SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6731
Authorization For Wearable Biomedical
Gadgets Monitoring System
Nallareddy Suchitra 1 , S.G.Sanjana2 ,L.Raji3, Dr K.Vijaya4 , J.Swetha5
1Nallareddy Suchitra, R.M.K Engineering College, Chennai, Tamil Nadu
2S.G.Sanjana, R.M.K Engineering College, Chennai, Tamil Nadu
3L.Raji, R.M.K Engineering College, Chennai, Tamil Nadu
4Dr K.Vijaya, R.M.K Engineering College, Chennai, Tamil Nadu
5J.Swetha, R.M.K Engineering College, Chennai, Tamil Nadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The cloud computing and IOT technologies have
succeed a lot of attention amidst the human race over a past
few years. But, the cloud and IOT experience a major security
issue. The information stored in the cloud database have only
some access to its end users but it is little hardtopreservefrom
discrete service providers. The existing technologies face high
computation and high communication cost which are
vulnerable to active attacks, where its essentiality has been
reduced in the real-world application. So, we propose a user
based cloud authentication scheme for securing the stored
medical data. The user and the wearable sensor node develops
a mutual authentication and establish a secret session key for
secure communications in the future. Hence, we use Real-Or-
Random(ROR) model and Automated Validation of Internet
Security Protocols and Applications(AVISPA) for securing the
medical data and from attacks.
Key Words: Wearable Device, Healthcare,Big
Data, Cloud Computing, Authentication,Security.
1 .INTRODUCTION
The major concerns in cloud computing are security
and confidentiality as users have limited access on the
stored data at the distant locations managed by
different service providers. These components can be
used to build advanced components in future network.
The Cloud and IoT are integrated as cloud IoT model
where it can be used together to provide services
including wearable healthcareapplications.Nowadays,
the people are very interested in buying wearable
devices such as smart watches and bracelets, wearable
sleep aid devices, Etc which are availableinthemarket.
In recent years, due to the advancement in the
technologiesthewearablegadgetshasbeenused bythe
people in a tremendous way .Due to the high sampling
rate in the wearable device the data produced from it
needs to be stored and handled carefully at the cloud
centric data server. A wearable sensor-based medical
system includes varioussensordevicesthatareflexibly
worn on different parts of the body of a person ,
including into textile fiber, clothes, elastic bands or
even these can be directly attached to the human body
in case the devices are implantablemedicaldeviceslike
pacemaker. The wearable sensors measure
physiological data like electromyography,
electrocardiogram,bodytemperature,heartrate,blood
pressure, arterial oxygen saturation (SpO2), etc. The
advances in wireless communication has won against
the geographicalbarriers.Inthiswork,ascenariointhe
Cloud of Things Centric (CoTC) for a smart healthcare
system is considered, where a set of wearable sensor
nodes are embedded.SinceIoTdevicesproducealarge
amount of non-structured or semi-structureddata,the
collected big data has three characteristics, such as
volume, variety, and velocity. As the cloud offers
virtually unlimited, on-demand storage capacity and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6732
cheap price, it is the most suitable and cost effective
solution to deal with big data produced by IoT devices.
2. RELATED WORK
2.1 Wearable Biomedical Parameter Monitoring
System
There are some blind patients in one ward; also elder
patients are there so it could not be handled by one
caretaker or doctor. Hence to overcome these
shortcomings creation of Wearable technique is
introduced. The necessitiesofthesystemarethatevery
patient should wear this band which would be
connected to doctors 2018 computer server
microcontroller via internet. The development of
remote healthcare monitoring system is done by
programming the r for making a wearable device using
patient's physiological parameters which are logged at
that instance and activity of patients can be viewed at
the doctor's screen.
2.2 A health remote monitoring application based
on wireless body area networks
Among the importantresearchprojectsmuchdeployed
in healthcare field there is the wireless body Area
networks(WBANs)applications,whichcanwidelyhelp
to remote monitor the human health. This research
aims to develop a wearable WBAN application for
health remote monitoring, that monitor patient's
health through the continuous detection, process and
communicate of human physiologicalparameters.This
application use four biomedical sensor nodes that are
able to measure physiological signal (ECG, SPO2, heart
rate and breathing) and convert it to useful data. Then,
the data is transmitted by a processor and then sent to
a central node by a transceiver. The data is collected
and send to monitoring pc in real time, which projects
and records the physiological parameters on a
graphical interface.
3. PROPOSED SYSTEM
This paper introduces a cloudlet based healthcare
system. The body data gained by wearable gadgets are
sent to the nearby cloudlet. Those data are further sent
to the remote cloud where doctors can access for
disease diagnosis. According to data deliverychain, we
divide the security form into three stages. Initially,
user’s necessary signs collected by wearable gadgets
are sent to a closet gateway of cloudlet. During this
process, data security is the main problem. In the next
stage, user’s data will be further sent toward remote
cloud through cloudlets. A cloudlet is gathered by a
certain number of mobile devices whose owners may
need and/or share some specific data contents. Thus,
both security and data sharing are considered in this
stage.Especially, we use trust model to test trust level
between users to determine sharing data or not. Based
on the medical data storedincloud,weprovidesecurity
policy and protection. We also use collaborative IDS to
protect cloud ecosystem in cloudlet mesh.
4. ARCHITECTURE DIAGRAM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6733
5. METHODOLOGIES
5.1 SETUP PHASE
This phase comprises the following steps: Step 1. The
BRC first chooses a long-term secret session key K for
the Cloud of Things Centric (CoTC).TheBRCthenpicks
a unique identity and a unique master key for each
deployed wearable sensor node. After that the BRC
calculates the secret key and the corresponding secret
credential for each wearable node.Step2.TheBRCalso
selectsacryptographiccollisionresistantone-wayhash
function h. Moreover, the BRC generates two distinct
large primes p and q, and calculates the modulus n = p
× q, where p and q are secret with the BRC and CoT C.
Step 3. Finally, the BRC stores the information in CoT
C’s database.
5.2 REGISTRATION PHASE
The registration phase deals with boththeuserandthe
patient. This phase takes place onlyinofflinemodeand
it is a one-time procedure.Medical Professional
Registration Phase: Step1:User first picks his/her
identity & password on his/her choice, and then
generates two random numbers. The user then
computespseudo-identity,pseudopassword.Afterthat
the user dispatches the registration request to the BRC
securely. Step 2: The BRC chooses a 160-bit random
number for User . Step 3. The BRC generates a 160-bit
secret key to be used between User and all the
deployed sensor nodes . After that the BRC calculates
the temporal credential T for each sensor node . In
addition, the BRC generates a 160-bit secret key to be
shared between user andCoT C, and also calculatesthe
temporal credential for User . The BRC generates a
smart card with the information and delivers it to user
securely. Step 4 . After receiving smartcardfortheuser
securely, it stores all the information in the memory.
User Registration Phase: In this phase, a patient first
selects and forwards his/her nametotheBRC.TheBRC
then selects appropriate sensor kits and appoints a
medical professional. Finally, the BRC forwards
patient’s identity and the required information of
sensors to the appointed medical professional so that
the user can acquire the live data from the wearable
devices that are worn by the patient.
5.3 PRE-DEPLOYMENT
This phase is performed by the BRC in offline mode.
Finally, the BRC stores the information in the cloud
server.
5.4 LOGIN AND AUTHENTICATION PHASE
In this phase, the participants (user, cloud, wearable
sensor node) are mutually authenticated each other,
and at the end, a session key is established between
user and node . The details are presented as follows:
Step 1. User inserts smart card in a specific terminal
and then provides identity & password into the
smartcard reading device as inputs. If the verification
fails, Smart card rejects the login request; otherwise, it
proceeds to the next step. Step 2. Smart card selects an
accessed sensor identity , generatescurrenttimestamp
to undergo the calculations , and then dispatches the
login request message to CoT C openly. Step 3.On
successful verification, CoT C decrypts using the secret
parameters p and q with the help of the Chinese
Remainder Theorem (CRT) to retrieve. If there is no
match found, CoT C aborts this phase. Iftheverification
fails, CoT C rejects the login request. Otherwise, CoT C
moves to the next step. Step 4. CoT C then computes
and fetches the timestamp corresponding to identity
and generates a random nonce and current timestamp
to compute key and then transmits the authentication
request message 2. Step5.Sensornodealsogeneratesa
random nonce and current timestamp T3 for the
purpose of computing a session key shared with User ,
and then dispatches the authentication reply message
to User via public channel.Step6.OnreceivingMessage
from Sensor node , User firstchecks.Herethereceiving
time of Message is T ∗ 3 . Step 7. If the above
verification fails, the process is terminated.Thus,atthe
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6734
end of this phase, both User and Sensor node reserve
the same session key for communication securely.
5.5 PASSWORD CHANGE PHASE
This phase is executed by a registered medical
professional (user) in order to change his/her current
password by a new password. The following steps are
essential to complete this phase: Step 1. User first
inserts his/her smart card intoasmartcardreaderand
then provides identity andcurrentpassword asinputs.
Smartcard then calculates Pseudo identity, pseudo-
password and verifies . If this verification fails, Smart
card terminate this process.Otherwise,Smartcardasks
user to input new password and continues to the next
step. Step 2. User picks a new password and supplies
to Smartcard . Smart card computes new pseudo-
password. Step 3. User updates Register , Session key
respectively. Finally, the smart card contains the
information.
5.6 SMART CARD REVOCATION PHASE
If the smart card of an authorized registered user is
stolen/lost, the following steps are essential for
obtaining a new smart card : Step 1. User keeps the
same identity , but chooses a password thenpickstwo
random number , and computes pseudo-identity,
pseudo password and then sends the registration
request to the BRC securely.Step 2. On receiving
pseudo-identity,pseudo password the BRC chooses a
160-bit random number , generates registration
timestamp for User , computes an authenticator . The
BRC then stores pseudo-identity , in CoT C’s database
in place of pseudo-identity , for further use
corresponding to User . After that the BRC generates a
new smart card new with the information anddelivers
it to User securely. Step 3. After receiving new
smartcard , User computes a new register .User
replaces a new register respectively. The smart card
then contains the informationForsecurityreason,User
discards A new register from Smartcard memory.
5.7 DYNAMIC WEARABLE SENSOR ADDITION
PHASE
For deployment of a new wearable sensor node, say
Sensor node in the existing network, the BRC does the
following steps in offline mode: Step 1. The BRC picks a
unique identity ,newSensor node and a unique master
key . After that the BRC calculates the secret key using
its own secret key K and the corresponding secret
credential Step 2. Finally, the BRC stores the
information and into Sensor node’ s memory before its
deployment.
6. RESULT
6.1 REGISTER DATABASE
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6735
6.2 SENSOR DATABASE
6.3 PATIENT MEDICAL INFORMATION DATABASE
7. CONCLUSION
In this paper, we checked the secureprivacyprotection
problem andsharing of medical data in larger amounts
in cloud. For the secure collection of data and low
communication cost, we generated a systemwhichwill
not allow users to transfer data to the remote cloud.
But, it allow users to transmit data to a cloudlet, that is
used to trigger thedatasharingprobleminthecloudlet.
Initially, we can use wearable gadgets to collect users’
information, and the transmission of users’ data in
order to ensure privacy of the users, we use NTRU
mechanism. After the initial process,we use trust
model to measure users’ for the purpose of sharing
information in the cloudlet and trust level to check
whether to share data or not. Further, for securing of
remote cloud data, we divided the data stored in the
remote cloud and encrypt the data in several ways, it is
not only used to protect information but to accelerate
the transmission efficacy. Finally, we introduced
collaborative IDS based on cloudlet mesh to secure the
entire system. The proposed schemes are processed
with simulations and experiments.
8. REFERENCES
[1] Deshpande, Vaibhav V., and Arvind R. Bhagat Patil.
"Energy efficient clustering in wireless sensornetwork
using a cluster of cluster heads." In 2013 Tenth
International Conference on Wireless and Optical
Communications Networks (WOCN), pp. 1-5. IEEE,
2013.
[2] Boulis, Athanassios, and Mani Srivastava.
"Node-level energy management for sensor networks
in the presence of multiple applications." Wireless
Networks 10, no. 6 (2004): 737-746.
[3] Jabbar, Sohail, Abid Ali Minhas, Anand Paul, and
Seungmin Rho. "Multilayer cluster designingalgorithm
for lifetime improvementofwirelesssensornetworks."
The journal of Supercomputing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6736
70, no. 1 (2014): 104-132.
[4] Jan, Hilal, Anand Paul, Abid Ali Minhas, Awais
Ahmad,
Sohail Jabbar, and Mucheoul Kim. "Dependability and
reliability analysis of intra cluster routing technique."
Peer-to-Peer Networking and Applications 8, no. 5
(2015): 838-850.
[5] Ahmad, Awais, M. Mazhar Rathore, Anand Paul,and
Bo-Wei Chen. "Data transmissionscheme using mobile
sink in static wireless sensor network." Journal of
Sensors 2015 (2015).
[6] Ahmad, Awais, Sohail Jabbar, Anand Paul, and
Seungmin Rho. "Mobility aware energy efficient
congestion control in mobilewirelesssensornetwork."
International Journal of Distributed Sensor Networks
2014 (2014).
[7]Song, Min, and Bei He. "Capacity analysis for flatand
clustered wireless sensor networks." In Wireless
Algorithms, Systems and Applications, 2007. WASA
2007. International Conference on, pp. 249-253. IEEE,
2007.
[8] Iwata, Atsushi, Ching-Chuan Chiang, Guangyu Pei,
Mario
Gerla, and Tsu-Wei Chen. "Scalable routing strategies
for ad hoc wireless networks."IEEEjournalonSelected
Areas inCommunications 17, no. 8 (1999):1369-1379.
[9] Singh, Shio Kumar, M. P. Singh, and D. K. Singh.
"A survey of energy-efficienthierarchicalcluster-based
routing in wireless sensor networks." International
Journal of Advanced Networking and Application
(IJANA) 2, no. 02 (2010): 570-580.
[10] Yatika, Vikram nandal. “Increase throughput of a
network through wireless sensor network.”
International Journal of Computer Science and Mobile
Computing.”
IJCSMC, vol. 3, Issue. 7, pg.310 317, 2014.
[11] Heinzelman, Wendi Rabiner, Anantha
Chandrakasan, and
Hari Balakrishnan. "Energy-efficient communication
protocolforwirelessmicrosensornetworks."InSystem
sciences, 2000. Proceedings of the 33rd annual Hawaii
international conference on, pp. 10-pp. IEEE, 2000.
[12] Handy, M. J., Marc Haase, and Dirk Timmermann.
"Low energy adaptive clustering hierarchy with
deterministic cluster-head selection." In Mobile and
Wireless Communications Network, 2002. 4th
International Workshop on, pp. 368-372. IEEE, 2002.

More Related Content

What's hot

IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
IRJET Journal
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
eSAT Publishing House
 
IRJET - IoT based Asset Tracking System
IRJET - IoT based Asset Tracking SystemIRJET - IoT based Asset Tracking System
IRJET - IoT based Asset Tracking System
IRJET Journal
 
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive PatientsIRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET Journal
 
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST THE PHYSICALLY CHALLENGED
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST  THE PHYSICALLY CHALLENGEDNECK MOVEMENT BASED WHEELCHAIR TO ASSIST  THE PHYSICALLY CHALLENGED
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST THE PHYSICALLY CHALLENGED
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNO
IRJET Journal
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET Journal
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET Journal
 
IRJET- An Efficient Health Care System for Human Anatomy using IoT
IRJET- An Efficient Health Care System for Human Anatomy using IoTIRJET- An Efficient Health Care System for Human Anatomy using IoT
IRJET- An Efficient Health Care System for Human Anatomy using IoT
IRJET Journal
 
Ijsrdv8 i10772
Ijsrdv8 i10772Ijsrdv8 i10772
Ijsrdv8 i10772
aissmsblogs
 
IRJET - A Casestudy on Zigbee based Patient Monitoring System
IRJET -  	  A Casestudy on Zigbee based Patient Monitoring SystemIRJET -  	  A Casestudy on Zigbee based Patient Monitoring System
IRJET - A Casestudy on Zigbee based Patient Monitoring System
IRJET Journal
 
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRICEXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
AM Publications,India
 
Secured Smart Healthcare Monitoring System based on IOT
Secured Smart Healthcare Monitoring System based on IOTSecured Smart Healthcare Monitoring System based on IOT
Secured Smart Healthcare Monitoring System based on IOT
Associate Professor in VSB Coimbatore
 
IRJET - Medical Analysis using Virtual Reality
IRJET - Medical Analysis using Virtual RealityIRJET - Medical Analysis using Virtual Reality
IRJET - Medical Analysis using Virtual Reality
IRJET Journal
 
Survey of a Symptoms Monitoring System for Covid-19
Survey of a Symptoms Monitoring System for Covid-19Survey of a Symptoms Monitoring System for Covid-19
Survey of a Symptoms Monitoring System for Covid-19
vivatechijri
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
 
Business Plan: Health Monitoring System
Business Plan: Health Monitoring SystemBusiness Plan: Health Monitoring System
Business Plan: Health Monitoring SystemSunil Kumar
 
IRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat AuthenticationIRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat Authentication
IRJET Journal
 
IRJET - Fabricating Intelligent Ankle Boot for Dementia Patient
IRJET - Fabricating Intelligent Ankle Boot for Dementia PatientIRJET - Fabricating Intelligent Ankle Boot for Dementia Patient
IRJET - Fabricating Intelligent Ankle Boot for Dementia Patient
IRJET Journal
 

What's hot (19)

IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
 
IRJET - IoT based Asset Tracking System
IRJET - IoT based Asset Tracking SystemIRJET - IoT based Asset Tracking System
IRJET - IoT based Asset Tracking System
 
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive PatientsIRJET-  	  An IoT based Remote HRV Monitoring System for Hypertensive Patients
IRJET- An IoT based Remote HRV Monitoring System for Hypertensive Patients
 
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST THE PHYSICALLY CHALLENGED
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST  THE PHYSICALLY CHALLENGEDNECK MOVEMENT BASED WHEELCHAIR TO ASSIST  THE PHYSICALLY CHALLENGED
NECK MOVEMENT BASED WHEELCHAIR TO ASSIST THE PHYSICALLY CHALLENGED
 
IRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNO
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
 
IRJET- An Efficient Health Care System for Human Anatomy using IoT
IRJET- An Efficient Health Care System for Human Anatomy using IoTIRJET- An Efficient Health Care System for Human Anatomy using IoT
IRJET- An Efficient Health Care System for Human Anatomy using IoT
 
Ijsrdv8 i10772
Ijsrdv8 i10772Ijsrdv8 i10772
Ijsrdv8 i10772
 
IRJET - A Casestudy on Zigbee based Patient Monitoring System
IRJET -  	  A Casestudy on Zigbee based Patient Monitoring SystemIRJET -  	  A Casestudy on Zigbee based Patient Monitoring System
IRJET - A Casestudy on Zigbee based Patient Monitoring System
 
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRICEXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
 
Secured Smart Healthcare Monitoring System based on IOT
Secured Smart Healthcare Monitoring System based on IOTSecured Smart Healthcare Monitoring System based on IOT
Secured Smart Healthcare Monitoring System based on IOT
 
IRJET - Medical Analysis using Virtual Reality
IRJET - Medical Analysis using Virtual RealityIRJET - Medical Analysis using Virtual Reality
IRJET - Medical Analysis using Virtual Reality
 
Survey of a Symptoms Monitoring System for Covid-19
Survey of a Symptoms Monitoring System for Covid-19Survey of a Symptoms Monitoring System for Covid-19
Survey of a Symptoms Monitoring System for Covid-19
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
Business Plan: Health Monitoring System
Business Plan: Health Monitoring SystemBusiness Plan: Health Monitoring System
Business Plan: Health Monitoring System
 
IRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat AuthenticationIRJET- Automatic Recognition using Heartbeat Authentication
IRJET- Automatic Recognition using Heartbeat Authentication
 
IRJET - Fabricating Intelligent Ankle Boot for Dementia Patient
IRJET - Fabricating Intelligent Ankle Boot for Dementia PatientIRJET - Fabricating Intelligent Ankle Boot for Dementia Patient
IRJET - Fabricating Intelligent Ankle Boot for Dementia Patient
 

Similar to IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System

IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET Journal
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET Journal
 
IRJET- Design and Implementation of Health Monitoring System
IRJET-  	  Design and Implementation of Health Monitoring SystemIRJET-  	  Design and Implementation of Health Monitoring System
IRJET- Design and Implementation of Health Monitoring System
IRJET Journal
 
ealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Reviewealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Review
IRJET Journal
 
IoT Based Patient Monitoring System
IoT Based Patient Monitoring SystemIoT Based Patient Monitoring System
IoT Based Patient Monitoring System
IRJET Journal
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET Journal
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
IRJET Journal
 
IoT Based Patient Biomedical Signal Tracking System
IoT Based Patient Biomedical Signal Tracking SystemIoT Based Patient Biomedical Signal Tracking System
IoT Based Patient Biomedical Signal Tracking System
IRJET Journal
 
A Review Paper on Doctorless Intelligent Covid Center
A Review Paper on Doctorless Intelligent Covid CenterA Review Paper on Doctorless Intelligent Covid Center
A Review Paper on Doctorless Intelligent Covid Center
IRJET Journal
 
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET- Implementation of Cloud based Health Care Monitoring System using IoTIRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET Journal
 
Android Based Patient Health Monitoring System
Android Based Patient Health Monitoring SystemAndroid Based Patient Health Monitoring System
Android Based Patient Health Monitoring System
IRJET Journal
 
IOT – Based Health Monitoring System
IOT – Based Health Monitoring SystemIOT – Based Health Monitoring System
IOT – Based Health Monitoring System
IRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET Journal
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET Journal
 
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
IRJET Journal
 
IRJET- Virtual Assistant for Medical Emergency
IRJET-  	  Virtual Assistant for Medical EmergencyIRJET-  	  Virtual Assistant for Medical Emergency
IRJET- Virtual Assistant for Medical Emergency
IRJET Journal
 
HEART RATE MONITORING SYSTEM USING IOT
HEART RATE MONITORING SYSTEM USING IOTHEART RATE MONITORING SYSTEM USING IOT
HEART RATE MONITORING SYSTEM USING IOT
IRJET Journal
 
Applications of Sensors to Detect the Behavior of Human. A Survey Paper
Applications of Sensors to Detect the Behavior of Human. A Survey PaperApplications of Sensors to Detect the Behavior of Human. A Survey Paper
Applications of Sensors to Detect the Behavior of Human. A Survey Paper
IRJET Journal
 

Similar to IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System (20)

IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
 
IRJET- Design and Implementation of Health Monitoring System
IRJET-  	  Design and Implementation of Health Monitoring SystemIRJET-  	  Design and Implementation of Health Monitoring System
IRJET- Design and Implementation of Health Monitoring System
 
ealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Reviewealth Monitoring System in Emergency Using IoT: A Review
ealth Monitoring System in Emergency Using IoT: A Review
 
IoT Based Patient Monitoring System
IoT Based Patient Monitoring SystemIoT Based Patient Monitoring System
IoT Based Patient Monitoring System
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
 
IoT Based Patient Biomedical Signal Tracking System
IoT Based Patient Biomedical Signal Tracking SystemIoT Based Patient Biomedical Signal Tracking System
IoT Based Patient Biomedical Signal Tracking System
 
A Review Paper on Doctorless Intelligent Covid Center
A Review Paper on Doctorless Intelligent Covid CenterA Review Paper on Doctorless Intelligent Covid Center
A Review Paper on Doctorless Intelligent Covid Center
 
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET- Implementation of Cloud based Health Care Monitoring System using IoTIRJET- Implementation of Cloud based Health Care Monitoring System using IoT
IRJET- Implementation of Cloud based Health Care Monitoring System using IoT
 
Android Based Patient Health Monitoring System
Android Based Patient Health Monitoring SystemAndroid Based Patient Health Monitoring System
Android Based Patient Health Monitoring System
 
IOT – Based Health Monitoring System
IOT – Based Health Monitoring SystemIOT – Based Health Monitoring System
IOT – Based Health Monitoring System
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
 
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoT
 
IRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoTIRJET- Body Sensor Network using Raspberry Pi3: IoT
IRJET- Body Sensor Network using Raspberry Pi3: IoT
 
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
Implementation of IOT based Student Healthcare Monitoring and Automation Boot...
 
IRJET- Virtual Assistant for Medical Emergency
IRJET-  	  Virtual Assistant for Medical EmergencyIRJET-  	  Virtual Assistant for Medical Emergency
IRJET- Virtual Assistant for Medical Emergency
 
HEART RATE MONITORING SYSTEM USING IOT
HEART RATE MONITORING SYSTEM USING IOTHEART RATE MONITORING SYSTEM USING IOT
HEART RATE MONITORING SYSTEM USING IOT
 
Applications of Sensors to Detect the Behavior of Human. A Survey Paper
Applications of Sensors to Detect the Behavior of Human. A Survey PaperApplications of Sensors to Detect the Behavior of Human. A Survey Paper
Applications of Sensors to Detect the Behavior of Human. A Survey Paper
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6731 Authorization For Wearable Biomedical Gadgets Monitoring System Nallareddy Suchitra 1 , S.G.Sanjana2 ,L.Raji3, Dr K.Vijaya4 , J.Swetha5 1Nallareddy Suchitra, R.M.K Engineering College, Chennai, Tamil Nadu 2S.G.Sanjana, R.M.K Engineering College, Chennai, Tamil Nadu 3L.Raji, R.M.K Engineering College, Chennai, Tamil Nadu 4Dr K.Vijaya, R.M.K Engineering College, Chennai, Tamil Nadu 5J.Swetha, R.M.K Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The cloud computing and IOT technologies have succeed a lot of attention amidst the human race over a past few years. But, the cloud and IOT experience a major security issue. The information stored in the cloud database have only some access to its end users but it is little hardtopreservefrom discrete service providers. The existing technologies face high computation and high communication cost which are vulnerable to active attacks, where its essentiality has been reduced in the real-world application. So, we propose a user based cloud authentication scheme for securing the stored medical data. The user and the wearable sensor node develops a mutual authentication and establish a secret session key for secure communications in the future. Hence, we use Real-Or- Random(ROR) model and Automated Validation of Internet Security Protocols and Applications(AVISPA) for securing the medical data and from attacks. Key Words: Wearable Device, Healthcare,Big Data, Cloud Computing, Authentication,Security. 1 .INTRODUCTION The major concerns in cloud computing are security and confidentiality as users have limited access on the stored data at the distant locations managed by different service providers. These components can be used to build advanced components in future network. The Cloud and IoT are integrated as cloud IoT model where it can be used together to provide services including wearable healthcareapplications.Nowadays, the people are very interested in buying wearable devices such as smart watches and bracelets, wearable sleep aid devices, Etc which are availableinthemarket. In recent years, due to the advancement in the technologiesthewearablegadgetshasbeenused bythe people in a tremendous way .Due to the high sampling rate in the wearable device the data produced from it needs to be stored and handled carefully at the cloud centric data server. A wearable sensor-based medical system includes varioussensordevicesthatareflexibly worn on different parts of the body of a person , including into textile fiber, clothes, elastic bands or even these can be directly attached to the human body in case the devices are implantablemedicaldeviceslike pacemaker. The wearable sensors measure physiological data like electromyography, electrocardiogram,bodytemperature,heartrate,blood pressure, arterial oxygen saturation (SpO2), etc. The advances in wireless communication has won against the geographicalbarriers.Inthiswork,ascenariointhe Cloud of Things Centric (CoTC) for a smart healthcare system is considered, where a set of wearable sensor nodes are embedded.SinceIoTdevicesproducealarge amount of non-structured or semi-structureddata,the collected big data has three characteristics, such as volume, variety, and velocity. As the cloud offers virtually unlimited, on-demand storage capacity and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6732 cheap price, it is the most suitable and cost effective solution to deal with big data produced by IoT devices. 2. RELATED WORK 2.1 Wearable Biomedical Parameter Monitoring System There are some blind patients in one ward; also elder patients are there so it could not be handled by one caretaker or doctor. Hence to overcome these shortcomings creation of Wearable technique is introduced. The necessitiesofthesystemarethatevery patient should wear this band which would be connected to doctors 2018 computer server microcontroller via internet. The development of remote healthcare monitoring system is done by programming the r for making a wearable device using patient's physiological parameters which are logged at that instance and activity of patients can be viewed at the doctor's screen. 2.2 A health remote monitoring application based on wireless body area networks Among the importantresearchprojectsmuchdeployed in healthcare field there is the wireless body Area networks(WBANs)applications,whichcanwidelyhelp to remote monitor the human health. This research aims to develop a wearable WBAN application for health remote monitoring, that monitor patient's health through the continuous detection, process and communicate of human physiologicalparameters.This application use four biomedical sensor nodes that are able to measure physiological signal (ECG, SPO2, heart rate and breathing) and convert it to useful data. Then, the data is transmitted by a processor and then sent to a central node by a transceiver. The data is collected and send to monitoring pc in real time, which projects and records the physiological parameters on a graphical interface. 3. PROPOSED SYSTEM This paper introduces a cloudlet based healthcare system. The body data gained by wearable gadgets are sent to the nearby cloudlet. Those data are further sent to the remote cloud where doctors can access for disease diagnosis. According to data deliverychain, we divide the security form into three stages. Initially, user’s necessary signs collected by wearable gadgets are sent to a closet gateway of cloudlet. During this process, data security is the main problem. In the next stage, user’s data will be further sent toward remote cloud through cloudlets. A cloudlet is gathered by a certain number of mobile devices whose owners may need and/or share some specific data contents. Thus, both security and data sharing are considered in this stage.Especially, we use trust model to test trust level between users to determine sharing data or not. Based on the medical data storedincloud,weprovidesecurity policy and protection. We also use collaborative IDS to protect cloud ecosystem in cloudlet mesh. 4. ARCHITECTURE DIAGRAM
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6733 5. METHODOLOGIES 5.1 SETUP PHASE This phase comprises the following steps: Step 1. The BRC first chooses a long-term secret session key K for the Cloud of Things Centric (CoTC).TheBRCthenpicks a unique identity and a unique master key for each deployed wearable sensor node. After that the BRC calculates the secret key and the corresponding secret credential for each wearable node.Step2.TheBRCalso selectsacryptographiccollisionresistantone-wayhash function h. Moreover, the BRC generates two distinct large primes p and q, and calculates the modulus n = p × q, where p and q are secret with the BRC and CoT C. Step 3. Finally, the BRC stores the information in CoT C’s database. 5.2 REGISTRATION PHASE The registration phase deals with boththeuserandthe patient. This phase takes place onlyinofflinemodeand it is a one-time procedure.Medical Professional Registration Phase: Step1:User first picks his/her identity & password on his/her choice, and then generates two random numbers. The user then computespseudo-identity,pseudopassword.Afterthat the user dispatches the registration request to the BRC securely. Step 2: The BRC chooses a 160-bit random number for User . Step 3. The BRC generates a 160-bit secret key to be used between User and all the deployed sensor nodes . After that the BRC calculates the temporal credential T for each sensor node . In addition, the BRC generates a 160-bit secret key to be shared between user andCoT C, and also calculatesthe temporal credential for User . The BRC generates a smart card with the information and delivers it to user securely. Step 4 . After receiving smartcardfortheuser securely, it stores all the information in the memory. User Registration Phase: In this phase, a patient first selects and forwards his/her nametotheBRC.TheBRC then selects appropriate sensor kits and appoints a medical professional. Finally, the BRC forwards patient’s identity and the required information of sensors to the appointed medical professional so that the user can acquire the live data from the wearable devices that are worn by the patient. 5.3 PRE-DEPLOYMENT This phase is performed by the BRC in offline mode. Finally, the BRC stores the information in the cloud server. 5.4 LOGIN AND AUTHENTICATION PHASE In this phase, the participants (user, cloud, wearable sensor node) are mutually authenticated each other, and at the end, a session key is established between user and node . The details are presented as follows: Step 1. User inserts smart card in a specific terminal and then provides identity & password into the smartcard reading device as inputs. If the verification fails, Smart card rejects the login request; otherwise, it proceeds to the next step. Step 2. Smart card selects an accessed sensor identity , generatescurrenttimestamp to undergo the calculations , and then dispatches the login request message to CoT C openly. Step 3.On successful verification, CoT C decrypts using the secret parameters p and q with the help of the Chinese Remainder Theorem (CRT) to retrieve. If there is no match found, CoT C aborts this phase. Iftheverification fails, CoT C rejects the login request. Otherwise, CoT C moves to the next step. Step 4. CoT C then computes and fetches the timestamp corresponding to identity and generates a random nonce and current timestamp to compute key and then transmits the authentication request message 2. Step5.Sensornodealsogeneratesa random nonce and current timestamp T3 for the purpose of computing a session key shared with User , and then dispatches the authentication reply message to User via public channel.Step6.OnreceivingMessage from Sensor node , User firstchecks.Herethereceiving time of Message is T ∗ 3 . Step 7. If the above verification fails, the process is terminated.Thus,atthe
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6734 end of this phase, both User and Sensor node reserve the same session key for communication securely. 5.5 PASSWORD CHANGE PHASE This phase is executed by a registered medical professional (user) in order to change his/her current password by a new password. The following steps are essential to complete this phase: Step 1. User first inserts his/her smart card intoasmartcardreaderand then provides identity andcurrentpassword asinputs. Smartcard then calculates Pseudo identity, pseudo- password and verifies . If this verification fails, Smart card terminate this process.Otherwise,Smartcardasks user to input new password and continues to the next step. Step 2. User picks a new password and supplies to Smartcard . Smart card computes new pseudo- password. Step 3. User updates Register , Session key respectively. Finally, the smart card contains the information. 5.6 SMART CARD REVOCATION PHASE If the smart card of an authorized registered user is stolen/lost, the following steps are essential for obtaining a new smart card : Step 1. User keeps the same identity , but chooses a password thenpickstwo random number , and computes pseudo-identity, pseudo password and then sends the registration request to the BRC securely.Step 2. On receiving pseudo-identity,pseudo password the BRC chooses a 160-bit random number , generates registration timestamp for User , computes an authenticator . The BRC then stores pseudo-identity , in CoT C’s database in place of pseudo-identity , for further use corresponding to User . After that the BRC generates a new smart card new with the information anddelivers it to User securely. Step 3. After receiving new smartcard , User computes a new register .User replaces a new register respectively. The smart card then contains the informationForsecurityreason,User discards A new register from Smartcard memory. 5.7 DYNAMIC WEARABLE SENSOR ADDITION PHASE For deployment of a new wearable sensor node, say Sensor node in the existing network, the BRC does the following steps in offline mode: Step 1. The BRC picks a unique identity ,newSensor node and a unique master key . After that the BRC calculates the secret key using its own secret key K and the corresponding secret credential Step 2. Finally, the BRC stores the information and into Sensor node’ s memory before its deployment. 6. RESULT 6.1 REGISTER DATABASE
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6735 6.2 SENSOR DATABASE 6.3 PATIENT MEDICAL INFORMATION DATABASE 7. CONCLUSION In this paper, we checked the secureprivacyprotection problem andsharing of medical data in larger amounts in cloud. For the secure collection of data and low communication cost, we generated a systemwhichwill not allow users to transfer data to the remote cloud. But, it allow users to transmit data to a cloudlet, that is used to trigger thedatasharingprobleminthecloudlet. Initially, we can use wearable gadgets to collect users’ information, and the transmission of users’ data in order to ensure privacy of the users, we use NTRU mechanism. After the initial process,we use trust model to measure users’ for the purpose of sharing information in the cloudlet and trust level to check whether to share data or not. Further, for securing of remote cloud data, we divided the data stored in the remote cloud and encrypt the data in several ways, it is not only used to protect information but to accelerate the transmission efficacy. Finally, we introduced collaborative IDS based on cloudlet mesh to secure the entire system. The proposed schemes are processed with simulations and experiments. 8. REFERENCES [1] Deshpande, Vaibhav V., and Arvind R. Bhagat Patil. "Energy efficient clustering in wireless sensornetwork using a cluster of cluster heads." In 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1-5. IEEE, 2013. [2] Boulis, Athanassios, and Mani Srivastava. "Node-level energy management for sensor networks in the presence of multiple applications." Wireless Networks 10, no. 6 (2004): 737-746. [3] Jabbar, Sohail, Abid Ali Minhas, Anand Paul, and Seungmin Rho. "Multilayer cluster designingalgorithm for lifetime improvementofwirelesssensornetworks." The journal of Supercomputing
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6736 70, no. 1 (2014): 104-132. [4] Jan, Hilal, Anand Paul, Abid Ali Minhas, Awais Ahmad, Sohail Jabbar, and Mucheoul Kim. "Dependability and reliability analysis of intra cluster routing technique." Peer-to-Peer Networking and Applications 8, no. 5 (2015): 838-850. [5] Ahmad, Awais, M. Mazhar Rathore, Anand Paul,and Bo-Wei Chen. "Data transmissionscheme using mobile sink in static wireless sensor network." Journal of Sensors 2015 (2015). [6] Ahmad, Awais, Sohail Jabbar, Anand Paul, and Seungmin Rho. "Mobility aware energy efficient congestion control in mobilewirelesssensornetwork." International Journal of Distributed Sensor Networks 2014 (2014). [7]Song, Min, and Bei He. "Capacity analysis for flatand clustered wireless sensor networks." In Wireless Algorithms, Systems and Applications, 2007. WASA 2007. International Conference on, pp. 249-253. IEEE, 2007. [8] Iwata, Atsushi, Ching-Chuan Chiang, Guangyu Pei, Mario Gerla, and Tsu-Wei Chen. "Scalable routing strategies for ad hoc wireless networks."IEEEjournalonSelected Areas inCommunications 17, no. 8 (1999):1369-1379. [9] Singh, Shio Kumar, M. P. Singh, and D. K. Singh. "A survey of energy-efficienthierarchicalcluster-based routing in wireless sensor networks." International Journal of Advanced Networking and Application (IJANA) 2, no. 02 (2010): 570-580. [10] Yatika, Vikram nandal. “Increase throughput of a network through wireless sensor network.” International Journal of Computer Science and Mobile Computing.” IJCSMC, vol. 3, Issue. 7, pg.310 317, 2014. [11] Heinzelman, Wendi Rabiner, Anantha Chandrakasan, and Hari Balakrishnan. "Energy-efficient communication protocolforwirelessmicrosensornetworks."InSystem sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, pp. 10-pp. IEEE, 2000. [12] Handy, M. J., Marc Haase, and Dirk Timmermann. "Low energy adaptive clustering hierarchy with deterministic cluster-head selection." In Mobile and Wireless Communications Network, 2002. 4th International Workshop on, pp. 368-372. IEEE, 2002.