Page 46 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 46

2019 ITU Kaleidoscope Academic Conference




                             solutions   that   focus   on    authentication,  user  authentication  and  database  access
                             vulnerabilities,   configuration   authentication exist and need to be ensured across multiple
                             assessments,  malware  defenses,  as   diverse systems. Can the network identify the right user and
                             well   as   activity   and   event   allow him or her to access the upper layers?
                             monitoring  [11].  Administrations
                             have  begun  issuing  cybersecurity   6.   Privacy: How much of a user’s medical records will
                             regulation  guidelines  for  network-  be made available, to whom and when? Can somebody pry
                             connected medical devices [12] [13]   into a user’s health records and cause harm? Can the network
                             [14].  ICT  access  technologies  will   identify identity theft through appropriate mechanisms? In a
                             need to be in sync with the overall   mix and match of technologies this aspect needs to be given
                             ICT deployment.                  careful consideration.
                             a.  Massive IoT (mMTC) and
            Support      for     Critical IoT (uRRLC)         7.     Power requirements, availability: Medical devices
            different  end-user  b.  IP and non-IP-based device   need  the  power  to  operate  and  be  functional.  Besides  the
            IoT types            support                      processing done by the device, the device also would need to
                                                              be in regular contact with the access network to indicate that
                          7.  CHALLENGES                      it is “alive” and can send and receive data. This will require
                                                              the end device to consume power only when it is in trans-
           There  exist  several  challenges  in  implementing  the   receive mode and consume minimal or no energy at other
           requirements as mentioned in the above sections.   times. The access network would need to have the required
                                                              power-saving modes and features.
           1.     Interoperability  between  different  standards:
           Medical user equipment will need to have newer access, like   8.   Regulations are evolving especially so in the new
           5G enablement, in the coming times. Devices currently have   frontiers of technology. In many countries, the impact is yet
           Wi-Fi  enablement  and  some  devices  may  have  access   to be studied and implemented. How much impact will it
           features like infrared or other proprietary technologies. To   play in IoT architectures and deployment is yet to be seen.
           have interoperability, one access system needs to integrate
           with other systems. For instance, a Wi-Fi system at a higher   9.   e2e solution life cycle: The IoT ecosystem at the
           level  will  need  integration  with,  a  5G  system.  However,   lowest layer starts from the medical device, moves through
           seamless handovers between an ongoing Wi-Fi data session   different layers of connectivity and management and reaches
           with a 4G or 5G system does not work as well as a handover   the  application  layer.  Each  layer  has  its  hardware  and
           between a 4G to 4G node.                           software and ideally should not impact the changes in other
                                                              layers. It will be of importance to ensure that dependencies
           2.     Investment in the introduction of new technologies   are  known  to  the  stakeholders  in  the  chain  whenever  any
           and architectures to enable required functionalities like low   functionality  of  any  end  and  intermediate  layers  bears  an
           latency, higher throughput and security.           impact on other layers.
           3.     Quality  of  end  devices  and  overall  cost  of   10.   Standardization:  Standardization  organizations
           ownership:                                         exist  in  the  telecommunication  and  ICT  domains,  where
                                                              these bodies work on enhancements in existing features and
           a)    Resiliency: from cyberattacks, equipment and network   functionalities.  There  exist  medical  associations  and  trade
           architecture  to  enable  availability.  Node  architectures  like   organizations that define the ethics and ways of working for
           CU-DU split in radio access nodes, CP-UP in core networks,   the medical fraternity. Research is ongoing in the medical
           network slices, container-based cloud applications will help   field in newer and better ways of treatment and drugs. The
           in  application  recovery  and  resilience.  Implementation  of   challenge  lies  in  ensuring  that  the  various  research  and
           such changes is not expected to take place rapidly and will   standard  organizations  and  associations  operating  for  the
           take  time  for  full-scale  deployment.  b)    End-to-end   various layers are working in tandem. This is a tall order in
           ownership:  spanning  from  the  devices,  access  systems,   today’s world.
           gateways, internet, applications and databases spread in the
           cloud.  Service  Level  Agreements  (SLAs)  of  the  network,   8.  MODEL FOR IOT DEPLOYMENT
           SLAs of the medical equipment will become relevant and
           needed.  Currently,  e2e  SLAs  for  IoT  systems  spanning   The paper puts forward a model for IoT keeping in view the
           across  multiple  layers  with  different  ownerships  are  non-  requirements  of  the  healthcare  sector.  Multiple  factors
           existent or evolving.                              contribute  to  a  healthy  ecosystem  for  enabling  IoT  for
                                                              healthcare.  The  importance  of  each  factor  cannot  be
           5.     Security a)  Network security: algorithms used for   discounted  as  the  diffusion  of  IoT  hinges  on  each  of  the
           encryption  and  ciphering  at  the  access  layer,  application   enabling factors.
           layer  and  database  layer  with  adequate  protection  for  the
           control and traffic layers. b)  User security: the end-to-end
           encryption   from   user   to   application.   SIM-based




                                                           – 26 –
   41   42   43   44   45   46   47   48   49   50   51