sc 20(10): e5

Research Article

Consociate Healthcare System through Biometric Based Internet of Medical Things (BBIOMT) Approach

Download842 downloads
  • @ARTICLE{10.4108/eai.23-6-2020.165499,
        author={Sherin Zafar and Samia Khan and Nida Iftekhar and Siddharta Sankar Biswas},
        title={Consociate Healthcare System through Biometric Based Internet of Medical Things (BBIOMT) Approach},
        journal={EAI Endorsed Transactions on Smart Cities},
        volume={4},
        number={10},
        publisher={EAI},
        journal_a={SC},
        year={2020},
        month={6},
        keywords={IOMT, IOT, BBIOMT},
        doi={10.4108/eai.23-6-2020.165499}
    }
    
  • Sherin Zafar
    Samia Khan
    Nida Iftekhar
    Siddharta Sankar Biswas
    Year: 2020
    Consociate Healthcare System through Biometric Based Internet of Medical Things (BBIOMT) Approach
    SC
    EAI
    DOI: 10.4108/eai.23-6-2020.165499
Sherin Zafar1,*, Samia Khan1, Nida Iftekhar1, Siddharta Sankar Biswas1
  • 1: Department of CSE, SEST, Jamia Hamdard, India
*Contact email: Zafarsherin@gmail.com

Abstract

Internet of Medical Things (IOMT) or healthcare Internet of Thing (IOT) is a collection of medical devices and applications that connect the various healthcare systems based on IT through online computer networks. The devices are connected the output Wi-Fi allowing the M-M (machine to machine) communication through IOMT. IOMT provides various applications including remote patient monitoring (RPM), wearable fitness bands (WFB), hospital beds that are sensor equipped and many-more. IOMT allows communication of medical devices without the intervention of human. The widespread deployment of IOMT faces challenges of security, privacy, connectivity as well as compatibility. IOMT based systems suffer from various security breaches and hacking attacks. Traditional security measures of login/password do not compliment IOT based systems. So this research chapter proposes a novel Biometric Based Internet of Medical Things (BBIOMT) technology that is unique and spoof free. The BBIOMT approach eliminates shortcomings of traditional password schemes and offer a much superior authentication solution.