{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:05:49Z","timestamp":1760227549675,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T00:00:00Z","timestamp":1651104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"nExt generation eMergencY commuNicatiOnS\u2014(EMYNOS) project","award":["653762"],"award-info":[{"award-number":["653762"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The fifth generation (5G) of mobile networks is designed to mark the beginning of the hyper-connected society through a broad set of novel features and disruptive characteristics, delivering massive connectivity, coverage and availability paired with unprecedented speed, throughput and capacity. Such a highly capable networking paradigm, facilitated by its integrated segments and available subsystems, will propel numerous cutting-edge, innovative and versatile services, spanning every possible business vertical. Augmented, response-capable healthcare services have already been identified as one of the prime objectives of both vendors and customers; therefore, addressing controversies and shortcomings related to the specific field is considered a priority for all stakeholders. The scope of this paper is to present the architectural elements of 5G which enable efficient, remote healthcare services along with emergency health monitoring and response capability. In addition, we propose a holistic scheme based on technical enablers such as Internet-of-Things (IoT) and Fog Computing, for mitigating common issues and current limitations which may compromise the proclaimed service delivery.<\/jats:p>","DOI":"10.3390\/s22093375","type":"journal-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T22:20:06Z","timestamp":1651184406000},"page":"3375","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Melding Fog Computing and IoT for Deploying Secure, Response-Capable Healthcare Services in 5G and Beyond"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2847-2769","authenticated-orcid":false,"given":"Christos","family":"Tselios","sequence":"first","affiliation":[{"name":"Wireless Communications Laboratory, University of Patras, 26504 Patras, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1083-0345","authenticated-orcid":false,"given":"Ilias","family":"Politis","sequence":"additional","affiliation":[{"name":"Systems Security Laboratory, University of Piraeus, 18532 Piraeus, Greece"},{"name":"InQbit Innovations SRL, Peroni Str. District 4, No. 14\u201316, 041386 Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9938-6211","authenticated-orcid":false,"given":"Dimitrios","family":"Amaxilatis","sequence":"additional","affiliation":[{"name":"Spark Works Limited, Unit 2B, Galway Technology Centre, Mervue Business & Technology Park, Wellpark Road, H91 AHR1 Galway, Ireland"}]},{"given":"Orestis","family":"Akrivopoulos","sequence":"additional","affiliation":[{"name":"Spark Works Limited, Unit 2B, Galway Technology Centre, Mervue Business & Technology Park, Wellpark Road, H91 AHR1 Galway, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8955-9270","authenticated-orcid":false,"given":"Ioannis","family":"Chatzigiannakis","sequence":"additional","affiliation":[{"name":"Department of Computer, Control and Informatics Engineering, La Sapienza University, 00185 Rome, Italy"}]},{"given":"Spyros","family":"Panagiotakis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Hellenic Mediterranean University, 71500 Heraklion, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-598X","authenticated-orcid":false,"given":"Evangelos K.","family":"Markakis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Hellenic Mediterranean University, 71500 Heraklion, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"ref_1","unstructured":"European Commission (2022, March 09). The European Emergency Number 112. Available online: https:\/\/bit.ly\/2UnEbyz."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Tselios, C., and Tsolis, G. (2016, January 23\u201325). On QoE-awareness through virtualized probes in 5G networks. Proceedings of the 2016 IEEE 21st International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), Toronto, ON, Canada.","DOI":"10.1109\/CAMAD.2016.7790351"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Politis, I., Lykourgiotis, A., Tselios, C., and Orfanoudakis, T. (2018, January 20\u201324). On Measuring the Efficiency of Next Generation Emergency Communications: The EMYNOS Paradigm. Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422741"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012, January 17). Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing (MCC\u201912), Helsinki, Finland.","DOI":"10.1145\/2342509.2342513"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2961","DOI":"10.1109\/COMST.2018.2849509","article-title":"Survey on Multi-Access Edge Computing for Internet of Things Realization","volume":"20","author":"Porambage","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","article-title":"Fog and IoT: An Overview of Research Opportunities","volume":"3","author":"Chiang","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/JCN.2018.000036","article-title":"Double-matching resource allocation strategy in fog computing networks based on cost efficiency","volume":"20","author":"Jia","year":"2018","journal-title":"J. Commun. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Liu, Z., Yang, Y., Chen, Y., Li, K., Li, Z., and Luo, X. (May, January 29). A Multi-tier Cost Model for Effective User Scheduling in Fog Computing Networks. Proceedings of the IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France.","DOI":"10.1109\/INFCOMW.2019.8845252"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Dang, T.D., and Hoang, D. (2017, January 8\u201311). A data protection model for fog computing. Proceedings of the 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), Valencia, Spain.","DOI":"10.1109\/FMEC.2017.7946404"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bousselham, M., Benamar, N., and Addaim, A. (2019, January 3\u20134). A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System. Proceedings of the 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco.","DOI":"10.1109\/WITS.2019.8723723"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"B60","DOI":"10.1364\/JOCN.11.000B60","article-title":"Hierarchical edge cloud enabling network slicing for 5G optical fronthaul","volume":"11","author":"Song","year":"2019","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"108","DOI":"10.23919\/ICN.2021.0009","article-title":"Blockchain-enabled fog resource access and granting","volume":"2","author":"Liu","year":"2021","journal-title":"Intell. Converg. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Al-Khafajiy, M., Baker, T., Waraich, A., Alfandi, O., and Hussien, A. (2019, January 3\u20137). Enabling High Performance Fog Computing through Fog-2-Fog Coordination Model. Proceedings of the 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/AICCSA47632.2019.9035353"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Akrivopoulos, O., Chatzigiannakis, I., Tselios, C., and Antoniou, A. (2017, January 4\u20138). On the Deployment of Healthcare Applications over Fog Computing Infrastructure. Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy.","DOI":"10.1109\/COMPSAC.2017.178"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4189","DOI":"10.1109\/TII.2019.2898174","article-title":"Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics","volume":"15","author":"Sangaiah","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Bolivar, L.T., Tselios, C., Area, D.M., and Tsolis, G. (2018, January 26\u201329). On the Deployment of an Open-Source, 5G-Aware Evaluation Testbed. Proceedings of the 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Bamberg, Germany.","DOI":"10.1109\/MobileCloud.2018.00016"},{"key":"ref_17","unstructured":"(2022, March 09). ETSI, GS NFV 002, Network Functions Virtualisation (NFV): Architectural Framework, V.1.2.1. Available online: https:\/\/bit.ly\/2ZYlrrI."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ordonez-Lucena, J., Adamuz-Hinojosa, O., Ameigeiras, P., Mu\u00f1oz, P., Ramos-Mu\u00f1oz, J.J., Chavarria, J.F., and Lopez, D. (2018, January 18\u201321). The Creation Phase in Network Slicing: From a Service Order to an Operative Network Slice. Proceedings of the 2018 European Conference on Networks and Communications (EuCNC), Ljubljana, Slovenia.","DOI":"10.1109\/EuCNC.2018.8443255"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Infiesta, J.T., Guimar\u00e3es, C., Contreras, L.M., and de la Oliva, A. (2020, January 10\u201312). GANSO: Automate Network Slicing at the Transport Network Interconnecting the Edge. Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Leganes, Spain.","DOI":"10.1109\/NFV-SDN50289.2020.9289875"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","article-title":"Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions","volume":"20","author":"Afolabi","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chafika, B., Taleb, T., Phan, C.-T., Tselios, C., and Tsolis, G. (2021, January 8\u201311). Distributed AI-based Security for Massive Numbers of Network Slices in 5G & Beyond Mobile Systems. Proceedings of the 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), Porto, Portugal.","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482418"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"19691","DOI":"10.1109\/ACCESS.2018.2822398","article-title":"A Service-Oriented Deployment Policy of End-to-End Network Slicing Based on Complex Network Theory","volume":"6","author":"Guan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"14","DOI":"10.23919\/JCC.2020.08.002","article-title":"Joint resource allocation and admission control in sliced fog radio access networks","volume":"17","author":"Ai","year":"2020","journal-title":"China Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1007\/s00034-019-01226-7","article-title":"A hardware acceleration platform for AI-based inference at the edge","volume":"39","author":"Karras","year":"2020","journal-title":"Circuits Syst. Signal Process."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kukli\u0144ski, S., Ko\u0142akowski, R., Tomaszewski, L., Sanabria-Russo, L., Verikoukis, C., Phan, C.T., Zanzi, L., Devoti, F., Ksentini, A., and Tselios, C. (2021, January 7\u201310). MonB5G: AI\/ML-Capable Distributed Orchestration and Management Framework for Network Slices. Proceedings of the 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece.","DOI":"10.1109\/MeditCom49071.2021.9647681"},{"key":"ref_26","unstructured":"Ulema, M., Zuckerman, D., Chatzimisios, P., Granelli, F., Mangra, N., Markakis, E., Namuduri, K., Nikoloudakis, Y., Rawat, P., and Shakir, M.Z. (2022, March 09). Public Safety Technology Gaps and Opportunities. Available online: https:\/\/bit.ly\/3KyotXH."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCOM.2017.1700345","article-title":"Efficient Next Generation Emergency Communications over Multi-Access Edge Computing","volume":"55","author":"Markakis","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MCOM.2019.1800506","article-title":"Acceleration at the Edge for Supporting SMEs Security: The FORTIKA Paradigm","volume":"57","author":"Markakis","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Markakis, E., Nikoloudakis, Y., Pallis, E., and Manso, M. (2019, January 15\u201318). Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare. Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland.","DOI":"10.1109\/WF-IoT.2019.8767249"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/MCOM.2017.1600284CM","article-title":"EMYNOS: Next Generation Emergency Communication","volume":"55","author":"Markakis","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.inffus.2017.06.002","article-title":"Smart system for children\u2019s chronic illness monitoring","volume":"40","author":"Sendra","year":"2018","journal-title":"Inf. Fusion"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.comnet.2017.05.018","article-title":"An architecture and protocol for smart continuous eHealth monitoring using 5G","volume":"129","author":"Lloret","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Akrivopoulos, O., Zhu, N., Amaxilatis, D., Tselios, C., Anagnostopoulos, A., and Chatzigiannakis, I. (2018, January 20\u201324). A Fog Computing-Oriented, Highly Scalable IoT Framework for Monitoring Public Educational Buildings. Proceedings of the 2018 IEEE International Conference on Communications (ICC), City, MO, USA.","DOI":"10.1109\/ICC.2018.8422489"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3375\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:02:47Z","timestamp":1760137367000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/9\/3375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,28]]},"references-count":33,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["s22093375"],"URL":"https:\/\/doi.org\/10.3390\/s22093375","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,4,28]]}}}