Personal Health and Illness Management and the Future Vision of Biomedical Clothing Based on WSN

Personal Health and Illness Management and the Future Vision of Biomedical Clothing Based on WSN

Ge Zhang, Zubin Ning
Copyright: © 2023 |Volume: 19 |Issue: 1 |Pages: 21
ISSN: 1548-3924|EISSN: 1548-3932|EISBN13: 9781668479025|DOI: 10.4018/IJDWM.316126
Cite Article Cite Article

MLA

Zhang, Ge, and Zubin Ning. "Personal Health and Illness Management and the Future Vision of Biomedical Clothing Based on WSN." IJDWM vol.19, no.1 2023: pp.1-21. http://doi.org/10.4018/IJDWM.316126

APA

Zhang, G. & Ning, Z. (2023). Personal Health and Illness Management and the Future Vision of Biomedical Clothing Based on WSN. International Journal of Data Warehousing and Mining (IJDWM), 19(1), 1-21. http://doi.org/10.4018/IJDWM.316126

Chicago

Zhang, Ge, and Zubin Ning. "Personal Health and Illness Management and the Future Vision of Biomedical Clothing Based on WSN," International Journal of Data Warehousing and Mining (IJDWM) 19, no.1: 1-21. http://doi.org/10.4018/IJDWM.316126

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

It is essential to have a fast, reliable, and energy-efficient connection between wireless sensor networks (WSNs). Control specifications, networking layers, media access control, and physical layers should be optimised or co-designed. Health insurance will become more expensive for individuals with lower incomes. There are privacy and cyber security issues, an increased risk of malpractice lawsuits, and more costs in terms of both time and money for doctors and patients. In this paper, personal health biomedical clothing based on wireless sensor networks (PH-BC-WSN) was used to enhance access to quality health care, boost food production through precision agriculture, and improve the quality of human resources. The internet of things enables the creation of healthcare and medical asset monitoring systems that are more efficient. There was extensive discussion of medical data eavesdropping, manipulation, fabrication of warnings, denial of services, position and tracker of users, physical interference with devices, and electromagnetic attacks.