Remote Patient Monitoring Within a Future 5G Infrastructure
- 618 Downloads
Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monitoring. Today, there exist several constraints, probably preventing the adoption of such services in clinical routine work. Within a future 5G infrastructure, new possibilities will be available due to improved addressing solutions and extended security services in addition to higher bandwidth in the wireless communication link. Thus 5G solutions can represent a paradigm shift regarding remote patient’s monitoring and tracking possibilities, with enhancement in transmitting information between patients and health care services. Some aspects of new possibilities are highlighted in describing a realistic scenario within a future 5G framework.
KeywordsWearable sensors Implantable medical devices Remote monitoring Mobile communication Security Telemedicine
Unable to display preview. Download preview PDF.
- 3.CEN/ISSS eHealth Standardization Focus Group. (2005). Current and future standardiza-tion issues in the eHealth domain: Achieving interoperability. Executive summary. Retrieved 10 06, 2008, from ftp://ftp.cenorm.be/PUBLIC/Reports/eHealth/eHealthStandardizationExecutive.
- 4.Dagtas, S., Pekhteryev, G., Sahinoglu, Z., Çam, H., & Challa, N. (2008). Real-time and secure wireless health monitoring. International Journal of Telemedicine and Applications, p. 10.Google Scholar
- 5.Fensli, R., Dale, J. G., O‘Reilly, P., O’Donoghue, J., Sammon, D., & Gundersen T. (2009). Towards improved healthcare performance: Examining technological possibilities and patient satisfaction with wireless body area networks. Journal of Medical Systems.Google Scholar
- 6.Ferraiolo, D. F., Kuhn, D. R., & Chandramouli, R. (2007). Role based access control, artech house, 2003, 2nd ed.Google Scholar
- 8.Ferreira, A., et al. (2009). How to Securely Break into RBAC: The BTG-RBAC Model. In 2009 Annual Computer Security Applications Conference (presented at the 2009 Annual Computer Security Applications Conference (ACSAC) (pp. 23–31), Honolulu, Hawaii, USA.Google Scholar
- 9.Ferreira, A., et al. (2006). How to break access control in a controlled manner. In Proceedings of the 19th IEEE Symposium on Computer-based Medical Systems (pp. 847–854). IEEE Computer Society.Google Scholar
- 11.Halperin, D., et al. (2008). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy (pp. 129–142).Google Scholar
- 13.Jovanov E., Raskovic D., Price J., Chapman J., Moore A., Krishnamurthy A.: Patient monitoring using personal area networks of wireless intelligent sensors. Biomedical Sciences Instrumentation 37, 373–378 (2001)Google Scholar
- 14.Kumar, S., Kambhatla, K., Hu, F., Lifson, M., & Xiao, Y. (2008). Ubiquitous computing for remote cardiac patient monitoring: A survey. International Journal of Telemedicine and Applications.Google Scholar
- 16.Toumaz Technology Ltd. (2009). Retrieved December 6, 2009 from http://www.toumaz.com/.
- 17.V-Patch. (2008). Wireless. Retrieved December 06, 2009, from http://www.vpatchmedical.com/.
- 19.Wootton R., Kvedar J. C.: Home telehealth: Connecting care within the community. RSM Press, London (2006)Google Scholar
- 20.Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., & Salvador, G. S. (2010). A cloud computing solution for patient’s data collection in health care institutions. In Second International Conference on eHealth, Elemedicine, and Social Medicine (pp. 95–99), (ETELEMED ‘10), 2010.Google Scholar