• Tidak ada hasil yang ditemukan

Cloud-assisted Industrial Internet of Things (IIoT)

N/A
N/A
Protected

Academic year: 2024

Membagikan "Cloud-assisted Industrial Internet of Things (IIoT)"

Copied!
11
0
0

Teks penuh

(1)

ContentslistsavailableatScienceDirect

Computer Networks

journalhomepage:www.elsevier.com/locate/comnet

Cloud-assisted Industrial Internet of Things (IIoT) – Enabled framework for health monitoring

M. Shamim Hossain

a,

, Ghulam Muhammad

b

aSoftware Engineering Department, College of Computer and Information Sciences, Riyadh 11543, Saudi Arabia

bComputer Engineering Department, College of Computer and Information Sciences, Riyadh 11543, Saudi Arabia

a r t i c l e i n f o

Article history:

Received 2 August 2015 Revised 6 January 2016 Accepted 8 January 2016 Available online xxx

Keywords:

ECG monitoring IoT-driven healthcare Cloud-assisted system Signal watermarking

Healthcare Industrial Internet of Things (HealthIIoT)

a b s t r a c t

ThepromisingpotentialoftheemergingInternetofThings(IoT)technologiesforintercon- nectedmedicaldevicesandsensorshasplayedanimportantroleinthenext-generation healthcareindustryforquality patientcare.Becauseofthe increasingnumber ofelderly and disabledpeople, there is an urgentneed for areal-time health monitoringinfras- tructure for analyzingpatients’healthcare datato avoidpreventable deaths. Healthcare IndustrialIoT(HealthIIoT)hassignificantpotentialfortherealizationofsuchmonitoring.

HealthIIoTisacombinationofcommunicationtechnologies, interconnectedapps,Things (devicesandsensors),and peoplethatwouldfunctiontogetheras onesmartsystemto monitor, track, and store patients’healthcare information for ongoing care. This paper presentsaHealthIIoT-enabledmonitoringframework,whereECGandotherhealthcaredata arecollectedbymobiledevicesandsensorsandsecurelysenttothecloudforseamlessac- cessbyhealthcareprofessionals.Signalenhancement,watermarking,andotherrelatedan- alyticswillbeusedtoavoididentitytheftorclinicalerrorbyhealthcareprofessionals.The suitabilityofthisapproachhasbeenvalidatedthroughbothexperimentalevaluation,and simulationbydeployinganIoT-drivenECG-basedhealthmonitoringserviceinthecloud.

© 2016ElsevierB.V.Allrightsreserved.

1. Introduction

Todaywearewitnessingtheincreaseduseofsmartde- vices and communication apps in healthcare monitoring, andtheir influenceon the activities ofhealthcare profes- sionals (doctors, nurses, andhospital administrators),pa- tients, and the healthcare industry.According to Gartner andForbes, it is estimated that by 2020, the Internet of Things(IoT)willcontribute$1.9trilliontotheglobalecon- omyand$117billion totheIoT-basedhealthcareindustry [1].Basedonthisestimate,itisexpectedthattheHealth- care Industrial IoT (HealthIIoT) will be one of the main

Corresponding author. Tel.: +966 114676189.

E-mail addresses: [email protected] (M.S. Hossain), [email protected] (G. Muhammad).

players in the Industrial Internet of Things (IIoT)-driven healthcare industry. IIoT has had a remarkable influence acrossmanylargeandsmallhealthcareindustries.Asare- sult, an increasing number ofwearable IoT devices,tools, and apps are being used for different monitoring appli- cations (e.g., glucose monitors, ECG monitors, and blood pressuremonitors)toavoidpreventabledeathduetohos- pitalorother relatederrors.Theerrorsmayoccur before, during,orafterhospitalization.

Currently, HealthIIoT is still in its preliminary stages with regards to design, development, and deployment;

however, IoT-based solutions are presently displaying a remarkable impact, and carving out a growing market in today’s healthcare industry and tomorrow’s emerging IIoT-based healthcare monitoring solutions. IIoT has the potential to save 50,000 people each year in the US by avoiding preventable deaths due to hospital error [2]. It

http://dx.doi.org/10.1016/j.comnet.2016.01.009 1389-1286/© 2016 Elsevier B.V. All rights reserved.

Pleasecitethisarticleas:M.S.Hossain,G.Muhammad,Cloud-assistedIndustrialInternetofThings(IIoT)– Enabledframe-

(2)

2 M.S. Hossain, G. Muhammad / Computer Networks 0 0 0 (2016) 1–11

ARTICLE IN PRESS

JID:COMPNW [m3Gdc;February26,2016;19:24]

promises patient well-being and safety by coordinating critical patient information and synchronizing related resources (e.g., healthcare staff, facilities, wearable smart devices to capture real-time patient data such as vital signs,andpatient-relatedelectronic information)instantly through interconnected devices and sensors. Research reveals that IoT in the healthcare industry can facilitate better care with reduced costs, reduced direct patient- healthcarestaff interaction,andubiquitousaccesstoqual- itycare[3].Mohammedetal.developedaremotepatient monitoringsystemusingweb servicesandcloud comput- ing [4]. Hassanalieragh et al. discussed the opportunities and challenges of health monitoring and management using IoT [5]. To date,however, no comprehensive study hasbeenpublishedaboutcloud-assistedIIoT-drivenhealth monitoring.

Safe and high-quality healthcare service is of paramountimportancetopatients.Accordingly,healthcare data security and patients’ privacy are important issues that will have a great impact on the future success of HealthIIoT[17].One ofthe majorissues inthe IIoT-based healthcare system is the protection of privacy. In gen- eral, a healthcare service provider receives data from its users (such aspatients) and shares them withregistered clinics or healthcare professionals. The provider may also distribute the data to health insurance companies and pharmaceutical companies. Moreover, patient data can be vulnerable to hackers during cloud transfer or synchronizationwithinterconnecteddevices.

Therefore, we need to protect this information from unauthorized access, which may result in the posting of personal information in the public domain, or in in- terference with essential medical equipment, such as a pacemaker. A security breach of a patient’s monitoring devicesanddatamaycausethepatient socialembarrass- ment,mentaldisorders,oradversephysicaleffectssuchas a fatalheartattack. Hence,dataprotectioninthe formof watermarking andauthenticationis very importantin an IIoT-basedhealthcaresystem.

To this end, this paper describesan IIoT-based health monitoring framework, where health monitoring signals are authenticated.As a casestudy,we haveusedelectro- cardiogram(ECG) monitoring, asECG isan important as- sessment tool. Bycontinuously monitoringan ECG signal, a healthcare professional can diagnose disease and pre- scribe medications to avoid preventable death. ECG sig- nals are recorded via portable ECG recording devices at home or outdoors, and sent to smartphones or desktops viaBluetoothtechnology.Ontheclientside,asmartphone appordesktopsoftwareremovesunwantednoisefromthe recordedsignal,andembedsawatermarkforsecurityand authenticationpurposes;heartbeatisalsomonitoredusing a simple algorithm. The watermarked ECG signal is then transmittedtoacloudserver,wheretemporalandspectral featuresareextractedandclassifiedusingaone-classsup- port vector machine classifier. The classification decision, alongwiththewatermarkedECG,ispassedtothedesired healthcare professionalforanalysis.The professionalthen sendsbackadecisionandprescriptiontothecloudserver.

The cloud then notifies the patient. The contributions of thepaperareasfollows:

• theintroductionofawatermarkintotheECGsignalon theclientside,toavoidasecuritybreachinthecloud

• theintroductionofauseridentificationcodetoprovide customizedprotectionofdata

• theintroductionofaone-class supportvector machine classifierinthecloud

Therestofthispaperisorganizedasfollows.Section2 reports some related studies. Section 3 outlines the HealthIIoT ecosystem, followed by a high-level data flow architecturefortheHealthIIoTmonitoringvaluechain,and thedetails ofa cloud-supportedHealthIIoT-enabled mon- itoringframework. Section 4describes a proposed health monitoring approach by considering ECG as healthcare data.Section5presentstheexperimentalresultsandeval- uations.Section6concludesthepaper.

2. Relatedstudies

TheIIoT isan innovative technology, directlyintercon- nectingasetofsensorsanddevices(suchassmartphones) to collect, record, transmit, and share data for possible analysis.TheIoThasawiderangeofemergingapplications [4–16].Amongthem,themostrevolutionarypotential ap- plication is healthcare monitoring, where patient health- caredataarecollectedfromanumberofsensors,analyzed, delivered through a network and shared with healthcare professionalsforevaluationofpatientcare[4–6,10,11,13].A morecomprehensivesurvey ofIoT forhealthcareapplica- tions canbe found in[7].IoT-enabled healthcareapplica- tions, including IoT-driven ECG monitoring, are discussed in the following studies [6,10]. Li et al. [10]. presents a healthmonitoringserviceasaplatformforECGmonitoring usingadaptivelearninganalysismodeltodetectabnormal- ities.

Mohammedetal.developedaremotepatientmonitor- ing system using web services and cloud computing[4]. Inparticular,theydesignedanAndroidapplicationforECG datamonitoringandanalysis.Datacanbefurtheranalyzed bythird-partysoftwareifneeded;however,thereisnoop- tion for the cloud server to extract features and classify thesignaltoassistthehealthprofessionalatthetimethe signal is received. In our proposed framework, the cloud serverextracts featuresandclassifiesthesignal, sothat a preliminaryanalysisdecisionfromthecloudcanbesentto thehealthcareprofessionalstofacilitategoodpatientcare.

Hassanalieragh et al. discussed the opportunities and challengesofhealthmonitoringandmanagementusingIoT [5].Somechallengesincludeslowprocessing,handlingbig data,presence oftoomuch heterogeneous data,anddata integrity.Inourproposedframework,theECGsignaliswa- termarkedon the client side before transmitting through theInternettoauthenticateagainst anyattacks.Datapro- cessingisalsodistributedbetweentheclientside andthe cloudsidetomaketheoverallprocessingfaster.

Jaraetal. [8]presenta remote monitoringframework using IoT by proposing a protocol, called YOAPY, to cre- ateasecureandscalablefusionofmulti-modalsensorsto recordvitalsigns.Acloud-basedspeechandfacerecogni- tionframeworkwasdevelopedtomonitorapatient’sstate remotely [26]. Xu et al. [9] developed a ubiquitous data

(3)

accessing method in an IoT-based system for emergency medicalscenarios. They proposed a semantic data model tostoredata,andaresource-baseddataaccessmethodto gaincontrolofthedataubiquitously,concludingthattheir method could be significant to assist decision-making in emergencymedicalsituations.

Zhanget al.[12] introduced an architecture of mobile healthcarenetworks,incorporatingprivacy-preservingdata collectionandsecuretransmission.Theprivacy-preserving datacollectionwas achievedusingcryptography withse- cretkeysandprivatekeys.Securetransmissionwasgained using attribute-based encryption, where only authorized users would haveaccess to the data.These methods are generallyworthwhile;however,themainproblemiscom- putationcomplexity.

Granadosetal.[14]proposedweb-enabledgatewaysfor IoT-basedeHealthwithanoptionforwiredorwirelessser- vices. To take advantage of wired gateways in terms of power-efficiencyandlowcost,theauthorsusedthewired gateways in a small room or building, where movement is restricted. Radio frequency identification (RFID)-based eHealthcaresystemswere proposedin[15,16].In[15],the authors proposed a system that would capture the pa- tient’senvironmentalconditions,such astemperatureand humidity, by RFID,and transmit them to the cloud for a moredetailedunderstandingofambientconditions.Catar- inucci et al. [16] proposed an IoT-aware architecture to monitorand assess a patient’ssituation automatically by integratingultra-high-frequencyRFIDfunctionality.

Sawandetal.[18]identifiedthreetypesofthreatsinan eHealthcaremonitoring system. These are identitythreat, where the identity of the patient is lost or stolen, ac- cess threat, where an intruder can accessthe system il- legally, and disclosure threat, where confidential medical data are opened via malware or file sharing tools inten- tionallyorunintentionally.Theyofferedsomesolutions to thesethreats,includingbiometriccryptographyandanad- vancedsignalprocessingscheme;however,theauthorsdid notimplementthesesolutionsintheirpaper.

In[19,21], emotion-aware oraffectivemobile comput- ing frameworkshave beenproposed, and theauthors in- vestigated an architecture named “emotion-aware mobile cloud” (EMC) formobile computing. Authors in [20] pro- posed another framework, affective interaction through wearable computing and cloud technology (AIWAC). Re- cently,Huetal.[6]introduced theHealthcareInternet of Things (Health-IoT), attempting a bridge between intelli- genthealthmonitoringandemotionalcareofthepatient.

To date, we have found no comprehensive study on cloud-assisted IIoT-driven ECG monitoring, where (i) the ECGsignaliswatermarkedontheclientsidebeforetrans- mission through the Internet to the cloud, and (ii) the cloud server extracts features and classifies the signal to assisthealthcareprofessionalsinprovidingqualitypatient care.

3. Proposedcloud-assistedHealthIIoT-enabled monitoringframework

HealthIIoTcanrevolutionizetoday’shealthcareindustry with affordable and quality patient care by adopting a

Patient with IoT devices and sensors

Healthcare professionals

Smart medical device and ‘Things’ industries

Emergency response service

Social media and family

Environmental and home control service (e.g. temp, air, light)

Drug industries, and pharmacies (e.g. smart

pills, and medicines)

Analysis ECG

verification Storage

Replica data center

Research center

Fig. 1. Conceptual illustration and scenario for HealthIIoT ecosystem.

largenumberofinterconnectedmachines,wearablethings (devices and sensors), and cloud-computing technologies tocollectpatientdatainaseamlessmanner.ThisHealthI- IoT technology will play an important role in a number of health monitoring applications, to form a Healthcare IndustrialIoT ecosystem.Fig.1describesa comprehensive IIoT-driven healthcare ecosystem. As shown in Fig. 1, one type of stakeholder (e.g., patient with IoT devices and sensors, healthcare professional, hospital or medical research center, social media and family) is connected to another type of stakeholder (e.g.,emergency response services, drug industries and pharmacies, smart medical devices and ‘Things’ industries, environmental and home control services)to formacomplexHealthIIoTecosystem.

Italsodispatches emergencyservicestothepatientwhen needed, and orders pharmacy refills. In this ecosystem, interconnected ‘Things’ (medical devicesand sensors)are coordinated. It allows fast transfer ofpatient information among the stakeholders in a secured manner, such that specific patient data are available only to a designated authorized healthcare team. Finally, cloud-based big data analyticenablesanalyzing,storing,closelymonitoring,and securely sharing the datafor further review and medical recommendations,aimed towardsfulfillingthe promiseof Industrial IoT in regard to quality patient care, real-time patientmonitoring,andavoidinghospitalerror.

The Industrial IoT is the combination of big data, IoT, Machine to Machine (M2M) communication, cloud com- puting,andreal-timeanalysisofdatafrominterconnected sensor devices [22]. The success of HealthIIoT largely depends on the advancement of the cloud-computing technologyandbigdataanalytics.Itcreatesaplatformfor interconnectedsmartmedicaldevicestooperatewithlarge amountsofdata(bigdata)fromanywhereatanytime.The dataare actuallygeneratedbyamyriad ofinterconnected smart devices, communication apps, and their usage in healthcare monitoring applications. Data are gathered and analyzed from e-health records, imaging equipment, medicalsensors,devices,andsmartphonesoverthecloud.

This analysis augments the decision-making power of

(4)

4 M.S. Hossain, G. Muhammad / Computer Networks 0 0 0 (2016) 1–11

ARTICLE IN PRESS

JID:COMPNW [m3Gdc;February26,2016;19:24]

Fig. 2. Data flow architecture for HealthIIoT monitoring value chain.

Fig. 3. The proposed HealthIIoT architecture for an ECG monitoring.

healthcareprofessionals,andhelpspatientshaveanactive roleinmanagingtheirpersonalhealth.

Fig. 2 outlines how the flow of a patient’shealthcare data (e.g., ECG signals) is captured securely; how it is transferred seamlessly through a connection gateway to theclouddatacentersforfurtheranalysisandprocessing, suchasfeatureextraction,classification,verification,work- loadmeasurement,andbigdatamanagement.After being processed and securely stored in the cloud, the chain of collecteddataiseitheraccessedbyhealthcareprofession- als, ordelivered to externalsystems forfurther industry- specifichealthcareIoTsolutions.

Fig. 3 shows the cloud-assisted IIoT-enabled health monitoring framework. First, the patient’s ECG signal is recorded throughthe connecteddevicesandsensors, and then after possible signal reconstruction, enhancement,

andwatermarking,itissenttothecloud-basedsystemus- ing network connections. The cloud system validatesthis informationto checkthatthepatient’sinformationiscor- rect,andthen extractssome features,classifiesthesignal, and redirects it to the assigned healthcare professionals andprovidersforpossiblepatientcare.

Themajorcomponentsoftheframeworkaredescribed below.

Healthcarestaff and other related stakeholders: Pa- tientsuploadtheirECGreadingsthroughanECGinterface, which is connected to the Internet. After some process- ing,theECGreadingisstoredintheclouddatabase,where healthcareprofessionalscanaccessitandreviewitforpos- sibleactionbasedontheuploadedECGreadings.

ECGsignal capturingandrecordingservice:Thisser- viceisusedtorecordandstoretheECGsignalfromdiffer- entdevicesandsmartphones.

Securetransmissionservice:Theserviceenablesase- cure and authenticated transmission of the ECG signal throughInternet.Toaccomplishthis,watermarkingisem- beddedintothesignal,andlater,isextractedtoverifythe authenticity.

Resource allocation manager: Manages virtual ma- chine(VM)resourcesandwebservices.

Cloudsystemmanager:ControlsallVMsandallocates suitableresourcesthroughtheresourceallocationmanager foreach service, suchasECG signal andthings collection andrecordservicemanager,ECGmonitoringsessionman- ager,featureextractionandclassificationmanager, andfi- nally,signal reconstruction, enhancementandwatermark- ingmanager.

(1) ECG signal and things collection and record service management: This web service is responsible for managingtheusers’dataandtheirrelatedhealthin- formation,andstoringtheminthedatabase.

(5)

(2) ECG monitoring (analysis and communication alerts) sessionmanagement: Responsiblefor managingand controlling the sessions, in addition to locating, tracking,andevaluatingtheactivities.

(3) Featureextractionandclassificationmanagement:This webserviceextractscollecteddatauponrunningthe ECG apps on smartphones, and stores them in a MySQLdatabasebeforesendingthemtotheHealthI- IoTcloud.

(4) Signal reconstruction, enhancement, and watermark- ing: Thisweb servicegenerates,records,andtracks theperformanceofthemonitoringfunction.

HealthIIoT manager: Manages all health-related IIoT databy assigningdatatodifferentreplicateddatacenters, afterverifyingtheauthenticityofthedata.

Monitoring and analytics: Analyzes the data by ex- tracting features and applying classification techniques.

Calculates andmonitors the workload of the framework, suchasstorageandbandwidth.

Replicaservice:Becauseofthegrowingdemandforin- terconnectedmedicaldeviceswithheterogeneousconnec- tivity,HealthIIoTsystemshandlelargenumbersofdatare- questsforaccessingpatienthealthcare.Therefore,datasets needtobereplicatedinmultiplesitesanddatacentersto offer faster data access times.If one ormore sites (data centers)are down, healthcare data can be accessed from other nearby sites. Generating replicas also enables the healthcareprofessionals’ECGfilerequeststodistributethe workload through the replica servers, and avoid perfor- mancedegradation dueto networkcongestion. Moreover, thisensuresfasteraccess,scalability,andareductioninre- sponsetime.

IIoT-driven healthcare service directory: Records and storesdata fromtheECG capturing devices.It alsoregis- tersandpublishesdifferentparticipatingservices.Itfacili- tatescontinuouscareforthepatientsbyrecordingtheECG signal inportable ECG recordingdevicesathome orout- doors,andsendsthem tosmartphonesordesktops.Some majorelementsinthisdirectoryaretheECGcapturingser- vice,feature extraction andECG classification service, se- curetransmissionservice,andpaymentservice.Healthcare professionalscangetaccesstotheECG datafromthisdi- rectorywithoutvisitingthepatient.

4. Proposedhealthmonitoringapproach

Our proposed health monitoring approach consists of someprocessingsteps,whicharesignalenhancement,wa- termarking,featureextraction,ECGanalysis, andsignalre- construction. Signal enhancement and watermarking are done on the client side. The work flow of the proposed frameworkisshowninFig.4.

4.1. Signalenhancement

AnECGmonitoringsystembasedonthecloudwaspro- posed by Pandeya et al. [23]. In their system, ECG data were collected by mobile devices and were sent to the cloud for analysis. The system wasjust a prototype, and therefore,problemsremainedinitsfullypracticalusagein

Fig. 4. Overall work flow of the ECG monitoring system in the cloud.

Fig. 5. Effect of low-pass filtering and moving average filtering: (a) the recorded ECG signal, (b) the low-pass filtered signal, and (c) the moving average filtered signal.

termofdatacollectionandtransmission.Thefirstissueis toensuretheeffectivenessofECG datacollectionthrough mobile devices. Physiological artifacts can be caused by muscular activitiesthat resultinsmallspikes,andbyhu- man motion that results in large swings inthe recorded data.Non-physiologicalartifactscanbe producedby elec- trical interference and electrode malfunction. Electrode malfunction is initiated by loose connections, electrode misplacement, low amount of electrode gel, wrong filter setting,fractured wires,etc. Ofthem, electrodemisplace- mentisamajorsourceofmalfunctionofECGdataacquisi- tion[24].Cable misplacementcan evenresultinECGthat resemblescardiacabnormalitieslikeectopicrhythm[25].

Therefore, in the proposed framework, the recorded ECG signalsare enhanced before processingto get rid of some ofthecommonartifacts.Inthe enhancementstage, the recordedECG signal ispassedthrougha low-passfil- tertosuppressthehighfrequencycomponentsthatarere- ferred to noise. A 25-point moving average filter is then appliedtotheoutput ofthelow-passfiltertosmooththe signal. Fig. 5 shows the effect of low-pass filtering and movingaveragefilteringofarecordedECGsignal.Fromthe figure, we see that the signal looks ‘clear’ after applying these two filters. This preprocessing step is necessary to correctly detectelectrical waves inthe ECG signal,which iscriticalforsubsequentonlineanalysisandmonitoring.

4.2. PeakRdetection

To process the ECG signal, determining peak R is required. These two attributes in ECG signal are very important for ECG signal analysis. To detect R, we use analytical wavelettransform(AWT) [28]. Acomplex AWT

(6)

6 M.S. Hossain, G. Muhammad / Computer Networks 0 0 0 (2016) 1–11

ARTICLE IN PRESS

JID:COMPNW [m3Gdc;February26,2016;19:24]

Fig. 6. Detected peak R.

canbeexpressedbyEq.(1).

φ ( ω )

=

ω

neω,

ω

≥0

=0,

ω

<0 (1)

Theaboveequation isobtainedbycombiningaHilbert transform and a wavelet transform. In Eq. (1), n is the derivative order. The advantage of using the above equa- tion is that it combines the time-frequency location of a wavelettransformwiththelocalslopeinformationofthe Hilberttransform.

After applying complex AWT, we apply thresholding and look for persistent lines. The local maximums are identified in the wavelet transform signal to find R (see Fig.6).

4.3. ECGwatermarking

Thenext stage istowatermark thesignalto protectit fromforgery.Watermarkingisaproceduretoembedsome information in a signal without distorting the visibility or credibility of the signal for ownership claim. It has mainly two parts: watermark embedding and watermark extraction for verification. Embedding watermark in the ECG signal will ensure theauthenticity ofthe ECG signal transmitted over the cloud. We adopt a simple yet effi- cient strategy of watermarkingthat has rarely beenused for ECG signals. The watermarking is based on discrete wavelet transform (DWT)-singular value decomposition (SVD) [25,27].The studyin[25,27]did notuse DWT-SVD watermarking scheme in ECG signals, e-healthcare or cloud-basedsystems.DWTisamulti-resolutiontechnique that decomposesa signalintodifferentlevelsoftime and frequency.In theproposed step,weusea two-levelDWT that decomposes the signal into three subbands: approx- imation subbandL2, second-level detail subbandH2, and first-leveldetailsubbandH1.SVDisamatrixfactorization techniquethatdecomposesamatrixintothreematrices.If arectangularmatrixAofsizeI×Jistheinput,theoutput will betwo orthogonal matricesandone diagonalmatrix asfollows(Eq.(2)):

AI×J=UI×ISI×JVJT×J (2) where UTU=II×IandVTV=IJ×J, which means that U andVareorthogonal.Sisadiagonalmatrix,whosediago- nalentriesaresingularvaluesandarrangedindescending

order.Thesesingularvaluesarealways realnumbers.The computationofSVDisstableagainstround-off errors. The fact thata slightvariation inthe valuesof Smatrixdoes notaffecttheperceptionofanECGsignal,watermark bits can be added to the singularvalues of S to get a robust watermarking.

The watermark is an image consisting of the client’s registered ID in image format of size I× J, where I> J. Thedetailedprocedureisdescribedasfollows.

Step1.Normalizethewatermarkimagematrixby255.

Imi,j=

watermarki,j/255;0≤iI,0≤jJ

Step2.Apply SVDon thenormalized matrix.The resul- tantSw isasquarematrixofsizeI×I.

Im=Uw·Sw·VwT

Step3.MultiplySwbyawatermarkintensityfactor,

α

. Swα=

α

·Sw

Step4.Store Uw, VwT, and

α

for watermark extraction.

UseSwαforwatermarkembedding.

Step5.DividetheECGsignalintoNnumberofbeats.The beatdurationis0.6sandpeakRislocatedat40%

oftheduration.

Step6.Step 6:Applytwo-level DWToneach beat.Take H2 (detail coefficients atlevel 2) forwatermark embedding. Store L2 (approximation coefficient) and H1 (detail coefficientsat level 1) forrecon- structionofwatermarkedECGsignal.

Step7.Forma matrixGusingH2ofall theframes. The number of rows corresponds to the number of beatsofthesignal.

Step8.Apply SVD on matrix G. The resultant Ss is a squarematrixofsizeN×N.

G=Us·Ss·VsT

Step9.A newmatrix,Snew,of sizeN × N is formed by usingmatricesSw

α

andSs.

Snew=

Swα

(

n,n

)

+Ss

(

n,n

)

, nI Ss

(

n,n

)

,

(

I+1

)

nN Step10.Using Us, VsT, andSnew, perform inverseSVD to

getmatrixG. G=Us·Snew·VsT

Step11. UsingL2,G,andH1,performinverseDWTtoget watermarkedECGsignal.

The watermark image can be reconstructed by using thefollowingsteps.

Step1. Subtract Ss from Snew to get Sim. Sim should be equal to Sw if the watermarked speech signal is notunderattack.

Sim=Snew

(

n,n

)

Ss

(

n,n

)

,1≤nI

Step2. Apply inverse SVDto get the normalized water- mark.

Im=Uw·Sim·VwT

(7)

Step3. Getthewatermarkimage bymultiplyingtheval- uesby255anddividingby

α

.

Imi,j=

Imi,j×255/

α

; 0≤iI,0≤jJ

Ifthereisnoattack,Imi,jwillbethesameasthe watermarkimage.

The enhancement stage and the watermark stage are performedonthe clientside. Oncethe ECGsignal is wa- termarkedsignal is transmitted to the cloud, where it is processedtoextractfeaturesandtoanalyze.

4.4.Featureextraction

Several features are extracted from the ECG signal in thecloudserver.Thefeaturesincludeheartbeatrate(HBR), durationsofPwave,PRinterval,QRScomplex,andQTin- terval,andtheshape(inverted ornot,andpeakedornot) ofTwave.Thesearetotalofsevenfeatures.

TheHBRisdetermined bytheinverseofthe timedif- ference betweenRR intervals andexpressed asbeats per minutes(bpm)asexpressedbyEq.(3).

HBR

(

bpm

)

= 60

RR intervals

(

s

)

(3)

Anunusual p-wavemayrepresent ectopicatrialpace- maker. p-wavelonger than 80 ms can indicate atrialen- largement. A PR interval smaller than 120 ms may be a causeof Wolf–Parkinson–White syndrome, while larger than200 ms mayindicatea first degreeofatrioventricu- larblock.QRS complexwiderthan120mssuggestsadis- ruptionof theheart’s conduction system, orsever hyper- kalemia. A prolonged corrected QT interval ( > 440 ms) risks for ventricular tachyarrhythmia, while an unusual short interval may indicate severe hypercalcemia. For a correctedQTinterval,QTintervalshouldbenormalizedby thesquare root ofthe RRinterval. InvertedT wavesmay besyndromes ofmyocardialischemia,orhighintracranial pressure, while a peaked (determinedby the variance of thewave)Twave mayindicatehyperkalemiaorearlymy- ocardialinfarction.

Spectral features are also calculated by applying the FastFourierTransform(FFT)toeachbeat.A512-pointFFT isusedandfirsthalfofthemagnitudeoutputisretained.

The256bins are linearlyresampledtoF numberofbins, whereF is varied to 10,20, 30,and40. TheseF number offeaturesareappendedtopreviouslymentionsevenfea- turesforclassification.

4.5.One-classsupportvectormachine(OCSVM)classification OCSVM is a one-class classification technique, where thefeaturespaceismappedtoahigherdimensionalspace sothatahyperplane maximizesthedistancebetweenthe hyperplaneandtheorigin.InatypicalSVM,therearetwo classes, while in OCSVM, there is only one class in the training.OCSVMisusedinthisframework,becauseitcan detectthepersonalECGasabnormalornot.Fortheexper- iments,MIT-BIHdatabasewasused[29].Thefirstgroupof 48recordsaredividedintotwosets:firstsetcomprisesof first3minofdataineachrecordfortraining,whilesecond

Fig. 7. ECG signal modules on the client side and the cloud side.

setconsistsofremaining27minofdataineachrecordfor testing.

Fig.7showstheseparationofthemodulesintheclient sideandthecloudside.

5. Experimentalresultsandevaluation

Several experiments were performed to validate the proposed IoT-enabledECGsignal monitoring.Theyarede- scribedindetailsinthefollowingssections.

5.1. Watermarkingperformance

The performance of the ECG watermarking was mea- suredin termsofimperceptibility,androbustnessagainst attacks [30]. Imperceptibility is a measure of how much thesignalisdistortedperceivably.Tomeasureimpercepti- bility,weusedsignal-to-noiseratio(SNR),whichisanob- jectivemeasurement.SNRisdefinedbyEq.(4).

SNRdB=10log10 Ps

PsPs (4)

where, Ps and Ps are the power of original ECG sig- nalandthewatermarkedECGsignal,respectively.Another closely relatedmetric ispeak SNR orPSNR. In PSNR,the numeratoroflogarithminEq.(4)isreplacedbythesquare of themaximumvalue ofthe pixelinthe original water- markimage.

Withregardtorobustnessagainstattack,weconsidered two common attacks, which are additive white Gaussian noise (AWGN), and filtering of type low-pass, high-pass, andband-pass.Themeasurementwereobtainedbyusinga correlationfactor,

η

,whichiscomputedbyusingEq.(5).

η (

w,w

)

=

N

i=1wiwi

N

i=1wi2

N

i=1wi2

(5)

where,wandw’are theoriginal andextractedwater- mark,respectively,Nisthenumberofpixelsinthewater- markimage.

η

takesthevaluebetween0(norelation)and

1(perfectrelationship).

Fig. 8 shows the obtainedSNR andPSNR in dB using theproposedDWT-SVDbasedwatermarking.Theproposed scheme was compared with another popular method,

(8)

8 M.S. Hossain, G. Muhammad / Computer Networks 0 0 0 (2016) 1–11

ARTICLE IN PRESS

JID:COMPNW [m3Gdc;February26,2016;19:24]

Fig. 8. PSNR (dB) and SNR (dB) using the proposed DWT-SVD based wa- termarking, which is compared with DWT-DCT based watermarking.

Fig. 9. Correlation factor after different types of attack.

whichisDWT-DCT (discretecosinetransform)-based[31]. From the figure, we see that the proposed watermarking has a very good SNR and PSNR, and it outperforms the DWT-DCTbasedmethod.

Fig. 9shows correlation factor,

η

,after differenttypes

of attacks. The attacks were applied in the cloud server.

Theattacksincludedband-passfilteringwithpassbandbe- tween8Hzand40Hz,high-passfilteringwithcutoff fre- quencies of40Hz,low-pass filteringwithcutoff frequen- cies of8 Hz, and4 Hz,and AGWNof 20dB, 15 dB, and 10dB.Fromthefigure,weseethatalmostinallthecases thecorrelationfactorwas1,whichindicatestherobustness of the proposed watermarking algorithm. For a compari- sonwithDWT-DCTbasedmethod,thecorrelationfactorof DWT-DCTbasedwatermarkingis0.98forAWGN20dBat- tack.

5.2. Classificationperformance

Two types of classification experiments were per- formed: one withthe MIT-BIHdatabase asmentioned in the classification section, and the other with actual data recorded through theproposed framework. Fig. 10 shows theaverageclassificationaccuracyusingthetwodatabases.

Sevenfeaturescorrespondtofeatureswithoutspectralfea- tures.With37 features, theaccuracyreachedup to87.7%

with MIT-BIH database and 90.4% with private database.

Fig. 11 showsthe time spent fromtransmitting the data to the cloud, extracting features, to classifying the data.

Oneinstance,threeinstances,andfivesinstancesofservers

Fig. 10. Classification accuracy of the proposed framework.

Fig. 11. Time requirement of the proposed framework.

Table 1

Storage configurations.

Config. Node capacity Total storage Relative

(GB) (TB) storage (%)

1 [50–10 0 0] 20 .75 80

2 [50–500] 15 60

3 [50–200] 12 46 .75

4 [20–50] 4 .5 18

5 [10–20] 3 .5 15

were used in the cloud. With five instance server, only aroundtwosecondswereneededwhileusing37features.

5.3.WorkloadoftheIIoT-enabledhealthmonitoringservice To evaluate the proposed IIoT-based for health mon- itoring, we used a Java-based simulator program. The simulation environment includes cloud topology and an ECG data access pattern by a healthcare professional. To reduce overhead and latency, ECG files are replicated so thathealthcareprofessionalscangetaccesstothedesired datafor a specific patient fromneighboringdata centers.

Wehaveusedasimilarmulti-tiercloudtopologystructure [32]withmultipledatacentersusingthefollowingstorage configurations of replica servers as shown in Table 1, wherethecapacityofrelative storagerangesfrom15%to 80%. While submitting a task, a number of ECG files are requested foraccessto patient data.The sequence of file request ishandled by threeaccess patterns, such asZipf distribution, random distribution, and Gaussian distribu- tion. The framework is evaluated in terms of ECG data accessby healthcare professionals.The accesstime refers to the time of completion of all tasks for the ECG file

(9)

Zipf Guassian. Random 2

2.5 3 3.5 4 4.5 5 5.5x 105

ECG data access types

Data access times (sec)

Without Rep.

With Rep.

Fig. 12. ECG data access time using relative storage capacity 80%.

requests.Theobjectiveisto reduceECG dataaccesstime.

Inthesimulation,constant dataaccessrateis considered.

Thetotaldataaccesstimeisasummationoftimeneeded bythedisktofindareplicaofanECGfilefromthereplica data centerdisk andnetwork communicationlatency for replica transmission. The data access time, Access(R), is

Fig. 13. ECG data access time comparison for all storage configuration.

calculatedusingthefollowingmodel,Eq.(6): Access

(

R

)

=

vG

f

( v

,n

)

·Dlatency

( v

,r

)

+Gnetwork

( v

,r

)

(6)

where, G=(V,L) is undirected tree structure of the cloud, R is a set of replica data centers, n is an ECG file orsample, f(

v

,n)isdataaccessfrequencybyahealthcare professional(v)foranECGfile(n),rislowestancestorofv inR,Dlatencyisdiskaccesslatency,andGnetwork isnetwork communicationlatency.

We compared ECG data access time by integrating replicationandwithoutconsideringreplicationapproaches totheproposedframework.Fig.12comparestheECGdata accesstimesbyconsideringreplicationandnon-replication strategies for the first storage configuration,as shown in Table 1. In the majority ofcases, a storage configuration with replication resulted in a shorter ECG data access time than a configuration without replication. Replicated datasets in several data center locations decrease the data access time because healthcare professionals have access to the required ECG data for a particular patient from a nearbysite. Moreover, the storage capacityofthe

Fig. 14. Workload for ECG monitoring.

(10)

10 M.S. Hossain, G. Muhammad / Computer Networks 0 0 0 (2016) 1–11

ARTICLE IN PRESS

JID:COMPNW [m3Gdc;February26,2016;19:24]

data centers favors using the replication approach. With a reducedstoragecapacity,the ECGdata accesstimesfor both approaches (i.e., with and without replication) are increased, butby different magnitudes.Fig.13 showsthe executiontimesforZipfandGaussian distributionsforall thestorageconfigurationslistedinTable1.Shorteraccess times for all storage configurations are correlated with usingthereplicationapproach.

Fig. 14showsthe workload ofthe main servicesused for health monitoring of the proposed HealthIIoT frame- work. We have concentrated on three key services: ECG capturing service, transmission service, andextraction or classification service. To understand thefeatures ofthose workloads asthey relate toECGmonitoring,the run-time characteristicsofthoseworkloadsarecollectedbyrunning the proposed health monitoring prototype on the Ama- zon Elastic Computing Cloud (EC2). Forthis purpose, we rentedaVMwithanIntel®CoreTM2Duo,DDR3 ECCRAM at2.53GHZ,1Gbpsbandwidth,and4.0GB memory,run- ning Windows Server 2010. The performance monitor of Windows hasbeenusedtorecordthe resourceconsump- tions of those workloads for memory, CPU, and network bandwidthutilizations.

6. Conclusion

IIoT-driven healthcare monitoring is an emerging healthcare service that may potentially revolutionize the healthcareindustryintermsofimprovingaccesstopatient information, and offer quality patient care through con- tinuous monitoring from anywhere at any time, through amultitudeofdevices.WithHealthIIoT,healthcareprofes- sionalsmaybeabletoaccesspatientinformation,storeit, andanalyzeitinareal-timemannertomonitorandtrack thepatient.However,interconnectedwearable patientde- vicesandhealthcaredata(suchasECGsignals)aresubject to security breaches. To this end, this paper describes a cloud-integrated HealthIIoTmonitoring framework, where healthcaredataare watermarkedbeforebeingsenttothe cloud forsecure,safe,andhigh-qualityhealthmonitoring.

Future work will involve testingthe proposed HealthIIoT monitoring framework for data security and notification functions, as well asimplementing a test trialwith real- worldpatientsandhealthprofessionals.

Acknowledgment

The authors extend their appreciation to the Dean- shipofScientificResearchatKingSaudUniversity,Riyadh, Saudi Arabia forfunding this work through the research groupprojectno.RGP228.

References

[1] T. J. McCue, $117 billion market for internet of things in healthcare by 2020, forbes, April 2015, Retrieved from http://www.forbes.

com/sites/tjmccue/2015/04/22/117- billion- market- for- internet- of- things- in- healthcare- by- 2020 .

[2] S. Schneider, How the industrial internet of things can save 50,0 0 0 lives a year, January 2015, Industrial Internet Consor- tium, Retrieved from http://blog.iiconsortium.org/2015/01/how-to- industrial- internet- of- things- can- save- 50 0 0 0- lives- a- year.html .

[3] J. Bresnick, Healthcare internet of things driving global market growth, June 2015, Retrieved from http://healthitanalytics.com/news/

healthcare- internet- of- things- driving- global- market- growth . [4] J. Mohammed , A. Thakral , A.F. Ocneanu , C. Jones , C.H. Lung , A. Adler ,

Internet of Things: Remote patient monitoring using web services and cloud computing, in: Proceedings of the 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Comput- ing and Communications (GreenCom), and IEEE Cyber, Physical and Social Computing (CPSCom), Taipei, 1–3 September 2014, pp. 256–

263 .

[5] M. Hassanalieragh , A. Page , T. Soyata , G. Sharma , M. Aktas , G. Ma- teos , B. Kantarci , S. Andreescu , Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing:

Opportunities and challenges„ in: Proceedings of the IEEE Interna- tional Conference on Services Computing, 2015, pp. 285–292 . [6] L. Hu , M. Qiu , J. Song , M.S. Hossain , Software defined healthcare net-

works, IEEE Wirel. Commun. Mag. 22 (6) (2015) 67–75 .

[7] S.M.R. Islam , D. Kwak , M.H. Kabir , M. Hossain , K.S. Kwak , The Inter- net of Things for health care: A comprehensive survey, IEEE Access 3 (2015) 678–708 .

[8] J. Jara , M.A. Zamora-Izquierdo , A.F. Skarmeta , Interconnection frame- work for mHealth and remote monitoring based on the Internet of Things, IEEE J. Sel. Areas Commun. 31 (9) (2013) 47–65 .

[9] B. Xu , L.D. Xu , H. Cai , C. Xie , J. Hu , F. Bu , Ubiquitous data access- ing method in IoT-based information system for emergency medical services„ IEEE Trans. Ind. Inf. 10 (2) (2014) 1578–1586 .

[10] P.Y. Li , L. Guo , Y. Guo , Enabling health monitoring as a service in the cloud, in: Proceedings of the IEEE International Conference on Utility and Cloud Computing, October 2014, pp. 81–84 .

[11] M.S. Hossain, Cloud-supported cyber-physical framework for patients monitoring, IEEE Syst. J. (2015), doi: 10.1109/JSYST.2015.2470644 . [12] K. Zhang , K. Yang , X. Liang , Z. Su , X.S. Shen , H.H. Luo , Security and

privacy for mobile healthcare networks: From a quality of protection perspective, IEEE Wirel. Commun. Mag. 22 (4) (2015) 104–112 . [13] M.S. Hossain , G. Muhammad , Cloud-based collaborative media ser-

vice framework for health-care, Int. J. Distrib. Sensor Netw. 2014 (2014) 11 . Article 858712.

[14] J. Granados , A.M. Rahmani , P. Nikander , P. Liljeberg , H. Tenhunen , et al. , Web-enabled intelligent gateways for eHealth internet-of- things, in: R. Giaffreda, et al. (Eds.), Internet of Things. User-Centric IoT, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 2015, pp. 248–254 .

[15] S. Amendola , R. Lodato , S. Manzari , C. Occhiuzzi , G. Marrocco , RFID technology for IoT-based personal healthcare in smart spaces, IEEE Internet Things J. 1 (2) (2014) 144–152 .

[16] L. Catarinucci, D. De Donno, L. Mainetti, L. Palano, L. Patrono, M.L. Stefanizzi, L. Tarricone, An IoT-aware architecture for smart healthcare systems, IEEE Internet Things J. 2 (6) (2015) 515–526, doi: 10.1109/JIOT.2015.2417684 .

[17] D. bib17 , Securing the industrial Internet of Things, Inf. Syst. Secur.

Assoc. (ISSA) J. (2015) 24–30 .

[18] A. Sawand , S. Djahel , Z. Zhang , F. Naït-Abdesselam , Toward energy- efficient and trustworthy eHealth monitoring system, China Com- mun. 2 (1) (2015) 46–65 .

[19] M. Chen , Y. Zhang , Y. Li , S. Mao , V. Leung , EMC: Emotion-aware mo- bile cloud computing in 5G, IEEE Netw. 29 (2) (2015) 32–38 . [20] M. Chen , Y. Zhang , Y. Li , M. Hassan , A. Alamri , AIWAC: Affective in-

teraction through wearable computing and cloud technology, IEEE Wirel. Commun. Mag. 22 (1) (2015) 20–27 .

[21] M. Chen , NDNC-BAN: Supporting rich media healthcare services via named data networking in cloud-assisted wireless body area net- works, Inf. Sci. 284 (10) (2014) 142–156 .

[22] M. Chen , J. Wan , S. Gonzalez , L. Xiaofei , V.C.M. Leung , A survey of recent developments in home M2M networks, IEEE Commun. Surv.

Tutor. 16 (1) (2014) 98–114 .

[23] S. Pandeya , W. Voorsluys , S. Niua , A. Khandoker , R. Buyyaa , An au- tonomic cloud environment for hosting ECG Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the Internet-of-Things data analysis services, Future Gen.

Comput. Syst. 28 (2012) 147–154 .

[24] H. Tam , J. Webster , Minimizing electrode motion artifact by skin abrasion, IEEE Trans. Biomed. Eng. 24 (1977) 134–139 .

[25] V. Batchvarov , M. Malik , A. Camm , Incorrect electrode cable connec- tion during electrocardiographic recording, Europace 9 (2007) 1081–

1090 .

[26] M.S. Hossain , G. Muhammad , Cloud-assisted speech and face recog- nition framework for health monitoring, Mob. Netw. Appl. 20 (3) (2015) 391–399 .

(11)

[27] M. Ali , C.W. Ahn , An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain, Signal Process. 94 (2014) 545–556 .

[28] H. Zhao , F. Wang , Z. Chen , J. Liu , A robust audio watermarking al- gorithm based on SVD-DWT, Elektron. Ir Elektrotech. 20 (1) (2014) 75–80 .

[29] J.M. Lilly , S.C. Olhede , On the analytic wavelet transform, IEEE Trans.

Inf. Theory 56 (8) (2010) 4135–4156 .

[30] G.B. Moody , R.G. Mark , The impact of the MIT-BIH arrhythmia database, IEEE Eng. Med. Biol. Mag. 20 (3) (2001) 45–50 .

[31] J. Grody , L. Brutun , Performance evaluation of digital audio water- marking algorithms, Proceedings of the Forty-third IEEE Midwest Symposium on Circuits and Systems, 20 0 0, pp. 456–459 .

[32] M. Shorfuzzaman , A. Alelaiwi , M. Masud , M.M. Hassan , M.S. Hossain , Usability of a cloud based collaborative learning framework to im- prove learner’s experience, Comput. Hum. Behav. 51 (2015) 967–976 . M. Shamim Hossain is an Associate Professor of SWE, CCIS, at King Saud University, Riyadh, KSA. He received his Ph.D. degree in Electri- cal and Computer Engineering from the University of Ottawa, Canada.

His research interests include serious games, cloud and multimedia for healthcare, big data for multimedia, social media, and biologi- cally inspired approach for multimedia and software system. He has authored and co-authored around 100 publications including refereed IEEE/ACM/Springer/Elsevier journals, conference papers, books, and book chapters. He has served as a member of the organizing and technical committees of several international conferences and workshops. Recently, he received outstanding paper award from an IEEE Conference. He has served as co-chair, general chair, workshop chair, publication chair, pub- licity chair, and TPC for over 12 IEEE and ACM conferences and work- shops. He is on the editorial board of Springer Multimedia tools and Applications (MTAP). Currently, he serves as a lead guest editor of IEEE Transactions on Cloud Computing, IEEE Communication Magazine, Else- vier Future Generation Computer Systems, Elsevier Computers and Elec- trical Engineering, Springer Multimedia tools and Applications (MTAP), Springer Cluster Computing. Previously, he served as a lead guest editor of IEEE Transactions on Information Technology in Biomedicine (currently JBHI), Springer Multimedia tools and Applications, and Hindawi Interna- tional Journal of Distributed Sensor Networks. He is a Senior Member of IEEE and a member of ACM.

Ghulam Muhammad is an Associate Profes- sor in the department of Computer Engineering, College of Computer and Information Sciences at the King Saud University, Riyadh, KSA. He re- ceived his Ph.D. in Electrical and Computer En- gineering from Toyohashi University and Tech- nology, Japan in 2006. His research interests in- clude serious games, cloud and multimedia for healthcare, resource provisioning for big data processing on media clouds and biologically in- spired approach for multimedia and software system, image and speech processing. He has authored and co- authored more than 120 pub- lications including refereed IEEE/ACM/Springer/Elsevier journals, confer- ence papers, books, and book chapters.

Referensi

Dokumen terkait

Cloud computing and the Internet of Things bring new security risks. Mobile Internet era, business services side gradually evolve to cloud computing platform, features of cloud

Wang, A security and privacy model for mobile rfid systems in the internet of things, in: International Conference on Communication Technology Proceedings, ICCT,

Dalam konteks sistem monitoring factor daya listrik, beberapa peneliti telah melakukan pengembangan sistem monitoring berbasis Internet of Things (IoT), baik untuk keperluan

Index Terms—Internet of Things, edge computing, low-power embedded systems, microprocessor optimizations, IoT survey, adaptable microprocessors, heterogeneous architectures, energy

Editorial Security, Trust and Privacy for Cloud, Fog and Internet of Things Chien-Ming Chen ,1Shehzad Ashraf Chaudhry ,2Kuo-Hui Yeh ,3 and Muhammad Naveed Aman 4 1Shandong University

Securing Sensor to Cloud Ecosystem using Internet of Things IoT Security Framework Abdul Fuad Abdul Rahman National Vulnerability Assessment Centre, MyVAC CyberSecurity Malaysia,

A Survey on Information-Centric Networking with Cloud Internet of Things and Artificial Intelligence ABSTRACT The Internet is evolving, and data is a critical component of today's

The results of checking the maximum range of the system built were also KEYWORDS: Internet of Things IoT, LoRa, LoRaWAN, The Things Network, gas meter, remote reading.. INTRODUCTION