Abstract
Advances in networking and small sensors (motes, RFID tags, etc) have made it possible to monitor and provide medical assistance to people in need at their homes. Recently, WISP tags, one advanced technology of Radio Frequency Identification (RFID) tags, have been used to monitor indoor activity, vital signs, sleep quality, and health status remotely. These types of systems take collaborative decision based on the data collected from all the WISP tags of the system. Any missing tag data within the environment may introduce critical error in the system’s decision and this eventually may jeopardize system’s decision reliability. In order to maintain system’s reliability, a monitoring protocol needs to be executed frequently and it should be made efficient in terms of execution time. This paper studies the problem of monitoring a large set of WISP tags and identifying the missing ones. In this paper, based on probabilistic methods, we propose a monitoring protocol for WISP based Smart Healthcare Monitoring Systems. The goal of this protocol is to improve the security and reliability of a smart healthcare monitoring system by detecting missing tags and reporting back only the data of the existing tags.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ilic, C.: Using tags to make teeth. RFID Journal, http://www.rfidjournal.com/article/articleview/1206/1/1/ (Downloaded January 22, 2005)
Exavera Technologies, eShepherd overview, http://www.exavera.com/healthcare/eshepherd.php
Holleman, J., Yeager, D., Prasad, R., Smith, J., Otis, B.: NeuralWISP: An Energy Harvesting Wireless Neural Interface with 1-m Range. Trans. on BioCAS, 37–40 (2008)
Jiang, B., Smith, J., Philipose, M., Roy, S., Sundara-Rajan, K., Mamishev, A.: Energy scavenging for inductively coupled passive RFID systems. Trans. on Inst. and Meas., 118–125 (2007)
Buettner, M., Greenstein, B., Sample, A., Smith, J.R., Wetherall, D.: Revisiting smart dust with RFID sensor networks. In: Proc. of Workshop on Hot Topics in Networks (2008)
Buettner, M., Greenstein, B., Prasad, R., Sample, A., Smith, J.R., Yeager, D., Wetherall, D.: Demonstration: RFID sensor networks with the Intel WISP. In: Proc. of Conference on Embedded Networked Sensor Systems, pp. 393–394 (2008)
Tan, C.C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: Proc. of ICDCS, pp. 295–302 (2008)
Li, T., Chen, S., Ling, Y.: Identifying the Missing Tags in a Large RFID System. In: Proc. of Mobihoc, pp. 1–10 (2010)
Salajegheh, M., Clark, S., Ransford, B., Fu, K., Juels, A.: CCCP: Secure remote storage for computational RFIDs. In: Proc. of 18th USENIX Security Symposium (2009)
Chaudhri, R., Lester, J., Borriello, G.: An RFID based system for monitoring free weight exercises. In: Proc. of SenSys, pp. 431–432 (2008)
Lee, S.R., Joo, S.D., Lee, C.W.: An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification. In: Proc. of Mobiquitous, pp. 166–172 (2005)
Intel Corporation. Age-in-place, www.intel.com/research/prohealth/cs-aging_in_place.htm
Georgia Institute of Technology. Awarehome, www.cc.gatech.edu/fce/ahri/
Hoque, E., Dickerson, R., Stankovic, J.A.: Monitoring Body Positions and Movements during Sleep using WISPs. In: Proc. of Wireless Health, pp. 44–53 (2010)
Chae, H.J., Yeager, D.J., Smith, J.R., Fu, K.: Maximalist Cryptography and Computation on the WISP UHF RFID Tag. In: Proc. of RFID Security (2007)
Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context Aware Communications. In: Proc. of CCS, pp. 479–490 (2008)
Saxena, N., Voris, J.: Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 2–21. Springer, Heidelberg (2010)
Kodialam, M., Nandagopal, T.: Fast and Reliable Estimation Schemes in RFID Systems. In: Proc. of MOBICOM, pp. 322–333 (2006)
Hush, D., Wood, C.: Analysis of Tree Algorithm for RFID Arbitration. In: Proc. of ISIT, p. 107 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rahman, F., Ahamed, S.I. (2013). Towards Improving Reliability of Computational RFID Based Smart Healthcare Monitoring Systems. In: Biswas, J., Kobayashi, H., Wong, L., Abdulrazak, B., Mokhtari, M. (eds) Inclusive Society: Health and Wellbeing in the Community, and Care at Home. ICOST 2013. Lecture Notes in Computer Science, vol 7910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39470-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-39470-6_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39469-0
Online ISBN: 978-3-642-39470-6
eBook Packages: Computer ScienceComputer Science (R0)