Smart Hospital Platform


Smart Hospital Platform has implemented a complete IoT system that can be deployed in hospital scenes. On the data collection terminal, Wi-Fi and LoRa protocols are used for data uploading, including gateway settings and edge network building methods. The data will be uploaded to two cloud platforms via the MQTT protocol: AliCloud and AWS. The collected data will be simply processed by SQL and stored in the cloud database, which will be called by the subsequent visualization platform. The visualization platform provides users with the web and mobile visualization interface.

The platform currently supports multiple data upload methods such as Wi-Fi, LoRa, UWB, and BLE.

Smart Hospital Platform including the underlying sensor data collection, edge network formation and gateway data forwarding, cloud device authentication and data collection and processing, database storage, data recall and visualization. Finally, all collected data is fed back to the user in an intuitive graphical interface.

Real-time Interface


The data acquisition end includes data such as temperature, humidity, pressure, acceleration, etc, based on the IoT node, the human traffic counting based on the ranging sensor, and BLE-based positioning. All sensors form an edge network through LoRa or Wi-Fi protocol, and then upload data to the cloud server through the MQTT protocol through the LoRa gateway or the router.

The device registers in the cloud through the Internet of Things platform, and then processes the corresponding data through the rules engine and forwards the data to the database. The real-time data will be extracted and displayed in the corresponding database by the visualization platform.

The resource structure diagram of the current project is as follows:

System Model

The data collected by the sensors of the data acquisition device will pass through the following process and finally be presented in the visualization interface:

Network Security

Asymmetric key encryption is a good way to send secret data. Anyone with access to the public key can send an encrypted message to the private key holder, and only the private key holder can decrypt and read it. Also, the public and private keys also allow signing of documents, and private keys are used to add digital signatures to messages. Anyone with a public key can check the signature and know that the original message has not been altered. In addition to the fact that the presentation message has not been tampered with, a digital signature can also be used to prove ownership of the private key. Anyone with a public key can verify the signature and be sure that the signer owns the private key when signing the message.