A Secure Mobile Healthcare System using Trust-Based Multicast Scheme
#1

[attachment=10638]
A Secure Mobile Healthcare System using Trust-Based Multicast Scheme
Abstract

Telecommunication technologies in telemedicine services is the progress of wireless and portable networks has wide application of mobile electronic healthcare systems. Security is a fundamental system necessity because many patients have isolation concerns when their individual information is shared over the open wireless channels. This project determines the characteristics and security problem with wireless and persistent information interactions for a mobile healthcare system. Mobile health care system consists of a number of mobile devices and sensors attached to a patient. These devices form a mobile adhoc sensor network and assemble data that are sent to a hospital or healthcare center for monitoring. In this system a protected multicast strategy is engaged to evaluate the activities of each node, so that only truthful nodes are permitted to involve in interactions. A new trust evaluation model can efficiently estimate the trustworthiness of movable healthcare devices and effectively handle medical nodes.
Existing System
Mobile healthcare services have the potential to become integral components of a modern healthcare system, in this system propose a healthcare system based on a multi-agent system(MAS) that would provide a series of services, such as mobile telemedicine, continuous monitoring, emergency processing. It improves the management efficiency of a hospital and shortens the response time to emergency cases. It does not concern with security exchange of information between the hospitals and to the corresponding patients.
Disadvantages
 Eavesdroppers can access the patient information
 Privacy of the patients information will be affected
 Confidentiality and authentication will not be achieved.
Proposed System
In this System, we innovate and design a novel trust evaluation model. We then propose a secure multicast strategy that employs trust in order to evaluate the behavior of each node, so that only trustworthy nodes are allowed to participate in communications, while the misbehavior of malicious nodes is effectively prevented. Data transmission in this system provides more security. The goals of this secure mobile healthcare system are safely exchanging the patient’s information issued by mobile Devices, and preventing improper use of illegal devices, such as intercepting transferred data, eavesdropping communicating data. TrE (Trust Evaluation Model) is based on the standard DES algorithm for communication.
Advantages
 Confidentiality achieved using symmetric cryptography algorithm, so unauthorized parties cannot access this information.
 Authentication is achieved by using Asymmetric cryptography algorithm.
 Only particular patients and medical specialist can access their medical information
 Module
 User Verification
 Wearable Devices
 Trust Evaluation
 Data Transmission
 Mobile healthcare system
 Module Description
User Verification
User verification is needed for every system to keep security and for any other misuses. Each authorized user will have a user-id /name and a password for login. This is directly giving from the system admin or manager to the users who are authorized. The users want to follow some rules and conditions while using the system, and any misbehave will lead to block of particular user-id/name.
Wearable Devices
A wearable medical device can be described as an autonomous, non-invasive system that performs a specified medical action or operation, such as monitoring or support, in collaboration with other devices in a network. The primary functions of wearable sensors normally include physiological monitoring, information storage, data transmission and instruction receiving. These devices can be directly attached to either the human body or a piece of clothing, and they thus support continuous patient monitoring. We are going to simulate each and every sensor as assuming the sensor and inserting data manually.
Trust Evaluation
Trust is defined as “the degree to which a node should be trustworthy, secure, or reliable during any interaction with the node”. The concept of trust has been introduced into mobile healthcare security with wide application in the realm of network and information security. Thereby, trust represents a mutual relationship established between any two trustworthy medical nodes (sensors) for a specific purpose: one node, called the Object, can forward packets for another node, called the Subject. Here we are going to apply algorithm to find trust based nodes.
Data Transmission
Unlike traditional hospital management schemes, where most patients only can access medical care or monitoring in a particular place at a specific time, current healthcare equipment can provide continuous monitoring of patients, as well as maximal mobility for them. Here, data communications rely on wireless channels instead of wires. However, mobility takes difficulty for data exchange as well because the requirements of the deployment of a number of infrastructures are able to increase the cost of mobile healthcare systems. We are going to simulate with maximum of two systems and it will be in wired technology.
Mobile healthcare system
Mobile healthcare (m-healthcare) is an important research direction for the application of wireless communications in healthcare systems. Therefore, many wireless technologies, including IEEE 802.11, Bluetooth, and Wi-Fi, are used to form wireless local area networks (WLAN) and connect to the Internet. Mobile networks not only provide mobility to patients, but also allow physicians so they can access patients’ data anytime and anywhere. Combination of given four modules makes a mobile health care system.
Conclusion
The introduction of mobile healthcare systems can greatly improve the benefits for patients and hospitals, by not only providing better quality of patient care, but by also reducing administrative and medical costs for both patients and hospitals. The topic of security has raised interesting research issues in wireless and pervasive healthcare networks. Here, we introduce the technique of trust evaluation without a centralized trust management authority and propose a novel trust evaluation model that can efficiently calculate the trustworthiness of mobile healthcare devices and dynamically manage medical nodes. Furthermore, we present a secure multicast mechanism based on our trust evaluation model, which offers flexible protection to dynamic and agile environments and improves the security of a pervasive and mobile healthcare system.
Software Requirement
 Operating system :- Windows XP Professional
 Front End :- Microsoft Visual Studio .Net 2008
 Coding Language :- Visual C# .Net
 Backend :-SqlServer 2005
Hardware Requirement
 System : Pentium IV 2.4 GHZ
 Hard Disk : 40 GB
 Floppy Drive : 1.44 Mb
 Monitor : 15 Vga Colour
 Mouse : Logitech.
 RAM : 256 Mb
Reply
#2
Presented by:
P.JYOTHI

[attachment=13366]
Abstract
This project determines the characteristics and security problem with wireless and persistent information interactions for a mobile healthcare system.
Mobile health care system consists of a number of mobile devices and sensors attached to a patient.
These devices form a mobile adhoc sensor network and assemble data that are sent to a hospital or healthcare center for monitoring.
Modules
User Verification
Wearable Devices
Trust Evaluation
Mobile healthcare system
Reply
#3
to get information about the topic" source code for mobile healthcare system" full report ppt and related topic refer the page link bellow

http://studentbank.in/report-a-secure-mo...e=threaded

http://studentbank.in/report-a-secure-mo...ast-scheme


Reply
#4

to get information about the topic "source code for mobile health care" related topic refer the page link bellow

http://studentbank.in/report-a-secure-mo...e=threaded

http://studentbank.in/report-a-secure-mo...ast-scheme
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mobile healthcare management system ppt, intelligent healthcare systems ltd, wearable healthcare system on textile platform pptin tamil, ge healthcare group management, seminar report for mobile healthcare systems word, e healthcare adviser, mini projects in healthcare,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,401 06-10-2016, 10:27 AM
Last Post: ijasti
  broadband mobile full report project topics 7 23,862 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,146 01-05-2015, 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 14,757 11-03-2015, 07:27 PM
Last Post: Guest
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,325 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,353 02-02-2013, 03:56 PM
Last Post: seminar details
  Seminar Report On Mobile Networking For Smart Dust Computer Science Clay 1 11,629 24-12-2012, 02:27 PM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,328 24-12-2012, 12:47 PM
Last Post: seminar details
  TWO WAY STUDENT INFORMATION SYSTEM USING CELLULAR TECHNOLOGY smart paper boy 3 3,490 24-12-2012, 11:24 AM
Last Post: seminar details
  Enhanced QoS Multicast Routing Protocol nit_cal 1 5,727 20-12-2012, 10:31 AM
Last Post: seminar details

Forum Jump: