Advertisement

Journal of Medical Systems

, Volume 36, Issue 6, pp 3605–3619 | Cite as

Development of an Ease-of-Use Remote Healthcare System Architecture Using RFID and Networking Technologies

  • Shih-Sung Lin
  • Min-Hsiung HungEmail author
  • Chang-Lung Tsai
  • Li-Ping Chou
Original Paper

Abstract

The study aims to provide an ease-of-use approach for senior patients to utilize remote healthcare systems. An ease-of-use remote healthcare system (RHS) architecture using RFID (Radio Frequency Identification) and networking technologies is developed. Specifically, the codes in RFID tags are used for authenticating the patients’ ID to secure and ease the login process. The patient needs only to take one action, i.e. placing a RFID tag onto the reader, to automatically login and start the RHS and then acquire automatic medical services. An ease-of-use emergency monitoring and reporting mechanism is developed as well to monitor and protect the safety of the senior patients who have to be left alone at home. By just pressing a single button, the RHS can automatically report the patient’s emergency information to the clinic side so that the responsible medical personnel can take proper urgent actions for the patient. Besides, Web services technology is used to build the Internet communication scheme of the RHS so that the interoperability and data transmission security between the home server and the clinical server can be enhanced. A prototype RHS is constructed to validate the effectiveness of our designs. Testing results show that the proposed RHS architecture possesses the characteristics of ease to use, simplicity to operate, promptness in login, and no need to preserve identity information. The proposed RHS architecture can effectively increase the willingness of senior patients who act slowly or are unfamiliar with computer operations to use the RHS. The research results can be used as an add-on for developing future remote healthcare systems.

Keywords

Remote healthcare system RFID Web services Automatic login Automatic services Emergency reporting mechanism 

Acronyms

AA

Authentication and Authorization

ASA

Automatic Service Agent

AV

Audio/Video

AVIA

AV Interaction Agent

CA

Communication Agent

DQA

Data Query Agent

ECG

Electrocardiogram

EMA

Emergency Monitoring Agent

EMR

Emergency Monitoring and Reporting

EMRA

Emergency Monitoring and Reporting Agent

GUI

Graphical User Interface

HTTP

Hypertext Transfer Protocol

ID

Identity

IDA

Identification Agent

MLVPA

Multi-Language Vocal Prompt Agent

PDA

Personal Digital Assistant

PSA

Pre-Schedule Agent

RF

Radio Frequency

RFID

Radio Frequency Identification

RHS

Remote Healthcare System

RMA

Regular Measurement Agent

SD

System Database

SOAP

Simple Object Access Protocol

SSL

Secure Socket Layer

UMA

User Management Agent

XML

Extensible Markup Language

Notes

Acknowledgement

The authors would like to thank the National Science Council of the Republic of China (R.O.C.) for financially supporting this research under Contract No. NSC 98-2221-E-606-019 and NSC 100-2221-E-034-014. Many thanks are also given to Chung Cheng Institute of Technology, National Defense University, and Chinese Culture University (under Flying Geese Program), R.O.C., for financially supporting this research. This work is also financially supported by Advanced Institute of Manufacturing with High-tech Innovations (AIM-HI), Taiwan, R.O.C.

References

  1. 1.
    Busnel, P., Khoury, P. E., Li, K., Saidane, A., and Zannone, N., S&D pattern deployment at organizational level: A prototype for remote healthcare system. Electron. Notes Theor. Comput. Sci. 244:27–39, 2009.CrossRefGoogle Scholar
  2. 2.
    Wu, S., Jiang, P., Yang, C., Li, H., and Bai, Y., The development of a tele-monitoring system for physiological parameters based on the B/Smodel. Comput. Biol. Med. 40:883–888, 2010.CrossRefGoogle Scholar
  3. 3.
    Gu, D., Zhang, Z., and Zeng, Y., Access to healthcare services makes a difference in healthy longevity among older Chinese adults. Soc. Sci. Med. 68:210–219, 2009.CrossRefGoogle Scholar
  4. 4.
    Steele, R., Lo, A., Secombe, C., and Wong, Y. K., Elderly persons’ perception and acceptance of using wireless sensor networks to assist healthcare. Int. J. Med. Informat. 78:788–801, 2009.CrossRefGoogle Scholar
  5. 5.
    Chen, C.-M., Web-based remote human pulse monitoring system with intelligent data analysis for home health care. Expert Syst. Appl. 38:2011–2019, 2011.CrossRefGoogle Scholar
  6. 6.
    Tan, T.-H., Chang, C.-S., Huang, Y.-F., Chen, Y.-F., and Lee, C., Development of a Portable Linux-Based ECG Measurement and Monitoring System. J. Med. Syst. 35:559–569, 2011.CrossRefGoogle Scholar
  7. 7.
    Youm, S., Lee, G., Park, S., and Zhu, W., Development of remote healthcare system for measuring and promoting healthy lifestyle. Expert Syst. Appl. 38:2828–2834, 2011.CrossRefGoogle Scholar
  8. 8.
    Tani, S., Marukami, T., Matsuda, A., Shindo, A., Takemoto, K., and Inada, H., Development of a health management support system for patients with diabetes mellitus at home. J. Med. Syst. 34:223–228, 2010.CrossRefGoogle Scholar
  9. 9.
    Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. Published online: 27 October 2010.Google Scholar
  10. 10.
    Leonard, D. C., Pons, A. P., and Asfour, S. S., Realization of a universal patient identifier for electronic medical records through biometric technology. IEEE Trans. Inf. Technol. Biomed. 13:494–500, 2009.CrossRefGoogle Scholar
  11. 11.
    Li, X., Qiu, W., Zheng, D., Chen, K., and Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57:793–800, 2010.CrossRefGoogle Scholar
  12. 12.
    Lee, S.-Y., Wang, L.-H., and Fang, Q., A low-power RFID integrated circuits for intelligent healthcare systems. IEEE Trans. Inf. Technol. Biomed. 14:1387–1396, 2010.CrossRefGoogle Scholar
  13. 13.
    Lin, C. C., Lin, P. Y., Lu, P. K., and Hsieh, G. Y., A healthcare integration system for disease assessment and safety monitoring of dementia patients. IEEE Trans. Inf. Technol. Biomed. 12:579–586, 2008.CrossRefGoogle Scholar
  14. 14.
    Huang, C. L., Chung, P. C., Tsai, M. H., Yang, Y. K., and Hsu, Y. C., Reliability improvement for an RFID-based psychiatric patient localization system. Comput. Commun. 31:2039–2048, 2008.CrossRefGoogle Scholar
  15. 15.
    Tassani, S., Baruffaldi, F., Testi, D., Cacciari, C., Accarisi, S., and Viceconti, M., Personal Digital Assistant in an orthopaedic wireless ward: The HandHealth project. Comput. Meth. Programs Biomed. 86:21–29, 2007.CrossRefGoogle Scholar
  16. 16.
    Georgiadis, C. K., Mavridis, I. K., and Pangalos, G. I., Healthcare teams over the Internet: Programming a certificate-based approach. Int. J. Med. Inform. 70:161–171, 2007.CrossRefGoogle Scholar
  17. 17.
    Hsu, J., Huang, J., Kinsman, J., Fireman, B., Miller, R., Selby, J., and Ortiz, E., Use of e-Health Services between 1999 and 2002: A Growing Digital Divide. J. Am. Med. Inform. Assoc. 12:164–171, 2005.CrossRefGoogle Scholar
  18. 18.
    Wu, J. H., Wang, S. C., and Lin, L. M., Mobile computing acceptance factors in the healthcare industry: A structural equation model. Int. J. Med. Inform. 76:66–77, 2007.CrossRefGoogle Scholar
  19. 19.
    Aidi, S., Arriott, J. L., and Nation, R. L., The role of perceptions of clinicians in their adoption of a web-based antibiotic approval system: Do perceptions translate into actions. Int. J. Med. Inform. 77:33–40, 2008.CrossRefGoogle Scholar
  20. 20.
    Lee, Y. S., Awareness of blood pressure among older adults: A cross-sectional descriptive study. Int. J. Nurs. Stud. 44:796–804, 2007.CrossRefGoogle Scholar
  21. 21.
    McGeady, D., Kujala, J., and Ilvonen, K., The impact of patient–physician web messaging on healthcare service provision. Int. J. Med. Inform. 77:17–23, 2008.CrossRefGoogle Scholar
  22. 22.
    Moisil, I., and Jitaru, E., E-health progresses in Romania. Int. J. Med. Inform. 75:315–321, 2006.CrossRefGoogle Scholar
  23. 23.
    Lemaire, E. D., Deforge, D., Marshall, S., and Curran, D., A secure web-based approach for accessing transitional health information for people with traumatic brain injury. Comput. Meth. Programs Biomed. 81:213–219, 2006.CrossRefGoogle Scholar
  24. 24.
    Masters, K., For what purpose and reasons do doctors use the Internet: A systematic review. Int. J. Med. Inform. 77:4–16, 2008.CrossRefGoogle Scholar
  25. 25.
    Choe, J., and Yoo, S. K., Web-based secure access from multiple patient repositories. Int. J. Med. Inform. 77:242–248, 2008.CrossRefGoogle Scholar
  26. 26.
    LifeScan Inc (2011) http://www.lifescan.com/. Accessed 15 Oct 2011.
  27. 27.
    VISHAY (2011) http://www.vishay.com/. Accessed 15 Oct 2011.
  28. 28.
    Liao, W.-P., Lin, T. M. Y., and Liao, S.-H., Contributions to Radio Frequency Identification (RFID) research: An assessment of SCI-, SSCI-indexed papers from 2004 to 2008. Decis. Support. Syst. 50:548–556, 2011.CrossRefGoogle Scholar
  29. 29.
    Zhu, X., Mukhopadhyay, S. K., and Kurata, H., A review of RFID technology and its managerial applications in different industries. J. Eng. Technol. Manag. 29:152–167, 2012.CrossRefGoogle Scholar
  30. 30.
    Fuschini, F., Piersanti, C., Sydanheimo, L., Ukkonen, L., and Falciasecca, G., Electromagnetic Analyses of Near Field UHF RFID Systems. IEEE Trans. Antenn. Propag. 58:1759–1770, 2010.CrossRefGoogle Scholar
  31. 31.
    Kim, D., and Yeo, J., A passive RFID tag antenna installed in a recessed cavity in a metallic platform. IEEE Trans. Antenn. Propag. 58:3814–3820, 2010.CrossRefGoogle Scholar
  32. 32.
    Bashir, A. K., Chauhdary, S. H., Shah, S. C., and Park, M.-S., Mobile RFID and its design security issues. IEEE Potentials 30:34–38, 2011.CrossRefGoogle Scholar
  33. 33.
    Sun, H.-M., Ting, W.-C., and Wang, K.-H., On the security of Chien’s Ultralightweight RFID authentication protocol. IEEE Trans. Depend. Secure Comput. 8:315–317, 2011.CrossRefGoogle Scholar
  34. 34.
    Qian, Z., Chen, C., You, I., and Lua, S., ACSP: A novel security protocol against counting attack for UHF RFID systems. Comput. Math. Appl. 63:492–500, 2012.CrossRefGoogle Scholar
  35. 35.
    Kurkovsky, S., Syta, E., and Casano, B., Continuous RFID-enabled authentication: Privacy implications. IEEE Technol. Soc. Mag. 30:34–41, 2011.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Shih-Sung Lin
    • 1
  • Min-Hsiung Hung
    • 2
    Email author
  • Chang-Lung Tsai
    • 2
  • Li-Ping Chou
    • 2
  1. 1.Department of Electrical and Electronic Engineering, Chung Cheng Institute of TechnologyNational Defense UniversityTaoyuanRepublic of China
  2. 2.Department of Computer Science and Information EngineeringChinese Culture UniversityTaipeiRepublic of China

Personalised recommendations