0% found this document useful (0 votes)
129 views5 pages

Three and Five Layer Architecture

Three layer and five layer architecture diagrams are described for IoT-based health monitoring systems. The three layer architecture includes a perception layer, network layer, and application layer, with each layer having privacy and security issues that must be addressed. The five layer architecture includes a things/device layer, communication/service layer, network layer, application server layer, with each layer designed to secure against different types of attacks. Real-time health monitoring involves sensors, devices, and a communication channel between patients and doctors, requiring security of data shared over this channel.

Uploaded by

jawad mughal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views5 pages

Three and Five Layer Architecture

Three layer and five layer architecture diagrams are described for IoT-based health monitoring systems. The three layer architecture includes a perception layer, network layer, and application layer, with each layer having privacy and security issues that must be addressed. The five layer architecture includes a things/device layer, communication/service layer, network layer, application server layer, with each layer designed to secure against different types of attacks. Real-time health monitoring involves sensors, devices, and a communication channel between patients and doctors, requiring security of data shared over this channel.

Uploaded by

jawad mughal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Three layer Architecture Diagram:

Five layer architecture Diagram:


Description:
Three Layer:
E-health has advanced significantly thanks to the incredible combination of the
internet of things (IoT) with traditional health monitoring technologies. Real-time
health monitoring services are offered by various sensors and wireless body area
network devices. As the quantity of IoT device use is exploding quickly, and
technological and security issues are also becoming worse by the hour. For secure
communication over the public network, the data produced by sensor-based
devices requires confidentiality, integrity, authenticity, and end-to-end security.
An application layer, a network layer, and a perception layer are all components
of IoT-based health monitoring systems. Every layer has some privacy and
security issues that need to be properly addressed.
The availability, validity, and integrity of the patient's critical data are referred to
as security, whereas privacy assures that the data may only be accessed and
understood by the rightful owner. A system of real-time health monitoring
involves a number of gadgets that provide a communication channel between
patients and doctors. The security of the data shared between patients and health
monitoring devices is necessary for this communication channel.
Each layer of the internet of things includes security flaws that must be closed in
order to address serious security issues. The physical layer, sometimes referred to
as the perception layer, is the top layer. Temperature, humidity, location, and
other environmental data are sensed and relayed to the network layer via sensor
devices.
Data from the network layer is routed and transmitted using some emerging
technologies, such as Wi-Fi, Bluetooth, ZigBee, and 4G LTE, to various IoT hubs
and devices. These technologies have enabled communication between various
platforms, including cloud computing and gateway routers. In order to transmit
data between two or more different IoT nodes of the network, gateways act as
middleware.
Through this layer, the application layer guarantees the security trifecta of data
confidentiality, integrity, and authenticity. The application layer defines any IoT
application that has been implemented. The application layer acts as a bridge
between the network and the endpoints.
Five Layer:
Things Layer/Device Layer: All devices can execute their individual tasks at this layer,
which serves as the link between data gathering and the control network. These
tasks include detection, monitoring, controls, and actions. It transports data from
the IoT architecture's lowest layer to its upper ones.
This layer is designed to prevent attacks including physical, identity spoofing,
whitelisting, sandboxing, secure booting, sniffing, as malicious attacks.
Communication/Service Layer: This layer allows different devices to interconnect with
each other over a central network to collect and share data across local devices.
The transmission in the form of sending and receiving signals between the layers
uses various protocols such as mobile/wireless networks, Bluetooth, wired serial
protocols and so forth. Some processing capabilities can also be incorporated into
the layer to suit the needs of users, such as signal and identity authentication.
This layer is designed to Secure communication against sniffing and adulteration.
Network Layer: This layer allows IoT services and gadgets to communicate with or
be controlled by remote cloud computing servers. Physical hardware components
including switches, gateways, routers, and broadband internet are used to
establish this link. Additionally, this layer creates an access environment for the
perception layer and offers secure network communication. The network layer
makes sure that users, objects, and services may access and employ dependable
response mechanisms, storage, and analytical resources.
This layer is design to secure routing and switching data traffic from attacks such
as man in the middle, sniffing, spoofing and DoS.
Application Server Layer: Users communicate with the IoT-cloud-based e-Health
system directly through this layer. Users may get alarms, see collected data in
real-time, manually or automatically respond to emergency situations, and more.
This layer is in charge of offering the user application-specific services. It describes
the many use cases for IoT deployment, including e-Health systems, smart homes,
and smart cities.
This layer is design to Protect against attacks such as blat anting, bribery of
information and malicious code.

You might also like