A Secure Information Forwarder for Mobile Healthcare System using Sensors

DOI : 10.17577/IJERTCONV3IS16104

Download Full-Text PDF Cite this Publication

Text Only Version

A Secure Information Forwarder for Mobile Healthcare System using Sensors

A. Santhi V. Senthil Kumar M.E

PG Scholar Assistant professor/ECE

Oxford Engineering College Oxford Engineering College Trichy Pirattiyur Trichy Pirattiyur

Abstract: A secure information forwarder for mobile healthcare system that combines mobile with sensor network to monitor the health condition of patients. The mobile Healthcare system can benefit medical users by providing high-quality healthcare monitoring, the challenges facing in m-Healthcare system, especially during a medical emergency. It provides a wide range of effective healthcare services. The sensor data measures the health parameters and is connected to the Bluetooth and 3G network, to the sensor node for wireless transmission through the internet. A visualization module of the recorded biomedical data on Android mobile devices used by patients and doctors at the end of the networks in real-time. Our approach for a mobile healthcare solution is managed to process the large amount of biomedical data combining 3G network and mobile technology for daily lifestyle to users appropriately.

Index Terms Android, Bluetooth, sensors, smart phone, 3G, server


The mobile healthcare information and communication technologies are transforming our social interactions, lifestyles, and work places. One of the most promising applications of information technology is healthcare management. Healthcare is based on the reactive responses to acute conditions to a proactive approach characterized by early detection and prevention of long term management of health conditions. The current places an emphasis on the monitoring of health conditions and the management of wellness as significant contributors to individual healthcare. This is particularly important in developed countries. The aging population, where information technology can significantly improve quality of life. In particular, the biomedical data is critical for the advancement of temperature and pressure by using sensors. Each mobile medical users personal health information (PHI) such as heart rate, blood pressure and temperature can be first collected by BSN. The sensor data transmitted to smartphone via Bluetooth. Finally, the data further transmitted to the healthcare center via networks. The collected PHI data, medical professionals at healthcare center can continuously monitor medical users. The health conditions as well quickly react to users life-threatening situations and save their lives. The healthcare center

dispatching ambulance and medical personnel to an emergency location.


    Considering the phase of the art, it is conceivable to concern that the works on user interface for mobile healthcare for people with disabilities are very specialized and distinct one. There are some researches which are concentrating on elder peoples, physically challenged people and psychical disabilities. This research develops a practical accessible interface networks figuring out the important requirements for a diversified group of impairments [1]. In [3] a framework for managing security & preserving privacy for analysis of sensor data from smart phone, without compromising on data utility is presented. In that paper they suggest a method to achieve data security & privacy throughout the complete data lifecycle. yan conferred an architecture for mobile healthcare [4] which spotlight on how an integrated system control the home. This system only pinpoints how to solve the server problems at the software level while hardware aspects were not studied. A system that could control electrical appliances using Bluetooth technology proposed by Mr.liang in the year 2010 [4].The disadvantage of this system was that it was unable to control the system remotely through a dedicated network. The embedded system which is connected to android in home is ready to receive control through bluetooth receiver. Any bluetooth enabled device is connected to that embedded system and send a command for hospital server.


    By accounting all the merits and demerits of previous related works, few things are sorted for betterment of smart home. They are listed as

    • No network area limitation

    • Importance of Android application

    • Android application should be user friendly, dynamic and universal

    • Cost effective

    As per the list the proposed system is one which control the mobile healthcare with the combination of GSM technology by using a Smart phone having an android application.

    Fig.1. Pervasive health monitoring in m-Healthcare system.

    The android application is dynamic one i.e. we can add the sensors as per our requirement and we can choose the sensor level and hospital server. It is universal to all the users.


    In case of secure information forwarder for mobile healthcare system using sensors with Bluetooth act as transmitter and the android act as receiver. This android is connected with the nearby hospital server.

    The temperature and pressure sensor will be equipped directly in the medical user. The sensor data transmitted to the healthcare center for every time period. For example, the mobile medical users health information such as heart rate, blood pressure and temperature will be collected by the medical users Smartphone.

    1. Smartphone communication

      For each sensor data transmitted to the medical center will be aggregated by the Smartphone. The medical users using Bluetooth communication. This received medical information will be transmitted to healthcare center periodically with the help of network.

    2. Healthcare center

      A secure information forwarder for mobile healthcare using the sensors. The sensor data transmitted to the Smartphone via Bluetooth. The Bluetooth information transmitted to the healthcare center for every time period. For example, the mobile medical users health information such as heart rate, blood pressure and temperature will be collected by the medical users.

    3. ATmega 528

      In this proposed design ATmega 528 act as CPU of the hardware unit. It can be programmed to bring out an enormous amount of tasks. The features of ATmega528 is given below:

      • High performance RISC CPU

      • Interrupt capability (up to 14 sources).

      • Power on Reset (POR).

      • Low power and high speed CMOS flash/EEPROM

      • Wide operating voltage range (2.0 5.56) volts.

      • High sink/source current (25mA).

    4. Bluetooth

    The serial Bluetooth products consist of Bluetooth serial interface module and Bluetooth adapter. Bluetooth is a computing and telecommunications industry specification that describes the mobile phones can easily interconnect with each other and with home and business phones and computers using a short-range wireless connection. Send a data from one electronic device to another via Bluetooth.


    Eclipse is an integrated development environment (IDE). It contains a base workspace and an extensible plug-in system for customizing the environment. The application Written mostly in Java, Eclipse can be used to develop the applications in phone. Eclipse may also be used to develop applications in other programming languages.

    The Eclipse software development kit (SDK), which includes the Java development tools, is meant for Java developers. Android Development Tools is a plug-in for the Eclipse IDE that is desined to provide an integrated environment. Its build the Android applications. ADT using the Eclipse to let developers set up new Android projects. To create an application UI, add packages based on the Android Framework API, debug their applications using the Android SDK tools, and export signed or unsigned .apk files in order to distribute their applications.

    Eclipse uses plug-ins to provide all the functionality within and on top of the runtime system. The runtime system is based on the application in smartphone, an implementation of the core framework. To allow the Eclipse Platform to be extended using other programming languages, such as C language Python language, the plug-in framework allows the Eclipse Platform to work with typesetting languages like Latex and networking applications such as telnet and database management systems. The information forwarder for mobile healthcare system creates application using the eclipse tool.


    Create app with android, eclipse software can run call service program. Google announced the availability of app inventor for eclipse, a web based visual development environment for programmers, based on open blocks java library and providing access to android devices. The eclipse software additional functions are orientation data. The phone functions are text messaging and speech to text conversion and contact data and persistent storage and web services. The AVD manager provides a graphical user interface in which create and manage android virtual

    device, which are required by the android emulator. Launch the AVD manager. An AVD is a device configuration for the android emulator that allows model different configurations of android powered devices. To create a new AVD, the first step is to launch the AVD Manager. The eclipse software used to implement the app in mobile.

    Fig 2. Eclipse AVD output

    Fig 3.database server output

    Fig 4. New user registration

    Fig 5.New user registration page

    Fig 6. Android app output


A secure information forwarder for mobile healthcare system using sensors, the Android mobile devices is successfully implemented. An information forwarder are designed and used for the measurement of temperature sensor and blood pressure sensor, while the Android mobile device is used to provide a mobile healthcare service by means of an Android application running on a Samsung device with wireless internet access. Medical users can walk outside and receive the high-quality healthcare monitoring. By combining the 3G network and mobile communication techniques, significant network extension and the higher accessibility of mobile healthcare system has been achieved. We have proposed the ideas of establishing the 3G applications. With the use of comfortable wearable sensors in global areas, the proposed mobile healthcare system promises to improve the flexibility and scalability of healthcare applications.

The query processes handle the communication between the server and Android mobile device to display the patient current location and nearby hospital on a mobile screen in real time. All the studies and implementation will be done in the next phase and any advancement if possible, is expected to be incorporated with that.


  1. R. Zhang, Y. Zhang, J. Sun, and G. Yan, Fine-Grained Private Matching for Proximity-Based Mobile Social Networking, Prof. of INFOCOM 12, pp. 1-9, 2012.

  2. R. Lu, X. Lin, X. Liang, and X. Shen, A Secure Handshake Scheme with Symptoms Matching for m-Healthcare Social Network, Mobile Networks and Applications special issue on wireless and personal comm., vol. 16, no. 6, pp. 683-694, 2011.

  3. W. Dong, V. Dave, L. Qiu, and Y. Zhang, Secure Friend Discovery in Mobile Social Networks, Prof. of INFOCOM 11, pp. 1647-1655, 2011.

  4. R. Lu, X. Lin, X. Liang, and X. Shen, Secure Handshake with Symptoms-Matching: The Essential to the Success of M healthcare Social Network, Proc. Fifth Intl Conf. Body Area Networks (BodyNets 10), 2010.

  5. Y. Ren, R.W.N. Pazzi, and A. Boukerche, Monitoring Patients via a Secure and Mobile Healthcare System, IEEE Wireless Comm., vol. 17, no. 1, pp. 59-65, Feb. 2010.

  6. A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance Evaluation of Service Execution in Opportunistic Computing, Proc. 13th ACM Intl Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM 10), pp. 291-298, 2010.

  7. M. Li, W. Lou, and K. Ren, Data Security and Privacy in Wireless Body Area Networks, IEEE Wireless Comm., vol. 17, no. 1, pp. 51- 58, Feb. 2010.

  8. J. Sun and Y. Fang, Cross-Domain Data Sharing in Distributed Electronic Health Record Systems, IEEE Trans. Parallel Distributed and Systems, vol. 21, no. 6, pp. 754-764, June 2010.

  9. M. Conti, S. Giordano, M. May, and A. Passarella, From Opportunistic Networks to Opportunistic Computing, IEEE Comm. Magazine, vol. 48, no. 9, pp. 126-139, Sept. 2010

  10. M. Conti and M. Kumar, Opportunities in Opportunistic Computing, IEEE Computer, vol. 43, no. 1, pp. 42-50, Jan. 2010

  11. A. Toninelli, R. Montanari, and A. Corradi, Enabling Secure Service Discovery in Mobile Healthcare Enterprise Networks, IEEE Wireless Comm., vol. 16, no. 3, pp. 24-32, June 2009.

  12. X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, Sage: A Strong Privacy-Preserving Scheme against Global Eavesdropping for Ehealth Systems, IEEE J. Selected Areas in Comm., vol. 27, no. 4, pp. 365-378, May 2009.

  13. M.R. Yuce, S.W.P. Ng, N.L. Myo, J.Y. Khan, and W. Liu, Wireless Body Sensor Network Using Medical Implant Band, J. Medical Systems, vol. 31, no. 6, pp. 467-474, 2007.

  14. M. Avvenuti, P. Corsini, P. Masci, and A. Vecchio, Opportunistic Computing for Wireless Sensor Networks, Proc. IEEE Intl Conf. Mobile Adhoc and Sensor Systems (MASS 07), pp. 1-6, 2007.

  15. X. Lin, X. Sun, P. Ho, and X. Shen, GSIS: A Secure and Privacy Preserving Protocol for vehicular communications, IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.

  16. A. Amirbekyan and V. Estivill-Castro, A New Efficient Privacy- Preserving Scalar Product Protocol, Proc. Sixth Australasian Conf. Data Mining and Analytics (AusDM 07), pp. 209- 214, 2007.

  17. X. Lin, X. Sun, P. Ho, and X. Shen, GSIS: A Secure and Privacy Preserving Protocol for vehicular communications, IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.

  18. J. Vaidya and C. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, Proc. Eighth ACM SIGKDD Intl Conf. Knowledge Discovery and Data Mining (KDD 02), pp. 639- 4, 2002.

  19. W. Du and M. Atallah, Privacy-Preserving Cooperative Statistical Analysis, Proc. 17th Ann. Computer Security Applications Conf. (ACSAC 01), pp. 102-111, 2001.

  20. P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. 17th Intl Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT 99), pp. 223-238, 1999.

  21. D. Boneh and M.K. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. Ann. Intl Conf. Cryptology Organized (CRYPTO 01), pp. 213-229, 2001.

  22. X. Lin, X. Sun, P. Ho, and X. Shen, GSIS: A Secure and Privacy Preserving Protocol for vehicular communications, IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.

  23. R. Lu, X. Lin, H. Zhu, and X. Shen, An Intelligent Secure and Privacy-Preserving Parking Scheme through Vehicular Communications, IEEE Trans. Vehicular Technology, vol. 59, no. 6, pp. 2772-2785, July 2010.

  24. R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in Vanets, IEEE Trans. Vehicular Technology, vol. 61, pp. 86-96, 2012.

  25. K-H. Huang, Y.-F. Chung, C.-H. Liu, F. Lai, and T.-S. Chen, Efficient Migration for Mobile Computing in Distributed Networks, Computer Standards and Interfaces, vol. 31, no. 1, pp. 40-47, 2009.

Leave a Reply