Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 1360289, 11 pages
https://doi.org/10.1155/2017/1360289
Research Article

Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection

1School of Computer and Information and the University Key Laboratory of Intelligent Perception and Computing of Anhui Province, Anqing Normal University, Anqing 246011, China
2School of Computer and Information, Anqing Normal University, Anqing 246011, China

Correspondence should be addressed to Yu’e Jiang; moc.361@eoaixsw

Received 9 November 2016; Revised 21 December 2016; Accepted 23 January 2017; Published 7 March 2017

Academic Editor: Liangmin Wang

Copyright © 2017 Yu’e Jiang and Jiaxiang Liu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. H. Y. Shum, V. W. Q. Lou, K. Z. J. He, C. C. H. Chen, and J. Wang, “The ‘Leap Forward’ in nursing home development in Urban China: future policy directions,” Journal of the American Medical Directors Association, vol. 16, no. 9, pp. 784–789, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. N. Kumar, K. Kaur, S. C. Misra, and R. Iqbal, “An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud,” Peer-to-Peer Networking and Applications, vol. 9, no. 5, pp. 824–840, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. N. K. Suryadevara and S. C. Mukhopadhyay, “Wireless sensor network based home monitoring system for wellness determination of elderly,” IEEE Sensors Journal, vol. 12, no. 6, pp. 1965–1972, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. J. E. Morley, G. Caplan, M. Cesari et al., “International survey of nursing home research priorities,” Journal of the American Medical Directors Association, vol. 15, no. 5, pp. 309–312, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. J. E. Morley, “Under nutrition: a major problem in nursing homes,” Synthetic Communications, vol. 44, no. 8, pp. 1019–1042, 2014. View at Google Scholar
  6. H. Makimura, K. Watanabe, H. Igarashi, and H. Waki, “Monitoring system of railway using passive RFID in UHF band,” IEEJ Transactions on Electronics, Information and Systems, vol. 132, no. 5, pp. 691–696, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. L. M. Wang and S. M. Xiong, Introduction to the Internet of Things Engineering, Tsinghua University Press, Beijing, China, 2011.
  8. J. C. Chen and T. J. Collins, “Creation of a RFID based real time tracking (R-RTT) system for small healthcare clinics,” Journal of Medical Systems, vol. 36, no. 6, pp. 3851–3860, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. N. Li and B. Becerik-Gerber, “Performance-based evaluation of RFID-based indoor location sensing solutions for the built environment,” Advanced Engineering Informatics, vol. 25, no. 3, pp. 535–546, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Liu and Z. C. Ji, “Research on RFID reader network tracking algorithm,” Computer Engineering, vol. 38, no. 18, pp. 248–250, 2012. View at Google Scholar
  11. M. Arebey, M. A. Hannan, H. Basri, R. A. Begum, and H. Abdullah, “Solid waste monitoring system integration based on RFID, GPS and camera,” in Proceedings of the International Conference on Intelligent and Advanced Systems (ICIAS '10), pp. 1–5, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Tao, X. Zhou, Y. Ma, and F. Zhao, “Mobile mutual authentication protocol based on hash function,” Journal of Computer Applications, vol. 36, no. 3, pp. 657–660, 2016. View at Google Scholar
  13. S.-J. Zhou, W.-Q. Zhang, and J.-Q. Luo, “Survey of privacy of radio frequency identification technology,” Journal of Software, vol. 26, no. 4, pp. 960–976, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Wickramasinghe, D. C. Ranasinghe, C. Fumeaux, K. D. Hill, and R. Visvanathan, “Sequence learning with passive RFID sensors for real time bed-egress recognition in older people,” IEEE Journal of Biomedical and Health Informatics, p. 1, 2016. View at Publisher · View at Google Scholar
  15. B. Fabian, T. Ermakova, and C. Muller, “SHARDIS: a privacy-enhanced discovery service for RFID-based product information,” IEEE Transactions on Industrial Informatics, vol. 8, no. 3, pp. 707–718, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. X. L. Liu, H. Qi, Q. K. Li et al., “Efficient detection of cloned attacks for large-scale RFID systems,” in Algorithms and Architectures for Parallel Processing, vol. 8630 of Lecture Notes in Computer Science, pp. 85–99, Springer International Publishing, Berlin, Germany, 2014. View at Google Scholar
  17. A. Arbit, Y. Oren, and A. Wool, “A secure supply-chain RFID system that respects your privacy,” IEEE Pervasive Computing, vol. 13, no. 2, pp. 52–60, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Jannati and B. Bahrak, “Security analysis of an RFID tag search protocol,” Information Processing Letters, vol. 116, no. 10, pp. 618–622, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Y. Wang, F. X. Jing, and Y. Q. Wang, “An improved hash-based RFID security authentication algorithm,” Journal of Shangdong University, vol. 49, no. 9, pp. 154–159, 2014. View at Google Scholar
  20. D.-Z. Sun and J.-D. Zhong, “A hash-based RFID security protocol for strong privacy protection,” IEEE Transactions on Consumer Electronics, vol. 58, no. 4, pp. 1246–1252, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. H. M. Zheng, Y. J. Wang, K. Chen, and J. T. Zhang, “Design of wireless remote security monitoring system for tower crane fleet,” Journal of Electronic Measurement and Instrumentation, vol. 28, no. 5, pp. 520–527, 2014. View at Google Scholar
  22. L. Shen, Z. Zhao, and X. Yu, “Design of remote monitoring internet of things system for new optical fiber smart structure,” Journal of Nanjing University of Aeronautics and Astronautics, vol. 3, no. 47, pp. 453–458, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. F.-M. Li, N. Jiang, J. Xiong, and J.-Y. Zhang, “Multi-object tracking scheme with pyroelectric infrared sensor and video camera coordination,” Acta Electronica Sinica, vol. 42, no. 4, pp. 672–678, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. Y.-J. Chang, C.-H. Chen, L.-F. Lin, R.-P. Han, W.-T. Huang, and G.-C. Lee, “Wireless sensor networks for vital signs monitoring: application in a nursing home,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 685107, 12 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. G.-X. Han and C.-R. Li, “Improvement on moving object tracking method for network video surveillance,” Journal on Communications, vol. 35, pp. 160–164, 2014. View at Publisher · View at Google Scholar · View at Scopus