that because of the het-
erogeneous nature of IoT, it has raised various privacy and security concerns. For
instance, data confidentiality, integrity, availability, user authentication, autho-
rization, and anonymity. Figure 4depicts the different attack scenarios that can
affect the remote monitoring of sleep.
4 Existing Security and Privacy Solutions
While considering these IoT privacy and security concerns, the researchers and
security experts around the globe from different domains, i.e., academia, indus-
try, and technical backgrounds are attempting to mitigate these flaws in IoT
infrastructure by fulfilling the necessary security and privacy measures as men-
tioned in Sect. 3. Some existing proposed mechanisms that also apply to sleep-
tracker architecture are as follows:
Bruening and Waterman [5] introduced a concept of data tagging to ensure
data privacy while transferring the sensor data over the network. It appends
an additional tag to data transfer to ensure trusted communication, hence can
hide the user’s identity. Similarly, Chatzigiannakis et al.[6] proposed another
approach to preserve user identity, which is known as the zero-knowledge proof
(ZKP). Based on this concept, the sender can show to receive specific properties
of transferred information that can ensure its authenticity without revealing its
identity. Moreover, Henze et al., [11] have examined the clustering technique
known as the k-anonymity model to hide the location of sensor nodes to protect
the sensitive data being transferred over the wireless network (WSN). The idea
behind this is to gather the data from these nodes at different positions without
being easily traced. Furthermore, Google4proposed a solution that is a part of
the Google cloud platform. Scalability is the main feature of this platform, which
allows connecting the devices, collecting the data, and visualizing them.
Besides, IoT solutions, namely IBM Bluemix Platform offered by IBM, is
an IoT-enabled cloud solution. This platform can be used for the development
of cloud-based applications managing data generated by several sensors and
devices, and it supports secure data transfers.
Moreover, Internet Protocol version 6 (IPv6) [8] is the next-generation Inter-
net protocol, which is being deployed as a communication protocol in the IoT
environment. However, because of its nature, it is vulnerable to DoS attacks [17].
Such vulnerability can interrupt the communication between the nodes in a net-
work. To resolve this problem, the Rule-based mechanism [16] and a lightweight,
encrypted scheme known as Secure-DAD [18] have been proposed by Rehman
4Google Cloud IoT - Fully managed IoT services — Google Cloud. Retrieved May
29, 2019, from https://cloud.google.com/solutions/iot/.
Security and Privacy of IoT Based Healthcare Systems 11
and Manickam. The former technique can detect any attempt of the DoS attack,
while a later system can prevent it from occurring. Thus, by deploying such
mechanisms, we can ensure a trusted communication between the IoT nodes in
a heterogeneous environment.
Recently, Dwivedi et al.[10] proposed an IoT framework based on a modified
blockchain model. The authors claim that the proposed framework provides a
solution that is based on advanced cryptographic primitives for IoT data appli-
cations and secure transactions. Also, it can provide anonymity of users over the
blockchain-based network.
To complement, in Sect. 5, we present an IoT-based case study (i.e., AMI-
IoT platform) to show how these security concerns as aforementioned can be
addressed in a real-life scenario.
5 AMI-IoT Deployed Platform
The Ami-lab has been developing several IoT architectures for the past decade
and following; we described how we addressed the previously discussed secu-
rity issues. We have mainly focused on privacy, data profiling, the man-in-the-
middle-attack, data corruption, which can undermine the end-to-end communi-
cation from the environmental nodes to the database. The AMI-IoT platform as
depicted in Fig. 5is composed of three main components, which are, end-users
environment, network, and cloud architecture. Based on the work of Mendon¸ca
et al.[2], we assume that the three elements, Sensing Approach (SA), Awareness
& Security (AS) and Responsibility & Actions (RA), are essentials to address
the IoT security concerns.
5.1 Sensing Approach (SA)
The SA element is the entry point of the architecture. It ensures data detection
and its migration from environmental nodes to the database. It also represents
the listening state of other components as well as the architecture. At this point,
making sure of the working state of environmental nodes is crucial. Data gathered
by nodes will be sent through a network path built by the node and its peer. This
element is the foundation of IoT architecture, enabling endpoint sleep trackers
and allowing them to submit information through the entire network, giving
the opportunity to experts to process the data. Sleep tracker such as a smart
mat has been used, transmitting data to a node that will serve as a broker and
publish the information. On the other hand, a unique peer will be subscribing
to that broker getting the data in time through a canal. A gateway will be used
to monitor and redirect the traffic from the peer to the smart mat. Nevertheless,
during the SAP, neglecting the user’s privacy, the authenticity of the information
sent, and the security of the database on which information is stored does not
respect the security standards Raza et al.[15]. It’s from this perspective that we
build the same element.
12 I. Sadek et al.
Fig. 5. Ami-IoT Architecture issues addressed (i. Jamming, Flooding, Phishing, Con-
nection Timed out, Battery, Not responsible, Privacy, Data profiling; ii. The sinkhole,
Man-in-the-middle, Hello Flood, Connection persistence, Packet loss, Botnet; iii. Flood-
ing, Dos, Data stealing, Data loss, Data modification, privacy)
5.2 Awareness and Security (AS)
This element intends to make the system aware of abnormalities and breaches,
which can occur and put the needed security to prevent a possible attack. On
this note, a system cannot be protected if we are not aware of the situations and
the risks surrounding it. Based on that, the Ami-lab will be relying on the three
components of the architecture.
End-User Environment. It regroups all the environmental nodes gathering
the data. This component is the favorite spot of attackers due to the negligence
of users and their compliance with the attacks mentioned previously. This com-
ponent is subject to external attacks and faces issues such as privacy, access,
data profiling. To face those challenges, Ami-lab implemented firewalls Raza et
al.[15] in every node deployed on the end-user side. Those firewalls have been
added, preventing external attacks and allowing just one communication at a
time. Regarding privacy, we concluded that even the node should be identified
by their ID and not the users. Thus, yet if the attacker has the identifier, he
won’t be able to know whose information he has access to. Moreover, rules have
also been applied so that the user will have limited access to the node. It will
restrict phishing attacks, which can compromise the system. Also, all incoming
Security and Privacy of IoT Based Healthcare Systems 13
connections are blocked, accepting just the one responsible for collecting data.
These techniques lead to securing the End-users environment component.
Cloud Architecture. It represents the core of the Ami-lab system. It’s all the
technologies and methods put together to enable a peer for each environmental
node and the storing in the database. Data corruption, data stealing, data loss,
privacy, data modification are various problems undermining this component.
Ami-lab took some countermeasures such as defining a firewall on each server
composing this part, to restrict intrusion. Every rule is set carefully, to block
every incoming traffics and allowing single traffic from the listener to its peer
(environmental node). Every outgoing traffic is controlled. Self-configuration and
optimization being part of our architecture, everything adapts itself to the new
configuration in our cloud. Thus, we are avoiding “data corruption” and any
other kind of intrusion. We are keeping the use of the environmental node iden-
tifier and data compression to address the privacy issue. It comes to another
concern, the bridge.
Internet (Network). Named in IoT architecture, the weak link, due to its
public nature, it can be subject to many attacks mentioned in the previous sec-
tions. It relates the end-users environment to the cloud environment serving as
a bridge. While an attack cannot reach the first component of the architecture,
there is still a chance to intercept the data while it’s been sent. Then, botnet
attacks, man-in-the-middle attacks, which will block the transaction or worst
prevent data from storing in the database. To avoid this weak point, we cre-
ated a secure tunnel known just by our peers. The Internet will serve to, will be
retrieving the certificates and then establishing a secured channel between the
environmental node and the cloud node. Every communication has been made
to guarantee that each environmental node has its peer and can communicate
just with that peer. In case something happened, it won’t affect the whole sys-
tem since we made them independent. To reinforce the security, a high level of
encryption has been used as well as data compression.
5.3 Responsibility and Actions (RA)
This element is the last piece conferring “responsibility” feature to a system and
is based on Angarita and Kelaidonis et al.work[3,13]. Making a system able to
take action, depending on the outcome of a situation is the key role of this part.
Being part of our future work, Ami-lab strives to achieve a self-healing architec-
ture. The concept of “responsibility” should be transmitted to the architecture
enabling its self-management. A responsible environment based on awareness
feature should be able to react in time when a situation occurs. A system should
be able to define the right action to take and complete it in an optimal way.
Indeed, an IoT system, when facing an intrusion issue, should be able to take
action and keeps working. For instance, if there is an attack on the environmen-
tal node, the node should be able to detect and close all the connections, then
14 I. Sadek et al.
re-enable the peer connection. We achieved “the responsibility” feature on the
environmental nodes. It allows them to take action against intrusion, connectiv-
ity issues, and data transmission issues. Processing information, and creating an
adapted virtual object dynamically to decipher the correct information, is also
part of our future work. This feature grants autonomy to the applications letting
the system creating an environment suited to the end-user. It gives the required
access to the user, based on its knowledge and background. Regarding the lis-
tening peers for data retrieval, our system can take action upon peers’ failure
by replacing them in time. A monitoring system such as Prometheus or Zabbix
will be listening to applications, environmental nodes, cloud nodes, and servers
and networks to transmit the right information, while the nodes themselves will
decide the communication state.
6 Recommendations
Apart from the given possible solutions as described in Sects. 4,and5certain
things need to be considered by both parties, i.e., sleep tracker end-users as
well as the healthcare service providers, to ensure a safer approach while lever-
aging the IoT sleep tracker in caregiving. This section outlines some of these
recommendations.
Application/Firmware Updates: Hackers are always in search of find-
ing the weak links to attack victims, which could be via mobile apps, IoT
sleep trackers. For instance, outdated mobile apps are the most vulnerable
to security threats. Similarly, healthcare system providers rarely provide the
latest firmware updates on existing IoT sleep trackers, which open the doors
for possible side-channel attacks on end-user devices. Therefore, healthcare
service providers should offer the regular updates on mobile apps and ensure
availability of sleep tracker device’s latest firmware to mitigate the zero-day
attacks i.e., latest security threats which are unknown to security systems,
while end-users should update their device apps and keep IoT sleep tracker’s
firmware updated to prevent possible security breaches.
Software Installation: After ensuring the mobile app and IoT sleep tracker
are updated. End-users should also refrain from downloading any untrusted
third-party software, applications or click on any adware link by doing so,
and they are inviting the malware into their mobile devices. For example,
end-users receive any health promotion ads by clicking on the link or by
downloading a malicious app, IoT sleep tracker users allow the attacker to
gain access, thus can monitor their privacy remotely. After compromising
the mobile user device, an attacker can secretly get the private information
that most of the time, IoT sleep tracker users are unaware of. Therefore,
before downloading any app or clicking such links, IoT sleep tracker users
should confirm their source or authenticity to prevent malware installation
into their mobile devices.
Security and Privacy of IoT Based Healthcare Systems 15
Social Engineering: With the massive impact of social media, end-users
share their personal information publicly on social media sites such as Face-
book, Instagram, etc. With such a large user-base, these platforms are seen
by cybercriminals as a new and lucrative platform to spread malware. There-
fore, IoT sleep tracker users should not reveal their personal details with an
unknown person over these sites or the phone’s calls.
Awareness Program: Moreover, healthcare service providers should con-
duct awareness programs such as online surveys and workshops to keep edu-
cating their IoT sleep tracker customers regularly so that end-users can gain
awareness about the latest hacking tactics, cybercrimes, and their possible
countermeasures.
By applying these suggestions into practice, the possibilities of privacy and secu-
rity threats targeted against the IoT sleep tracker environment can be prevented.
Thus, to enable a safe and secure remote caregiving.
7 Conclusion
With the rapid advancement and deployment of the IoT in the healthcare
domain, these technologies are closely related to people; therefore, privacy and
security are major concerns. To highlight these two critical aspects of IoT, we
reviewed in this paper the progress of the research works related to IoT sleep
trackers and found that these concerns need to be addressed. Moreover, to miti-
gate such threats, some proposed solutions from researchers and security experts
are described. Furthermore, there are certain things that we recommend for both
end-users and service providers to deploy a resilient IoT infrastructure to ensure
a secured sleep tracker.
References
1. Aldowah, H., Ul Rehman, S., Umar, I.: Security in internet of things: issues, chal-
lenges and solutions. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds.)
IRICT 2018. AISC, vol. 843, pp. 396–405. Springer, Cham (2019). https://doi.org/
10.1007/978-3-319-99007- 1 38
2. de Almeida, F.M., de Ribamar Lima Ribeiro, A., Moreno, E.D.: An architecture
for self-healing in internet of things. In: UBICOMM 2015, p. 89 (2015)
3. Angarita, R.: Responsible objects: towards self-healing internet of things appli-
cations. In: 2015 IEEE International Conference on Autonomic Computing, pp.
307–312, July 2015. https://doi.org/10.1109/ICAC.2015.60
4. Boulos, M.I., Jairam, T., Kendzerska, T., Im, J., Mekhael, A., Murray, B.J.:
Normal polysomnography parameters in healthy adults: a systematic review and
meta-analysis. Lancet Respir. Med. 7(6), 533–543 (2019). https://doi.org/10.
1016/S2213-2600(19)30057-8.http://www.sciencedirect.com/science/article/pii/
S2213260019300578
5. Bruening, P.J., Waterman, K.K.: Data tagging for new information governance
models. IEEE Secur. Priv. 8(5), 64–68 (2010). https://doi.org/10.1109/MSP.2010.
147
16 I. Sadek et al.
6. Chatzigiannakis, I., Pyrgelis, A., Spirakis, P.G., Stamatiou, Y.C.: Elliptic curve
based zero knowledge proofs and their applicability on resource constrained devices.
In: 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor
Systems, pp. 715–720, October 2011. https://doi.org/10.1109/MASS.2011.77
7. Davidovich, M.L.Y., Karasik, R., Tal, A., Shinar, Z.: Sleep apnea screening with
a contact-free under-the-mattress sensor. In: 2016 Computing in Cardiology Con-
ference (CinC), pp. 849–852, September 2016. https://doi.org/10.23919/CIC.2016.
7868876
8. Deering, S., Hinden, R.: Internet protocol, version 6 (IPv6) specification. RFC
8200, RFC Editor, July 2017. https://tools.ietf.org/pdf/rfc8200.pdf
9. Dimitrov, D.V.: Medical internet of things and big data in healthcare. Healthcare
Inform. Res. 22(3), 156–163 (2016). https://doi.org/10.4258/hir.2016.22.3.156
10. Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-
preserving healthcare blockchain for IoT. Sensors 19(2) (2019). https://doi.org/
10.3390/s19020326.http://www.mdpi.com/1424-8220/19/2/326
11. Henze, M., Hermerschmidt, L., Kerpen, D., H¨außling, R., Rumpe, B., Wehrle, K.:
A comprehensive approach to privacy in the cloud-based internet of things. Future
Gener. Comput. Syst. 56, 701–718 (2016). https://doi.org/10.1016/j.future.2015.
09.016.http://www.sciencedirect.com/science/article/pii/S0167739X15002964
12. Islam, S.M.R., Kwak, D., Kabir, M.H., Hossain, M., Kwak, K.S.: The internet of
things for health care: a comprehensive survey. IEEE Access 3, 678–708 (2015).
https://doi.org/10.1109/ACCESS.2015.2437951
13. Kelaidonis, D., et al.: A cognitive management framework for smart objects and
applications in the internet of things. In: Timm-Giel, A., Strassner, J., Ag¨uero, R.,
Sargento, S., Pentikousis, K. (eds.) MONAMI 2012. LNICST, vol. 58, pp. 196–206.
Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37935-2 15
14. Niewolny, D.: How the internet of things is revolutionizing healthcare.
Healthcare Segment Manager, Freescale Semiconductor, October 2013.
freescale.com/healthcare
15. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in
the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013). https://doi.
org/10.1016/j.adhoc.2013.04.014.http://www.sciencedirect.com/science/article/
pii/S1570870513001005
16. Rehman, S.U., Manickam, S.: Rule-based mechanism to detect denial of service
(DOS) attacks on duplicate address detection process in IPv6 link local communi-
cation. In: 2015 4th International Conference on Reliability, Infocom Technologies
and Optimization (ICRITO)(Trends and Future Directions), pp. 1–6. IEEE (2015)
17. Rehman, S.U., Manickam, S.: Denial of service attack in IPv6 duplicate address
detection process. Int. J. Adv. Comput. Sci. Appl. 7, 232–238 (2016)
18. Rehman, S.U., Manickam, S.: Improved mechanism to prevent denial of service
attack in IPv6 duplicate address detection process. Int. J. Adv. Comput. Sci. Appl.
8(2), 63–70 (2017)
19. Sadek, I., Seet, E., Biswas, J., Abdulrazak, B., Mokhtari, M.: Nonintrusive vital
signs monitoring for sleep apnea patients: a preliminary study. IEEE Access 6,
2506–2514 (2018). https://doi.org/10.1109/ACCESS.2017.2783939
20. Sadek, I., Biswas, J., Abdulrazak, B.: Ballistocardiogram signal processing: a
review. Health Inf. Sci. Syst. 7(1), 10 (2019). https://doi.org/10.1007/s13755-019-
0071-7
21. Sadek, I., Demarasse, A., Mokhtari, M.: Internet of things for sleep tracking: wear-
ables vs. nonwearables. Health Technol. (2019). https://doi.org/10.1007/s12553-
019-00318-3
Security and Privacy of IoT Based Healthcare Systems 17
22. Shustak, S., et al.: Home monitoring of sleep with a temporary-tattoo EEG, EOG
and EMG electrode array: a feasibility study. J. Neural Eng. 16(2), 026024 (2019).
https://doi.org/10.1088/1741-2552/aafa05
23. Tal, A., Shinar, Z., Shaki, D., Codish, S., Goldbart, A.: Validation of contact-free
sleep monitoring device with comparison to polysomnography. J. Clin. Sleep Med.
13(3), 517–522 (2017). https://doi.org/10.5664/jcsm.6514
24. Tung, C.E., Su, D., Turakhia, M.P., Lansberg, M.G.: Diagnostic yield of extended
cardiac patch monitoring in patients with stroke or TIA. Front. Neurol. 5,
266 (2015). https://doi.org/10.3389/fneur.2014.00266.https://www.frontiersin.
org/article/10.3389/fneur.2014.00266
25. Tuominen, J., Peltola, K., Saaresranta, T., Valli, K.: Sleep parameter assessment
accuracy of a consumer home sleep monitoring ballistocardiograph beddit sleep
tracker: a validation study. J. Clin. Sleep Med. 15(03), 483–487 (2019). https://
doi.org/10.5664/jcsm.7682
26. Zaunseder, S., Henning, A., Wedekind, D., Trumpp, A., Malberg, H.: Unobtrusive
acquisition of cardiorespiratory signals. Somnologie 21(2), 93–100 (2017). https://
doi.org/10.1007/s11818-017-0112-x
Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the
chapter’s Creative Commons license, unless indicated otherwise in a credit line to the
material. If material is not included in the chapter’s Creative Commons license and
your intended use is not permitted by statutory regulation or exceeds the permitted
use, you will need to obtain permission directly from the copyright holder.
... It is practically hard to distinguish between employees with good intentions and outsiders without the use of extremely accurate analysis tools [31].  Cloud computing: Where data is kept for analysis [32], if don't protect Information related to the patient's health be vulnerable to attack and easily accessible by all parties. ...
Article
Full-text available
The importance of each person's healthcare should be viewed as fundamental in the modern world due to the rise in various health issues. A decrease in the proportion of doctors is caused by an increase in the number of cases. The diagnosis is consequently delayed, or some patients are overlooked. As a result, people become more reliant on doctors for checkups. In order to retain each patient's digital identification, in light of all these worries, health and medical care systems have begun to connect and interact with the internet of things (IoT). Many health disorders in the healthcare system go undiagnosed resulting from a shortage of doctors and other medical experts, as well as a lack of access to healthcare services. These IoT-based healthcare options, on the other hand, have made it possible for patients and medical professionals to continuously track and analyze patient data. In this study, IoT for healthcare systems is discussed. These included applications, structures, and potential design snags and issues. It has been demonstrated that these systems could be very beneficial to people, especially during the (Covid-19) pandemic's global isolation and the growing challenges in treating patients intelligently. This paper also presents a survey study on the use of IoT in smart healthcare, its applicability, the future directions for its development, and a review of past researchers' applications.
... Smart contracts are discussed as a means of implementing access control regulations and protecting patient privacy. The purpose of this second survey paper [31] is to offer a broad perspective on the challenges of privacy and security in IoT-based healthcare infrastructure. Unauthorized access, data breaches, and identity theft are just some of the vulnerabilities and risks that are investigated. ...
Conference Paper
Full-text available
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identi-fiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous au-thentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed framework, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. An Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector. CCS CONCEPTS • Security and privacy → Usability in security and privacy.
... This may require a combination of both technical and organizational measures, such as firewalls, antivirus software, end-user training, and continual monitoring. Privacy is another major concern when it comes to AI and healthcare [19]. A patient's personal information is often collected and stored by healthcare providers and organizations, which can include health records, genetic information, and financial details. ...
Article
Full-text available
This study focuses on the potential application of Artificial Intelligence (AI) in healthcare and hospitals to improve the quality of services for patients. The research objectives include the investigation of existing AI use cases in healthcare, exploration of potential areas in which AI can best be applied, and identification of the challenges to successful AI application. This research utilizes both primary and secondary data sources to investigate the potential of AI in healthcare and hospitals. The primary data is collected through published research papers, technical reports, and industry news to gain an understanding of the current state of AI applications in healthcare. The secondary data is gathered from expert opinions with experienced healthcare professionals such as physicians, hospital administrators, and IT experts to gain insights into existing use cases and potential applications of AI in healthcare and hospitals. The results of the study demonstrate that AI has a significant potential to deliver enhanced outcomes in various aspects of healthcare and hospitals, including diagnosis, treatment, and management. However, the successful integration of AI requires overcoming numerous challenges such as regulatory standardization, privacy protection, and data availability. To foster a positive development of AI in healthcare, it is recommended that healthcare organizations enhance their digital capabilities, enable secure data sharing and collaboration, and use AI tools to deliver a more comprehensive and personalized patient care experience.
... Healthcare organizations must take appropriate measures to protect patient data from cyberattacks, accidental data loss, and human error. By implementing appropriate security controls, establishing clear policies and procedures, and providing regular employee training, healthcare organizations can help prevent patient data breaches and maintain trust in the healthcare system [9,10]. ...
Article
Full-text available
IoT-based healthcare solutions have transformed patient care and improved results. These technologies capture and store sensitive patient data, raising security and privacy concerns. The paper first discusses IoT-based healthcare system security issues. It evaluates cyber threats, system unavailability, and vulnerabilities attackers can use to get patient data. The report also tackles IoT-based healthcare system privacy issues such illegal data access and sharing and patient data breach concerns. The study proposes numerous frameworks and solutions to protect patient data in IoT-based healthcare systems. Blockchain technology can increase data security and privacy by offering a transparent, decentralized, tamper-resistant database. The report also discusses differential privacy, a statistical method that adds noise to sensitive patient data to protect privacy. The study also examines how AI and ML can detect and mitigate security vulnerabilities in IoT-based healthcare systems. The study also emphasizes the need for uniform security and privacy standards to protect patient data across healthcare companies. The report stresses the importance of integrating security and privacy into IoT-based healthcare systems from the start. In conclusion, the study emphasizes security and privacy in IoT-based healthcare systems and the problems of protecting patient data. It explores standardized security and privacy protocols and many frameworks and solutions to address these issues.
Chapter
With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks. Despite a long history of attacks on IoT devices in unprotected home networks, the problem of accurate, rapid detection and prevention of such attacks remains open. Many existing IoT protection solutions are cloud-based, sometimes ineffective, and might share consumer data with unknown third parties. This paper investigates the potential for effective IoT threat detection locally, on a home router, using AI tools combined with classic rule-based traffic-filtering algorithms. Our results show that with a slight rise of router hardware resources caused by machine learning and traffic filtering logic, a typical home router instrumented with our solution is able to effectively detect risks and protect a typical home IoT network, equaling or outperforming existing popular solutions, without any effects on benign IoT functionality, and without relying on cloud services and third parties.
Article
Full-text available
Across the world, healthcare costs are projected to continue to increase, and the pressure on the healthcare system is only going to grow in intensity as the rate of growth of elderly population increases in the coming decades. As an example, when people age one possible condition that they may experience is sleep-disordered breathing (SDB). SDB, better known as the obstructive sleep apnea (OSA) syndrome, and associated cardiovascular complications are among the most common clinical disorders. The gold-standard approach to accurately diagnose OSA, is polysomnography (PSG), a test that should be performed in a specialist sleep clinic and requires a complete overnight stay at the clinic. The PSG system can provide accurate and real-time data; however, it introduces several challenges such as complexity, invasiveness, excessive cost, and absence of privacy. Technological advancements in hardware and software enable noninvasive and unobtrusive sensing of vital signs. An alternative approach which may help diagnose OSA and other cardiovascular diseases is the ballistocardiography. The ballistocardiogram (BCG) signal captures the ballistic forces of the heart caused by the sudden ejection of blood into the great vessels with each heartbeat, breathing, and body movement. In recent years, BCG sensors such as polyvinylidene fluoride film-based sensors, electromechanical films, strain Gauges, hydraulic sensors, microbend fiber-optic sensors as well as fiber Bragg grating sensors have been integrated within ambient locations such as mattresses, pillows, chairs, beds, or even weighing scales, to capture BCG signals, and thereby measure vital signs. Analysis of the BCG signal is a challenging process, despite being a more convenient and comfortable method of vital signs monitoring. In practice, BCG sensors are placed under bed mattresses for sleep tracking, and hence several factors, e.g., mattress thickness, body movements, motion artifacts, bed-partners, etc. can deteriorate the signal. In this paper, we introduce the sensors that are being used for obtaining BCG signals. We also present an in-depth review of the signal processing methods as applied to the various sensors, to analyze the BCG signal and extract physiological parameters such heart rate and breathing rate, as well as determining sleep stages. Besides, we recommend which methods are more suitable for processing BCG signals due to their nonlinear and nonstationary characteristics.
Article
Full-text available
Medical care has become one of the most indispensable parts of human lives, leading to a dramatic increase in medical big data. To streamline the diagnosis and treatment process, healthcare professionals are now adopting Internet of Things (IoT)-based wearable technology. Recent years have witnessed billions of sensors, devices, and vehicles being connected through the Internet. One such technology—remote patient monitoring—is common nowadays for the treatment and care of patients. However, these technologies also pose grave privacy risks and security concerns about the data transfer and the logging of data transactions. These security and privacy problems of medical data could result from a delay in treatment progress, even endangering the patient’s life. We propose the use of a blockchain to provide secure management and analysis of healthcare big data. However, blockchains are computationally expensive, demand high bandwidth and extra computational power, and are therefore not completely suitable for most resource-constrained IoT devices meant for smart cities. In this work, we try to resolve the above-mentioned issues of using blockchain with IoT devices. We propose a novel framework of modified blockchain models suitable for IoT devices that rely on their distributed nature and other additional privacy and security properties of the network. These additional privacy and security properties in our model are based on advanced cryptographic primitives. The solutions given here make IoT application data and transactions more secure and anonymous over a blockchain-based network.
Chapter
Full-text available
In the recent past, Internet of Things (IoT) has been a focus of research. With the great potential of IoT, there comes many types of issues and challenges. Security is one of the main issues for IoT technologies, applications, and platforms. In order to cover this key aspect of IoT, this paper reviews the research progress of IoT, and found that several security issues and challenges need to be considered and briefly outlines them. Efficient and functional security for IoT is required to ensure data anonymity, confidentiality, integrity, authentication, access control, and ability to identify, as well as heterogeneity, scalability, and availability must be taken into the consideration. Considering these facts, by reviewing some of the latest researches in the IoT domain, new IoT solutions from technical, academic, and industry sides are provided and discussed. Based on the findings of this study, desirable IoT solutions need to be designed and deployed, which can guarantee: anonymity, confidentiality, and integrity in heterogeneous environments.
Article
Full-text available
Sleep is a fundamental and vital physiological function. Getting enough quality sleep is necessary to a person’s mental health, physiological well-being, quality of life, and safety. Sleep-disordered breathing, specifically obstructive sleep apnea can result in serious health issues, including hypertension and stroke. The current approaches for diagnosing sleep disorders are burdensome, intrusive, and can affect the patient’s sleep quality. As a result, there is a crucial need for less cumbersome systems to diagnose sleep-related problems. In this research paper, we evaluated the capacity of the microbend fiber optic sensor to monitor heart rate and respiration in a nonintrusive manner. In addition, we tested the capacity of the sensor in discriminating between shallow breathing and no breathing. The proposed sensor was compared to a three-channel portable monitoring device (ApneaLink) in a clinical setting during a drug-induced sleep endoscopy. Across all ten patients recruited for our study, the system achieved satisfactory results in the mean heart rate and the mean respiratory rate with an error of 0.55±0.59 beats/minute and 0.38±0.32 breaths/minute, respectively. Besides, the Pearson correlation coefficient between the proposed sensor and the reference device was 0.96 and 0.78 for heart rate and respiration, respectively. On the contrary, the proposed sensor provided a very low sensitivity (24.24±12.81%) and a relatively high specificity (85.88±6.01%) for sleep apnea detection. It is expected that this preliminary research will pave the way toward unobtrusive detection of vital signs in real time.
Article
Sleep is a very significant biological function for the human being and is important to have a physical balance and a proper regime for a decent quality of life. It is very important to monitor sleep and quality of sleep, especially to older adults because they spend more time in bed compared to younger adults. Insufficient sleep for older adults might cause depression, attention and memory problems, excessive daytime sleepiness, and experience more nighttime falls. The current sleep assessments and evaluation methods are troublesome, expensive, and time-consuming. Thus, the healthcare community is seeking inexpensive and mobile devices that can support a long-term data collection and be accessible to most of the people. This is where a massive use of Internet of Things devices (wearables, low-energy sensors, beacons, apps) is playing a major shift in the quality of life of the population. This paper presents a summary of the current nonintrusive sleep tracking technologies (these include but not limited to consumer sleep trackers e.g., wearables such as bracelets; smart-watches, Mobile Apps and non-wearables such as sleep-tracking mats that can be placed under a bed mattress) and their suitability for the elderly.
Article
Background: Existing normal polysomnography values are not truly normative as they are based on small sample sizes due to the fact that polysomnography is expensive and burdensome to obtain. There is a clear need for a large sample of truly normative data for clinical management and research. This study is a comprehensive meta-analysis of adult polysomnography parameters scored using recent criteria and establishes normative values adjusted for age and sex. Methods: For this meta-analysis of adult polysomnography parameters, we searched Scopus for studies of any design published between Jan 1, 2007, and July 31, 2016, that reported polysomnographic parameters scored using recent American Academy of Sleep Medicine criteria (2007 or 2012) collected during an overnight level 1 in-laboratory sleep study in healthy controls. We excluded studies of patients with conditions or subjected to treatments that might affect sleep and studies not available in English. Study endpoints were the pooled estimates of 14 reported polysomnographic parameters. Estimates for each parameter were pooled using a random-effects meta-analysis. The influence of age and sex was ascertained using multivariate mixed-effects meta-regressions. This study is registered with PROSPERO, number CRD42017074319. Findings: Of 3712 articles, 169 studies, comprising 5273 participants, were eligible for inclusion. We report normative data stratified by age and sex. For each decade of age, total sleep time decreased by 10·1 min (95% CI 7·5 to 12·8), sleep efficiency decreased by 2·1% (1·5 to 2·6), wake after sleep onset increased by 9·7 min (6·9 to 12·4), sleep onset latency increased by 1·1 min (0·3 to 1·9), arousal index increased by 2·1 events per h (1·5 to 2·6), percentage of N1 sleep increased by 0·5% (0·1 to 0·8), apnea-hypopnea index increased by 1·2 events per h (0·9 to 1·4), mean oxygen saturation decreased by 0·6% (0·5 to 0·7), minimum oxygen saturation decreased by 1·8% (1·3 to 2·3), and periodic limb movement index increased by 1·2 events per h (0·8 to 1·6). Changes with age in the percentage of N2 sleep (0·0%, 95% CI -0·1 to 0·1), N3 sleep (-0·1%, -0·1 to 0·0), and rapid eye movement (REM) sleep (0·0%, -0·1 to 0·0) were not significant. Every 10% increase in the percentage of male participants was associated with reduced REM latency (0·9 min decrease, 95% CI 0·1 to 1·6) and mean oxygen saturation (0·1% decrease, 0·0 to 0·1), and greater arousal index (0·3 events per h, 0·0 to 0·5) and apnea-hypopnea index (0·2 events per h, 0·1 to 0·3). Interpretation: These normative values serve as a useful control reference for clinicians and for future research where it might be difficult to obtain polysomnographic controls. The resulting normative trends by age and sex might also be hypothesis-generating for a broad range of investigations. Funding: None.
Article
Study Objectives: Growing interest in monitoring sleep and well-being has created a market for consumer home sleep monitoring devices. Additionally, sleep disorder diagnostics, and sleep and dream research would benefit from reliable and valid home sleep monitoring devices. Yet, majority of currently available home sleep monitoring devices lack validation. In this study, the sleep parameter assessment accuracy of Beddit Sleep Tracker (BST), an unobtrusive and non-wearable sleep monitoring device based on ballistocardiography, was evaluated by comparing it with polysomnography (PSG) measures. We measured total sleep time (TST), sleep onset latency (SOL), wake after sleep onset (WASO), and sleep efficiency (SE). Additionally, we examined whether BST can differentiate sleep stages. Methods: We performed sleep studies simultaneously with PSG and BST in ten healthy young adults (5 female/5 male) during two non-consecutive nights in a sleep laboratory. Results: BST was able to distinguish SOL with some accuracy. However, it underestimated WASO and thus overestimated TST and SE. Also, it failed to discriminate between non-rapid eye movement sleep stages and did not detect the rapid eye movement sleep stage. Conclusions: These findings indicate that BST is not a valid device to monitor sleep. Consumers should be careful in interpreting the conclusions on sleep quality and efficiency provided by the device.
Article
Objective: Circadian and sleep dysfunction have long been symptomatic hallmarks of a variety of devastating neurodegenerative conditions. The gold standard for sleep monitoring is overnight sleep in a polysomnography (PSG) laboratory. However, this method has several limitations such as availability, cost and being labour-intensive. In recent years there has been a heightened interest in home-based sleep monitoring via wearable sensors. Our objective was to demonstrate the use of printed electrode technology as a novel platform for sleep monitoring. Approach: Printed electrode arrays offer exciting opportunities in the realm of wearable electrophysiology. In particular, soft electrodes can conform neatly to the wearer's skin, allowing user convenience and stable recordings. As such, soft skin-adhesive non-gel-based electrodes offer a unique opportunity to combine electroencephalography (EEG), electromyography (EMG), electrooculography (EOG) and facial EMG capabilities to capture neural and motor functions in comfortable non-laboratory settings. In this investigation temporary-tattoo dry electrode system for sleep staging analysis was designed, implemented and tested. Main results: EMG, EOG and EEG were successfully recorded using a wireless system. Stable recordings were achieved both at a hospital environment and a home setting. Sleep monitoring during a 6 h session shows clear differentiation of sleep stages. Significance: The new system has great potential in monitoring sleep disorders in the home environment. Specifically, it may allow the identification of disorders associated with neurological disorders such as rapid eye movement (REM) sleep behavior disorder.
Article
Over the past years, various systems and techniques enabling unobtrusive/minimally obtrusive acquisition of physiological signals have evolved. These systems and techniques open up novel opportunities for sleep medicine. This work provides an overview of unobtrusive systems and techniques to monitor cardiorespiratory function. We present basic principles of mechanical, radar-based, optical, and electrical measurements, and present concrete examples focused on how such systems and techniques can be used for sleep medicine. This work demonstrates the high potential of unobtrusive acquisition. Furthermore, it highlights the need for a standardized evaluation of the available techniques and demonstrates the demand for sleep-specific developments of available techniques in interdisciplinary collaborations.