Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

BITS: A Blockchain-driven Intelligent Scheme for

Telesurgery System
Rajesh Gupta, Student Member, IEEE∗ , Urvish Thakker† , Sudeep Tanwar, Member, IEEE‡ ,
Mohammad S. Obaidat, Fellow of IEEE and Fellow of SCS§ , Kuei-Fang Hsiao¶
∗†‡ Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India
§ Collegeof Computing and Information, University of Sharjah, UAE, King Abdullah II School of IT,
University of Jordan, Jordan, University of Science and Technology Beijing, China.
¶ Department of Information Systems, University of Sharjah, UAE and Department of Information Management,

Ming Chuan University, Taiwan


Email: ∗ 18ftvphde31@nirmauni.ac.in, † 17bit115@nirmauni.ac.in, ‡ sudeep.tanwar@nirmauni.ac.in,
§ m.s.obaidat@ieee.org, ¶ kfhsiao@gmail.com

Abstract—Intelligent Telesurgery (TS) system with 6G-enabled It is worthy to note that Healthcare 3.0 was patient-oriented,
Tactile Internet (TI) based on the blockchain has tremendous po- but was incompetent to manage real-time large scale data while
tential to deliver real-time and intelligent ultra-responsive health- Healthcare 4.0 was able to overcome the disadvantages of prece-
care services remotely with high quality and reliability. It would
be significantly beneficial for the society in the prospect that high- dent revolutions. Healthcare 4.0 employed Electronic Health
quality medical service could be delivered to deprived areas and Record (EHR) to store patients data and envisions wearable
a highly promising surgical diagnosis could be achieved. However, devices to track and monitor patients unrelated to the location of
the state-of-the-art TS systems have security, privacy, reliability, patients [3]. However, the exigent need for intelligent healthcare
latency, and high-cost blockchain-based storage concerns, which systems resulted in Healthcare 5.0. Artificial Intelligence (AI)
limit the applicability of TS in surgical operations across the globe
in the near future. To mitigate the aforementioned issues, we in this and Automation are at the pith of healthcare 5.0 [2]. In the
paper propose a novel approach named BITS an intelligent and present era, the healthcare industry is focusing on the develop-
blockchain-based TS framework. The issues pertaining to security, ment of smart and intelligent healthcare equipment. Moreover
privacy, and lack of trust could be resolved through employing automating the mundane surgeries which might compensate
a smart contract. The issues related to the cost of data storage for the dearth of quality doctors faced today. It also aims at
could be resolved by employing the InterPlanetary File System
(IPFS) protocol. Moreover, we incorporate Artificial Intelligent (AI) enhancing the reliability of such automation procedures.
algorithms for training of surgical robots. The proposed scheme Conventional treatment procedures were manual, so patients
also prevents the execution of malicious commands transmitted ought to reach the hospital and address their health compli-
by an intruder to a great extent. The 6G communication channel cations with surgeons. It would be a quite expensive, intri-
significantly mitigates the latency issues in exchanging surgical cate, and time-consuming procedure. Subsequently, the pro-
commands. Finally, we highlight some issues of the state-of-art TS
systems and how the proposed BITS will be beneficial to combat liferation of communication technologies enabled surgeons to
those issues. proliferate their services remotely in a newfangled manner
Index Terms—Blockchain, Healthcare 5.0, Security, Privacy, called telemedicine [4]. It has been sufficient to be efficient
Anonymity, Telesurgery, Artificial Intelligence. in extending the reach of dexterous healthcare treatment to
remote areas, incorporating remote management of specialized
I. I NTRODUCTION care units, and facilitating services to international patients
Healthcare is a paramount factor in discerning the quality of [5][4]. The most intrigued applications forte in the domain of
living standards for a particular region or country. Healthcare telemedicine is Telesurgery (TS) [6]. It is a procedure in which
industry is an aggregate and incorporation of industries within the doctor can perform medical operations from a distant place
the economic structure that offers products and services for employing a robotic arm controlled by the doctor sitting in the
therapeutic, preventive, curative, rehabilitative, and palliative operating room. It enables doctors and clinical practitioners to
treatments of patients. An efficacious healthcare structure may facilitate real-time surgical procedures remotely over wireless
lead to a noteworthy contribution to overall growth, a burgeon- communication channels (WCC) and with the aid of surgical
ing of the nation, and bolster the country’s economy. Access robots. It mitigates the long-distance traveling time, expenses
to accessible, and reliable healthcare facilities are essential for associated, and compensates for the lack of quality surgeons
health promotion and sustainability. Disease prevention and to perform surgeries [7]. It pledges to enable the skills of
control, mitigation of trivial impairment and premature death, sophisticated surgeons to be accessible to patients globally,
and accomplishing health equity among all citizens are prime especially in underprivileged areas; obviating the need for
concern for any country. Healthcare industry has witnessed patients to transit beyond their local hospital. This is precisely
various revolutions such as 1.0 to 5.0 [1], [2]. Healthcare beneficial in scenarios when the condition of the patient is
1.0 consisted of maintaining physical manual records for data critical and the transfer of patients may have its own adverse
related to the patient and was considered to be surgeon centric. effects. Furthermore, facilitating systematic medical care to the
However, in Healthcare 2.0, the manual records were restored by mobile military troops can be facilitated through employing
electronic records and were sought after as technology-centric. TS. However, issues related to latency of the network, i.e.

978-1-7281-6544-8/20/$31.00 ©2020 IEEE

Authorized licensed use limited to: Carleton University. Downloaded on November 04,2020 at 07:46:37 UTC from IEEE Xplore. Restrictions apply.
the delay in the communication medium, which affects the complex surgeries, where multiple surgeons are involved and
time-lag between the doctor’s movement and its appearance on can cause the death of a patient. Thus, there is latency, reliability,
the dashboard, the chances of cyber attack over the network and interoperability (due to private blockchain) concerns in the
and leakage of sensitive information due to hacking or other HaBiTs framework.
unethical practices are prevalent challenges in the real-life im- To combat the issues prevalent in the present solutions of TS
plementation of TS. Also, the cost of setting up the infrastructure systems, we propose BITS framework, which employs 6G as a
for enabling TS is a major area of concern, especially for the communication medium and incorporates Artificial Intelligent
developing nations [8]. (AI) algorithms in the TS procedure to predict the disease
In TS systems, both patients and doctors are at distinct pattern. If the system gets hacked and manipulated by the
places connected through a public network, which leads to malicious user, the AI-based algorithms facilitate to identify
many security risks. As TS is a safety-critical application, where the commands which might be generated by such intruder and
security attacks might result in loss of patient’s life. Thus, stop the further execution of the same. In addition to AI, we
security and robustness are important aspects of the TS system, incorporate 6G as a communication medium that mitigates the
as they ensure protection against probable security attacks. time lag between the doctor’s movement and its execution by the
Many authors across the globe have presented TS systems such robotic arm significantly ( probably less than 1 microsecond).
as Lee et al. [9] proposed a secure Interoperable Telesurgery Thus, BITS framework is capable to combat the challenges of
Protocol (ITP) to meet the security requirements of TS systems. the state-of-the-art TS systems.
They defined their framework for communication among the
A. Research Contributions
TS robots and surgeons controls the same. An open-source
software tools were employed to develop the secure ITP. Fekri Major contributions of the paper are as follows:
et al. [10] proposed a novel approach to enhance security • We highlight various security, privacy, and communication
in TS system by employing Deep Learning (DL) techniques. challenges of the state-of-the-art telesurgery systems.
The commands given by the surgeons were used to train the • We present BITS, a blockchain-based intelligent and effi-
DL model, which then used to differentiate the instructions cient scheme for the telesurgery system.
given by a surgeon or malicious intruder [11]. Their proposed • Finally, we present how the aforementioned security, pri-
novel approach enabled the protection against probable security vacy, and communication challenges of the state-of-the-art
attacks on the TS operations. Iqbal et al. [12] presented a system systems can be eradicated with the proposed BITS scheme.
called SecureSurgiNET to ensure security and reliability of TS
B. Organization
operations. Their system employed various full-proof reliable
communication protocols. Also, telesurgical authority, database Rest of the paper is organized as follows. Section II describes
server, and identity management server were incorporated in the the system model and the mathematical framework of the BITS.
system to enhance the efficiency and security of TS environ- Section III describes the proposed blockchain and AI-based TS
ment. However, the present solutions were inadequate owing to system called BITS. In Section IV, we evaluate the performance
lack of trust in the system, lack of privacy, and security concerns of BITS. Finally, Section V concludes the paper.
for sensitive information related to the patients. Furthermore, II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
the solutions are based on centralized architectures which may
lead to misuse of power by central authorities. Thus, there is Fig. 1 shows the blockchain-envisioned AI-focused intelligent
an exigent need for more efficient and reliable solutions for TS TS system called BITS, which consists of various remote entities
procedure. such as surgeon/doctor, patient, caregiver, and healthcare center.
The adoption of blockchain technologies is a feasible solution All the remote entities in BITS are communicating with each
to the aforementioned challenges of conventional healthcare TS other via Ethereum blockchain network after satisfying the
framework. It is a distributed ledger, i.e., a sequence (chain) smart contract conditions over the 6G communication channel.
of blocks that preserves transactions and keeps them safe. It Blockchain maintains the coherence between the entities during
ameliorates the maintenance costs and enhances the consistency the surgical procedures for the betterment of its result, whereas
and security of the information. This has various benefits in 6G enhances the network performance parameters such as
healthcare systems over conventional such as seamless inter- latency (10 − 100µsec) and reliability (99.99999%). BITS
operability, quicker exchange of records, catastrophe recovery,
Control Commands
error tolerance, immutability of data, traceability, cost-effective,
Robot Training Robot Testing
prompt access to data, and data protection [13]. Gupta et al.
[14] proposed a blockchain-based TS system named HaBiTs,
employed a private blockchain network. It facilitates only vali-
dated users to access information from the blockchain network, Surgeon Smart Smart Patient
Contract Contract
which ensures the security of patients personal health records.
The data in a block cannot be altered once written due to
bolckchain’s immutability characteristics. If one block is altered,
then all subsequent blocks becomes invalid. It is relatively easy Haptic Feedback
to track who tried to manipulate a particular block’s information. Fig. 1: BITS system model.
However, the HaBiTs framework uses a 5G network which
has the end-to-end delay of < 5ms that is not suitable for considers the entity set {ξD , ξP , ξH , ξC } ∈ ξ, where ξD is a

Authorized licensed use limited to: Carleton University. Downloaded on November 04,2020 at 07:46:37 UTC from IEEE Xplore. Restrictions apply.
doctor entity, which comprises of same specialization multiple with facilitating qualitative healthcare services and enhances
1 2 n
doctors {ξD , ξD , . . . ξD }, entity ξP is a group of m patients the efficacy of the system by employing the InterPlanetary
1 2 m
{ξP , ξP , . . . ξP }. Both ξD i
and ξPj need to tie up with the File System (IPFS) protocol for storing of data. The various
1 2 h
specialized hospitals {ξH , ξH , . . . ξH } ∈ ξH for their surgical components that have been incorporated in the presented BITS
k 1 t c
procedures. Each ξH has t caregivers {ξC , . . . ξC . . . ξC , } for framework have been discussed in subsequent subsections. Fig.
taking care of the patients. The relation between ξD , ξP , ξH , ξC 2 depicts the proposed architecture of the BITS framework for
entities are subject to the following constraints. TS procedure.
{m, j} ≥ 0 (1) 3D Video Monitor Audio, Video, Velocity, Force Feedback
Slave HD

{h, i, n, k, c, t} > 0 (2) Controller Camera


Slave
Sensors
, ξPj , ξC
i t k Manipulator
∀{ξD } ∈ ξH (3) Surgeon
SC
Patient
SC Video Compressor

th
Any i doctor i
ξD operates over ξPj
in an hospital A k
ξD . i
ξD Position
Sensor Base Base
Haptic
Feedback
Station Station
can operate multiple surgeries over different ξP . Thus, ξD and Patient
Feedback
ξP have one-to-many (1:m) relationship, i.e., F(ξD → ξP )1:m , Self-Observation
Surgical Videos
likewise each ξD is tied up with diverse ξH for their surgical Manual Data Feed
Simulations
procedures, i.e., F(ξD → ξH )1:h . However, one ξP must be Reinforcement Tech.
Demonstrations

associated with only one ξH for treatment, i.e., F(ξP → ξH )1:1 . Surgeon HSI
Trained Robotic
Arms
All entities ξD , ξP , ξH , and ξC can communicate with each
Surgeon Layer Transmission and Training Layer Patient Layer
other via blockchain (BEtherium ) network to preserve the
security and privacy of the TS system for its smooth execution. Fig. 2: The proposed architecture of BITS [14], [15]
Each block (B) of an BEtherium consists of the following A. Supervision and Controller Layer
components.
The supervision and controller layer consists of surgeons who
Curr P rev
B= {BHash , BHash ,N,T , BN o. , BV er , MRoot } (4) monitor the TS procedure and have an active involvement in
Curr P rev it. Surgeons controls and supervise the robots actions occurred
where BHash and BHashare the hash values of the current at patient layer during the TS procedure is via Human System
and the previous blocks, N is the nonce value, T is the Interface (HSI). The 6G-enabled Tactile Internet communication
block timestamp, BN o. is the block number, BV er is the block medium is employed to facilitate the transmission of commands
version, and MRoot signifies the merkle root value. Each entity through HSI from surgeons to robots. To ensure the trust
associated with the BEtherium network can have their respective between various entities involved in TS, (i.e., surgeon, patient,
wallets {ωD , ωP , ωH , ωC } ∈ ω for communication. Each ωl can and caregivers) and coordinate the commands a digital Smart
have the following fields. Contract (SC) needs to be enforced among them [16]. The
ωl = {KP rivate , KP ublic , %, Tω , GV al , Mω
Root } (5) SC ensures the integrity and reliability of the TS procedure.
Various components of supervision and controller layer that
where KP rivate and KP ublic are the private-public key pairs of aid in the TS procedure includes a master controller, proximity
the ξ for secure communication, % is the hash value of the data, sensors, foot paddle, haptic devices, master controller, 3D tissue
Tω is the wallet timestamp of an ξ, GV al is the total gas value monitoring, video decompressor, microphone, and speakers.
of the ξ, and Mω Root is the merkle root of the ω. All these Surgeons can communicate with SC for TS requesting and
communication can be executed over the 6G communication initiating via Ethereum clients. Patients approve proposals from
channel to improvise the network performance parameters for the surgeons based on their present reviews of results provided
the TS procedure. The properties of the 6G communication by the previous patients [17]. During the submission approved
channel are as follows in comparison to the other 4G and 5G by the patient, the surgeons can activate the TS procedure (S-
communication channels. State = Active) and update the IPFS-storage record of patients.
L6G (< 100µsec) ≪ L5G (< 1ms) ≪ L4G (< 20ms) (6) After completion of the TS process, the S-state is updated
to Completed status. Post surgical procedure, the patients are
R6G (99.99999%) ≫ R5G (99.999%) ≫ R4G (7)
entitled to review the surgeon based on their functioning.
In view of all the communication and security parameters
B. Communication Layer
mentioned above, the goal of BITS is represented as follows.
This layer facilitates the communication between the surgeon
O = max(T S{Accuracy,Reliability} , P atientSecurity
M edical Data , at the supervision and controller layer and robot at the patient
ωSecurity ) + min(LCommunication , T SErrors ) (8) layer of the BITS for transmission of commands and data. BITS
employs WCC as 6G-enabled TI for facilitating secure and
III. P ROPOSED A PPROACH reliable, real-time transmission of the procedural commands.
The subsequent section describes the functioning of BITS, Furthermore, it is worthy to note that AI-based intelligent
a blockchain-based secure TS architecture. BITS is a secure services such as 3D Tissue tracking and kinematic modeling
TS framework built on a public blockchain and employing are embedded in the system employing machine learning and
the Ethereum platform. It is secure and obviates the need for computer vision algorithms []. Moreover, as the SCs are over
involvement of intermediaries to build trust among the patients the public blockchain and shared between various entities, the
and surgeons. It also mitigates the conveyance cost associated maim of the TS framework is to secure the SCs as well. IPFS,

Authorized licensed use limited to: Carleton University. Downloaded on November 04,2020 at 07:46:37 UTC from IEEE Xplore. Restrictions apply.
6G-enabled TI, and ESC are some prime components of the are transmitted by the surgeon may get altered by the malicious
communication layer. intruder and if that gets executed, it may prove fatal for the
IPFS Protocol: The conventional blockchain frameworks di- patient. Thus as it is a safety-critical application, we need to
rectly store the data in the blockchain, which can be significantly adhere to the maximum possible levels of security. Thus, we
costly, i.e., about 550 USD for 1MB of data. IPFS is an im- will employ machine learning and deep learning algorithms
mutable and distributed protocol that would be ideal for solving that will be trained on a custom dataset consisting of instances
the aforementioned issue as there are no charges associated with of commands which are authorized by surgeon and commands
storing data in it. Also, it is worthy to note that it is distributed which are malicious in nature. The model after training will be
and has no single point of failure [18]. It also accelerates the able to predict whether a command is veritable or is specious,
procedure of downloading by hosting the portion of the data as shown in Algorithm 2. The integration of the model will
to other peers utilizing minimum bandwidth. Moreover, it also mitigate the chances of execution of malicious commands and
prevents replication of data as it renders the same hash value boost the reliability of the system. Thus, with BITS, we propose
for the same data. a novel smart TS framework based on blockchain.
The above-elicited reasons are the driving force to employ
Algorithm 2 AI-enabled procedure for malicious TS command
IPFS protocol, a peer-to-peer distributed protocol in BITS
detection.
framework. Moreover, it strives to deliver high-performance Input: ζ and δ is the number of data entries in the legitimate and non-legitimate training
throughput and low data latency in access. Data is stored datasets Υ with maximum M and K entries respectively. ΥLeg Cmd and ΥnLeg Cmd
are the datasets with legitimate and non-legitimate TS commands.
in blocks of a specific size, that constitute a generic Merkle Output: Surgical robot trained with legitimate commands.
structure of the directed acyclic graph when IPFS protocol is procedure M AL C MD D ET(ζ, δ, ΥLeg Cmd , ΥnLeg Cmd )
employed for storing of data. When a file is stored in IPFS, a while True do
if (Υ is NULL) then
hash key is rendered and transmitted to the associated entity. Return (”Enter data feed for robot training”);
Also, the hash key can be used when we want to access data else
Robot Training (ΥLeg Cmd , ΥnLeg Cmd );
through the IPFS gateway. In this manner, traceability in BITS is if (ζ > M or δ > K) then
beneficial in spotting the loop-hole in the system in case some Training Finished (Surgical Robot);
Ready For Test (TS Commands);
issue arises. else
M = M + 1;
Algorithm 1 AI-enabled procedure for robot training. K = K + 1;
Find Optimal Weights (Genetic Algorithm);
Input: κ is the number of data entries in the training dataset Υ with maximum N entries, Apply Ensemble Learning(Surgical Robot);
ΥV id and ΥImg are the multimedia datasets for robot training, ΥDoc Exp is the manual Fetch Next Record (ρ0 , ζ, δ);
information feed by the surgeons Continue;
Output: Robot training. end if
procedure ROBOT T RAINING(κ, ΥV id , ΥImg , ΥDoc Exp ) Robot is trained with ΥLeg Cmd and ΥnLeg Cmd
while TRUE do . Loop for surgical robot training. end if
if (Υ is NULL) then end while
Return (”Enter data feed for robot training”); end procedure
else if (κ > N) then
Stop Training (Surgical Robot); D. Patient Layer
Ready for testing data;
else It consists of a surgical robot known as a teleoperator that
κ = κ + 1; executes the command provided by the surgeons at the supervi-
Apply CNN(”Training using multimedia data”)
Fetch Next Record (ρ, κ); . ρ is record. sion and controller layer. The surgical robot sends and collects
Continue; haptic data in real-time, employing haptic feedback tools. The
end if
Surgical robot is fully trained for the surgery. various other components, such as haptic devices, HD cameras,
end while sensors, video compression, and controller, are also incorporated
end procedure
in the patient layer [19]. Besides the surgical robot, patients and
C. Training Layer caregivers also are associated with the patient layer domain. In
The Training layer embeds the AI algorithms employed to BITS, patients are entitled to give feedback, post the completion
accomplish tasks such as kinematic modeling and cooperative of TS procedure. This would aid other patients in choosing
modeling. Moreover, the sensors data is aggregated here to appropriate surgeons based on the feedback data associated with
facilitate the surgeon at supervision and controller layer with 3D the surgeon. Moreover, it would be a motivating factor for the
tissue tracking cooperative controlling. Also, the robots would surgeons to perform all the surgeries with adequate enthusiasm.
be trained using various AI techniques such as reinforcement IV. R ESULTS AND D ISCUSSION
learning and DL, so that the overall efficacy of TS procedure This section discusses the performance evaluation of BITS
gets enhanced. Training to robots are provided using specialized using the following performance metrics: latency, throughput,
TS videos. It also be due to live demonstrations of surgeries and storage cost.
and customized data given as input by the surgeon, as shown in
Algorithm 1. Moreover, the reinforcement learning algorithms A. Latency
will be employed so that robots learn from their own past Fig. 3a depicts the latency difference between the BITS and
experiences of performing surgeries and owing to it the efficacy the state-of-the-art approaches called HaBiTs and AaYusH. The
of robot gets enhanced with every surgery it performs. Here, communication channel considered in the BITS as 6G, whereas
we propose to use 6G enabled TI network as a communication 4G and 5G were in traditional TS systems. From Fig. 3a, we can
medium. However, the communication medium is open, so, the notice that the processing latency in BITS is quite low compared
chances of being hacked is increases. Thus, the commands that to the traditional ones.

Authorized licensed use limited to: Carleton University. Downloaded on November 04,2020 at 07:46:37 UTC from IEEE Xplore. Restrictions apply.
(a) Latency in TS instructions processing. (b) Throughput in TS data access. (c) Blockchain storage cost with IPFS.
Fig. 3: Performance evaluation of BITS with parameters latency, throughput, and storage cost.

B. Throughput [4] A. J. Hung, J. Chen, A. Shah, and I. S. Gill, “Telementoring and


telesurgery for minimally invasive procedures,” The Journal of urology,
Fig. 3b presents the throughput comparison of BITS with the vol. 199, no. 2, pp. 355–369, 2018.
traditional HaBiTs and AaYusH TS systems. The communication [5] R. Guljas, A. Ahmed, K. Chang, and A. Whitlock, “Impact of telemedicine
network deployed in BITS is 6G, which has a latency of in managing type 1 diabetes among school-age children and adolescents:
an integrative review,” Journal of pediatric nursing, vol. 29, no. 3, pp. 198–
< 100µsec and reliability of 99.99999%, whereas HaBiTs 204, 2014.
and AaYusH deployed 4G and 5G communication channels [6] T. Hassan, A. Hameed, S. Nisar, N. Kamal, and O. Hasan, “Al-zahrawi:
respectively. From Fig. 3a, we can find out that the throughput a telesurgical robotic system for minimal invasive surgery,” IEEE Systems
Journal, vol. 10, no. 3, pp. 1035–1045, 2014.
(in bps) in BITS is extremely high compared to the HaBiTs and [7] J. Vora, S. Tanwar, S. Tyagi, N. Kumar, and J. J. Rodrigues, “Home-based
AaYusH. exercise system for patients using iot enabled smart speaker,” in 2017 IEEE
19th International Conference on e-Health Networking, Applications and
C. Storage Cost Services (Healthcom), pp. 1–6, IEEE, 2017.
[8] N. Shahzad, T. Chawla, and T. Gala, “Telesurgery prospects in delivering
Fig. 3c deals with the comparison of data storage cost of healthcare in remote areas,” The Journal of the Pakistan Medical Associ-
BITS with respect to the HaBiTs and AaYusH. From the figure, ation, vol. 69, no. Supl. 1, p. S69, 2019.
[9] G. S. Lee and B. Thuraisingham, “Cyberphysical systems security applied
we depict that the storage cost in HaBiTs is quite high and the to telesurgical robotics,” Computer Standards & Interfaces, vol. 34, no. 1,
costs of AaYusH and BITS are comparatively same. pp. 225–229, 2012.
[10] P. Fekri, P. Setoodeh, F. Khosravian, A. Safavi, and M. H. Zadeh, “Towards
V. C ONCLUSION deep secure tele-surgery,” in Proceedings of the international conference
on scientific computing (CSC), pp. 81–86, The Steering Committee of The
In this paper, we propose BITS a novel intelligent TS frame- World Congress in Computer Science, 2018.
work based on blockchain to enhance the efficacy of state-of- [11] R. Gupta, S. Tanwar, N. Kumar, and S. Tyagi, “Blockchain-based security
attack resilience schemes for autonomous vehicles in industry 4.0: A sys-
art TS systems. We facilitate with comprehensive insights into tematic review,” Computers & Electrical Engineering, vol. 86, p. 106717,
the cloud-based and blockchain-based smart TS framework and 2020.
highlight the security, reliability, privacy, and high-cost data [12] S. Iqbal, S. Farooq, K. Shahzad, A. W. Malik, M. M. Hamayun,
and O. Hasan, “Securesurginet: A framework for ensuring security in
storage issues. We present how incorporating AI techniques telesurgery,” International Journal of Distributed Sensor Networks, vol. 15,
could be highly beneficial for the TS system. Moreover, we no. 9, p. 1550147719873811, 2019.
propose how blockchain-based data storage employing IPFS [13] J. Vora, A. Nayyar, S. Tanwar, S. Tyagi, N. Kumar, M. S. Obaidat, and
J. J. Rodrigues, “Bheem: A blockchain-based framework for securing
protocol guarantees privacy, reliability, security, and is cost- electronic health records,” in 2018 IEEE Globecom Workshops (GC
effective as it obviates the need for third-party verification. Wkshps), pp. 1–6, IEEE, 2018.
Furthermore, we emphasize that how 6G enabled network would [14] R. Gupta, S. Tanwar, S. Tyagi, N. Kumar, M. S. Obaidat, and B. Sadoun,
“Habits: Blockchain-based telesurgery framework for healthcare 4.0,” in
improve the present TS system, which uses 5G as a communi- 2019 International Conference on Computer, Information and Telecommu-
cation medium by mitigating the delay in the communication nication Systems (CITS), pp. 1–5, IEEE, 2019.
significantly. Then, we also highlight the effectiveness of the [15] R. Gupta, A. Shukla, and S. Tanwar, “Aayush: A smart contract-based
telesurgery system for healthcare 4.0,” in 2020 IEEE International Con-
proposed blockchain-based smart TS framework. In the future, ference on Communications Workshops (ICC Workshops), pp. 1–6, 2020.
we will implement the proposed framework to identify its [16] N. Kabra, P. Bhattacharya, S. Tanwar, and S. Tyagi, “Mudrachain:
challenges and issues for real-life applications. Blockchain-based framework for automated cheque clearance in financial
institutions,” Future Generation Computer Systems, vol. 102, pp. 574–587,
2020.
R EFERENCES [17] R. Gupta, S. Tanwar, S. Tyagi, and N. Kumar, “Tactile-internet-based
[1] P. J. Choi, R. J. Oskouian, and R. S. Tubbs, “Telesurgery: past, present, telesurgery system for healthcare 4.0: An architecture, research challenges,
and future,” Cureus, vol. 10, no. 5, 2018. and future directions,” IEEE Network, vol. 33, pp. 22–29, Nov 2019.
[2] B. Mohanta, P. Das, and S. Patnaik, “Healthcare 5.0: A paradigm shift in [18] A. VishwaVidyapeetham, “A blockchain and ipfs based framework for
digital healthcare system using artificial intelligence, iot and 5g commu- secure research record keeping,” International Journal of Pure and Applied
nication,” in 2019 International Conference on Applied Machine Learning Mathematics, vol. 119, no. 15, pp. 1437–1442, 2018.
(ICAML), pp. 191–196, IEEE, 2019. [19] L. Leveque, W. Zhang, C. Cavaro Menard, P. Le Callet, and H. Liu,
[3] L. Coventry and D. Branley, “Cybersecurity in healthcare: a narrative “Study of video quality assessment for telesurgery,” IEEE Access, vol. 5,
review of trends, threats and ways forward,” Maturitas, vol. 113, pp. 48– pp. 9990–9999, 2017.
52, 2018.

Authorized licensed use limited to: Carleton University. Downloaded on November 04,2020 at 07:46:37 UTC from IEEE Xplore. Restrictions apply.

You might also like