IoT Enabled Smart Home and Health Monitoring System
DOI:
https://doi.org/10.32628/IJSRSET229497Keywords:
Web of Things (IoT, Internet of Things (IoT) and Building Automation Systems(BAS).Abstract
Hospital patients have a big impact on their health and are more likely to get various ailments if they don't get prompt and effective care. In recent years, it may have been challenging to observe patients. Consequently, a reply is needed. Anytime, wherever, keep track of the patients of your doctor. The solution to this is expected to be invented, according to recent Web of Things (IoT) device events. After our days, health is of the biggest significance. Researchers and practitioners in this field will benefit from this job since it will help them comprehend the enormous potential of IoT in the medical industry and pinpoint significant IoT difficulties.A good level of health is necessary for efficient everyday job. The goal of the project is to create a sensor that can be used with an IOT-enabled smartphone to vividly track a patient's heart rate. This article offers a portable framework that continuously monitors a patient's heart rate, temperature, and various other room-related metrics using a Wi-Fi module. Health monitoring systems and smart homes with IOT capabilities have been presented. Based on the output numbers obtained, the precise sickness from the doctor, even from a distance, and some settings, the system offers access to approved personal data via any IOT platform. The Wi-Fi module can be used to control the space. Users can control appliances from anywhere in the globe thanks to the Internet of Things (IoT).
References
- W. Kastner, G. Neugschwandtner, S. Soucek, and H. M. Newman, “Communication systems for building automation and control,” Proc. IEEE, vol. 93, no. 6, pp. 1178–1203, Jun. 2005.
- M. Thuillard, P. Ryser, and G. Pfister, “Life safety and security systems,” in Sensors in Intelligent Buildings, vol. 2. Weinheim, Germany: WileyVCH, 2001, pp. 307–397.
- T. Novak, A. Treytl, and P. Palensky, “Common approach to functional safety and system security in building automation and control systems,” in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2007, pp. 1141– 1148.
- Information Technology–Security Technique– Evaluation Criteria for IT Security, IEC 15408, 2005.
- C. P. Pfleeger and S. L. Pfleeger, Security in Computing, 4th ed. Englewood Cliffs, NJ: Prentice-Hall, 2006.
- D. Hwang, P. Schaumont, K. Tiri, and I. Verbauwhede, “Securing embedded systems,” IEEE Security Privacy, vol. 4, no. 2, pp. 40–49, Mar. 2006.
- S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, “Security in embedded systems: Design challenges,” ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461–491, Aug. 2004.
- V. Gungor and G. Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical approaches,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258– 4265, Oct. 2009.
- BACnet—A Data Communication Protocol for Building Automation and Control Networks, ANSI/ASHRAE 135, 2008.
- Control Network Protocol Specification, ANSI/EIA/CEA 709.1, 1999.
- KNX Specification, Konnex Assoc., Diegem, Belgium, 2009, Ver. 2.0.
- Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE 802.15.4, 2006.
- ZigBee Specification 2007, ZigBee Alliance, San Ramon, CA, 2007.
- D. G. Holmberg, “BACnet wide area network security threat assessment,” Nat. Inst. Standards Technol., Gaithersburg, MD, NISTIR Tech. Rep. 7009, 2003.
- ANSI/ASHRAE Addendum 135–2008 g: Updating BACnet Network Security, May 2010, Status: 5th public review. [Online]. Available: http:// bacnet.org/Addenda/index.html
- C. Schwaiger and A. Treytl, “Smart card based security for fieldbus systems,” in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2003, pp. 398–406.
- Tunneling Component Network Protocols Over Internet Protocol Channels, ANSI/EIA 852, 2002. [18] W. Granzer, W. Kastner, G. Neugschwandtner, and F. Praus, “Security in networked building automation systems,” in Proc. IEEE Int. Workshop Factory Commun. Syst., 2006, pp. 283–292.
- A. Cilardo, L. Coppolino, N. Mazzocca, and L.Romano, “Elliptic curve cryptography engineering,” Proc. IEEE, vol. 943, no. 2, pp. 395– 406, Feb. 2006.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.