Page 46 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 46
2019 ITU Kaleidoscope Academic Conference
solutions that focus on authentication, user authentication and database access
vulnerabilities, configuration authentication exist and need to be ensured across multiple
assessments, malware defenses, as diverse systems. Can the network identify the right user and
well as activity and event allow him or her to access the upper layers?
monitoring [11]. Administrations
have begun issuing cybersecurity 6. Privacy: How much of a user’s medical records will
regulation guidelines for network- be made available, to whom and when? Can somebody pry
connected medical devices [12] [13] into a user’s health records and cause harm? Can the network
[14]. ICT access technologies will identify identity theft through appropriate mechanisms? In a
need to be in sync with the overall mix and match of technologies this aspect needs to be given
ICT deployment. careful consideration.
a. Massive IoT (mMTC) and
Support for Critical IoT (uRRLC) 7. Power requirements, availability: Medical devices
different end-user b. IP and non-IP-based device need the power to operate and be functional. Besides the
IoT types support processing done by the device, the device also would need to
be in regular contact with the access network to indicate that
7. CHALLENGES it is “alive” and can send and receive data. This will require
the end device to consume power only when it is in trans-
There exist several challenges in implementing the receive mode and consume minimal or no energy at other
requirements as mentioned in the above sections. times. The access network would need to have the required
power-saving modes and features.
1. Interoperability between different standards:
Medical user equipment will need to have newer access, like 8. Regulations are evolving especially so in the new
5G enablement, in the coming times. Devices currently have frontiers of technology. In many countries, the impact is yet
Wi-Fi enablement and some devices may have access to be studied and implemented. How much impact will it
features like infrared or other proprietary technologies. To play in IoT architectures and deployment is yet to be seen.
have interoperability, one access system needs to integrate
with other systems. For instance, a Wi-Fi system at a higher 9. e2e solution life cycle: The IoT ecosystem at the
level will need integration with, a 5G system. However, lowest layer starts from the medical device, moves through
seamless handovers between an ongoing Wi-Fi data session different layers of connectivity and management and reaches
with a 4G or 5G system does not work as well as a handover the application layer. Each layer has its hardware and
between a 4G to 4G node. software and ideally should not impact the changes in other
layers. It will be of importance to ensure that dependencies
2. Investment in the introduction of new technologies are known to the stakeholders in the chain whenever any
and architectures to enable required functionalities like low functionality of any end and intermediate layers bears an
latency, higher throughput and security. impact on other layers.
3. Quality of end devices and overall cost of 10. Standardization: Standardization organizations
ownership: exist in the telecommunication and ICT domains, where
these bodies work on enhancements in existing features and
a) Resiliency: from cyberattacks, equipment and network functionalities. There exist medical associations and trade
architecture to enable availability. Node architectures like organizations that define the ethics and ways of working for
CU-DU split in radio access nodes, CP-UP in core networks, the medical fraternity. Research is ongoing in the medical
network slices, container-based cloud applications will help field in newer and better ways of treatment and drugs. The
in application recovery and resilience. Implementation of challenge lies in ensuring that the various research and
such changes is not expected to take place rapidly and will standard organizations and associations operating for the
take time for full-scale deployment. b) End-to-end various layers are working in tandem. This is a tall order in
ownership: spanning from the devices, access systems, today’s world.
gateways, internet, applications and databases spread in the
cloud. Service Level Agreements (SLAs) of the network, 8. MODEL FOR IOT DEPLOYMENT
SLAs of the medical equipment will become relevant and
needed. Currently, e2e SLAs for IoT systems spanning The paper puts forward a model for IoT keeping in view the
across multiple layers with different ownerships are non- requirements of the healthcare sector. Multiple factors
existent or evolving. contribute to a healthy ecosystem for enabling IoT for
healthcare. The importance of each factor cannot be
5. Security a) Network security: algorithms used for discounted as the diffusion of IoT hinges on each of the
encryption and ciphering at the access layer, application enabling factors.
layer and database layer with adequate protection for the
control and traffic layers. b) User security: the end-to-end
encryption from user to application. SIM-based
– 26 –