Three layer and five layer architecture diagrams are described for IoT-based health monitoring systems. The three layer architecture includes a perception layer, network layer, and application layer, with each layer having privacy and security issues that must be addressed. The five layer architecture includes a things/device layer, communication/service layer, network layer, application server layer, with each layer designed to secure against different types of attacks. Real-time health monitoring involves sensors, devices, and a communication channel between patients and doctors, requiring security of data shared over this channel.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
129 views5 pages
Three and Five Layer Architecture
Three layer and five layer architecture diagrams are described for IoT-based health monitoring systems. The three layer architecture includes a perception layer, network layer, and application layer, with each layer having privacy and security issues that must be addressed. The five layer architecture includes a things/device layer, communication/service layer, network layer, application server layer, with each layer designed to secure against different types of attacks. Real-time health monitoring involves sensors, devices, and a communication channel between patients and doctors, requiring security of data shared over this channel.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Three layer Architecture Diagram:
Five layer architecture Diagram:
Description: Three Layer: E-health has advanced significantly thanks to the incredible combination of the internet of things (IoT) with traditional health monitoring technologies. Real-time health monitoring services are offered by various sensors and wireless body area network devices. As the quantity of IoT device use is exploding quickly, and technological and security issues are also becoming worse by the hour. For secure communication over the public network, the data produced by sensor-based devices requires confidentiality, integrity, authenticity, and end-to-end security. An application layer, a network layer, and a perception layer are all components of IoT-based health monitoring systems. Every layer has some privacy and security issues that need to be properly addressed. The availability, validity, and integrity of the patient's critical data are referred to as security, whereas privacy assures that the data may only be accessed and understood by the rightful owner. A system of real-time health monitoring involves a number of gadgets that provide a communication channel between patients and doctors. The security of the data shared between patients and health monitoring devices is necessary for this communication channel. Each layer of the internet of things includes security flaws that must be closed in order to address serious security issues. The physical layer, sometimes referred to as the perception layer, is the top layer. Temperature, humidity, location, and other environmental data are sensed and relayed to the network layer via sensor devices. Data from the network layer is routed and transmitted using some emerging technologies, such as Wi-Fi, Bluetooth, ZigBee, and 4G LTE, to various IoT hubs and devices. These technologies have enabled communication between various platforms, including cloud computing and gateway routers. In order to transmit data between two or more different IoT nodes of the network, gateways act as middleware. Through this layer, the application layer guarantees the security trifecta of data confidentiality, integrity, and authenticity. The application layer defines any IoT application that has been implemented. The application layer acts as a bridge between the network and the endpoints. Five Layer: Things Layer/Device Layer: All devices can execute their individual tasks at this layer, which serves as the link between data gathering and the control network. These tasks include detection, monitoring, controls, and actions. It transports data from the IoT architecture's lowest layer to its upper ones. This layer is designed to prevent attacks including physical, identity spoofing, whitelisting, sandboxing, secure booting, sniffing, as malicious attacks. Communication/Service Layer: This layer allows different devices to interconnect with each other over a central network to collect and share data across local devices. The transmission in the form of sending and receiving signals between the layers uses various protocols such as mobile/wireless networks, Bluetooth, wired serial protocols and so forth. Some processing capabilities can also be incorporated into the layer to suit the needs of users, such as signal and identity authentication. This layer is designed to Secure communication against sniffing and adulteration. Network Layer: This layer allows IoT services and gadgets to communicate with or be controlled by remote cloud computing servers. Physical hardware components including switches, gateways, routers, and broadband internet are used to establish this link. Additionally, this layer creates an access environment for the perception layer and offers secure network communication. The network layer makes sure that users, objects, and services may access and employ dependable response mechanisms, storage, and analytical resources. This layer is design to secure routing and switching data traffic from attacks such as man in the middle, sniffing, spoofing and DoS. Application Server Layer: Users communicate with the IoT-cloud-based e-Health system directly through this layer. Users may get alarms, see collected data in real-time, manually or automatically respond to emergency situations, and more. This layer is in charge of offering the user application-specific services. It describes the many use cases for IoT deployment, including e-Health systems, smart homes, and smart cities. This layer is design to Protect against attacks such as blat anting, bribery of information and malicious code.