Secure Health Monitoring of Soldiers With Tracking System Using IoT A Survey
Secure Health Monitoring of Soldiers With Tracking System Using IoT A Survey
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID - IJTSRD23834 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 693
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
based on IOT concept is developed and proposed in this location as soon as pulse values drop below pre-decided
paper which will be an effective alternative to the existing threshold or on receiver demand.
technologies in the area of soldiers’ health and location
tracking on the battlefields. Table 1 provides the state-of the- 4. An IOT Based Patient Monitoring System:
art soldiers health and location monitoring system of the GPS One of the key learning platforms for IoT is the Raspberry Pi.
to guide the soldier in correct direction. The base station can The Raspberry Pi is a popular platform because it offers a
access the current status of the soldier using IOT as the complete Linux server in a tiny platform for a very low cost.
different tracking parameters of the soldier get transmitted The Raspberry Pi also allows interfacing services and
via Wi-Fi module. These information will be stored on the actuators through the general purpose I/O pins. In this paper
Cloud and can be extracted on the PC of control room, as and specialized sensor is used to monitor patient’s heart rate,
when extracted. Based on these information, the authorities body temperature, body movement and breathing rate. The
can initiate immediate action by deploying a medical, rescue combination of Raspberry Pi and IoT becomes a new
team or any backup force for their help. Using various innovation technology in healthcare system. Raspberry Pi
biomedical sensors, health parameters of a soldier is acts as a small clinic after connecting these (Temperature,
observed along with its surrounding environment condition Respiration, Accelerometer, Heartbeat) sensors. Raspberry
observed. The proposed system is divided into two unit i.e. Pi works as small clinic in many places. Raspberry Pi collects
Soldier and control room units.LM35 temperature sensor, data from sensors and then it transfer wirelessly to IoT
Pulse Rate sensor and oxygen level detector sensor for website. Raspberry Pi board is connected to the internet,
continuously monitoring health status of soldier. GPS is used that board MAC address is registered to the internet. After
to determine real time position and orientation. Data that in IoT website, add MAC address of this board. Then the
originating from sensors and GPS receiver is processed and sensors output is connected to the IoT website.
collected using ARM processor.
One is directly connected to the monitor, keyboard, and
2. Health Monitoring and Tracking of Soldiers using mouse to the Raspberry Pi board and got output in monitor
GPS: screen. Another method is Raspberry Pi board is connected
Communicating with the base (control room) station become to a laptop (or) computer using data cable. After that install
the fundamental challenges in military operations. Also the putty software to the respective system. Change IP address,
proper navigation between soldiers’ organizations plays Subnet mask, gateway to that system. Then open that putty
important role for careful planning and co-ordination. So this software, output will display in that screen.
paper focus on tracking the location of soldier from GPS,
which is useful for control room station to know the exact 5. A Smart System Connecting e-Health Sensors and the
location of soldier and accordingly they will guide them. Also Cloud:
High-speed, short-range, soldier-tosoldier wireless Cloud Computing is a general expression for any
communications to relay information on situational technological services provide through the Internet. Cloud
awareness, such as Bio-medical sensors, GPS navigation, computing provides compatible and on-demand network
Wireless communication. access for numerous computing resources such as networks,
systems, applications, and services. Moreover, cloud
The most significance in this is implementation of M-Health. computing are using modern and flexible methods to
Implementation of this system improves the security of our provide, manage, and pay for information technology
country and also help to improve the safety of the soldier. services with minimal management effort and cost. Cloud
This system also helps to provide real time video computing technology has several advantages such as
information. The casualties of war are reduced with the help flexibility, highly auto-mated, low cost, fast services
of this system. It also helps to giving critical information and providing and a huge storage capacity.
warning to the soldiers and can apply more of them to the
current weak locations. This strengthens the defence system. The wireless health sensors are connected to a Raspberry Pi.
This Raspberry Pi is responsible for collecting data from
3. A Real Time Autonomous Soldier Health Monitoring: sensors and transmittingthis data through wireless
Wireless Sensor Networks are the collection of a large communication channels to platform services hosted on the
number of low-cost, low-power, multifunctional sensor cloud.
nodes that are small in size and communicate untethered in
short distances. They can be an integral part of military The integration between wireless sensor networks and cloud
C4ISRT systems. This paper suggests a method to ensure the computing will create a new generation of technology in
safety and dignity of each and every army personnel of the many aspects such as patient monitoring with minimal cost,
armed forces of the world by providing them with a device reducing the number of occupied beds in hospitals, and
that constantly monitors the value of the pulse rate of the improving medical staff performance. In addition, applying
wearer, and along with the aid of the GPS module present various data mining techniques help to extract and analyse
along with the transmitter setup present at the source, helps patients’ data. The system introduced in this paper provides
in keeping a tab on the immediate location details (latitude decisions based on patients’ historical data, real-time data
and longitude) of the wearer in those adverse situations gathering, and thus eliminating manual data collection.
where the pulse rate (or heart rate) falls below the clinically
6. Providing Confidentiality and Integrity on Data
accepted value of 60 beats per minute. Thus it helps to track,
Stored in Cloud Storage by Hash and Meta-data
observe and keep in mind the whereabouts of every soldier.
Approach:
The paper also proposes further integration with existing Security is the protection of information assets through the
equipment in use. Effective interfacing has been achieved use of technology, processes, and training . Cloud storage is a
and results suggest proper intimation of pulse rate and service that includes inherent vulnerabilities, but these have
@ IJTSRD | Unique Paper ID - IJTSRD23834 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 694
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
never dissuaded users from taking advantage of its securely transmitted to the server and vice versa. This
economies and flexibilities. algorithm provides Mutual authentication, confidentiality,
forward security, scalability. This algorithm resisting replay
With adoption of a cloud model, users lose control over
physical security. Users raised concerns whether their data attack, tag masquerade attack, server spoofing attack,
are accessed by unauthorized person since there are many location attack, cloning attack [2 To implement this schema
user sharing the resources over the cloud. successfully a powerful server device needed [2]. There are
also some other schema [3-6] which are more efficient then
Sharing the cloud with other users possesses risks and this schema in tag computational time [2].
concerns over security. Security overall covers mainly three
aspects: Confidentiality, Integrity and Availability (CIA). b) Cryptanalysis and improvement of an efficient mutual
These aspects are the topmost considerations in designing a authentication RFID scheme based on elliptic curve
security measure to ensure maximum protection. cryptography This paper is improved version of Chou’s
protocol [7] based on ECC which is failed to provide mutual
Confidentiality: Protecting data and information from authentication and cloning attack. [8]
disclosure to unauthorized person.
9. Secure File Storage On Cloud Using Cryptography:
Integrity: Protecting data and information from being
modified by unauthorized person.
Availability: Authorized people are able to access and use
data and information whenever require.
7. GPS Based Soldier Tracking And Health Indication
System With Environmental Analysis:
This paper has an idea of tracking the soldier and navigation
between soldier to soldier health status along with knowing
their speed, distance, height as well as environmental The main goal is to securely store and access data in cloud
situation of them during the war, which enables the army that is not controlled by the owner of the data. We exploit
personnel to plan the strategies of war. The control room the technique of elliptic curve cryptography encryption to
gets location of soldier from GPS. Even in case of losing the protect data files in the cloud. Two part of the cloud server
battlefield it is the responsibility of the GPS to guide the improved the performance during storage and accessing of
soldier on correct path if he is lost in the battlefield. The base data. The ECC Encryption algorithm used for encryption is
station can access the current status of the soldier which is another advantage to improve the performance during
displayed on the PC. And hence can take immediate action by encryption and decryption process. We assume that this way
sending help for the soldier or sending backup for threat
ahead. Using various biomedical sensor health parameters of of storing and accessing data is much secure and have high
soldier’s are observed, as well as surrounding atmosphere performance. Our efforts are going on to solve the problem
pressure, oxygen levels are observed. The position and of group sharing of data in the shared data section as in this
orientation of soldier is trapped using GPS. scheme only member of group can access the data stored
over shared data section. One to many, many to one, many to
8. A Survey Of Authentication Of RFID Devices Using many communication is not possible.
Cryptography:
A secure ECC based RFID authentication protocol with ID III. SYSTEM DESIGN:
verifier This paper[Liao’s schema] proposes an ECC based System design is the process of defining the architecture,
mutual authentication algorithm that satsfies the essiential modules, interfaces and data for a system to satisfy specified
requirements in RFID system [2]. requirements. Systems design could be seen asthe
application of systems theory to product development .
In this algorithm tag believes that the ID verifier Zt is
@ IJTSRD | Unique Paper ID - IJTSRD23834 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 695
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Provides Mutual authentication,
SutharMonali
2018 ECC Algorithm confidentiality, forward security, Complicated and tricky
,Prof.Alka J Patel
scalability
Joseph
Survey on different
Selvanayagam, Akash Slow key generation and
2018 cryptographic Knowledge of security approaches
Singh, Joans Michael, slow signing
algorithms
Jaya Jeswani
@ IJTSRD | Unique Paper ID - IJTSRD23834 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 696