Body Area Network For Human Health Care Monitoring System Using GSM Modem

2012 ◽  
Vol 2 (11) ◽  
pp. 173-174
Author(s):  
K. Ashokkumar K. Ashokkumar ◽  
◽  
S. Karthikeyan S. Karthikeyan
Author(s):  
Saranya Vasanthamani ◽  
S. Shankar

The wireless body area network (WBAN) consists of wearable or implantable sensor nodes, which is a technology that enables pervasive observing and delivery of health-related information and services. The network capability of body devices and integration with wireless infrastructure can result in pervasive environment deliver the information about the patients to health care service providers. WBAN has a major part in e-health observing system. Due to sensitivity and critical of the data carried and handled by WBAN, reliability becomes a critical issues. WBAN loads a high degree of reliability as it openly affects the quality of patient observing. A main requirement is that the health care professionals receive the monitored data correctly. Thus reliability can be measured to achieve reliable network are fault tolerance, QoS, and security. As WBAN is a special type of WSN. The objective is to achieve a reliable network with minimum delay and maximum throughput while considering power consumption by reducing unnecessary communication.


2011 ◽  
Vol 17 (1) ◽  
pp. 197-209 ◽  
Author(s):  
Raluca Marin-Perianu ◽  
Mihai Marin-Perianu ◽  
Paul Havinga ◽  
Simon Taylor ◽  
Rezaul Begg ◽  
...  

2021 ◽  
Author(s):  
Narahari Narasimhaiah ◽  
Rachapudi Praveen Sam

BACKGROUND Healthcare monitoring systems have emerged as one of the most vital systems and from the past decade have become technology-oriented. People face an unnecessary mortality crisis due to various diseases owing to lack of medical care for patients at the perfect time. Our goal is to develop the application for cloud based Health Care system. OBJECTIVE Cyber-attacks are the primary challenge for cloud-based control of health care. In that big serious issue in the field of health care monitoring are denial of services, problems with node failure, traffic jams between nodes and malicious attacks. METHODS In order to cope up with above challenges this work has proposed a secure structure for cloud based human health monitoring system. Initially, a novel Multidimensional Authentication design method which therefore provides the data with a secure authentication and can be prevented from intruding an unauthorized person. RESULTS Then provide an effective single new Steadiness Pawn Detection and Cybernetic Security Framework for safe and secure patient health monitoring. As a consequence, Concealment Drip Detection is suggested to improve the scalability in fog computing, which prevents intruders from information in the fog. CONCLUSIONS Therefore, by using all the above techniques in a single framework the major data risks in healthcare systems are prevented and the cloud-based health monitoring system requires more efficient monitoring of the patient's health status, thereby preserving human life on time. CLINICALTRIAL Background: Healthcare monitoring systems have emerged as one of the most vital systems and from the past decade have become technology-oriented. People face an unnecessary mortality crisis due to various diseases owing to lack of medical care for patients at the perfect time. Our goal is to develop the application for cloud based Health Care system. Objective: Cyber-attacks are the primary challenge for cloud-based control of health care. In that big serious issue in the field of health care monitoring are denial of services, problems with node failure, traffic jams between nodes and malicious attacks. Methods: In order to cope up with above challenges this work has proposed a secure structure for cloud based human health monitoring system. Initially, a novel Multidimensional Authentication design method which therefore provides the data with a secure authentication and can be prevented from intruding an unauthorized person. Results: Then provide an effective single new Steadiness Pawn Detection and Cybernetic Security Framework for safe and secure patient health monitoring. As a consequence, Concealment Drip Detection is suggested to improve the scalability in fog computing, which prevents intruders from information in the fog. Therefore, by using all the above techniques in a single framework the major data risks in healthcare systems are prevented and the cloud-based health monitoring system requires more efficient monitoring of the patient's health status, thereby preserving human life on time.


Sign in / Sign up

Export Citation Format

Share Document