In this paper, we demonstrate an empirical analysis of the reliability of low-rate wireless u-healthcare monitoring applications. We have considered the performance analysis of the IEEE 802.15.4 low-rate wireless technologies for u-healthcare applications. For empirical measurement, we considered three scenarios in which the reliability features of the low-rate wireless u-healthcare monitoring applications have been measured: (i) distance between sensor nodes and base station; (ii) deployment of the number of sensor nodes in a network; and (iii) data transmission by different time intervals. The experimental results show that received data are used to calculate BER and analyze the performance according to the scenarios. The BER is affected when varying the distance between sensor node and base station, the number of nodes, and time interval.
513Low-rate wireless u-healthcare monitoring system works well in single-hop (ad hoc network) data communications but revealed some scheduling problems in a multi-hop network. One of the more difficult constraints was that several wireless biological data sensors, including ECG, and accelerometer reached the limits of using a multi-hop environment. Our experimental results demonstrated that the star topology and the one-hop connection to the base station are able to improve the performance of the reliability of the low-rate wireless u-healthcare monitoring applications. In applying low-rate wireless technology for wireless u-healthcare monitoring application, sampling rate, number of nodes and data packet sizes as well as reliable medical devices are closely related to the reliability that will improve the system performance.Young-Dong Lee received his BS, MS, and PhD degrees from and 1998, respectively. He is currently an associate professor in the School of Computer and Information Engineering at Dongseo University. From 1987 to 1998, he was a research associate at the Agency for Defense Development. His current research interests include developing secure communication system, side-channel attack, and ubiquitous sensor network/radio frequency identification security.