Skip to main content

Towards Improving Reliability of Computational RFID Based Smart Healthcare Monitoring Systems

  • Conference paper
Inclusive Society: Health and Wellbeing in the Community, and Care at Home (ICOST 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7910))

Included in the following conference series:

  • 2310 Accesses

Abstract

Advances in networking and small sensors (motes, RFID tags, etc) have made it possible to monitor and provide medical assistance to people in need at their homes. Recently, WISP tags, one advanced technology of Radio Frequency Identification (RFID) tags, have been used to monitor indoor activity, vital signs, sleep quality, and health status remotely. These types of systems take collaborative decision based on the data collected from all the WISP tags of the system. Any missing tag data within the environment may introduce critical error in the system’s decision and this eventually may jeopardize system’s decision reliability. In order to maintain system’s reliability, a monitoring protocol needs to be executed frequently and it should be made efficient in terms of execution time. This paper studies the problem of monitoring a large set of WISP tags and identifying the missing ones. In this paper, based on probabilistic methods, we propose a monitoring protocol for WISP based Smart Healthcare Monitoring Systems. The goal of this protocol is to improve the security and reliability of a smart healthcare monitoring system by detecting missing tags and reporting back only the data of the existing tags.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ilic, C.: Using tags to make teeth. RFID Journal, http://www.rfidjournal.com/article/articleview/1206/1/1/ (Downloaded January 22, 2005)

  2. Exavera Technologies, eShepherd overview, http://www.exavera.com/healthcare/eshepherd.php

  3. Holleman, J., Yeager, D., Prasad, R., Smith, J., Otis, B.: NeuralWISP: An Energy Harvesting Wireless Neural Interface with 1-m Range. Trans. on BioCAS, 37–40 (2008)

    Google Scholar 

  4. Jiang, B., Smith, J., Philipose, M., Roy, S., Sundara-Rajan, K., Mamishev, A.: Energy scavenging for inductively coupled passive RFID systems. Trans. on Inst. and Meas., 118–125 (2007)

    Google Scholar 

  5. Buettner, M., Greenstein, B., Sample, A., Smith, J.R., Wetherall, D.: Revisiting smart dust with RFID sensor networks. In: Proc. of Workshop on Hot Topics in Networks (2008)

    Google Scholar 

  6. Buettner, M., Greenstein, B., Prasad, R., Sample, A., Smith, J.R., Yeager, D., Wetherall, D.: Demonstration: RFID sensor networks with the Intel WISP. In: Proc. of Conference on Embedded Networked Sensor Systems, pp. 393–394 (2008)

    Google Scholar 

  7. Tan, C.C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: Proc. of ICDCS, pp. 295–302 (2008)

    Google Scholar 

  8. Li, T., Chen, S., Ling, Y.: Identifying the Missing Tags in a Large RFID System. In: Proc. of Mobihoc, pp. 1–10 (2010)

    Google Scholar 

  9. Salajegheh, M., Clark, S., Ransford, B., Fu, K., Juels, A.: CCCP: Secure remote storage for computational RFIDs. In: Proc. of 18th USENIX Security Symposium (2009)

    Google Scholar 

  10. Chaudhri, R., Lester, J., Borriello, G.: An RFID based system for monitoring free weight exercises. In: Proc. of SenSys, pp. 431–432 (2008)

    Google Scholar 

  11. Lee, S.R., Joo, S.D., Lee, C.W.: An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification. In: Proc. of Mobiquitous, pp. 166–172 (2005)

    Google Scholar 

  12. Intel Corporation. Age-in-place, www.intel.com/research/prohealth/cs-aging_in_place.htm

  13. Georgia Institute of Technology. Awarehome, www.cc.gatech.edu/fce/ahri/

  14. Hoque, E., Dickerson, R., Stankovic, J.A.: Monitoring Body Positions and Movements during Sleep using WISPs. In: Proc. of Wireless Health, pp. 44–53 (2010)

    Google Scholar 

  15. Chae, H.J., Yeager, D.J., Smith, J.R., Fu, K.: Maximalist Cryptography and Computation on the WISP UHF RFID Tag. In: Proc. of RFID Security (2007)

    Google Scholar 

  16. Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context Aware Communications. In: Proc. of CCS, pp. 479–490 (2008)

    Google Scholar 

  17. Saxena, N., Voris, J.: Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 2–21. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Kodialam, M., Nandagopal, T.: Fast and Reliable Estimation Schemes in RFID Systems. In: Proc. of MOBICOM, pp. 322–333 (2006)

    Google Scholar 

  19. Hush, D., Wood, C.: Analysis of Tree Algorithm for RFID Arbitration. In: Proc. of ISIT, p. 107 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rahman, F., Ahamed, S.I. (2013). Towards Improving Reliability of Computational RFID Based Smart Healthcare Monitoring Systems. In: Biswas, J., Kobayashi, H., Wong, L., Abdulrazak, B., Mokhtari, M. (eds) Inclusive Society: Health and Wellbeing in the Community, and Care at Home. ICOST 2013. Lecture Notes in Computer Science, vol 7910. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39470-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39470-6_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39469-0

  • Online ISBN: 978-3-642-39470-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics