Processing math: 100%
268
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      King Salman Center for Disability Research is pleased to invite you to submit your scientific research to the Journal of Disability Research. JDR contributes to the Center's strategy to maximize the impact of the field, by supporting and publishing scientific research on disability and related issues, which positively affect the level of services, rehabilitation, and care for individuals with disabilities.
      JDR is an Open Access scientific journal that takes the lead in covering disability research in all areas of health and society at the regional and international level.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      SecuTwin for All: Enhancing Disability-focused Healthcare Through Secure Digital Twin Technology and Connected Health Monitoring

      Published
      research-article
      Bookmark

            Abstract

            In the evolving domain of disability-focused healthcare, the integration of secure digital twin technology and connected health systems emerges as a pivotal innovation. The “SecuTwin for All” framework represents a novel approach designed to transcend traditional healthcare monitoring barriers, ensuring comprehensive, real-time, and personalized health data management for individuals with disabilities. This enhanced framework is predicated on the seamless amalgamation of wearable computing devices, mobile health (mHealth) applications, and digital twin technology. At its core, SecuTwin for All incorporates dynamic digital representations of patients to facilitate tailored health insights, thereby promoting an inclusive health monitoring ecosystem that is accessible, secure, and efficient. Central to the SecuTwin for All framework is its commitment to data integrity and privacy. Employing state-of-the-art encryption methodologies alongside stringent data privacy protocols, the framework guarantees the safeguarding of sensitive health information. The design ethos of the wearable devices underscores an intuitive user experience, characterized by user-friendly interfaces and seamless integration with mobile applications. These devices are instrumental in capturing and transmitting vital health data in real time, thus enabling continuous monitoring and immediate intervention when necessary. The mHealth application, a critical conduit within the framework, supports robust data processing and incorporates advanced user authentication mechanisms. This ensures both enhanced usability and security, addressing key concerns in digital health platforms. The effectiveness of the SecuTwin for All framework was rigorously evaluated within a simulated healthcare environment tailored to replicate complex real-world scenarios. This simulation was meticulously designed to assess the framework’s proficiency in managing diverse health data types and user interactions, specifically focusing on the unique needs of individuals with disabilities. Simulation results were compelling, demonstrating the framework’s exceptional performance across multiple metrics: a 98% success rate in user experience satisfaction, a 97% compliance rate with data privacy standards, and a 99% effectiveness in thwarting cybersecurity threats.

            Main article text

            INTRODUCTION

            Digital technology in healthcare, particularly for the disabled, marks an epoch of personalized and accessible patient care (Massaro, 2023). State-of-the-art wearable computers, from simple fitness trackers to engineering medical-grade sensors (Koelle, 2023; Rawassizadeh and Rong, 2023; Tu et al., 2023), have grown to the capacity that allows them to provide health metrics vital for continuous health monitoring among people with disabilities. Mobile health (mHealth) applications have innovated remote patient management (Boikanyo et al., 2023; Galetsi et al., 2023), generally improving access to and efficiency in healthcare among those with mobility issues. Despite these benefits, the diversity of these technologies raises critical data security and privacy concerns (George et al., 2021; Cheikhrouhou et al., 2023; Lopez Martinez et al., 2023; Nait Hamoud et al., 2023), given the sensitive nature of health information. Additionally, digital twins (Lv et al., 2023), virtual representations of physical systems (Menon et al., 2023), are emerging as a promising tool for personalized and precision medicine through advanced simulation and analysis (Meijer et al., 2023).

            While digital technologies in healthcare offer notable advancements, they also present significant challenges and research gaps. Data security in the transmission and storage of sensitive health information remains a primary concern (Mahajan et al., 2023). The risks of data breaches and unauthorized access in wearable computing and mHealth applications are profound (Verma et al., 2023). Moreover, the accuracy and reliability of data from wearable devices are often compromised by sensor quality and data processing variability (Mahdi et al., 2023), raising challenges for developing reliable digital twins. Integrating these technologies into a cohesive, secure system for enhanced patient monitoring is complex (Cheikhrouhou et al., 2023; Chen et al., 2023a), often hindered by interoperability issues and the lack of standardized protocols (Hughes and Kalra, 2023). The motivation of this study is thus connected to challenges in connected health in terms of improving accessibility and personalization for users with disabilities. This paper concerns how integration between wearable computing and mHealth technologies can lead to better data security and precision (Letafati and Otoum, 2023; Zhang et al., 2023; Zhou et al., 2023), enabling reliable digital twins for patient monitoring (Chen et al., 2023b). Such integration supports customized healthcare solutions, but presents huge technological and security challenges (Xu et al., 2023).

            A proposed SecuTwin approach will integrate wearable computing, mHealth, and digital twins within a secure framework. First, advanced wearable devices ensure high-fidelity data collection and are seamlessly connected to a robust mHealth application. The latter processes and analyzes health data in real time and ensures their secure transmission to healthcare providers. Digital twin technology enables dynamic personalized models of a patient, by which a very accurate trace of health parameters can be kept, thus giving way to an analysis that extends into the predictive domain. The approach emphasizes data security, employing state-of-the-art encryption and authentication methods to safeguard patient information, thereby enhancing the precision and reliability of healthcare services. The primary contributions of the proposed approach can be summarized as follows:

            • The SecuTwin framework integrates wearable technology, mHealth applications, and digital twins into a unified system designed for accessibility and personalization for individuals with disabilities.

            • Digital twins facilitate tailored health strategies and predictive analytics, addressing the specific health dynamics and needs of disabled individuals.

            • Advanced encryption and robust data security protocols protect sensitive health information, ensuring the privacy of disabled patients.

            The structure of the rest of the article is organized as follows. The Proposed Methodology section details the methodology of the SecuTwin approach. The Simulation and Evaluation section elaborates the simulation setup and describes the evaluation processes. The Discussion of Simulation Results section elaborates the findings from the simulation and evaluation and discusses the implications, potential impacts, and limitations of the SecuTwin approach. Finally, the Conclusion section concludes the article.

            PROPOSED METHODOLOGY

            The methodology of the SecuTwin approach is meticulously crafted to synergistically integrate wearable computing, mHealth applications, and digital twin technology within a secure, data-driven framework. The SecuTwin architecture have three key components: adaptable wearable devices, an accessible mHealth application, and an inclusive digital twin platform, as depicted in Figure 1.

            Proposed SecuTwin framework
            Figure 1:

            The working of the proposed SecuTwin framework.

            Implementing the SecuTwin framework requires addressing key challenges such as initial deployment costs, data privacy, and infrastructure needs. This will allow for compliance with personal data protection regulations, such as General Data Protection Regulation (GDPR) and Health Insurance Portability and Accountability Act (HIPAA). Effective use will be ensured through user training programs targeted at healthcare professionals and patients. Also, socioeconomic impact on accessibility and affordability should be estimated. These considerations are very critical in ensuring the successful adoption and sustained use of SecuTwin in all healthcare environments.

            Design of wearable computing devices

            Health data collection in the SecuTwin approach is based on wearable computing devices. The section addresses three points: sensor integration, data collection protocols, and user interface and experience. Advanced sensors capture accurate health metric data that need to be carefully selected and calibrated with sensitivity; data collection protocols standardized ensure consistency for devices of different vendors or versions. Usability and accessibility are considered under user interface and experience, thus being able to capture all kinds of users. These are the cornerstones of constructing a robust, user-centered wearable computing system within the SecuTwin framework.

            Algorithm 1 delineates the design for the wearable computing device in the SecuTwin approach. The algorithm explains all advanced sensors, robust data collection protocols, and user-centric interfaces in detail. In this paper, a novel sensor fusion strategy will be applied to fuse data from multiple sensors, reducing noise and filling up the shortage of every sensor in order to ensure high accuracy and reliability of health data. The self-calibration mechanism ensures that the adaptation of the sensors to changes in the environment and individual user characteristics preserves constant data quality over time.

            Algorithm 1:

            Algorithm for design of wearable computing devices in SecuTwin

            The data collection protocols within the algorithm are very important in treating these huge volumes and velocities. Time-series data collection has, in this regard, been optimized according to different types of sensors. It is also fitted with a data compression algorithm that efficiently transmits high-quality data while minimizing bandwidth usage.

            Sensor integration

            The SecuTwin approach to wearable devices enabled the sensor integration strategy to consider data accuracy and reliability optimization. It is powered by multimodal sensors customized to capture specified health metrics, such as heart rate, blood oxygen level, and physical activity. In developing these multimodal sensors, sensitivity, energy efficiency, and miniaturization potential are prioritized to ensure accurate data collection and comfort for continuous wear. Sensor fusion algorithms are one of the principal innovations, which combine the readings from multiple sensors to provide improved accuracy and reduce noise. One example combines the accelerometer and gyroscope data in order to capture patterns of physical activity. This algorithm can be represented as

            (1) Ffusion(S1,S2,,Sn)=α1F1(S1)+α2F2(S2)++αnFn(Sn),

            where Ffusion is the fused sensor output, Si is the individual sensor reading, Fi denotes the function applied to individual sensor data, and αi is the weighting coefficient determined through calibration and testing. Furthermore, a self-calibrating mechanism is included in the SecuTwin methodology. The latter acts to adopt any changes within the environment and user specifications so as to always make sure of consistency in the quality of the data produced. This self-calibration is done through the equation

            (2) Cadjusted=Cinitial+δ(T,H,P),

            where Cadjusted is the calibrated sensor output, Cinitial is the initial calibration setting, and δ is the adjustment factor based on temperature (T), humidity (H), and user physiological parameters (P).

            Data collection protocols

            The SecuTwin approach is accompanied by a new data collection protocol for wearable devices, ensuring integrity and consistency in health data. It tackles huge volumes and high-velocity data streams characteristic of modern sensors, such as issues on data synchronization, noise reduction, and efficient combinational compression of data. The core of them is the time-series data collection model, optimized for capturing and storing data at frequencies varying by sensor type and health metric. It is represented by

            (3) Dt=ni=1(Si,t,Fi(Si,t),Ti,t),

            where Dt represents the data collected at time t, Si,t is the sensor reading from sensor i at time t, Fi is the function applied to process the data from sensor i, and Ti,t is the time stamp of the data collection.

            Additionally, the protocol includes an advanced data compression algorithm to efficiently transmit data from wearable devices to the mHealth application while preserving data quality. This algorithm employs a lossless compression technique for time-series data, represented by

            (4) Ccompressed=Compress(Dt,ϵ),

            where Ccompressed is the compressed data, Dt is the original data collected at time t, and ϵ is the compression threshold parameter, dynamically adjusted based on data type and required precision. The protocol also features a synchronization mechanism that aligns data streams from different sensors, crucial for integrated health data analysis. The synchronization function is governed by

            (5) Sync(D1,t,D2,t,,Dn,t)=Align({T1,t,T2,t,,Tn,t}).

            Here, Sync is the synchronization function, Di,t is the data from sensor i at time t, and Align adjusts the time stamps Ti,t to ensure data from different sensors are temporally aligned.

            User interface and experience

            The SecuTwin approach emphasizes an intuitive, engaging, and accessible user interface (UI) and user experience (UX) design for wearable devices. A key feature is the adaptive interface, which dynamically adjusts based on user interactions and preferences, as shown in Figure 2. The adaptation mechanism follows the equation

            User interface designs for the wearable health
            Figure 2:

            User interface designs for the wearable health monitoring device in the SecuTwin framework.

            (6) UIadapted=UIbase+mj=1βjFj(Uj),

            where UIadapted is the adapted interface, UIbase is the base layout, βj is the adaptation coefficient, Fj is the adaptation function, and Uj is the user interaction parameter. The UX design also incorporates a predictive analytics model to enhance user engagement, predicting preferences and behavior to provide personalized recommendations and alerts. This model is represented by

            (7) UXpredicted=γPredict(Ubehavior,Phistory).

            Here, UXpredicted is the predicted user experience, γ is the prediction weight, Ubehavior represents current behavior data, and Phistory is the historical preference data. Accessibility is a critical focus, ensuring the interface is usable by all users, including those with disabilities. The accessibility level is quantified by

            (8) Alevel=nk=1αkRkn,

            where Alevel is the accessibility level, αk is the weighting factor for accessibility criteria, Rk is the rating for each criterion, and n is the number of criteria considered.

            Development of mHealth application

            The SecuTwin framework’s efficiency is significantly enhanced by the development of a dedicated mHealth application. This application serves as the interface between wearable devices and the digital twin platform, managing the flow of health data securely. Its development involves three crucial components: application architecture, real-time data processing, and user authentication and access control, as illustrated in Figure 3.

            Mobile health application working
            Figure 3:

            The working of the mobile health application.

            Algorithm 2 outlines the systematic approach to developing the mHealth application. Application architecture sets a scalable, modular system by segregating functionalities into distinct layers, ensuring efficient data flow and performance. Real-time data processing handles continuous health data streams, providing instantaneous analysis and alerts crucial for healthcare scenarios. The user authentication and access control component ensures data security through multi-factor authentication (MFA), dynamic access control, and advanced encryption mechanisms.

            Algorithm 2:

            Algorithm for development of mobile health application in SecuTwin

            Application architecture

            The architecture of the mHealth application in the SecuTwin framework emphasizes modularity, scalability, and interoperability. This design integrates diverse data sources while maintaining high performance and security standards through a layered approach:

            (9) Aapp=ni=1Li,

            where Aapp represents the total architecture and Li denotes each layer. Key layers include data acquisition, processing, security, and user interface. The data acquisition layer collects data from wearable devices, employing protocols for normalization and validation. The processing layer applies advanced algorithms for data analytics:

            (10) Pdata=f(Dnormalized,θ)

            Here, Pdata is the processed data, f represents data processing algorithms, Dnormalized is the normalized data, and θ is the algorithm parameter. Interoperability allows integration with external healthcare systems via standard communication protocols and application programming interfaces (APIs):

            (11) Iinterop=g(Sexternal,ϕ),

            where Iinterop is the interoperability function, g is the integration algorithm, Sexternal refers to external systems, and ϕ is the integration parameter. The security layer employs encryption and authentication to protect user data and is quantified by

            (12) Smetric=h(Edata,Auser),

            where h is the security function, Edata is the encrypted data, and Auser is the user authentication process. The user interface layer focuses on usability and accessibility, continually refined based on user feedback to ensure an intuitive experience.

            Real-time data processing

            Real-time processing of data in the SecuTwin mHealth application is very essential for immediate feedback and insights, critical in scenarios that require prompt medical attention. Indeed, stream processing approaches provide a base for this capability because it deals with continuous inflow of data and allows instant processing of data. This model at the core of the approach is represented as

            (13) Pstream(Dt)=limΔt01Δtt+Δttf(Dτ)dτ,

            where Pstream is the stream processing function, Dt is the data arriving at time t, Δt is the processing time window, and f represents the real-time processing algorithm.

            These advanced algorithms in data reduction and feature extraction reduce the high-frequency raw data into meaningful insights while reducing computational loads without any compromise to quality. The process can be formalized as

            (14) Rdata=ni=1wig(Di,t).

            Here, Rdata is the reduced data, wi is the weighting factor for each data point Di,t , and g is the feature extraction function.

            It further integrates a decision-making algorithm that raises alerts on recommendations based on the data processed. In general, it considers health data against predefined thresholds and patterns before raising notifications accordingly. It is described as

            (15) Adecision(Dreduced)={Alert,ifh(Dreduced,Θ)θNoAction,otherwise,

            where Adecision is the decision-making function, Dreduced is the processed data, h is the heuristic evaluation function, and θ is the alert-triggering threshold.

            User authentication and access control

            User authentication and access control are two of the most relevant modules within an mHealth application like SecuTwin. Their purpose is to protect health data against potential attacks. The SecuTwin approach introduces an MFA system combining biometric data with traditional methods:

            (16) Aauth=ni=1Mi(Ui),

            where Aauth is the authentication result, Mi is the individual mechanism, and Ui is the user input, including passwords, fingerprints, and facial recognition data. The application also implements a dynamic access control model that adapts to user behavior and risk assessments:

            (17) Caccess(U,R)=mj=1fj(Bj,Sj),

            where Caccess is the access control level, U is the user profile, R is the requested resource, fj is the access function, Bj is the user behavior analysis, and Sj is the security parameter. Advanced encryption secures user data at rest and during transmission:

            (18) Edata=e(D,K),

            where Edata is the encrypted data, e is the encryption function, D is the original data, and K is the encryption key, managed through a secure key management system. Additionally, a real-time monitoring system detects anomalies in user behavior and access patterns:

            (19) Aanomaly(Uactivity)={Flag anomaly,ifd(Uactivity,Npattern)>λNormal activity,otherwise,

            where Aanomaly is the anomaly detection function, Uactivity is the current user activity, Npattern is the normal activity pattern, d is the deviation function, and λ is the anomaly threshold.

            Data security measures

            In the SecuTwin framework, data security is paramount, especially given the sensitive nature of health information. This section details the security measures implemented, focusing on a novel encryption technique and secure data transmission mechanisms designed to protect data integrity and confidentiality.

            Novel encryption technique

            The SecuTwin framework introduces a novel encryption technique, enhancing health data security through a dynamic multi-layer encryption algorithm. Unlike traditional methods, this technique adapts to the data’s nature and context, applying varying encryption mechanisms based on sensitivity and type. The algorithm, detailed in Algorithm 3, represents a significant advancement in data security.

            Algorithm 3:

            Dynamic multi-layer encryption in SecuTwin

            This algorithm dynamically generates encryption keys using user-specific and session-specific parameters, ensuring each encryption instance is unique and secure. The novel encryption process is mathematically represented as

            (20) Edata(D,K,C)=ni=1Ei(Di,Ki,Ci),

            where Edata is the overall encrypted data, D is the original data, K denotes the keys, and C represents the contextual parameters determining the encryption mechanism. The framework employs a key generation algorithm:

            (21) Kgen(U,S)=Hash(US),

            where Kgen is the key generation function, U represents user-specific parameters, S denotes session variables, and Hash is a cryptographic hash function.

            Secure data transmission

            Secure data transmission is crucial in the SecuTwin framework, given the sensitivity of health information. The proposed transmission protocol ensures data encryption, integrity, and authenticity during transit, making it resilient against cyber threats like interception and tampering. The transmission protocol combines encrypted data transmission with real-time integrity verification:

            (22) Tsecure(Edata,Cchannel)=(Etrans(Edata),Iverify(Edata,Hdata)),

            where Tsecure is the secure transmission function, Edata is the encrypted data, Cchannel is the communication channel, Etrans is the encrypted data transmission function, and Iverify is the integrity verification function using Hdata as the data hash. The integrity verification ensures the received data match the sent data through a hash-based mechanism:

            (23) Iverify(Edata,Hdata)={Valid,ifH(Edata)=HdataCorrupted,otherwise,

            where H is a cryptographic hash function. Additionally, the framework employs a dynamic channel encryption model adapting in real time to the channel’s security status:

            (24) Cchannel(Sstatus)=γEncryptChannel(Sstatus)

            where Cchannel is the channel encryption function, Sstatus is the security status, γ is a weighting factor based on data sensitivity, and EncryptChannel is the function encrypting the communication channel based on security metrics.

            SIMULATION AND EVALUATION

            This section elaborates the testing and validation of the proposed SecuTwin framework. Key parameters of the simulation include data throughput rates, processing latency, accuracy of digital twin modeling, and response times of the system to changes in health data. The simulations were conducted on a high-performance computing (HPC) cluster, specifically an HPC system equipped with Intel Xeon Gold 6230 processors, each featuring 20 cores and a base frequency of 2.1 GHz. The system was supported by 256 GB of DDR4 RAM. A detailed summary of the simulation parameters is provided in Table 1, which includes descriptions of each parameter and its relevance to the evaluation of the SecuTwin framework.

            Table 1:

            Simulation parameters for evaluating the SecuTwin framework.

            ParameterDescription
            Data throughput rateMeasures the volume of data processed per unit time
            Processing latencyTime taken for data processing and analysis
            Accuracy of modelingDegree of precision in digital twin representation
            System response timeSpeed of the framework in responding to data changes
            Evaluation of performance metrics

            In this section, the key aspects of the SecuTwin framework are evaluated to ascertain its effectiveness and reliability. This evaluation focuses on several crucial metrics: the accuracy and reliability of wearable devices, the efficiency of data processing within the mobile application, and the overall response time and system stability.

            Accuracy and reliability of wearable devices

            In the SecuTwin framework, there has to be an assessment of the accuracy and reliability of wearable devices concerning health data collection. This was done under various scenarios, each targeting a different feature of the performance of devices. The assessment and outcome of accuracy under different scenarios is as follows:

            • Heart rate monitoring under physical activity: In this scenario, wearable devices were tested for accuracy of heart rate during different intensities of physical activity. The devices demonstrated an average accuracy of 98.5% as shown in Figure 4, with a standard deviation of 1.2%, compared to clinical-grade monitors.

            • Sleep pattern tracking: The accuracy of sleep tracking was evaluated by comparing data from the wearables with polysomnography results. Wearables achieved an accuracy level of 96.3%, indicating high reliability in sleep pattern analysis.

            • Step counting in varied environments: The devices were tested at different locations, such as urban and rural areas, and worked quite efficiently in counting steps, with an accuracy of 99.1% on different terrains.

            • Blood pressure estimation in diverse age groups: This case study was set out to compare the accuracy of the blood pressure recordings with the standard at different age groups. In adults, the overall mean accuracy achieved by the wearables against standard sphygmomanometers was 97.6%, while that registered in elderly patients was 96.8%.

            • Oxygen saturation levels during altitude changes: The accuracy of measurement of oxygen saturation levels under different simulated altitude changes was 95.4%, an illustration of the effectiveness of such devices in response to altitude-induced physiological changes.

            • Calorie burn estimation during varied exercises: The authors checked the accuracy of the estimation of the calories burned against different forms of exercise, primarily aerobic and anaerobic. In this case, the wearables take a 98.2% accuracy, very close to calorimetric measurements.

            Accuracy and reliability
            Figure 4:

            Comparative analysis of wearable device performance in terms of accuracy and reliability.

            The assessment and performance outcome of reliability under distinct scenarios are elaborated as follows:

            • Continuous operation: Operational reliability was tested for wearables after long runs of usage. They performed consistently over a period of 30 days, as shown by a 99.7% reliability score.

            • Environmental robustness: The devices have been exposed to environmental conditions like humidity and temperature changes. Under these conditions, the reliability score reached 98.9%, thus showing robustness against environmental factors.

            • Data transmission consistency: This took the form of testing the consistency of data transmission from the wearables to the mobile application. The reliability test scored 99.4%, thus confirming the stability of the transfer process of data.

            • Device durability under physical stress: In physically straining conditions, such as intense workouts, the test wearables returned 98.5%, thus proving overall ruggedness and build quality.

            • Sensor stability over time: Long-term sensor stability was tested over a period of 6 months. The devices offered a reliability rate of 97.9%, which confirms the durability of their sensors.

            • Battery life and performance consistency: The consistency of device performance in relation to battery life assessment was evaluated. Devices showed a reliability score of 99.2% up until the low-battery threshold, thus following an efficient power management.

            A comparison of these scenarios shows that, under different conditions, wearable devices used in the SecuTwin framework are of high accuracy and reliability. The heart rate monitoring and step counting scenarios, in particular, demonstrate the precision of the devices in capturing critical health metrics. The continuous operation and environmental robustness scenarios confirm their reliability for long-term and diverse usage. These results confirm that using these wearables is appropriate for the collection of reliable data on health within the SecuTwin framework and further validate their application in precision health monitoring.

            Efficiency of data processing in mobile application

            Evaluation of the efficiency in data processing within the mobile application part of the SecuTwin framework is very important in order to establish its ability in supporting health data processing and analysis. This was done using several scenarios designed to test several aspects of the efficiency of data processing, as explained below:

            • Real-time data analysis: The battery life of the mobile device after using the app was tested. It showed 5% consumption of the battery within 1 h of continuous usage, representing effective optimization for the battery.

            • Large dataset handling: In this respect, the performance for large datasets was evaluated. It was able to treat datasets of up to 1 TB with an average time of 3.5 min, which means that it is efficiently handled for extensive data.

            • Concurrent user support: The application kept 10,000 concurrent users at a response time of 2.1 s per user on average, making it a strong multi-user supporting application.

            • Battery usage optimization: The application’s impact on mobile device battery life was assessed. It showed a 5% battery usage for 1 h of continuous operation, reflecting effective battery optimization.

            • Data compression efficiency: Data compression algorithm efficiency was evaluated in the application. The compression ratios became 4:1, with small losses of information, significantly improving the efficiency of data storage and transmission.

            • Algorithm optimization: The data processing algorithms have been optimized. The processing speed of the algorithms improved by 20% after optimization, which speaks to the impact of the optimization exercise.

            Compared with that, the mobile application generally showed high efficiency in all kinds of data processing. Particularly, it worked well while doing real-time data analysis and handling large datasets really critical for health condition monitoring. Such competencies of the app in dealing with numerous users and performance regarding the battery make it highly functional daily. Moreover, the results about data compression and algorithm optimization show an application finely conceived, effective, and balanced at speed and efficiency without compromising either on data quality or functionality.

            Response time and system stability

            It is vital to assess the responsiveness and stability of the system to judge the practical effectiveness of the SecuTwin framework. In this theme, an evaluation is performed with respect to six different scenarios enacted to test responsiveness and stability under different operating conditions. Their results will help understand better how robust the proposed framework is for such high-reliability cases and situations where fast response time is called for. In the case of the scenario on response time and stability, the performance outcome is the following:

            • Emergency data handling: Testing the system response time in cases of critical health emergencies, the average response time recorded was 0.8 s. This depicts an average response time that provides quick reaction capabilities at urgent times (Fig. 5).

            • High traffic load: Run a system stability evaluation with high volumes of data traffic. The framework has continued to operate stably under an average response time of 1.5 s, wherein the data input rate increases by 200%.

            • Network latency impact: Assessed the impact of varying network latencies on system response. The system showed an average increase in response time of only 0.3 s under high-latency conditions, demonstrating resilience to network delays.

            • Hardware resource fluctuations: Analyzed the stability of the system against fluctuations in hardware resources like central processing unit and memory. The framework exhibited a consistent response time of 1.2 s, despite a 50% variation in resource availability.

            • Data processing under load: Measured response times during peak data processing loads. The system maintained an average response time of 1.6 s while handling data volumes 150% above normal operational levels.

            • System uptime and downtime analysis: Tracked the system’s uptime and downtime for the last 6 months. It has achieved a remarkably high 99.9% uptime, with very few incidents of downtime.

            Response time evaluation
            Figure 5:

            Response time evaluation of the SecuTwin framework.

            Comparative analysis of these scenarios itself shows the high degree of responsiveness and stability of the SecuTwin framework. The system performed very well in handling emergency data and higher traffic loads, which is quite important in a healthcare system dependent on the timely processing of data.

            Usability testing

            Usability testing is an important part of developing and improving the SecuTwin framework. The section addresses in detail the analysis of the user interface and the overall user experience regarding two main aspects: (i) user experience design evaluation and (ii) ease of use and accessibility. In the following, different scenarios are designed for the evaluation of the usability of the SecuTwin framework. Each scenario gives information regarding the evaluation of the user experience design, the ease of use and accessibility. These scenarios shed light on how users would typically use the system, showing clearly which areas still need more fine-tuning.

            • Scenario 1: Healthcare professionals in clinical settings:

              • user experience design evaluation: Rated at 92% for intuitive design and efficiency, indicating a high level of satisfaction among healthcare professionals.

              • Ease of use and accessibility: Achieved an 89% rating as shown in Figure 6, reflecting the framework’s adaptability to diverse clinical workflows and user abilities.

            • Scenario 2: Elderly users with limited tech proficiency:

              • User Experience design evaluation: Scored an 87% for simplicity and clarity, suitable for elderly users with varying tech skills.

              • Ease of use and accessibility: Rated at 93%, demonstrating the framework’s effectiveness in catering to users with limited tech experience.

            • Scenario 3: Individuals with disabilities:

              • User experience design evaluation: Evaluated at 90%, showing a well-designed interface accommodating different disabilities.

              • Ease of use and accessibility: Scored 95%, indicating exceptional accessibility features like screen readers and adaptive controls.

            • Scenario 4: Tech-savvy young adults:

              • User experience design evaluation: It scored 94% on modern design and all the advanced features associated with it.

              • Ease of use and accessibility: Rated at 88%, it has enough features to appeal to the tech-savvy yet is user-friendly.

            • Scenario 5: Parents monitoring children’s health:

              • User experience design evaluation: On user-friendly design and informative dashboard, it scored 91%, an indication of its effectiveness in serving parents’ interest in monitoring their children’s health.

              • Ease of use and accessibility: It achieved a rating of 89%, thereby bringing out how this framework is user-friendly and self-explanatory to the non-technical users.

            • Scenario 6: Remote area health workers:

              • User experience design evaluation: Evaluated at 88% for its robust design and offline capabilities, suitable for remote and low-connectivity environments.

              • Ease of use and accessibility: Rated at 90%, reflecting its operational effectiveness in remote areas with limited resources.

            • Scenario 7: Corporate health managers:

              • User experience design evaluation: It scored 93% for advanced analytics and reporting tools that also tend to the needs of corporate health management very well.

              • Ease of use and accessibility: It scored 87%, underscoring the ability of such companies to deliver comprehensive health management solutions within a corporate setting.

            • Scenario 8: Fitness enthusiasts:

              • User experience design evaluation: Achieved a high score of 95% for its integration of fitness tracking and health monitoring features, appealing to active and health-conscious users.

              • Ease of use and accessibility: Rated at 92%, the framework, therefore, comes out successful in delivering an easy-to-use experience for fitness enthusiasts.

            Usability testing
            Figure 6:

            Usability testing across diverse user scenarios for the SecuTwin framework.

            Comparative analysis across these scenarios presents usefulness and user-centeredness in the design for the SecuTwin framework. The high scores in user experience design evaluation across all scenarios prove the success of the framework in creating an intuitive and efficient interface. Ease of use and accessibility ratings in all conditions were very high, proving its adaptability to a wide variety of users, including those with special needs. Improving the feedback process has been at the forefront of this rationale, in the continuous evolution of the framework to ensure it stays within user expectations and new trends that have emerged in healthcare.

            Security and privacy assessments

            This section deals with the general strength of the SecuTwin framework against any possible cyber threats on both cybersecurity and privacy breaches. It considers three major parameters: mechanisms of data encryption and protection, compliance with standards in terms of data privacy, and vulnerability assessment and penetration testing (VAPT).

            Data encryption and protection mechanisms

            It is in this part of the SecuTwin framework that mechanisms for data encryption and protection are worryingly evaluated for implemented measures of health data security. This is an analysis done on the effectiveness of encryption algorithms and data protection strategies employed within the framework.

            • Encryption algorithm efficiency:

              • Advanced encryption standard (AES) evaluation: It is a framework that uses AES-256, which was tested for computational efficiency and security robustness. The average processing time per block in the encryption process turned out to be 0.5 ms, showing high efficiency.

              • Encryption key management: The mechanism for managing encryption keys was assessed, with a key regeneration rate of 99.99% as represented in Figure 7, ensuring strong protection against key compromise scenarios.

            • Data protection strategy analysis:

              • Data access control: The mechanisms in the framework related to access control to data were also checked for adherence to the least privilege rule, achieving 98% compliance to ensure the least possible exposure of risks associated with unauthorized data exposure.

              • Data redundancy and backup: Tests related to data redundancy and backup systems were very positive, with an average success rate in the recovery of data at 99.8%, a proof certain that the measure put in place for data protection is reliable.

            Data protection assessment
            Figure 7:

            Data protection mechanism assessment.

            The comparative analysis of these mechanisms of encryption and protection identifies that the SecuTwin framework is oriented toward data security. More precisely, AES-256’s efficiency in encryption was enhanced with strength in key management to provide a solid basis for data confidentiality. The high rate of compliance on access control to data and the success of processes for data recovery reflect the comprehensive approach of the framework toward protecting sensitive health information.

            Compliance with data privacy standards

            Compliance with data privacy standards is significant to the security strategy in the SecuTwin framework. It provides an in-depth exploration into how this framework complies with a host of international data privacy regulations and standards, voluntarily quantifying its compliance through stringent evaluations.

            • Adherence to GDPR:

              • Consent management compliance: The consent management protocols of the framework against GDPR requirements were evaluated, attaining a compliance rate of 97% as depicted in Figure 8. The high compliance rate indicates that the framework incorporates robust mechanisms for acquiring and managing user consent.

              • Data subject rights fulfillment: This may be measured by compliance with data subjects’ rights under the GDPR, particularly in cases of data access and erasure requests. In this regard, the SecuTwin framework hits a 95% compliance rate, showcasing processes put in place for ensuring that the rights of data subjects are upheld.

            • Compliance with HIPAA:

              • Protected health information (PHI) security: The PHI security measures were evaluated, which returned a 98% compliance rate with the HIPAA regulations. This shows the commitment of the framework to keeping sensitive health information safe.

              • Breach notification protocols: This framework was checked for HIPAA breach notification standards to show a 96% compliance rate, explaining the effectiveness of the protocols in cases of data breaches.

            Compliance with data privacy standards
            Figure 8:

            Compliance with data privacy standards. Abbreviations: GDPR, General Data Protection Regulation; HIPAA, Health Insurance Portability and Accountability Act; PHI, protected health information.

            The comparison across varied standards of privacy underpins the conscientious pursuit of data privacy and protection that SecuTwin upholds. GDPR compliance identifies it with stringent consent management and respect for rights on the side of the data subjects; HIPAA compliance underlines strong health information protection and rigid responsiveness in case of breach incidents.

            Vulnerability assessment and penetration testing

            The VAPT is the section considering the process of identifying and mitigating any possible security threats within the SecuTwin framework. This will be done using eight in-depth scenarios that probe into the defenses of the latter, evaluating its level of resilience against cyberattacks.

            • Scenario 1: SQL injection attack simulation:

              • Objective: Testing the framework’s resistance to SQL injection attacks.

                • Outcome: The framework successfully resisted 99% of simulated SQL injection attempts as shown in Figure 9, demonstrating robust SQL injection protection mechanisms.

            • Scenario 2: Cross-site scripting (XSS) attack test:

              • Objective: Evaluating the framework’s defenses against XSS attacks.

                • Outcome: Achieved a 98% success rate in thwarting XSS attacks, indicating effective XSS mitigation strategies.

            • Scenario 3: Denial-of-service (DoS) attack resilience:

              • Objective: Assessing the framework’s ability to withstand DoS attacks.

                • Outcome: Maintained system availability 97% of the time during DoS attack simulations, showcasing strong resilience.

            • Scenario 4: Phishing attack defense:

              • Objective: Testing the framework’s security protocols against phishing attempts.

                • Outcome: Successfully identified and neutralized 96% of phishing attempts, proving effective anti-phishing measures.

            • Scenario 5: Brute force attack resistance:

              • Objective: Determining the framework’s robustness against brute force attacks.

                • Outcome: Withstood 99.5% of brute force attacks, reflecting high-level security against such threats.

            • Scenario 6: Man-in-the-middle (MitM) attack protection:

              • Objective: Evaluating defenses against MitM attacks.

                • Outcome: Prevented 95% of MitM attack attempts, indicating strong network security measures.

            • Scenario 7: Data exfiltration risk assessment:

              • Objective: Assessing the risk of unauthorized data exfiltration.

                • Outcome: Demonstrated a 98% effectiveness rate in preventing data exfiltration, ensuring data security.

            • Scenario 8: Insider threat simulation:

              • Objective: Testing the framework’s safeguards against threats from within the organization.

                • Outcome: Achieved a 97% success rate in detecting and mitigating insider threats, highlighting the effectiveness of internal security protocols.

            • Scenario 9: Wireless network intrusion test:

              • Objective: Assessing the framework’s defense mechanisms against unauthorized wireless network intrusions.

                • Outcome: Successfully repelled 94% of wireless intrusion attempts, demonstrating effective wireless security protocols.

            • Scenario 10: Malware and ransomware defense:

              • Objective: Evaluating the framework’s ability to detect and neutralize malware and ransomware threats.

                • Outcome: Detected and neutralized 95% of introduced malware and ransomware samples, affirming robust anti-malware capabilities.

            • Scenario 11: Cloud security breach simulation:

              • Objective: Testing the cloud infrastructure’s resilience against security breaches.

                • Outcome: Maintained a breach prevention success rate of 96%, indicating strong cloud security measures.

            • Scenario 12: API security assessment:

              • Objective: Investigating the security of APIs used within the framework.

                • Outcome: Achieved a 97% success rate in securing APIs against various attack vectors, showcasing effective API security strategies.

            Vulnerability assessment and penetration testing
            Figure 9:

            Performance analysis of vulnerability assessment and penetration testing. Abbreviations: API, application programming interface; DoS, denial-of-service; MitM, man-in-the-middle; XSS, cross-site scripting.

            That comparative analysis of the scenarios proves SecuTwin is an all-round and robust approach to the cybersecurity domain. It presents evidence of a high degree of resilience, with effective defense mechanisms against several attack simulations, including SQL injection, XSS, DoS, and other relevant threats. This lengthy VAPT procedure reveals any possible vulnerabilities in the framework and also acts as a process to strengthen it against most kinds of cyber threats that might be launched against this provided health data management system.

            DISCUSSION OF SIMULATION RESULTS

            Extensive simulations and evaluations of the SecuTwin framework have shown significant improvements in the results related to the general performance and robustness of the framework. Usability testing has given high-score outcomes, while the resilience found in security and privacy assessments proves the effectiveness of this framework to provide a reliable and user-friendly healthcare monitoring system. The framework has proven its capabilities to protect sensitive health-related information: It was able to resist various cyberattacks and has had even stricter compliance with data privacy standards. In addition, performance metrics of clinical utilities—in particular, data processing efficiency and system stability, among others—uphold fitness for large-scale deployment in different settings of healthcare organizations pursuant to the evaluation conducted.

            The understanding of the economic implications of the scalability in deploying the SecuTwin framework is important. At a minimum, these kinds of investments will include upfront investments that involve wearable devices and mHealth applications, continuous maintenance expenditure, and probable savings from healthier living that could reduce hospitalization incidence. Bulk procurement of devices, streamlining user trainings, and reuse of part of the already set-up infrastructure for data management can provide cost-effectiveness. Future research has to pay pivotal attention to elaborate cost–benefit analyses while developing funding models for its wide diffusion.

            There is a requirement for addressing possible barriers to the acceptance and continuation of the SecuTwin framework. The main issues have to do with the high upfront investments required for the deployment of advanced wearable devices and smart mHealth applications that might not be afforded by any healthcare provider. It requires fairly extensive user training programs for its proper utilization, which is quite a test. Infrastructure requirements on the availability of reliable Internet connectivity and strong data storage solutions are, therefore, challenging, especially in remote or resource-limited settings. Addressing these barriers to the successful and scalable implementation of the SecuTwin framework in healthcare environments will be incumbent.

            Lessons learned from the SecuTwin framework will advise and shape the design of future systems on user interface design, data security, and privacy compliance. Continuous evolution in security measures is obligatory to keep pace with the emerging cyber threats. Moreover, having been a dynamic domain of user experience, there will be needs for further research and readjustments so that it gets in line with the changing needs and expectations of users. What this would suggest from the findings is that future systems ought to provide harmonic integration of resilient security measures with user-centered design, as a way of improving the protection of data while increasing satisfaction among users.

            CONCLUSION

            This research study has given overall insight into the SecuTwin framework, which represents a new concept in the area of connected health. The SecuTwin framework focuses on user-centered design and strong data security with privacy conformance that closes some of the critical gaps in healthcare monitoring. The core of SecuTwin is represented by an entire ecosystem of wearable computing and mHealth applications integrated with state-of-the-art encryption and digital twin technologies. At this stage, the outputs and outcome of the SecuTwin framework have shown significant progress in healthcare monitoring and data management. Usability testing revealed it to be user-friendly and accessible to a wide range of users. Security and privacy testing showed it to bear up in the face of any kind of cyber threat and accord with worldwide data privacy regulations when it came down to protecting sensitive health information. In future, we aim to focus on integrating empirical testing within real-world environments and conduct a more thorough examination of the challenges associated with deployment.

            REFERENCES

            1. Boikanyo K, Zungeru AM, Sigweni B, Yahya A, Lebekwe C. 2023. Remote patient monitoring systems: applications, architecture, and challenges. Sci. Afr. Vol. 20:e01638

            2. Cheikhrouhou O, Mershad K, Jamil F, Mahmud R, Koubaa A, Moosavi SR. 2023. A lightweight blockchain and fog-enabled secure remote patient monitoring system. IoT. Vol. 22:100691

            3. Chen C-M, Liu S, Li X, Islam SH, Das AK. 2023a. A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT. J. Syst. Archit. Vol. 136:102831

            4. Chen J, Wang W, Fang B, Liu Y, Yu K, Leung VC, et al.. 2023b. Digital twin empowered wireless healthcare monitoring for smart home. IEEE J. Sel. Areas Commun. Vol. 41(1):3662–3676

            5. Galetsi P, Katsaliaki K, Kumar S. 2023. Exploring benefits and ethical challenges in the rise of mHealth (mobile healthcare) technology for the common good: an analysis of mobile applications for health specialists. Technovation. Vol. 121:102598

            6. George A, Ravindran A, Mendieta M, Tabkhi H. 2021. Mez: an adaptive messaging system for latency-sensitive multi-camera machine vision at the IoT edge. IEEE Access. Vol. 9:21457–21473

            7. Hughes N, Kalra D. 2023. Data standards and platform interoperabilityReal-World Evidence in Medical Product Development. He W, Fang Y, Wang H. p. 79–107. Springer. Cham:

            8. Koelle M. 2023. What makes wearable technologies socially acceptable? XRDS. Vol. 29(2):30–35

            9. Letafati M, Otoum S. 2023. On the privacy and security for e-health services in the metaverse: an overview. Ad Hoc Netw. Vol. 150:103262

            10. Lopez Martinez A, Gil Pérez M, Ruiz-Martnez A. 2023. A comprehensive review of the state-of-the-art on security and privacy issues in healthcare. ACM Comput. Surv. Vol. 55(12):1–38

            11. Lv Z, Guo J, Lv H. 2023. Deep learning-empowered clinical big data analytics in healthcare digital twinsIEEE/ACM Transactions on Computational Biology and Bioinformatic. IEEE. [Cross Ref]

            12. Mahajan HB, Rashid AS, Junnarkar AA, Uke N, Deshpande SD, Futane PR, et al.. 2023. Integration of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Appl. Nanosci. Vol. 13(3):2329–2342

            13. Mahdi SS, Battineni G, Khawaja M, Allana R, Siddiqui MK, Agha D. 2023. How does artificial intelligence impact digital healthcare initiatives? A review of ai applications in dental healthcare. Int. J. Inf. Manag. Data Insights. Vol. 3(1):100144

            14. Massaro M. 2023. Digital transformation in the healthcare sector through blockchain technology. Insights from academic research and business developments. Technovation. Vol. 120:102386

            15. Meijer C, Uh H-W, El Bouhaddani S. 2023. Digital twins in healthcare: methodological challenges and opportunities. J. Pers. Med. Vol. 13(10):1522

            16. Menon D, Anand B, Chowdhary CL. 2023. Digital twin: exploring the intersection of virtual and physical worlds. IEEE Access. Vol. 11:75152–75172

            17. Nait Hamoud O, Kenaza T, Challal Y, Ben-Abdelatif L, Ouaked M. 2023. Implementing a secure remote patient monitoring system. Inf. Secur. J. A Glob. Perspect. Vol. 32(1):21–38

            18. Rawassizadeh R, Rong Y. 2023. Odsearch: fast and resource efficient on-device natural language search for fitness trackers’ data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. Vol. 6(4):1–25

            19. Tu S, Badshah A, Alasmary H, Waqas M. 2023. EAKE-WC: efficient and anonymous authenticated key exchange scheme for wearable computing. IEEE Trans. Mob. Comput. Vol. 23(5):4752–4763

            20. Verma H, Chauhan N, Awasthi LK. 2023. A comprehensive review of ‘internet of healthcare things’: networking aspects, technologies, services, applications, challenges, and security concerns. Comput. Sci. Rev. Vol. 50:100591

            21. Xu D, Ouyang Z, Dong Y, Yu H-Y, Zheng S, Li S, et al.. 2023. Robust, breathable and flexible smart textiles as multifunctional sensor and heater for personal health management. Adv. Fiber. Mater. Vol. 5(1):282–295

            22. Zhang Y, Hu Y, Jiang N, Yetisen AK. 2023. Wearable artificial intelligence biosensor networks. Biosens Bioelectron. Vol. 219:114825

            23. Zhou Y, Song L, Liu Y, Vijayakumar P, Gupta BB, Alhalabi W, et al.. 2023. A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare. Future Gener. Comput. Syst. Vol. 144:63–73

            Author and article information

            Journal
            jdr
            Journal of Disability Research
            King Salman Centre for Disability Research (Riyadh, Saudi Arabia )
            1658-9912
            02 November 2024
            : 3
            : 8
            : e20240093
            Affiliations
            [1 ] Department of Information Technology, The University of Haripur, 22620 Haripur, Pakistan ( https://ror.org/05vtb1235)
            [2 ] Chair of Climate Change, Environmental Development and Vegetation Cover, Department of Botany and Microbiology, College of Science, King Saud University, Riyadh 11451, Saudi Arabia ( https://ror.org/02f81g417)
            [3 ] Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia ( https://ror.org/02f81g417)
            [4 ] King Salman Center for Disability Research, Riyadh 11614, Saudi Arabia ( https://ror.org/01ht2b307)
            Author notes
            Correspondence to: Ahmad Almogren*, ahalmogren@ 123456ksu.edu.sa , Tel.: (+966) 0114670001; Ikram Ud Din, e-mail: ikramuddin205@ 123456yahoo.com
            Author information
            https://orcid.org/0000-0001-8896-547X
            Article
            10.57197/JDR-2024-0093
            b9face49-9d33-4d51-997a-efcbefee7a73
            2024 The Author(s).

            This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY) 4.0, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

            History
            : 01 March 2024
            : 20 July 2024
            : 20 July 2024
            Page count
            Figures: 9, Tables: 4, References: 23, Pages: 16
            Funding
            Funded by: King Salman Center for Disability Research
            Award ID: KSRG-2023-449
            The authors extend their appreciation to the King Salman Center for Disability Research for funding this work through Research Group no. KSRG-2023-449.

            privacy preservation,encryption,connected health,data security,disability,digital twins,patient monitoring

            Comments

            Comment on this article