Wireless Personal Communications

, Volume 57, Issue 3, pp 431–439 | Cite as

Remote Patient Monitoring Within a Future 5G Infrastructure

  • Vladimir Oleshchuk
  • Rune Fensli


Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monitoring. Today, there exist several constraints, probably preventing the adoption of such services in clinical routine work. Within a future 5G infrastructure, new possibilities will be available due to improved addressing solutions and extended security services in addition to higher bandwidth in the wireless communication link. Thus 5G solutions can represent a paradigm shift regarding remote patient’s monitoring and tracking possibilities, with enhancement in transmitting information between patients and health care services. Some aspects of new possibilities are highlighted in describing a realistic scenario within a future 5G framework.


Wearable sensors Implantable medical devices Remote monitoring Mobile communication Security Telemedicine 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aziz O., Lo B., Pansiot J., Atallah L., Yang G. Z., Darzi A.: From computers to ubiquitous computing by 2010: Health care. Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences 366(1881), 3805–3811 (2008)CrossRefGoogle Scholar
  2. 2.
    Barlow J., Wright C., Sheasby J., Turner A., Hainsworth J.: Self-management approaches for people with chronic conditions: A review. Patient Education and Counseling 48(2), 177–187 (2002)CrossRefGoogle Scholar
  3. 3.
    CEN/ISSS eHealth Standardization Focus Group. (2005). Current and future standardiza-tion issues in the eHealth domain: Achieving interoperability. Executive summary. Retrieved 10 06, 2008, from
  4. 4.
    Dagtas, S., Pekhteryev, G., Sahinoglu, Z., Çam, H., & Challa, N. (2008). Real-time and secure wireless health monitoring. International Journal of Telemedicine and Applications, p. 10.Google Scholar
  5. 5.
    Fensli, R., Dale, J. G., O‘Reilly, P., O’Donoghue, J., Sammon, D., & Gundersen T. (2009). Towards improved healthcare performance: Examining technological possibilities and patient satisfaction with wireless body area networks. Journal of Medical Systems.Google Scholar
  6. 6.
    Ferraiolo, D. F., Kuhn, D. R., & Chandramouli, R. (2007). Role based access control, artech house, 2003, 2nd ed.Google Scholar
  7. 7.
    Ferraiolo D.F., Sandhu R., Gavrila S., Kuhn D.R., Chandramouli R.: Proposed NIST standard for role-based access control. ACM Transaction on Information and System Security, 4(3), 224–274 (2001)CrossRefGoogle Scholar
  8. 8.
    Ferreira, A., et al. (2009). How to Securely Break into RBAC: The BTG-RBAC Model. In 2009 Annual Computer Security Applications Conference (presented at the 2009 Annual Computer Security Applications Conference (ACSAC) (pp. 23–31), Honolulu, Hawaii, USA.Google Scholar
  9. 9.
    Ferreira, A., et al. (2006). How to break access control in a controlled manner. In Proceedings of the 19th IEEE Symposium on Computer-based Medical Systems (pp. 847–854). IEEE Computer Society.Google Scholar
  10. 10.
    Halperin D. et al.: Security and privacy for implantable medical devices. Pervasive Computing, IEEE 7(1), 30–39 (2008)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Halperin, D., et al. (2008). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy (pp. 129–142).Google Scholar
  12. 13.
    Jovanov E., Raskovic D., Price J., Chapman J., Moore A., Krishnamurthy A.: Patient monitoring using personal area networks of wireless intelligent sensors. Biomedical Sciences Instrumentation 37, 373–378 (2001)Google Scholar
  13. 14.
    Kumar, S., Kambhatla, K., Hu, F., Lifson, M., & Xiao, Y. (2008). Ubiquitous computing for remote cardiac patient monitoring: A survey. International Journal of Telemedicine and Applications.Google Scholar
  14. 15.
    Tang P. C., Ash J. S., Bates D. W., Overhage J. M., Sands D. Z.: Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption. Journal of the American Medical Informatics Association 13(2), 121–126 (2006)CrossRefGoogle Scholar
  15. 16.
    Toumaz Technology Ltd. (2009). Retrieved December 6, 2009 from
  16. 17.
    V-Patch. (2008). Wireless. Retrieved December 06, 2009, from
  17. 18.
    Wald H. S., Dube C. E., Anthony D. C.: Untangling the web—The impact of internet use on health care and the physician–patient relationship. Patient Education and Counseling 68(3), 218–224 (2007)CrossRefGoogle Scholar
  18. 19.
    Wootton R., Kvedar J. C.: Home telehealth: Connecting care within the community. RSM Press, London (2006)Google Scholar
  19. 20.
    Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., & Salvador, G. S. (2010). A cloud computing solution for patient’s data collection in health care institutions. In Second International Conference on eHealth, Elemedicine, and Social Medicine (pp. 95–99), (ETELEMED ‘10), 2010.Google Scholar

Copyright information

© Springer Science+Business Media, LLC. 2010

Authors and Affiliations

  1. 1.Faculty of Engineering and ScienceUniversity of AgderGrimstadNorway

Personalised recommendations