Skip to main content

2024 | OriginalPaper | Buchkapitel

Identifying and Evaluating the Effects of User Scenarios on the Data Integrity of Wearable Devices

verfasst von : Ruijing Wang, Ying Wang, Ting Liao

Erschienen in: The Proceedings of the 2023 Conference on Systems Engineering Research

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wearable devices are able to sense, collect, and upload various physiological data. With the technological improvements and progress in power, computation complexity, and size for wearable devices, their application has rapidly expanded in various use scenarios in healthcare. The main challenge of utilizing healthcare data through wearable devices is data integrity. The accurate assessment of data integrity necessitates a comprehensive understanding of the contextual information of wearable usages in free-living conditions, such as user scenarios. To examine the effects of user scenarios on data integrity and validate the assessment method, we conducted a human-subject experiment. We collected raw acceleration and heart rate data from participants using the Apple Watch in the lab under the selected user scenarios. We implemented an anomaly detection method based on an ensemble of neural networks. Then, we associated those data compromises with user scenarios and tested if the selected scenarios influenced the data. This chapter demonstrates the ability of the proposed method to assess data integrity under different user scenarios and contributes to future work that quantifies the influence of user scenarios as potential root causes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat M. Haghi, K. Thurow, R. Stoll, Wearable devices in medical internet of things: scientific research and commercially available devices. Healthcare Inf. Res. 23, 4–15 (2017)CrossRef M. Haghi, K. Thurow, R. Stoll, Wearable devices in medical internet of things: scientific research and commercially available devices. Healthcare Inf. Res. 23, 4–15 (2017)CrossRef
2.
Zurück zum Zitat A.K. Pandey, A.I. Khan, Y.B. Abushark, M.M. Alam, A. Agrawal, R. Kumar, R.A. Khan, Key issues in healthcare data integrity: analysis and recommendations. IEEE Access 8, 40612–40628 (2020)CrossRef A.K. Pandey, A.I. Khan, Y.B. Abushark, M.M. Alam, A. Agrawal, R. Kumar, R.A. Khan, Key issues in healthcare data integrity: analysis and recommendations. IEEE Access 8, 40612–40628 (2020)CrossRef
3.
Zurück zum Zitat M. Zarour, M. Alenezi, M.T.J. Ansari, A.K. Pandey, M. Ahmad, A. Agrawal, R. Kumar, R.A. Khan, Ensuring data integrity of healthcare information in the era of digital health. Healthcare Technol. Lett. 8, 66–77 (2021)CrossRef M. Zarour, M. Alenezi, M.T.J. Ansari, A.K. Pandey, M. Ahmad, A. Agrawal, R. Kumar, R.A. Khan, Ensuring data integrity of healthcare information in the era of digital health. Healthcare Technol. Lett. 8, 66–77 (2021)CrossRef
4.
Zurück zum Zitat D.V. Dimitrov, Medical internet of things and big data in healthcare. Healthcare Inf. Res. 22, 156–163 (2016)CrossRef D.V. Dimitrov, Medical internet of things and big data in healthcare. Healthcare Inf. Res. 22, 156–163 (2016)CrossRef
5.
Zurück zum Zitat S.B. Baker, W. Xiang, I. Atkinson, Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521–26544 (2017)CrossRef S.B. Baker, W. Xiang, I. Atkinson, Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521–26544 (2017)CrossRef
6.
Zurück zum Zitat A. Pantelopoulos, N.G. Bourbakis, A survey on wearable sensor-based systems for health monitoring and prognosis. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40, 1–12 (2009) A. Pantelopoulos, N.G. Bourbakis, A survey on wearable sensor-based systems for health monitoring and prognosis. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40, 1–12 (2009)
7.
Zurück zum Zitat Y. Zhang, G. Chen, H. Du, X. Yuan, M. Kadoch, M. Cheriet, Real-time remote health monitoring system driven by 5g MEC-IoT. Electronics 9, 1753 (2020)CrossRef Y. Zhang, G. Chen, H. Du, X. Yuan, M. Kadoch, M. Cheriet, Real-time remote health monitoring system driven by 5g MEC-IoT. Electronics 9, 1753 (2020)CrossRef
8.
Zurück zum Zitat M. Abubakar, Z. Jaroucheh, A. Al Dubai, B. Buchanan, A decentralised authentication and access control mechanism for medical wearable sensors data, in 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS) (IEEE, 2021), pp. 1–7 M. Abubakar, Z. Jaroucheh, A. Al Dubai, B. Buchanan, A decentralised authentication and access control mechanism for medical wearable sensors data, in 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS) (IEEE, 2021), pp. 1–7
9.
Zurück zum Zitat M. Al Ameen, J. Liu, K. Kwak, Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)CrossRef M. Al Ameen, J. Liu, K. Kwak, Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36, 93–101 (2012)CrossRef
10.
Zurück zum Zitat S. Liu, S. Hu, J. Weng, S. Zhu, Z. Chen, A novel asymmetric three-party based authentication scheme in wearable devices environment. J. Netw. Comput. Appl. 60, 144–154 (2016)CrossRef S. Liu, S. Hu, J. Weng, S. Zhu, Z. Chen, A novel asymmetric three-party based authentication scheme in wearable devices environment. J. Netw. Comput. Appl. 60, 144–154 (2016)CrossRef
11.
Zurück zum Zitat A. Theodouli, S. Arakliotis, K. Moschou, K. Votis, D. Tzovaras, On the design of a blockchain-based system to facilitate healthcare data sharing, in 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing And Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 1374–1379 A. Theodouli, S. Arakliotis, K. Moschou, K. Votis, D. Tzovaras, On the design of a blockchain-based system to facilitate healthcare data sharing, in 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing And Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) (IEEE, 2018), pp. 1374–1379
12.
Zurück zum Zitat V.G. Garagad, N.C. Iyer, H.G. Wali, Data integrity: a security threat for internet of things and cyber-physical systems, in 2020 International Conference on Computational Performance Evaluation (ComPE) (IEEE, 2020), pp. 244–249 V.G. Garagad, N.C. Iyer, H.G. Wali, Data integrity: a security threat for internet of things and cyber-physical systems, in 2020 International Conference on Computational Performance Evaluation (ComPE) (IEEE, 2020), pp. 244–249
13.
Zurück zum Zitat L. Cai, Y. Zhu, The challenges of data quality and data quality assessment in the big data era. Data Sci. J. 14, 2 (2015)CrossRef L. Cai, Y. Zhu, The challenges of data quality and data quality assessment in the big data era. Data Sci. J. 14, 2 (2015)CrossRef
14.
Zurück zum Zitat R.S. Chakraborty, J. Mathew, A.V. Vasilakos, Security and Fault Tolerance in Internet of Things (Springer International Publishing, Berlin, 2019)CrossRef R.S. Chakraborty, J. Mathew, A.V. Vasilakos, Security and Fault Tolerance in Internet of Things (Springer International Publishing, Berlin, 2019)CrossRef
15.
Zurück zum Zitat G. Martin, P. Martin, C. Hankin, A. Darzi, J. Kinross, Cybersecurity and healthcare: how safe are we? BMJ 358, j3179 (2017)CrossRef G. Martin, P. Martin, C. Hankin, A. Darzi, J. Kinross, Cybersecurity and healthcare: how safe are we? BMJ 358, j3179 (2017)CrossRef
16.
Zurück zum Zitat I. Zikratov, A. Kuzmin, V. Akimenko, V. Niculichev, L. Yalansky, Ensuring data integrity using blockchain technology, in 2017 20th Conference of Open Innovations Association (FRUCT) (IEEE, 2017), pp. 534–539 I. Zikratov, A. Kuzmin, V. Akimenko, V. Niculichev, L. Yalansky, Ensuring data integrity using blockchain technology, in 2017 20th Conference of Open Innovations Association (FRUCT) (IEEE, 2017), pp. 534–539
17.
Zurück zum Zitat W.J. Gordon, C. Catalini, Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)CrossRef W.J. Gordon, C. Catalini, Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)CrossRef
18.
Zurück zum Zitat X. Yue, H. Wang, D. Jin, M. Li, W. Jiang, Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40, 1–8 (2016)CrossRef X. Yue, H. Wang, D. Jin, M. Li, W. Jiang, Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40, 1–8 (2016)CrossRef
19.
Zurück zum Zitat G. Zyskind, O. Nathan et al., Decentralizing privacy: using blockchain to protect personal data, in 2015 IEEE Security and Privacy Workshops (IEEE, 2015), pp. 180–184 G. Zyskind, O. Nathan et al., Decentralizing privacy: using blockchain to protect personal data, in 2015 IEEE Security and Privacy Workshops (IEEE, 2015), pp. 180–184
20.
Zurück zum Zitat Y. Wu, L. Huang, An intelligent method of data integrity detection based on multi-modality fusion convolutional neural network in industrial control network. Measurement 175, 109013 (2021)CrossRef Y. Wu, L. Huang, An intelligent method of data integrity detection based on multi-modality fusion convolutional neural network in industrial control network. Measurement 175, 109013 (2021)CrossRef
21.
Zurück zum Zitat Q. Li, P. Li, K. Mao, E.Y.-M. Lo, Improving convolutional neural network for text classification by recursive data pruning. Neurocomputing 414, 143–152 (2020)CrossRef Q. Li, P. Li, K. Mao, E.Y.-M. Lo, Improving convolutional neural network for text classification by recursive data pruning. Neurocomputing 414, 143–152 (2020)CrossRef
23.
Zurück zum Zitat A. John, R.C. Panicker, B. Cardiff, Y. Lian, D. John, Binary classifiers for data integrity detection in wearable IoT edge devices. IEEE Open J. Circuits Syst. 1, 88–99 (2020)CrossRef A. John, R.C. Panicker, B. Cardiff, Y. Lian, D. John, Binary classifiers for data integrity detection in wearable IoT edge devices. IEEE Open J. Circuits Syst. 1, 88–99 (2020)CrossRef
24.
Zurück zum Zitat A. John, S. Ullah, A. Kumar, B. Cardiff, D. John, An approximate binary classifier for data integrity assessment in IoT sensors, in 2020 27th IEEE International Conference on Electronics, Circuits and Systems (ICECS) (IEEE, 2020), pp. 1–4 A. John, S. Ullah, A. Kumar, B. Cardiff, D. John, An approximate binary classifier for data integrity assessment in IoT sensors, in 2020 27th IEEE International Conference on Electronics, Circuits and Systems (ICECS) (IEEE, 2020), pp. 1–4
25.
Zurück zum Zitat Y.A. Gerhana, A.R. Atmadja, W.B. Zulfikar, N. Ashanti, The implementation of k-nearest neighbor algorithm in case-based reasoning model for forming automatic answer identity and searching answer similarity of algorithm case, in 2017 5th International Conference on Cyber and IT Service Management (CITSM) (IEEE, 2017), pp. 1–5 Y.A. Gerhana, A.R. Atmadja, W.B. Zulfikar, N. Ashanti, The implementation of k-nearest neighbor algorithm in case-based reasoning model for forming automatic answer identity and searching answer similarity of algorithm case, in 2017 5th International Conference on Cyber and IT Service Management (CITSM) (IEEE, 2017), pp. 1–5
26.
Zurück zum Zitat T.G. Dietterich, Ensemble methods in machine learning, in International Workshop on Multiple Classifier Systems (Springer, 2000), pp. 1–15 T.G. Dietterich, Ensemble methods in machine learning, in International Workshop on Multiple Classifier Systems (Springer, 2000), pp. 1–15
27.
28.
Zurück zum Zitat H. Zhang, J. Liu, R. Li, H. Le, Fault diagnosis of body sensor networks using hidden Markov model. Peer-to-Peer Netw. Appl. 10, 1285–1298 (2017)CrossRef H. Zhang, J. Liu, R. Li, H. Le, Fault diagnosis of body sensor networks using hidden Markov model. Peer-to-Peer Netw. Appl. 10, 1285–1298 (2017)CrossRef
29.
Zurück zum Zitat H. Cai, K.K. Venkatasubramanian, Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems. EURASIP J. Inf. Secur. 2018, 1–21 (2018) H. Cai, K.K. Venkatasubramanian, Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems. EURASIP J. Inf. Secur. 2018, 1–21 (2018)
30.
Zurück zum Zitat Y. Wang, T. Liao, Data integrity and causation analysis for wearable devices in 5G, in IEEE International Conference on E-Health Networking, Application & Services (IEEE, 2022) Y. Wang, T. Liao, Data integrity and causation analysis for wearable devices in 5G, in IEEE International Conference on E-Health Networking, Application & Services (IEEE, 2022)
31.
Zurück zum Zitat V. Sameera, A. Bindra, G.P. Rath, Human errors and their prevention in healthcare. J. Anaesthesiol. Clin. Pharmacol. 37, 328 (2021)CrossRef V. Sameera, A. Bindra, G.P. Rath, Human errors and their prevention in healthcare. J. Anaesthesiol. Clin. Pharmacol. 37, 328 (2021)CrossRef
32.
Zurück zum Zitat J.R. Andrews, Diagnosis and treatment of chronic painful shoulder: review of nonsurgical interventions. Arthrosc.: J. Arthrosc. Relat. Surg. 21, 333–347 (2005) J.R. Andrews, Diagnosis and treatment of chronic painful shoulder: review of nonsurgical interventions. Arthrosc.: J. Arthrosc. Relat. Surg. 21, 333–347 (2005)
33.
Zurück zum Zitat G. Waddell, 1987 Volvo award in clinical sciences. A new clinical model for the treatment of low-back pain. Spine 12, 632–644 (1987) G. Waddell, 1987 Volvo award in clinical sciences. A new clinical model for the treatment of low-back pain. Spine 12, 632–644 (1987)
34.
Zurück zum Zitat R.F. Escamilla, K. Yamashiro, L. Paulos, J.R. Andrews, Shoulder muscle activity and function in common shoulder rehabilitation exercises. Sports Med. 39, 663–685 (2009)CrossRef R.F. Escamilla, K. Yamashiro, L. Paulos, J.R. Andrews, Shoulder muscle activity and function in common shoulder rehabilitation exercises. Sports Med. 39, 663–685 (2009)CrossRef
35.
Zurück zum Zitat A.M. Cools, V. Dewitte, F. Lanszweert, D. Notebaert, A. Roets, B. Soetens, B. Cagnie, E.E. Witvrouw, Rehabilitation of scapular muscle balance: which exercises to prescribe? Am. J. Sports Med. 35, 1744–1751 (2007)CrossRef A.M. Cools, V. Dewitte, F. Lanszweert, D. Notebaert, A. Roets, B. Soetens, B. Cagnie, E.E. Witvrouw, Rehabilitation of scapular muscle balance: which exercises to prescribe? Am. J. Sports Med. 35, 1744–1751 (2007)CrossRef
36.
Zurück zum Zitat R.A. Ekstrom, R.W. Osborn, P.L. Hauer, Surface electromyographic analysis of the low back muscles during rehabilitation exercises. J. Orthop. Sports Phys. Ther. 38, 736–745 (2008)CrossRef R.A. Ekstrom, R.W. Osborn, P.L. Hauer, Surface electromyographic analysis of the low back muscles during rehabilitation exercises. J. Orthop. Sports Phys. Ther. 38, 736–745 (2008)CrossRef
38.
Zurück zum Zitat Y. Mirsky, T. Doitshman, Y. Elovici, A. Shabtai, Kitsune: an ensemble of autoencoders for online network intrusion detection, arXiv preprint arXiv:1802.09089 (2018) Y. Mirsky, T. Doitshman, Y. Elovici, A. Shabtai, Kitsune: an ensemble of autoencoders for online network intrusion detection, arXiv preprint arXiv:1802.09089 (2018)
39.
Zurück zum Zitat L. Shu, Y. Yu, W. Chen, H. Hua, Q. Li, J. Jin, X. Xu, Wearable emotion recognition using heart rate data from a smart bracelet. Sensors 20, 718 (2020)CrossRef L. Shu, Y. Yu, W. Chen, H. Hua, Q. Li, J. Jin, X. Xu, Wearable emotion recognition using heart rate data from a smart bracelet. Sensors 20, 718 (2020)CrossRef
Metadaten
Titel
Identifying and Evaluating the Effects of User Scenarios on the Data Integrity of Wearable Devices
verfasst von
Ruijing Wang
Ying Wang
Ting Liao
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-49179-5_33

Neuer Inhalt