Health Monitoring System for Nursing Homes with...

12
Research Article Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection Yu’e Jiang 1,2 and Jiaxiang Liu 2 1 School of Computer and Information and the University Key Laboratory of Intelligent Perception and Computing of Anhui Province, Anqing Normal University, Anqing 246011, China 2 School of Computer and Information, Anqing Normal University, Anqing 246011, China Correspondence should be addressed to Yu’e Jiang; [email protected] Received 9 November 2016; Revised 21 December 2016; Accepted 23 January 2017; Published 7 March 2017 Academic Editor: Liangmin Wang Copyright © 2017 Yu’e Jiang and Jiaxiang Liu. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With the rapid growth of aged population in China, it is urgent to design a safe and effective monitoring system for the nursing homes. An optimized scheme and high performance security and privacy protection for monitoring system have already become the focus studied especially. So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. Dual-band RFID, virtual routing location algorithm, and diet and exercise data collection based on RFID were adopted to obtain the location and health information. And that fused a mobile authentication protocol based on Hash function to realize security access and privacy protection, which can improve security and reduce the complexity of calculation and the implementation cost compared with the typical authentication protocols. e experiment results show that the ratio of relative network delay is below 35%. e system has strong real-time, high security, more comprehensive data, and lower cost of computation and communication. It can satisfy the requirements of health monitoring for nursing homes. 1. Introduction It is estimated that China will enter the aging society. How to provide more comprehensive pension services becomes more and more urgent. As families and community can only provide limited elderly services, a tendency to meet the rocketing demands is to promote healthy monitoring system for nursing homes. As environment in nursing homes is complex, managers cannot focus on every one of the elderly people. So the challenge is to provide location service and health service in the event of dangerous conditions [1– 5]. With the rapid development of monitoring technology, RFID get more attention due to its advantage, such as unique identification, moveable identification, multitargets identification, and good environmental adaptability. In a word, a safe and effective monitoring system based on RFID for the nursing homes will be required urgently. Existing monitoring systems based on RFID usually lack an optimized scheme of data collection and privacy protection. For example, in the aspect of data collection, some are operating in a single frequency band, transmitting collection-data via line, even short of effective location algorithm and health data collection. As we known, there are obvious disadvantages in wireline monitoring system, such as routing restriction, the lack of flexibility, and high- cost. In terms of operation of frequency, RFID systems can be divided into four categories: low frequency (LF), high frequency (HF), ultra-frequency (UHF), and microwave, which have different properties. Due to low power, strong penetrating in RFID LF system, moveable identification, and multitargets identification in other RFID systems, how to realize the combination of the two advantages is a worthy topic [6–10]. Findings indicated that healthy diet and suf- ficient and regular exercises not only contribute to reduce and resist chronic diseases, but also promote physical and psychological health of elderly people. So to establish a system that can gather diet and exercise information and do some Hindawi Journal of Electrical and Computer Engineering Volume 2017, Article ID 1360289, 11 pages https://doi.org/10.1155/2017/1360289

Transcript of Health Monitoring System for Nursing Homes with...

Page 1: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

Research ArticleHealth Monitoring System for Nursing Homes with LightweightSecurity and Privacy Protection

Yursquoe Jiang12 and Jiaxiang Liu2

1School of Computer and Information and the University Key Laboratory of Intelligent Perception and Computing of Anhui ProvinceAnqing Normal University Anqing 246011 China2School of Computer and Information Anqing Normal University Anqing 246011 China

Correspondence should be addressed to Yursquoe Jiang wsxiaoe163com

Received 9 November 2016 Revised 21 December 2016 Accepted 23 January 2017 Published 7 March 2017

Academic Editor Liangmin Wang

Copyright copy 2017 Yursquoe Jiang and Jiaxiang Liu This is an open access article distributed under the Creative Commons AttributionLicense which permits unrestricted use distribution and reproduction in any medium provided the original work is properlycited

With the rapid growth of aged population in China it is urgent to design a safe and effective monitoring system for the nursinghomes An optimized scheme and high performance security and privacy protection for monitoring system have already becomethe focus studied especially So this paper proposed a health monitoring system with lightweight security and privacy protectionfor nursing homes Dual-band RFID virtual routing location algorithm and diet and exercise data collection based on RFID wereadopted to obtain the location and health information And that fused a mobile authentication protocol based on Hash functionto realize security access and privacy protection which can improve security and reduce the complexity of calculation and theimplementation cost compared with the typical authentication protocols The experiment results show that the ratio of relativenetwork delay is below 35The systemhas strong real-time high securitymore comprehensive data and lower cost of computationand communication It can satisfy the requirements of health monitoring for nursing homes

1 Introduction

It is estimated that China will enter the aging society Howto provide more comprehensive pension services becomesmore and more urgent As families and community canonly provide limited elderly services a tendency to meetthe rocketing demands is to promote healthy monitoringsystem for nursing homes As environment in nursing homesis complex managers cannot focus on every one of theelderly people So the challenge is to provide location serviceand health service in the event of dangerous conditions [1ndash5] With the rapid development of monitoring technologyRFID get more attention due to its advantage such asunique identification moveable identification multitargetsidentification and good environmental adaptability In aword a safe and effective monitoring system based on RFIDfor the nursing homes will be required urgently

Existing monitoring systems based on RFID usuallylack an optimized scheme of data collection and privacy

protection For example in the aspect of data collectionsome are operating in a single frequency band transmittingcollection-data via line even short of effective locationalgorithm and health data collection As we known thereare obvious disadvantages in wireline monitoring systemsuch as routing restriction the lack of flexibility and high-cost In terms of operation of frequency RFID systems canbe divided into four categories low frequency (LF) highfrequency (HF) ultra-frequency (UHF) and microwavewhich have different properties Due to low power strongpenetrating in RFID LF system moveable identification andmultitargets identification in other RFID systems how torealize the combination of the two advantages is a worthytopic [6ndash10] Findings indicated that healthy diet and suf-ficient and regular exercises not only contribute to reduceand resist chronic diseases but also promote physical andpsychological health of elderly people So to establish a systemthat can gather diet and exercise information and do some

HindawiJournal of Electrical and Computer EngineeringVolume 2017 Article ID 1360289 11 pageshttpsdoiorg10115520171360289

2 Journal of Electrical and Computer Engineering

statistical analysis for residents in nursing homes is of greatsignification Manual entry and a survey are applied fordata collection in traditional method which still have someproblems and drawbacks low-efficiency poor data qualityand less data quantity [11ndash14] In another aspect of privacyprotection security and privacy threats exist in the moni-toring system for nursing homes based on RFID in whichpersonal information recording information in daily lifeand personal property information are prone to attacks suchas replay attacks counterfeit attacks and tracking attacksIt is urgent to establish policies and standards for avoidingsecurity issues especially the encryption algorithm basedon Hash function Presently there are Hash-Lock protocolRandomized Hash-Lock protocol and Hash-Chain protocolHowever these have some flaws and fail to solve the securityproblems [15ndash20]

This paper adopts a RFID system with dual-band inwhich low frequency is used to activate the passive tag and theHF is used for communicating A simple algorithm namedvirtual routing location algorithm is introduced to realizearea location It effectively uses RFID and ZigBee technologyto establish an expandedRFIDwireless network for collectinglocation data Amethod of diet and exercise data acquirementbased on RFID technology is also proposed later At thesame time the system effectively integrates a lightweightRFID authentication protocol based on Hash function toachieve secure access and privacy protectionThis protocol iseffective against counterfeiting tracking and replay attacksand realizes the interaction between tag reader and back-end serverThese works show that the new system overcomesthe security leaks and has the merits of an optimized schemeof data collection low communication and computationcomplexity and so on

The rest of this paper can be outlined as follows Sec-tion 2 describes the architecture of the system along withmain modules which is divided into vertical and horizontalaspects functionmodule and security and privacy protectionmodule Section 3 discusses the key technology in thefunction module such as area location and data collectionbased on RFID Section 4 designs a kind of lightweight RFIDauthentication protocol based onHash function from the ver-tical aspect Section 5 sets up experimentation environmentand the network latency is tested along with related workFinally in Section 6 we summarize our discussion

2 System Description

The section mainly focuses on two aspects as follows onthe one hand the architecture of this system is proposedand the frequency selectivity of the RFID system workflowand communication mode are described in detail On theother hand the more detailed function requirements areanalyzed from vertical and horizontal aspects In the verticalaspect the system is divided into monitoring subsystem andservice subsystem Security and privacy are discussed fromthe horizontal aspect Security mode is embedded into everysubsystem such that a unified secure design makes sure thatthe monitoring system runs well

21 Architecture This system conforms to the IOT conceptwhich contains three layers the perceptual layer the networklayer and the application layer [3 7] The perceptual layer isat the most front-end of information collection and includeslocation nodes other data collection nodes sticking tags andRFIDwristbandsThen the information collected is uploadedto the back-end serve by ZigBee network with tree topologyin the network layer Finally the system uses NET+MYSQLtechnologies to realize the development of the whole systemincludingmonitoring subsystem service subsystem and webservice Its design architecture is shown in Figure 1

According to different requirements we choose two kindsof nodes for data collection Location node is designed tocollect the location information and the collection node isfor another data collection Each node communicates withCC2530 module by RS485 busThen ZigBee network formedby CC2530 modules will transmit the whole data to the back-end server

Every location node and RFID wristbands work togetherin two phases activation phase and communication phase125 KHz band is selected to activate passive part in a RFIDwristband and 433MHz band is for communication betweenone node and the active part of a wristband Comparedwith a single frequency band the Dual-band RFID systemcombines the advantage of low frequency and high frequencyeffectively low power and strong penetrating in LF systemmoveable identification andmultitargets identification inHFsystem According to the structure of antenna in a locationnode it can also be divided into single-channel mode anddual-channel mode which suit for different areas to belocated Every collection node mainly communicates withsticking tags which follows the EPC standards DesktopRFID reader with 433MHz frequency band is selected forcollection node to collect diet data part of exercise data andother service data

In the system tags or wristbands any one of RFIDreader and back-end service are connected with each otherby wireless network RFID or ZigBee This quite suits themonitoring system but it also brings a problemThe wirelesschannel is prone to attacks such as replay attack counterfeitattack and tracking attack So security and privacy should bepaid adequate attention

22 Function Module The monitoring system mainly con-tains monitoring subsystem and service subsystem accordingto the actual function from the vertical aspect Each subsys-tem combines with RFID wristbands to realize all-aroundautomatically monitoring management Security and privacyare designed to resist attacks from the horizontal aspect Thedetailed functions are shown in Figure 2

Monitoring subsystem offers a safe and secure environ-ment for the nursing homes residents All residents in thenursing homes wear RFID wristbands that can help the staffmonitor their locations So when dangers occur the staffcan quickly locate and provide appropriate help [5ndash7] Thespecific function is analyzed as follows

Journal of Electrical and Computer Engineering 3

Applicationlayer

Monitoring subsystem Service subsystem

Routing node

Real-time view

Gateway node

Web service

Back-end serve

ZigBee network

Networklayer

Indoor-exercise area

Securityand

privacyprotectionTerminal node

Diet area

Collection node

Sticking tag

Access and entrance area

Location nodePerceptual

layer Location node

wristbands

middot middot middot

Figure 1 The overall architecture

Health monitoring system for nursing homes with lightweight security and privacy protection

Resistance to trackingattack

Resistance tocounterfeit attack

Resistance to Mutual authenticationreplay attack

Service subsystemMonitoring subsystem

Area locationbased on RFID

Track record

Low-battery warning

Detention time

Diet data based onRFID

Exercise data based onREID

Other service data

Figure 2 Function diagram

(1) Area location this module is mainly used for locationQuery for the residents wearing RFID wristbands Oruse the module to achieve a certain period of timestatistics

(2) Low-battery warning the module can monitor theconsuming situation of battery for the RFID wrist-bands A warning signal is transmitted to the staffwhen the battery capacity is below the threshold

4 Journal of Electrical and Computer Engineering

(3) Detection time calculate the detection time in somedangerous and privacy areas such as bathroomsand toilets For example a resident wearing a RFIDwristband stays in these areas longer than normal itis very likely that an emergency has happened

(4) Track record record the daily activities of the resi-dents wearing the RFID wristbands and then pro-vide the information for health assessment or otherrequirements

Service subsystem is designed to offer health serviceand others and collect diet and exercise data which partlyreflects the health of residents in the nursing homes Concreteanalysis is as follows

(1) Diet data based on RFID the diet data for everyresident in the nursing homes are collected by thecollection node tricking tags and RFID wristbandThe back-end serve will record the data and comparewith the standard

(2) Exercise data based on RFID the exercise data comesfrom three kinds of activities the usage of athleticfacilities the usage of indoor recreational area andoutdoor-activities All the exercise data and diet dataare supported to help professionals to access healthstatus for every resident in nursing homes

(3) Other service data the module is for other dataservices querying relational information for everyresident sending blessing on holiday reminding theresident to take medicine and so on

Security and privacy are designed to defend all thesubsystems from threats It can be detailed as follows

(1) Resistance to Counterfeit Attacks It prevents attackersfrom counterfeit RFID tags or readers illegal access topersonal information of the resident guardian informationand sensitive data and so on

(2) Resistance to Tracking Attacks It prevents attackers fromgaining traces of activity by tracking location informationthreatening their person and property

(3) Resistance to Replay Attacks In an extreme case theattacker may obtain relevant information It prevents it frombeing reproduced by using this information thereby illegallypassing the authentication

(4) Mutual Authentication It aims to achieve the tag readerand the back-end server mutual authentication between thethree

Security design will be embedded above the varioussubfunctional modules and unified security design to ensurethat all functional modules are safe The next step will be adetailed analysis of key technologies and the authenticationprotocol in the security module

3 Key Technologies

As mentioned the system is divided into monitoring sub-system and service subsystem from the vertical aspect Thearea location module is very important and supports theother modules And that diet data and exercise data are theimportant parts of service subsystem So in this section wewill focus on the key technologies on these modules arealocation diet data and exercise data collection

31 Area Location Based on RFID According to the structurecharacteristics of the monitoring area in nursing homes itcan be divided into different areas such as indoor gym-nasium area diet area indoor-recreation area and accessand entrance area The system is designed to provide amore flexible easily configurable deployment model So wecan deploy the location node according to actual size ofareas to be monitored and other requirements The actualphysical location is known when the location node has beendeployed In this section we will talk about the process of dataacquisition of one location node and the location algorithm

The location nodes mainly work together with RFIDwristbands then the workflow of one single location nodeand RFID wristband is shown in Figure 3

The process of data acquisition consists of two phasesnamely activate phase and communication phase In thetrigger phase the location node sets control parameters andinitiates readers at first Then the RFID reader (locationnode) will scan RFID tags (RFID wristbands) in its coveragearea Finally when the searched tag ID matches the IDstored in memory the communication can begin In thecommunication phase the RFID reader starts to receive dataafter authenticating successfully If the data is a distress signalor warning signal then give priority to transmit otherwisetransmit the location data in the order queue

The location data mainly contains location array whichcomes from the virtual routing location algorithm In thefollowing parts we will simply describe the basic conceptsabout the algorithm The algorithm uses ZigBee and RFIDtechnology to form the RFID wireless network the coverageis far away As we known the read-write distance of RFIDreader is relatively close So we assume that the tag to belocated has the same physical location with the RFID readerAs the resident wearing RFID wristband moves in the RFIDwireless network the wristband will transmit a location arrayto back-end server The principle of the algorithm is shownin Figure 4

Assuming that the coordinates of all readers are alreadyknown then the coordinate of the tag can be gotten by thealgorithm As shown in Figure 4 the solid line is the actualroute the tag selected and the dotted line is the virtual routewhich is calculated by the algorithm For example the actualroute of the tag can be the same as the virtual route as shownbelow

(0 0) 997888rarr (1 1) 997888rarr (1 2) 997888rarr (1 3) 997888rarr (1 4) 997888rarr (2 4) 997888rarr (3 3) 997888rarr (4 2) 997888rarr (3 1) 997888rarr (3 0) (1)

Journal of Electrical and Computer Engineering 5

Clearthe ID

Start

Set control parameter

Scan coverage area RFID tags

The tag isdetected

The tag ID =

a tag ID in buffer

Activate the tag ready tocommunicate with the

reader

No

No

YesYes

Yes

Yes

YesNo

No

Nocertificate

Start to receive data

Distress signal

Data (tag ID triggernode ID trigger time)

Queue order transmit

Give priority totransmissions

Clear thedata

433MHz security

Figure 3 Workflow for one location node

ReaderTag

Actual routeVirtual route

1

10

2

2

3

3

4

4

Figure 4 Schematic diagram of the algorithm

A location array is chosen to realize the progress of thealgorithm It contains three parameters the ID of the tag thereading time and the ID of the readerThe following formulacan be used⟨119879119894 119905119895 119877119896⟩ = ⟨tag 119895 time 119895 reader 119896⟩ (2)

As shown is formula (2) the location array is expressedby ⟨119879119894 119905119895 119877119896⟩ 119879119894 is the ID of the 119894th tag 119877119896 is the ID of the119896th reader And 119905119895 is the time when the 119896th RFID readerstarts to communicate with the 119894th tag Location arrays arefirstly categorized according to 119879119894 and then according to 119905119895Finally we can get the coordinate of 119896th RFID reader as thecoordinate of 119894th tag at the time of 119905119895 The algorithm is simpleand effective fully in line with the needs of area location forthe nursing homes

32 Health Data Based on RFID In this section we will buildamodule to collect diet and exercise data automatically basedon RFID and do some statistical analysis Diet and exercisedata is usually very complex but there still has certainregularity and periodicity for collective life environmentin nursing homes Based on this application backgrounda simplified model for diet and exercise data collection isdesigned as follows

Diet area is divided into selection-area and settlement-area In selection-area plates and bowls sticking with tagsestablish the one-to-one relationship between each tag andthe food in its plate or bowl The settlement-area mainlycontains RFID readers and displays With the help of stickingtags RFID readers and wristbands the subsystem can realizesettlement and diet data collection quickly and automaticallyNext we will introduce the progress of data analysis in the

6 Journal of Electrical and Computer Engineering

Table 1 Exercise data based on RFID

Categories Indoor-entertainment Outdoor-activities Athletic facilities

MethodsAccumulate the continuous

time by indoor-RFIDreaders

Accumulate the continuoustime by entrance-RFID

readers

Accumulate the exercisetime on athletic facilities by

RFID readersTime (hoursday) 1198791 1198792 1198793The weight 1199081 1199082 1199083back-end server Five categories of the essential nutrients inbody are chosen as the main parameters to analyze whichare proteins fats carbohydrates and trace elements vitaminsand minerals Based on a nutrient criterion proposed byChina and the special requirements for the elderly a dailymeal nutrition supplement standards are designed Com-pared with the standards the system will judge whetherthe daily diet is reasonable and then put forward somesuggestions Finally a mathematical model is built to detailthe progress Let the amount of common food in nursinghomes as 119894 119896 take 1 to 5 respectively as protein fat vitaminsenergy minerals and inorganic salts 119886119896119894 is the value of 119896thnutrient in 119894th food and 119886119894119896 isin 119860 119906119894119896 is the value of dailyintake of 119896th nutrient in 119894th food and 119906119894119896 isin 119861 119906119894119896 = 1the formula indicates that the 119896th nutrient contained in the119894th food is ingested The daily intake of nutrients is shown informula (3)

119884 = 119860 lowast 119880 = (11988611 sdot sdot sdot 1198861119894 d1198861198961 sdot sdot sdot 119886119896119894)(11990611 sdot sdot sdot 1199061119896 d

1199061198941 sdot sdot sdot 119906119894119896)= (11991011 sdot sdot sdot 1199101119894 d

1199101198961 sdot sdot sdot 119910119896119894)(3)

119884 is the daily intake of nutrients 119910119896119894 express the 119896thnutrient intake from the 119894th food Add the elements in thesame column for array 119884 and get a new array 119881 = (V1 V2 V119896) V119896 is the 119896th nutrient you has been absorbed119872 = (1198981 1198982 119898119896) is the standard value of nutrientsComparing the 119881 with 119872 a result that whether you get thesufficient nutrients or not will be offered to the residents andstaff

The system classifies exercises as indoor-entertainmentoutdoor-activities and exercise on athletic facilities Formula(4) as below is used to calculate the amount of exercises dailysimplify

119878 = 119899sum119894=1

(119879119894 lowast 119908119894) (4)

As shown in formula (4) 119899 = 3 119894 = 1 2 3 representindoor-entertainment outdoor-activities and exercise onathletic facilities respectively 119908119894 is the weight value of theamount of the whole exercises The sum amount of 119894th

DataBase(ID㰀

T H(ID㰀T))

(ID㰀R H(ID㰀

R))

Reader

(IDR) (IDT)Tag

① Reader Tag Query rR

③ Reader DataBase Query④ DataBase Reader rD

② Tag DataBase M1M2

⑥ DataBase Reader M㰀3M

㰀4

⑦ Reader Tag M㰀3

⑤ Reader DataBase M2M3M4 rT

M3 rT

rR

Figure 5 The authentication flow of the protocol

exercises daily is 119879119894 and the sum of all kinds of exercise iscalculated by formula (4) noted by 119878The specific progress ofcalculation is shown in Table 1

According to the health status of the elderly and specialneeds daily exercise standards are designed when the elderlychecked in the nursing home And the standard for com-parison to determine the amount of the daily exercise isappropriate or not

4 Security and Privacy

As before security and privacy are very important for thewireless system and security mode is embedded into everysubsystem So a mobile authentication protocol based onHash function is designed in this section The procedure andimplementation of the protocol are discussed as follows

41 Proposed Protocol Based on a one-way Hash functionthis paper proposed a mutual authentication for informationprotection It is depicted in Figure 5 The symbols in theprotocol are described as follows 119867(119909) is the Hash functionof 119909 ID119879 is the identification number of the tag and is storedin the tag ID119877 is the identification number of the RFID readerand is stored in the reader (ID1015840119877 119867(ID1015840119877)) and (ID1015840119879 119867(ID1015840119879))are stored in the DataBase The authentication flow of theprotocol is shown in Figure 5

(1) The RFID reader generates a random number 119903119877 andsends (Query 119903119877) to the tag

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 2: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

2 Journal of Electrical and Computer Engineering

statistical analysis for residents in nursing homes is of greatsignification Manual entry and a survey are applied fordata collection in traditional method which still have someproblems and drawbacks low-efficiency poor data qualityand less data quantity [11ndash14] In another aspect of privacyprotection security and privacy threats exist in the moni-toring system for nursing homes based on RFID in whichpersonal information recording information in daily lifeand personal property information are prone to attacks suchas replay attacks counterfeit attacks and tracking attacksIt is urgent to establish policies and standards for avoidingsecurity issues especially the encryption algorithm basedon Hash function Presently there are Hash-Lock protocolRandomized Hash-Lock protocol and Hash-Chain protocolHowever these have some flaws and fail to solve the securityproblems [15ndash20]

This paper adopts a RFID system with dual-band inwhich low frequency is used to activate the passive tag and theHF is used for communicating A simple algorithm namedvirtual routing location algorithm is introduced to realizearea location It effectively uses RFID and ZigBee technologyto establish an expandedRFIDwireless network for collectinglocation data Amethod of diet and exercise data acquirementbased on RFID technology is also proposed later At thesame time the system effectively integrates a lightweightRFID authentication protocol based on Hash function toachieve secure access and privacy protectionThis protocol iseffective against counterfeiting tracking and replay attacksand realizes the interaction between tag reader and back-end serverThese works show that the new system overcomesthe security leaks and has the merits of an optimized schemeof data collection low communication and computationcomplexity and so on

The rest of this paper can be outlined as follows Sec-tion 2 describes the architecture of the system along withmain modules which is divided into vertical and horizontalaspects functionmodule and security and privacy protectionmodule Section 3 discusses the key technology in thefunction module such as area location and data collectionbased on RFID Section 4 designs a kind of lightweight RFIDauthentication protocol based onHash function from the ver-tical aspect Section 5 sets up experimentation environmentand the network latency is tested along with related workFinally in Section 6 we summarize our discussion

2 System Description

The section mainly focuses on two aspects as follows onthe one hand the architecture of this system is proposedand the frequency selectivity of the RFID system workflowand communication mode are described in detail On theother hand the more detailed function requirements areanalyzed from vertical and horizontal aspects In the verticalaspect the system is divided into monitoring subsystem andservice subsystem Security and privacy are discussed fromthe horizontal aspect Security mode is embedded into everysubsystem such that a unified secure design makes sure thatthe monitoring system runs well

21 Architecture This system conforms to the IOT conceptwhich contains three layers the perceptual layer the networklayer and the application layer [3 7] The perceptual layer isat the most front-end of information collection and includeslocation nodes other data collection nodes sticking tags andRFIDwristbandsThen the information collected is uploadedto the back-end serve by ZigBee network with tree topologyin the network layer Finally the system uses NET+MYSQLtechnologies to realize the development of the whole systemincludingmonitoring subsystem service subsystem and webservice Its design architecture is shown in Figure 1

According to different requirements we choose two kindsof nodes for data collection Location node is designed tocollect the location information and the collection node isfor another data collection Each node communicates withCC2530 module by RS485 busThen ZigBee network formedby CC2530 modules will transmit the whole data to the back-end server

Every location node and RFID wristbands work togetherin two phases activation phase and communication phase125 KHz band is selected to activate passive part in a RFIDwristband and 433MHz band is for communication betweenone node and the active part of a wristband Comparedwith a single frequency band the Dual-band RFID systemcombines the advantage of low frequency and high frequencyeffectively low power and strong penetrating in LF systemmoveable identification andmultitargets identification inHFsystem According to the structure of antenna in a locationnode it can also be divided into single-channel mode anddual-channel mode which suit for different areas to belocated Every collection node mainly communicates withsticking tags which follows the EPC standards DesktopRFID reader with 433MHz frequency band is selected forcollection node to collect diet data part of exercise data andother service data

In the system tags or wristbands any one of RFIDreader and back-end service are connected with each otherby wireless network RFID or ZigBee This quite suits themonitoring system but it also brings a problemThe wirelesschannel is prone to attacks such as replay attack counterfeitattack and tracking attack So security and privacy should bepaid adequate attention

22 Function Module The monitoring system mainly con-tains monitoring subsystem and service subsystem accordingto the actual function from the vertical aspect Each subsys-tem combines with RFID wristbands to realize all-aroundautomatically monitoring management Security and privacyare designed to resist attacks from the horizontal aspect Thedetailed functions are shown in Figure 2

Monitoring subsystem offers a safe and secure environ-ment for the nursing homes residents All residents in thenursing homes wear RFID wristbands that can help the staffmonitor their locations So when dangers occur the staffcan quickly locate and provide appropriate help [5ndash7] Thespecific function is analyzed as follows

Journal of Electrical and Computer Engineering 3

Applicationlayer

Monitoring subsystem Service subsystem

Routing node

Real-time view

Gateway node

Web service

Back-end serve

ZigBee network

Networklayer

Indoor-exercise area

Securityand

privacyprotectionTerminal node

Diet area

Collection node

Sticking tag

Access and entrance area

Location nodePerceptual

layer Location node

wristbands

middot middot middot

Figure 1 The overall architecture

Health monitoring system for nursing homes with lightweight security and privacy protection

Resistance to trackingattack

Resistance tocounterfeit attack

Resistance to Mutual authenticationreplay attack

Service subsystemMonitoring subsystem

Area locationbased on RFID

Track record

Low-battery warning

Detention time

Diet data based onRFID

Exercise data based onREID

Other service data

Figure 2 Function diagram

(1) Area location this module is mainly used for locationQuery for the residents wearing RFID wristbands Oruse the module to achieve a certain period of timestatistics

(2) Low-battery warning the module can monitor theconsuming situation of battery for the RFID wrist-bands A warning signal is transmitted to the staffwhen the battery capacity is below the threshold

4 Journal of Electrical and Computer Engineering

(3) Detection time calculate the detection time in somedangerous and privacy areas such as bathroomsand toilets For example a resident wearing a RFIDwristband stays in these areas longer than normal itis very likely that an emergency has happened

(4) Track record record the daily activities of the resi-dents wearing the RFID wristbands and then pro-vide the information for health assessment or otherrequirements

Service subsystem is designed to offer health serviceand others and collect diet and exercise data which partlyreflects the health of residents in the nursing homes Concreteanalysis is as follows

(1) Diet data based on RFID the diet data for everyresident in the nursing homes are collected by thecollection node tricking tags and RFID wristbandThe back-end serve will record the data and comparewith the standard

(2) Exercise data based on RFID the exercise data comesfrom three kinds of activities the usage of athleticfacilities the usage of indoor recreational area andoutdoor-activities All the exercise data and diet dataare supported to help professionals to access healthstatus for every resident in nursing homes

(3) Other service data the module is for other dataservices querying relational information for everyresident sending blessing on holiday reminding theresident to take medicine and so on

Security and privacy are designed to defend all thesubsystems from threats It can be detailed as follows

(1) Resistance to Counterfeit Attacks It prevents attackersfrom counterfeit RFID tags or readers illegal access topersonal information of the resident guardian informationand sensitive data and so on

(2) Resistance to Tracking Attacks It prevents attackers fromgaining traces of activity by tracking location informationthreatening their person and property

(3) Resistance to Replay Attacks In an extreme case theattacker may obtain relevant information It prevents it frombeing reproduced by using this information thereby illegallypassing the authentication

(4) Mutual Authentication It aims to achieve the tag readerand the back-end server mutual authentication between thethree

Security design will be embedded above the varioussubfunctional modules and unified security design to ensurethat all functional modules are safe The next step will be adetailed analysis of key technologies and the authenticationprotocol in the security module

3 Key Technologies

As mentioned the system is divided into monitoring sub-system and service subsystem from the vertical aspect Thearea location module is very important and supports theother modules And that diet data and exercise data are theimportant parts of service subsystem So in this section wewill focus on the key technologies on these modules arealocation diet data and exercise data collection

31 Area Location Based on RFID According to the structurecharacteristics of the monitoring area in nursing homes itcan be divided into different areas such as indoor gym-nasium area diet area indoor-recreation area and accessand entrance area The system is designed to provide amore flexible easily configurable deployment model So wecan deploy the location node according to actual size ofareas to be monitored and other requirements The actualphysical location is known when the location node has beendeployed In this section we will talk about the process of dataacquisition of one location node and the location algorithm

The location nodes mainly work together with RFIDwristbands then the workflow of one single location nodeand RFID wristband is shown in Figure 3

The process of data acquisition consists of two phasesnamely activate phase and communication phase In thetrigger phase the location node sets control parameters andinitiates readers at first Then the RFID reader (locationnode) will scan RFID tags (RFID wristbands) in its coveragearea Finally when the searched tag ID matches the IDstored in memory the communication can begin In thecommunication phase the RFID reader starts to receive dataafter authenticating successfully If the data is a distress signalor warning signal then give priority to transmit otherwisetransmit the location data in the order queue

The location data mainly contains location array whichcomes from the virtual routing location algorithm In thefollowing parts we will simply describe the basic conceptsabout the algorithm The algorithm uses ZigBee and RFIDtechnology to form the RFID wireless network the coverageis far away As we known the read-write distance of RFIDreader is relatively close So we assume that the tag to belocated has the same physical location with the RFID readerAs the resident wearing RFID wristband moves in the RFIDwireless network the wristband will transmit a location arrayto back-end server The principle of the algorithm is shownin Figure 4

Assuming that the coordinates of all readers are alreadyknown then the coordinate of the tag can be gotten by thealgorithm As shown in Figure 4 the solid line is the actualroute the tag selected and the dotted line is the virtual routewhich is calculated by the algorithm For example the actualroute of the tag can be the same as the virtual route as shownbelow

(0 0) 997888rarr (1 1) 997888rarr (1 2) 997888rarr (1 3) 997888rarr (1 4) 997888rarr (2 4) 997888rarr (3 3) 997888rarr (4 2) 997888rarr (3 1) 997888rarr (3 0) (1)

Journal of Electrical and Computer Engineering 5

Clearthe ID

Start

Set control parameter

Scan coverage area RFID tags

The tag isdetected

The tag ID =

a tag ID in buffer

Activate the tag ready tocommunicate with the

reader

No

No

YesYes

Yes

Yes

YesNo

No

Nocertificate

Start to receive data

Distress signal

Data (tag ID triggernode ID trigger time)

Queue order transmit

Give priority totransmissions

Clear thedata

433MHz security

Figure 3 Workflow for one location node

ReaderTag

Actual routeVirtual route

1

10

2

2

3

3

4

4

Figure 4 Schematic diagram of the algorithm

A location array is chosen to realize the progress of thealgorithm It contains three parameters the ID of the tag thereading time and the ID of the readerThe following formulacan be used⟨119879119894 119905119895 119877119896⟩ = ⟨tag 119895 time 119895 reader 119896⟩ (2)

As shown is formula (2) the location array is expressedby ⟨119879119894 119905119895 119877119896⟩ 119879119894 is the ID of the 119894th tag 119877119896 is the ID of the119896th reader And 119905119895 is the time when the 119896th RFID readerstarts to communicate with the 119894th tag Location arrays arefirstly categorized according to 119879119894 and then according to 119905119895Finally we can get the coordinate of 119896th RFID reader as thecoordinate of 119894th tag at the time of 119905119895 The algorithm is simpleand effective fully in line with the needs of area location forthe nursing homes

32 Health Data Based on RFID In this section we will buildamodule to collect diet and exercise data automatically basedon RFID and do some statistical analysis Diet and exercisedata is usually very complex but there still has certainregularity and periodicity for collective life environmentin nursing homes Based on this application backgrounda simplified model for diet and exercise data collection isdesigned as follows

Diet area is divided into selection-area and settlement-area In selection-area plates and bowls sticking with tagsestablish the one-to-one relationship between each tag andthe food in its plate or bowl The settlement-area mainlycontains RFID readers and displays With the help of stickingtags RFID readers and wristbands the subsystem can realizesettlement and diet data collection quickly and automaticallyNext we will introduce the progress of data analysis in the

6 Journal of Electrical and Computer Engineering

Table 1 Exercise data based on RFID

Categories Indoor-entertainment Outdoor-activities Athletic facilities

MethodsAccumulate the continuous

time by indoor-RFIDreaders

Accumulate the continuoustime by entrance-RFID

readers

Accumulate the exercisetime on athletic facilities by

RFID readersTime (hoursday) 1198791 1198792 1198793The weight 1199081 1199082 1199083back-end server Five categories of the essential nutrients inbody are chosen as the main parameters to analyze whichare proteins fats carbohydrates and trace elements vitaminsand minerals Based on a nutrient criterion proposed byChina and the special requirements for the elderly a dailymeal nutrition supplement standards are designed Com-pared with the standards the system will judge whetherthe daily diet is reasonable and then put forward somesuggestions Finally a mathematical model is built to detailthe progress Let the amount of common food in nursinghomes as 119894 119896 take 1 to 5 respectively as protein fat vitaminsenergy minerals and inorganic salts 119886119896119894 is the value of 119896thnutrient in 119894th food and 119886119894119896 isin 119860 119906119894119896 is the value of dailyintake of 119896th nutrient in 119894th food and 119906119894119896 isin 119861 119906119894119896 = 1the formula indicates that the 119896th nutrient contained in the119894th food is ingested The daily intake of nutrients is shown informula (3)

119884 = 119860 lowast 119880 = (11988611 sdot sdot sdot 1198861119894 d1198861198961 sdot sdot sdot 119886119896119894)(11990611 sdot sdot sdot 1199061119896 d

1199061198941 sdot sdot sdot 119906119894119896)= (11991011 sdot sdot sdot 1199101119894 d

1199101198961 sdot sdot sdot 119910119896119894)(3)

119884 is the daily intake of nutrients 119910119896119894 express the 119896thnutrient intake from the 119894th food Add the elements in thesame column for array 119884 and get a new array 119881 = (V1 V2 V119896) V119896 is the 119896th nutrient you has been absorbed119872 = (1198981 1198982 119898119896) is the standard value of nutrientsComparing the 119881 with 119872 a result that whether you get thesufficient nutrients or not will be offered to the residents andstaff

The system classifies exercises as indoor-entertainmentoutdoor-activities and exercise on athletic facilities Formula(4) as below is used to calculate the amount of exercises dailysimplify

119878 = 119899sum119894=1

(119879119894 lowast 119908119894) (4)

As shown in formula (4) 119899 = 3 119894 = 1 2 3 representindoor-entertainment outdoor-activities and exercise onathletic facilities respectively 119908119894 is the weight value of theamount of the whole exercises The sum amount of 119894th

DataBase(ID㰀

T H(ID㰀T))

(ID㰀R H(ID㰀

R))

Reader

(IDR) (IDT)Tag

① Reader Tag Query rR

③ Reader DataBase Query④ DataBase Reader rD

② Tag DataBase M1M2

⑥ DataBase Reader M㰀3M

㰀4

⑦ Reader Tag M㰀3

⑤ Reader DataBase M2M3M4 rT

M3 rT

rR

Figure 5 The authentication flow of the protocol

exercises daily is 119879119894 and the sum of all kinds of exercise iscalculated by formula (4) noted by 119878The specific progress ofcalculation is shown in Table 1

According to the health status of the elderly and specialneeds daily exercise standards are designed when the elderlychecked in the nursing home And the standard for com-parison to determine the amount of the daily exercise isappropriate or not

4 Security and Privacy

As before security and privacy are very important for thewireless system and security mode is embedded into everysubsystem So a mobile authentication protocol based onHash function is designed in this section The procedure andimplementation of the protocol are discussed as follows

41 Proposed Protocol Based on a one-way Hash functionthis paper proposed a mutual authentication for informationprotection It is depicted in Figure 5 The symbols in theprotocol are described as follows 119867(119909) is the Hash functionof 119909 ID119879 is the identification number of the tag and is storedin the tag ID119877 is the identification number of the RFID readerand is stored in the reader (ID1015840119877 119867(ID1015840119877)) and (ID1015840119879 119867(ID1015840119879))are stored in the DataBase The authentication flow of theprotocol is shown in Figure 5

(1) The RFID reader generates a random number 119903119877 andsends (Query 119903119877) to the tag

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 3: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

Journal of Electrical and Computer Engineering 3

Applicationlayer

Monitoring subsystem Service subsystem

Routing node

Real-time view

Gateway node

Web service

Back-end serve

ZigBee network

Networklayer

Indoor-exercise area

Securityand

privacyprotectionTerminal node

Diet area

Collection node

Sticking tag

Access and entrance area

Location nodePerceptual

layer Location node

wristbands

middot middot middot

Figure 1 The overall architecture

Health monitoring system for nursing homes with lightweight security and privacy protection

Resistance to trackingattack

Resistance tocounterfeit attack

Resistance to Mutual authenticationreplay attack

Service subsystemMonitoring subsystem

Area locationbased on RFID

Track record

Low-battery warning

Detention time

Diet data based onRFID

Exercise data based onREID

Other service data

Figure 2 Function diagram

(1) Area location this module is mainly used for locationQuery for the residents wearing RFID wristbands Oruse the module to achieve a certain period of timestatistics

(2) Low-battery warning the module can monitor theconsuming situation of battery for the RFID wrist-bands A warning signal is transmitted to the staffwhen the battery capacity is below the threshold

4 Journal of Electrical and Computer Engineering

(3) Detection time calculate the detection time in somedangerous and privacy areas such as bathroomsand toilets For example a resident wearing a RFIDwristband stays in these areas longer than normal itis very likely that an emergency has happened

(4) Track record record the daily activities of the resi-dents wearing the RFID wristbands and then pro-vide the information for health assessment or otherrequirements

Service subsystem is designed to offer health serviceand others and collect diet and exercise data which partlyreflects the health of residents in the nursing homes Concreteanalysis is as follows

(1) Diet data based on RFID the diet data for everyresident in the nursing homes are collected by thecollection node tricking tags and RFID wristbandThe back-end serve will record the data and comparewith the standard

(2) Exercise data based on RFID the exercise data comesfrom three kinds of activities the usage of athleticfacilities the usage of indoor recreational area andoutdoor-activities All the exercise data and diet dataare supported to help professionals to access healthstatus for every resident in nursing homes

(3) Other service data the module is for other dataservices querying relational information for everyresident sending blessing on holiday reminding theresident to take medicine and so on

Security and privacy are designed to defend all thesubsystems from threats It can be detailed as follows

(1) Resistance to Counterfeit Attacks It prevents attackersfrom counterfeit RFID tags or readers illegal access topersonal information of the resident guardian informationand sensitive data and so on

(2) Resistance to Tracking Attacks It prevents attackers fromgaining traces of activity by tracking location informationthreatening their person and property

(3) Resistance to Replay Attacks In an extreme case theattacker may obtain relevant information It prevents it frombeing reproduced by using this information thereby illegallypassing the authentication

(4) Mutual Authentication It aims to achieve the tag readerand the back-end server mutual authentication between thethree

Security design will be embedded above the varioussubfunctional modules and unified security design to ensurethat all functional modules are safe The next step will be adetailed analysis of key technologies and the authenticationprotocol in the security module

3 Key Technologies

As mentioned the system is divided into monitoring sub-system and service subsystem from the vertical aspect Thearea location module is very important and supports theother modules And that diet data and exercise data are theimportant parts of service subsystem So in this section wewill focus on the key technologies on these modules arealocation diet data and exercise data collection

31 Area Location Based on RFID According to the structurecharacteristics of the monitoring area in nursing homes itcan be divided into different areas such as indoor gym-nasium area diet area indoor-recreation area and accessand entrance area The system is designed to provide amore flexible easily configurable deployment model So wecan deploy the location node according to actual size ofareas to be monitored and other requirements The actualphysical location is known when the location node has beendeployed In this section we will talk about the process of dataacquisition of one location node and the location algorithm

The location nodes mainly work together with RFIDwristbands then the workflow of one single location nodeand RFID wristband is shown in Figure 3

The process of data acquisition consists of two phasesnamely activate phase and communication phase In thetrigger phase the location node sets control parameters andinitiates readers at first Then the RFID reader (locationnode) will scan RFID tags (RFID wristbands) in its coveragearea Finally when the searched tag ID matches the IDstored in memory the communication can begin In thecommunication phase the RFID reader starts to receive dataafter authenticating successfully If the data is a distress signalor warning signal then give priority to transmit otherwisetransmit the location data in the order queue

The location data mainly contains location array whichcomes from the virtual routing location algorithm In thefollowing parts we will simply describe the basic conceptsabout the algorithm The algorithm uses ZigBee and RFIDtechnology to form the RFID wireless network the coverageis far away As we known the read-write distance of RFIDreader is relatively close So we assume that the tag to belocated has the same physical location with the RFID readerAs the resident wearing RFID wristband moves in the RFIDwireless network the wristband will transmit a location arrayto back-end server The principle of the algorithm is shownin Figure 4

Assuming that the coordinates of all readers are alreadyknown then the coordinate of the tag can be gotten by thealgorithm As shown in Figure 4 the solid line is the actualroute the tag selected and the dotted line is the virtual routewhich is calculated by the algorithm For example the actualroute of the tag can be the same as the virtual route as shownbelow

(0 0) 997888rarr (1 1) 997888rarr (1 2) 997888rarr (1 3) 997888rarr (1 4) 997888rarr (2 4) 997888rarr (3 3) 997888rarr (4 2) 997888rarr (3 1) 997888rarr (3 0) (1)

Journal of Electrical and Computer Engineering 5

Clearthe ID

Start

Set control parameter

Scan coverage area RFID tags

The tag isdetected

The tag ID =

a tag ID in buffer

Activate the tag ready tocommunicate with the

reader

No

No

YesYes

Yes

Yes

YesNo

No

Nocertificate

Start to receive data

Distress signal

Data (tag ID triggernode ID trigger time)

Queue order transmit

Give priority totransmissions

Clear thedata

433MHz security

Figure 3 Workflow for one location node

ReaderTag

Actual routeVirtual route

1

10

2

2

3

3

4

4

Figure 4 Schematic diagram of the algorithm

A location array is chosen to realize the progress of thealgorithm It contains three parameters the ID of the tag thereading time and the ID of the readerThe following formulacan be used⟨119879119894 119905119895 119877119896⟩ = ⟨tag 119895 time 119895 reader 119896⟩ (2)

As shown is formula (2) the location array is expressedby ⟨119879119894 119905119895 119877119896⟩ 119879119894 is the ID of the 119894th tag 119877119896 is the ID of the119896th reader And 119905119895 is the time when the 119896th RFID readerstarts to communicate with the 119894th tag Location arrays arefirstly categorized according to 119879119894 and then according to 119905119895Finally we can get the coordinate of 119896th RFID reader as thecoordinate of 119894th tag at the time of 119905119895 The algorithm is simpleand effective fully in line with the needs of area location forthe nursing homes

32 Health Data Based on RFID In this section we will buildamodule to collect diet and exercise data automatically basedon RFID and do some statistical analysis Diet and exercisedata is usually very complex but there still has certainregularity and periodicity for collective life environmentin nursing homes Based on this application backgrounda simplified model for diet and exercise data collection isdesigned as follows

Diet area is divided into selection-area and settlement-area In selection-area plates and bowls sticking with tagsestablish the one-to-one relationship between each tag andthe food in its plate or bowl The settlement-area mainlycontains RFID readers and displays With the help of stickingtags RFID readers and wristbands the subsystem can realizesettlement and diet data collection quickly and automaticallyNext we will introduce the progress of data analysis in the

6 Journal of Electrical and Computer Engineering

Table 1 Exercise data based on RFID

Categories Indoor-entertainment Outdoor-activities Athletic facilities

MethodsAccumulate the continuous

time by indoor-RFIDreaders

Accumulate the continuoustime by entrance-RFID

readers

Accumulate the exercisetime on athletic facilities by

RFID readersTime (hoursday) 1198791 1198792 1198793The weight 1199081 1199082 1199083back-end server Five categories of the essential nutrients inbody are chosen as the main parameters to analyze whichare proteins fats carbohydrates and trace elements vitaminsand minerals Based on a nutrient criterion proposed byChina and the special requirements for the elderly a dailymeal nutrition supplement standards are designed Com-pared with the standards the system will judge whetherthe daily diet is reasonable and then put forward somesuggestions Finally a mathematical model is built to detailthe progress Let the amount of common food in nursinghomes as 119894 119896 take 1 to 5 respectively as protein fat vitaminsenergy minerals and inorganic salts 119886119896119894 is the value of 119896thnutrient in 119894th food and 119886119894119896 isin 119860 119906119894119896 is the value of dailyintake of 119896th nutrient in 119894th food and 119906119894119896 isin 119861 119906119894119896 = 1the formula indicates that the 119896th nutrient contained in the119894th food is ingested The daily intake of nutrients is shown informula (3)

119884 = 119860 lowast 119880 = (11988611 sdot sdot sdot 1198861119894 d1198861198961 sdot sdot sdot 119886119896119894)(11990611 sdot sdot sdot 1199061119896 d

1199061198941 sdot sdot sdot 119906119894119896)= (11991011 sdot sdot sdot 1199101119894 d

1199101198961 sdot sdot sdot 119910119896119894)(3)

119884 is the daily intake of nutrients 119910119896119894 express the 119896thnutrient intake from the 119894th food Add the elements in thesame column for array 119884 and get a new array 119881 = (V1 V2 V119896) V119896 is the 119896th nutrient you has been absorbed119872 = (1198981 1198982 119898119896) is the standard value of nutrientsComparing the 119881 with 119872 a result that whether you get thesufficient nutrients or not will be offered to the residents andstaff

The system classifies exercises as indoor-entertainmentoutdoor-activities and exercise on athletic facilities Formula(4) as below is used to calculate the amount of exercises dailysimplify

119878 = 119899sum119894=1

(119879119894 lowast 119908119894) (4)

As shown in formula (4) 119899 = 3 119894 = 1 2 3 representindoor-entertainment outdoor-activities and exercise onathletic facilities respectively 119908119894 is the weight value of theamount of the whole exercises The sum amount of 119894th

DataBase(ID㰀

T H(ID㰀T))

(ID㰀R H(ID㰀

R))

Reader

(IDR) (IDT)Tag

① Reader Tag Query rR

③ Reader DataBase Query④ DataBase Reader rD

② Tag DataBase M1M2

⑥ DataBase Reader M㰀3M

㰀4

⑦ Reader Tag M㰀3

⑤ Reader DataBase M2M3M4 rT

M3 rT

rR

Figure 5 The authentication flow of the protocol

exercises daily is 119879119894 and the sum of all kinds of exercise iscalculated by formula (4) noted by 119878The specific progress ofcalculation is shown in Table 1

According to the health status of the elderly and specialneeds daily exercise standards are designed when the elderlychecked in the nursing home And the standard for com-parison to determine the amount of the daily exercise isappropriate or not

4 Security and Privacy

As before security and privacy are very important for thewireless system and security mode is embedded into everysubsystem So a mobile authentication protocol based onHash function is designed in this section The procedure andimplementation of the protocol are discussed as follows

41 Proposed Protocol Based on a one-way Hash functionthis paper proposed a mutual authentication for informationprotection It is depicted in Figure 5 The symbols in theprotocol are described as follows 119867(119909) is the Hash functionof 119909 ID119879 is the identification number of the tag and is storedin the tag ID119877 is the identification number of the RFID readerand is stored in the reader (ID1015840119877 119867(ID1015840119877)) and (ID1015840119879 119867(ID1015840119879))are stored in the DataBase The authentication flow of theprotocol is shown in Figure 5

(1) The RFID reader generates a random number 119903119877 andsends (Query 119903119877) to the tag

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 4: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

4 Journal of Electrical and Computer Engineering

(3) Detection time calculate the detection time in somedangerous and privacy areas such as bathroomsand toilets For example a resident wearing a RFIDwristband stays in these areas longer than normal itis very likely that an emergency has happened

(4) Track record record the daily activities of the resi-dents wearing the RFID wristbands and then pro-vide the information for health assessment or otherrequirements

Service subsystem is designed to offer health serviceand others and collect diet and exercise data which partlyreflects the health of residents in the nursing homes Concreteanalysis is as follows

(1) Diet data based on RFID the diet data for everyresident in the nursing homes are collected by thecollection node tricking tags and RFID wristbandThe back-end serve will record the data and comparewith the standard

(2) Exercise data based on RFID the exercise data comesfrom three kinds of activities the usage of athleticfacilities the usage of indoor recreational area andoutdoor-activities All the exercise data and diet dataare supported to help professionals to access healthstatus for every resident in nursing homes

(3) Other service data the module is for other dataservices querying relational information for everyresident sending blessing on holiday reminding theresident to take medicine and so on

Security and privacy are designed to defend all thesubsystems from threats It can be detailed as follows

(1) Resistance to Counterfeit Attacks It prevents attackersfrom counterfeit RFID tags or readers illegal access topersonal information of the resident guardian informationand sensitive data and so on

(2) Resistance to Tracking Attacks It prevents attackers fromgaining traces of activity by tracking location informationthreatening their person and property

(3) Resistance to Replay Attacks In an extreme case theattacker may obtain relevant information It prevents it frombeing reproduced by using this information thereby illegallypassing the authentication

(4) Mutual Authentication It aims to achieve the tag readerand the back-end server mutual authentication between thethree

Security design will be embedded above the varioussubfunctional modules and unified security design to ensurethat all functional modules are safe The next step will be adetailed analysis of key technologies and the authenticationprotocol in the security module

3 Key Technologies

As mentioned the system is divided into monitoring sub-system and service subsystem from the vertical aspect Thearea location module is very important and supports theother modules And that diet data and exercise data are theimportant parts of service subsystem So in this section wewill focus on the key technologies on these modules arealocation diet data and exercise data collection

31 Area Location Based on RFID According to the structurecharacteristics of the monitoring area in nursing homes itcan be divided into different areas such as indoor gym-nasium area diet area indoor-recreation area and accessand entrance area The system is designed to provide amore flexible easily configurable deployment model So wecan deploy the location node according to actual size ofareas to be monitored and other requirements The actualphysical location is known when the location node has beendeployed In this section we will talk about the process of dataacquisition of one location node and the location algorithm

The location nodes mainly work together with RFIDwristbands then the workflow of one single location nodeand RFID wristband is shown in Figure 3

The process of data acquisition consists of two phasesnamely activate phase and communication phase In thetrigger phase the location node sets control parameters andinitiates readers at first Then the RFID reader (locationnode) will scan RFID tags (RFID wristbands) in its coveragearea Finally when the searched tag ID matches the IDstored in memory the communication can begin In thecommunication phase the RFID reader starts to receive dataafter authenticating successfully If the data is a distress signalor warning signal then give priority to transmit otherwisetransmit the location data in the order queue

The location data mainly contains location array whichcomes from the virtual routing location algorithm In thefollowing parts we will simply describe the basic conceptsabout the algorithm The algorithm uses ZigBee and RFIDtechnology to form the RFID wireless network the coverageis far away As we known the read-write distance of RFIDreader is relatively close So we assume that the tag to belocated has the same physical location with the RFID readerAs the resident wearing RFID wristband moves in the RFIDwireless network the wristband will transmit a location arrayto back-end server The principle of the algorithm is shownin Figure 4

Assuming that the coordinates of all readers are alreadyknown then the coordinate of the tag can be gotten by thealgorithm As shown in Figure 4 the solid line is the actualroute the tag selected and the dotted line is the virtual routewhich is calculated by the algorithm For example the actualroute of the tag can be the same as the virtual route as shownbelow

(0 0) 997888rarr (1 1) 997888rarr (1 2) 997888rarr (1 3) 997888rarr (1 4) 997888rarr (2 4) 997888rarr (3 3) 997888rarr (4 2) 997888rarr (3 1) 997888rarr (3 0) (1)

Journal of Electrical and Computer Engineering 5

Clearthe ID

Start

Set control parameter

Scan coverage area RFID tags

The tag isdetected

The tag ID =

a tag ID in buffer

Activate the tag ready tocommunicate with the

reader

No

No

YesYes

Yes

Yes

YesNo

No

Nocertificate

Start to receive data

Distress signal

Data (tag ID triggernode ID trigger time)

Queue order transmit

Give priority totransmissions

Clear thedata

433MHz security

Figure 3 Workflow for one location node

ReaderTag

Actual routeVirtual route

1

10

2

2

3

3

4

4

Figure 4 Schematic diagram of the algorithm

A location array is chosen to realize the progress of thealgorithm It contains three parameters the ID of the tag thereading time and the ID of the readerThe following formulacan be used⟨119879119894 119905119895 119877119896⟩ = ⟨tag 119895 time 119895 reader 119896⟩ (2)

As shown is formula (2) the location array is expressedby ⟨119879119894 119905119895 119877119896⟩ 119879119894 is the ID of the 119894th tag 119877119896 is the ID of the119896th reader And 119905119895 is the time when the 119896th RFID readerstarts to communicate with the 119894th tag Location arrays arefirstly categorized according to 119879119894 and then according to 119905119895Finally we can get the coordinate of 119896th RFID reader as thecoordinate of 119894th tag at the time of 119905119895 The algorithm is simpleand effective fully in line with the needs of area location forthe nursing homes

32 Health Data Based on RFID In this section we will buildamodule to collect diet and exercise data automatically basedon RFID and do some statistical analysis Diet and exercisedata is usually very complex but there still has certainregularity and periodicity for collective life environmentin nursing homes Based on this application backgrounda simplified model for diet and exercise data collection isdesigned as follows

Diet area is divided into selection-area and settlement-area In selection-area plates and bowls sticking with tagsestablish the one-to-one relationship between each tag andthe food in its plate or bowl The settlement-area mainlycontains RFID readers and displays With the help of stickingtags RFID readers and wristbands the subsystem can realizesettlement and diet data collection quickly and automaticallyNext we will introduce the progress of data analysis in the

6 Journal of Electrical and Computer Engineering

Table 1 Exercise data based on RFID

Categories Indoor-entertainment Outdoor-activities Athletic facilities

MethodsAccumulate the continuous

time by indoor-RFIDreaders

Accumulate the continuoustime by entrance-RFID

readers

Accumulate the exercisetime on athletic facilities by

RFID readersTime (hoursday) 1198791 1198792 1198793The weight 1199081 1199082 1199083back-end server Five categories of the essential nutrients inbody are chosen as the main parameters to analyze whichare proteins fats carbohydrates and trace elements vitaminsand minerals Based on a nutrient criterion proposed byChina and the special requirements for the elderly a dailymeal nutrition supplement standards are designed Com-pared with the standards the system will judge whetherthe daily diet is reasonable and then put forward somesuggestions Finally a mathematical model is built to detailthe progress Let the amount of common food in nursinghomes as 119894 119896 take 1 to 5 respectively as protein fat vitaminsenergy minerals and inorganic salts 119886119896119894 is the value of 119896thnutrient in 119894th food and 119886119894119896 isin 119860 119906119894119896 is the value of dailyintake of 119896th nutrient in 119894th food and 119906119894119896 isin 119861 119906119894119896 = 1the formula indicates that the 119896th nutrient contained in the119894th food is ingested The daily intake of nutrients is shown informula (3)

119884 = 119860 lowast 119880 = (11988611 sdot sdot sdot 1198861119894 d1198861198961 sdot sdot sdot 119886119896119894)(11990611 sdot sdot sdot 1199061119896 d

1199061198941 sdot sdot sdot 119906119894119896)= (11991011 sdot sdot sdot 1199101119894 d

1199101198961 sdot sdot sdot 119910119896119894)(3)

119884 is the daily intake of nutrients 119910119896119894 express the 119896thnutrient intake from the 119894th food Add the elements in thesame column for array 119884 and get a new array 119881 = (V1 V2 V119896) V119896 is the 119896th nutrient you has been absorbed119872 = (1198981 1198982 119898119896) is the standard value of nutrientsComparing the 119881 with 119872 a result that whether you get thesufficient nutrients or not will be offered to the residents andstaff

The system classifies exercises as indoor-entertainmentoutdoor-activities and exercise on athletic facilities Formula(4) as below is used to calculate the amount of exercises dailysimplify

119878 = 119899sum119894=1

(119879119894 lowast 119908119894) (4)

As shown in formula (4) 119899 = 3 119894 = 1 2 3 representindoor-entertainment outdoor-activities and exercise onathletic facilities respectively 119908119894 is the weight value of theamount of the whole exercises The sum amount of 119894th

DataBase(ID㰀

T H(ID㰀T))

(ID㰀R H(ID㰀

R))

Reader

(IDR) (IDT)Tag

① Reader Tag Query rR

③ Reader DataBase Query④ DataBase Reader rD

② Tag DataBase M1M2

⑥ DataBase Reader M㰀3M

㰀4

⑦ Reader Tag M㰀3

⑤ Reader DataBase M2M3M4 rT

M3 rT

rR

Figure 5 The authentication flow of the protocol

exercises daily is 119879119894 and the sum of all kinds of exercise iscalculated by formula (4) noted by 119878The specific progress ofcalculation is shown in Table 1

According to the health status of the elderly and specialneeds daily exercise standards are designed when the elderlychecked in the nursing home And the standard for com-parison to determine the amount of the daily exercise isappropriate or not

4 Security and Privacy

As before security and privacy are very important for thewireless system and security mode is embedded into everysubsystem So a mobile authentication protocol based onHash function is designed in this section The procedure andimplementation of the protocol are discussed as follows

41 Proposed Protocol Based on a one-way Hash functionthis paper proposed a mutual authentication for informationprotection It is depicted in Figure 5 The symbols in theprotocol are described as follows 119867(119909) is the Hash functionof 119909 ID119879 is the identification number of the tag and is storedin the tag ID119877 is the identification number of the RFID readerand is stored in the reader (ID1015840119877 119867(ID1015840119877)) and (ID1015840119879 119867(ID1015840119879))are stored in the DataBase The authentication flow of theprotocol is shown in Figure 5

(1) The RFID reader generates a random number 119903119877 andsends (Query 119903119877) to the tag

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 5: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

Journal of Electrical and Computer Engineering 5

Clearthe ID

Start

Set control parameter

Scan coverage area RFID tags

The tag isdetected

The tag ID =

a tag ID in buffer

Activate the tag ready tocommunicate with the

reader

No

No

YesYes

Yes

Yes

YesNo

No

Nocertificate

Start to receive data

Distress signal

Data (tag ID triggernode ID trigger time)

Queue order transmit

Give priority totransmissions

Clear thedata

433MHz security

Figure 3 Workflow for one location node

ReaderTag

Actual routeVirtual route

1

10

2

2

3

3

4

4

Figure 4 Schematic diagram of the algorithm

A location array is chosen to realize the progress of thealgorithm It contains three parameters the ID of the tag thereading time and the ID of the readerThe following formulacan be used⟨119879119894 119905119895 119877119896⟩ = ⟨tag 119895 time 119895 reader 119896⟩ (2)

As shown is formula (2) the location array is expressedby ⟨119879119894 119905119895 119877119896⟩ 119879119894 is the ID of the 119894th tag 119877119896 is the ID of the119896th reader And 119905119895 is the time when the 119896th RFID readerstarts to communicate with the 119894th tag Location arrays arefirstly categorized according to 119879119894 and then according to 119905119895Finally we can get the coordinate of 119896th RFID reader as thecoordinate of 119894th tag at the time of 119905119895 The algorithm is simpleand effective fully in line with the needs of area location forthe nursing homes

32 Health Data Based on RFID In this section we will buildamodule to collect diet and exercise data automatically basedon RFID and do some statistical analysis Diet and exercisedata is usually very complex but there still has certainregularity and periodicity for collective life environmentin nursing homes Based on this application backgrounda simplified model for diet and exercise data collection isdesigned as follows

Diet area is divided into selection-area and settlement-area In selection-area plates and bowls sticking with tagsestablish the one-to-one relationship between each tag andthe food in its plate or bowl The settlement-area mainlycontains RFID readers and displays With the help of stickingtags RFID readers and wristbands the subsystem can realizesettlement and diet data collection quickly and automaticallyNext we will introduce the progress of data analysis in the

6 Journal of Electrical and Computer Engineering

Table 1 Exercise data based on RFID

Categories Indoor-entertainment Outdoor-activities Athletic facilities

MethodsAccumulate the continuous

time by indoor-RFIDreaders

Accumulate the continuoustime by entrance-RFID

readers

Accumulate the exercisetime on athletic facilities by

RFID readersTime (hoursday) 1198791 1198792 1198793The weight 1199081 1199082 1199083back-end server Five categories of the essential nutrients inbody are chosen as the main parameters to analyze whichare proteins fats carbohydrates and trace elements vitaminsand minerals Based on a nutrient criterion proposed byChina and the special requirements for the elderly a dailymeal nutrition supplement standards are designed Com-pared with the standards the system will judge whetherthe daily diet is reasonable and then put forward somesuggestions Finally a mathematical model is built to detailthe progress Let the amount of common food in nursinghomes as 119894 119896 take 1 to 5 respectively as protein fat vitaminsenergy minerals and inorganic salts 119886119896119894 is the value of 119896thnutrient in 119894th food and 119886119894119896 isin 119860 119906119894119896 is the value of dailyintake of 119896th nutrient in 119894th food and 119906119894119896 isin 119861 119906119894119896 = 1the formula indicates that the 119896th nutrient contained in the119894th food is ingested The daily intake of nutrients is shown informula (3)

119884 = 119860 lowast 119880 = (11988611 sdot sdot sdot 1198861119894 d1198861198961 sdot sdot sdot 119886119896119894)(11990611 sdot sdot sdot 1199061119896 d

1199061198941 sdot sdot sdot 119906119894119896)= (11991011 sdot sdot sdot 1199101119894 d

1199101198961 sdot sdot sdot 119910119896119894)(3)

119884 is the daily intake of nutrients 119910119896119894 express the 119896thnutrient intake from the 119894th food Add the elements in thesame column for array 119884 and get a new array 119881 = (V1 V2 V119896) V119896 is the 119896th nutrient you has been absorbed119872 = (1198981 1198982 119898119896) is the standard value of nutrientsComparing the 119881 with 119872 a result that whether you get thesufficient nutrients or not will be offered to the residents andstaff

The system classifies exercises as indoor-entertainmentoutdoor-activities and exercise on athletic facilities Formula(4) as below is used to calculate the amount of exercises dailysimplify

119878 = 119899sum119894=1

(119879119894 lowast 119908119894) (4)

As shown in formula (4) 119899 = 3 119894 = 1 2 3 representindoor-entertainment outdoor-activities and exercise onathletic facilities respectively 119908119894 is the weight value of theamount of the whole exercises The sum amount of 119894th

DataBase(ID㰀

T H(ID㰀T))

(ID㰀R H(ID㰀

R))

Reader

(IDR) (IDT)Tag

① Reader Tag Query rR

③ Reader DataBase Query④ DataBase Reader rD

② Tag DataBase M1M2

⑥ DataBase Reader M㰀3M

㰀4

⑦ Reader Tag M㰀3

⑤ Reader DataBase M2M3M4 rT

M3 rT

rR

Figure 5 The authentication flow of the protocol

exercises daily is 119879119894 and the sum of all kinds of exercise iscalculated by formula (4) noted by 119878The specific progress ofcalculation is shown in Table 1

According to the health status of the elderly and specialneeds daily exercise standards are designed when the elderlychecked in the nursing home And the standard for com-parison to determine the amount of the daily exercise isappropriate or not

4 Security and Privacy

As before security and privacy are very important for thewireless system and security mode is embedded into everysubsystem So a mobile authentication protocol based onHash function is designed in this section The procedure andimplementation of the protocol are discussed as follows

41 Proposed Protocol Based on a one-way Hash functionthis paper proposed a mutual authentication for informationprotection It is depicted in Figure 5 The symbols in theprotocol are described as follows 119867(119909) is the Hash functionof 119909 ID119879 is the identification number of the tag and is storedin the tag ID119877 is the identification number of the RFID readerand is stored in the reader (ID1015840119877 119867(ID1015840119877)) and (ID1015840119879 119867(ID1015840119879))are stored in the DataBase The authentication flow of theprotocol is shown in Figure 5

(1) The RFID reader generates a random number 119903119877 andsends (Query 119903119877) to the tag

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 6: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

6 Journal of Electrical and Computer Engineering

Table 1 Exercise data based on RFID

Categories Indoor-entertainment Outdoor-activities Athletic facilities

MethodsAccumulate the continuous

time by indoor-RFIDreaders

Accumulate the continuoustime by entrance-RFID

readers

Accumulate the exercisetime on athletic facilities by

RFID readersTime (hoursday) 1198791 1198792 1198793The weight 1199081 1199082 1199083back-end server Five categories of the essential nutrients inbody are chosen as the main parameters to analyze whichare proteins fats carbohydrates and trace elements vitaminsand minerals Based on a nutrient criterion proposed byChina and the special requirements for the elderly a dailymeal nutrition supplement standards are designed Com-pared with the standards the system will judge whetherthe daily diet is reasonable and then put forward somesuggestions Finally a mathematical model is built to detailthe progress Let the amount of common food in nursinghomes as 119894 119896 take 1 to 5 respectively as protein fat vitaminsenergy minerals and inorganic salts 119886119896119894 is the value of 119896thnutrient in 119894th food and 119886119894119896 isin 119860 119906119894119896 is the value of dailyintake of 119896th nutrient in 119894th food and 119906119894119896 isin 119861 119906119894119896 = 1the formula indicates that the 119896th nutrient contained in the119894th food is ingested The daily intake of nutrients is shown informula (3)

119884 = 119860 lowast 119880 = (11988611 sdot sdot sdot 1198861119894 d1198861198961 sdot sdot sdot 119886119896119894)(11990611 sdot sdot sdot 1199061119896 d

1199061198941 sdot sdot sdot 119906119894119896)= (11991011 sdot sdot sdot 1199101119894 d

1199101198961 sdot sdot sdot 119910119896119894)(3)

119884 is the daily intake of nutrients 119910119896119894 express the 119896thnutrient intake from the 119894th food Add the elements in thesame column for array 119884 and get a new array 119881 = (V1 V2 V119896) V119896 is the 119896th nutrient you has been absorbed119872 = (1198981 1198982 119898119896) is the standard value of nutrientsComparing the 119881 with 119872 a result that whether you get thesufficient nutrients or not will be offered to the residents andstaff

The system classifies exercises as indoor-entertainmentoutdoor-activities and exercise on athletic facilities Formula(4) as below is used to calculate the amount of exercises dailysimplify

119878 = 119899sum119894=1

(119879119894 lowast 119908119894) (4)

As shown in formula (4) 119899 = 3 119894 = 1 2 3 representindoor-entertainment outdoor-activities and exercise onathletic facilities respectively 119908119894 is the weight value of theamount of the whole exercises The sum amount of 119894th

DataBase(ID㰀

T H(ID㰀T))

(ID㰀R H(ID㰀

R))

Reader

(IDR) (IDT)Tag

① Reader Tag Query rR

③ Reader DataBase Query④ DataBase Reader rD

② Tag DataBase M1M2

⑥ DataBase Reader M㰀3M

㰀4

⑦ Reader Tag M㰀3

⑤ Reader DataBase M2M3M4 rT

M3 rT

rR

Figure 5 The authentication flow of the protocol

exercises daily is 119879119894 and the sum of all kinds of exercise iscalculated by formula (4) noted by 119878The specific progress ofcalculation is shown in Table 1

According to the health status of the elderly and specialneeds daily exercise standards are designed when the elderlychecked in the nursing home And the standard for com-parison to determine the amount of the daily exercise isappropriate or not

4 Security and Privacy

As before security and privacy are very important for thewireless system and security mode is embedded into everysubsystem So a mobile authentication protocol based onHash function is designed in this section The procedure andimplementation of the protocol are discussed as follows

41 Proposed Protocol Based on a one-way Hash functionthis paper proposed a mutual authentication for informationprotection It is depicted in Figure 5 The symbols in theprotocol are described as follows 119867(119909) is the Hash functionof 119909 ID119879 is the identification number of the tag and is storedin the tag ID119877 is the identification number of the RFID readerand is stored in the reader (ID1015840119877 119867(ID1015840119877)) and (ID1015840119879 119867(ID1015840119879))are stored in the DataBase The authentication flow of theprotocol is shown in Figure 5

(1) The RFID reader generates a random number 119903119877 andsends (Query 119903119877) to the tag

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 7: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

Journal of Electrical and Computer Engineering 7

Table 2 Protocol performance analysis

Performance actor Hash-Lock Radom Hash-Lock Hash-Chain The proposed protocolComputational complexity

Tag 1119867 1119867 + 1119877 2119867 3119867 + 1119877Reader mdash (sum(1198992))119867 mdash 4119867 + 1119877DataBase mdash mdash (sum(1198992))119867 4119867 + 1119877

Security performanceResistance to counterfeiting attacks times times times Resistance to tracking attacks times times Resistance to replay attacks times times times Two-way authentication times times (2) The tag receives the data generates a random number119903119879 and then uses the received number and calculates1198721 = 119867(119903119877 119903119879) 1198722 = 119867(ID119879) oplus 1198721 and 1198723 =119867(ID119879 119903119877 119903119879)1198723 is stored in the tag and (119872111987221198723 119903119879) are sent to the reader(3) Using the received random number 119903119879 and its gener-

ated random number 119903119877 the reader calculates 11987210158401 =119867(119903119877 119903119879) Then it makes a judge whether 11987210158401 isequal to the received variable 1198721 if 11987210158401 = 1198721 thetag is authenticated And then Query is sent to theDataBase

(4) After receiving the Query the DataBase generates arandom number 119903119863 and sends it to the reader

(5) Using the received 119903119863 and its own numbers 119903119877 andID119877 the reader calculates the following numbers1198724 = 119867(ID119877) oplus 119867(119903119877 119903119863) and 1198725 = 119867(ID119877 119903119877 119903119863) 1198725 is stored in the reader and (119872211987231198724 119903119879 119903119877) are sent to the DataBase

(6) When the DataBase receives the data it will carryon the following three steps The first step is toauthenticate the reader it calculates11986710158401015840(ID119877) = 1198724oplus119867(119903119877 119903119863) tomeet the requirement of (ID1015840119877 119867(ID1015840119877))which are stored in the DataBase And if 11986710158401015840(ID119877) =119867(ID1015840119877) the reader is authenticated In the secondstep it calculates 11986710158401015840(ID119879) = 1198722 oplus 119867(119903119877 119903119879) If11986710158401015840(ID119879) = 119867(ID1015840119879) the tag is authenticated Thethird step calculates 11987210158405 = 119867(ID1015840119877 119903119863 119903119877) and11987210158403 = 119867(ID1015840119879 119903119879 119903119877) and sends (1198721015840311987210158405) to thereader

(7) The reader compares the received data 11987210158405 with thedata 1198725 which is stored earlier If 11987210158405 = 1198725 thenthe reader authenticates the DataBase and sends 11987210158403to the tag

(8) The tag receives the data 11987210158403 and compares it to thedata 1198723 which is stored in tag earlier If 11987210158403 = 1198723then the tag authenticates both the Reader and theDataBase

42 Protocol Performance Analysis The following will ana-lyze security performances of the proposed protocol fromfour aspects

(1) Resistance to Counterfeiting Attacks The protocol caneffectively exploit the one-way of Hash function The attack-ers cannot analyze the identification numbers of the tag orthe reader by intercepting data So the system has the abilityto resist counterfeiting attacks

(2) Resistance to Tracking Attacks The tag the reader and theDataBase will generate random numbers the response dataare changing in each certification process So attackers areunable to obtain location information thus avoiding trackingattacks

(3) Resistance to Replay Attacks The random numbers of thetag the reader and the DataBase are changed during eachauthentication process so that the previous authenticationinformation cannot be used to complete the replay attacks

(4) Two-Way Authentication Firstly the reader authenticatesthe tag by judging whether 11987210158401 = 1198721 Then the DateBaseverifies the security of the tag and the reader by the received(119872211987231198724 119903119879 119903119877) Finally the reader authenticates theDataBase by the formula11987210158405 = 1198725 And the tag verifies thatthe formula 11987210158403 = 1198723 is true and authenticates the Readerand the DataBase

On the basis of security considerations the protocolproposed also effectively reduces the calculation of the tagreducing tag costs and the use of energy consumption asshown in Table 2 In Table 2 119867 is the Hash function 119877 isthe random function 119899 is the total number of tags and ldquomdashrdquois not Hash function random function and so on [18ndash20]

As shown in Table 2 this authentication protocol fullyconsiders the newproblems brought by thewireless transmis-sion of the mobile RFID system compared with the classicalprotocol The proposed protocol balances the computationalprotocol at the tag the reader and the DataBase whileproviding strong security which can resist various types ofattacks obtain dual-authentication and decrease computa-tional complexity All these performancesmake the proposedthe system be appropriate for the nursing homes usage

5 Performance Testing and Related Work

The following will analyze the performance and related workto verify the feasibility and superiority of the system Firstly

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 8: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

8 Journal of Electrical and Computer Engineering

Node 1

Coordinate

Node 2

Node 3

Node 4

Node 5

Node 6

Node 7

Node 8

204

202201

203

205

206

Figure 6 Location nodes layout diagram

we will build the test environment testing the systemrsquos net-work delay characteristics and then analyze the related workof the system and compare it with the common monitoringsystem

51 Performance Testing Because the indoor layout of thenursing home is similar to the laboratory we choose thesecond floor laboratory to carry out system testing Themonitoring rooms are divided into 201 room 202 room 203room 204 room 205 room 206 room the lobby and serverroom as shown in Figure 6

As shown in Figure 6 the RFID node 1 and node 2 arelocated in the lobby area The node 3 is arranged at theentrance of the room 201 Moreover node 4 is located at the203 entrance of the room 203 node 5 at the room 205 node8 at the room 206 node 7 at the room 204 and node 6 atthe room 202 The coordinate node is arranged at the serverroom and connected with the back-end server The distancebetween the location nodes is 6ndash8 meters and the nodes thatare far away from the server communicate with their nearestnodes as the parent nodeWe use packet sniffer and hardwaretimers to test the system Assume that the data acquisitioninterval is 5 s and 100 times for each node during the testTheaverage network delay for each node is shown in Figure 7

From Figure 7 we can see that the network latency ofnodes 1 2 3 and 6 is close to each other In the networktopology these nodes are single-hop nodes and the actualphysical location is closer to the coordinator node Node 4and node 7 are close to each other In the network topologythey are two-hop nodes Node 5 and node 8 are three-hopnodes and the network delay is relatively large Thereforethe system topology design has some impact on the networkdelay but overall adding a security authentication protocolincreases the systemrsquos average network latency [19 20] andthe simulation show that the implementation of the protocol

Average network delay of each node

Node

No protocolThis paper

0 1 2 3 4 5 6 7 80

02

04

06

08

1

12

14

16

18

2

Aver

age n

etw

ork

delay

(s)

Figure 7 The average network delay of each node

time is about 500ndash550ms but manymonitoring systems dataacquisition time is about 5ndash60 s So here 5 s is chosen as thesampling interval we discuss the relative network latency andthe average network delay divided by the sampling intervalas shown in Figure 8

Figure 8 shows that comparedwith the sampling intervalthe relative network delay for the proposed system withlightweight security and privacy protocol is less than 35 sothe authentication protocol does not affect the system real-time data collection but can greatly improve system securityand privacy

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 9: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

Journal of Electrical and Computer Engineering 9

Table 3 Week of diet data from a tester

Dataappliance Week of diet data from a testerProtein (g) Fat (g) Vitamins (mg) Minerals and inorganic salts (mg) Energy (KJ)

02102016 (Sun) 731 237 8132 5828 6307503102016 (Mon) 761 455 13075 627333 69538104102106 (Tue) 952 603 863 783285 72006705102016 (Wed) 1075 718 8408 740973 97905606102016 (Thu) 871 45 8935 689935 72843407102016 (Fri) 928 637 11355 754183 80374608102016 (Sat) 661 296 4636 52829 551451Mean 8541 4851 9024 6724 72984Reference value 65sim75 25 1305sim1314 6530 7100sim9200Conclusion High High Low High Normal

Table 4 Week of exercise data from a tester

Dataappliance

Week of exercise data from a testerIndoor-

entertainment(1199081 = 02) Outdoor-activities

(1199082 = 035) Athletic facilities(1199083 = 045) Sum (hour) Reference value

(hour)

02102016 (Sun) 2 hours 05 hour 03 hour 071

06sim103102016 (Mon) 3 hours 08 hour 02 hour 09704102106 (Tue) 25 hours 1 hour 02 hour 09405102016 (Wed) 4 hours 01 hour 0 hours 083506102016 (Thu) 36 hours 03 hour 03 hour 09607102016 (Fri) 28 hours 04 hour 01 hour 074508102016 (Sat) 36 hours 03 hour 03 hour 096

Relative network delay

No protocolThis paper

02

0 2 3 4 5 6 7 8 910

005

01

015

025

03

035

04

Aver

age n

etw

ork

delay

sam

plin

g in

terv

al (

)

Node

Figure 8 Relative network delay

In the experimental environment we collected a week ofdiet and exercise data from a tester as shown in Tables 3 and4

In Table 3 the reference value comes from daily intake ofdietary nutrient values for Chinese residents aged 60 yearsand over The nursing home provides a basic diet menusimilar to the one provided each week which facilitates thecollection of diet data In Table 4 the reference value can beadjusted according to the previous exercise and health statusWe can see that week of diet and exercise data have certainregularity and periodicity to reflect the elderlyrsquos diet andexercise status which can monitor the health of the elderly

52 Related Work There are a lot of monitoring systemsbut few ones are in line with the needs of nursing homes inall aspects Reference [21] introduces a remote monitoringsystem for the tower clusters which focuses on industrial datatransmission and is not suitable for the elderlymonitoring In[22] a remote monitoring system based on intelligent fiberstructure is proposedThe system uses the liquid core opticalfiber structure based on ARM and GPRS to communicateThe cost is high and cannot be applied to the nursing homemonitoring system References [23 25] all use video fordata acquisition Reference [23] uses the pyroelectric infraredsensor and the video monitor to carry on the multitargettracking But its calculation and communication complexityare high and the data acquisition is not comprehensiveIn [24] a wireless network life-monitoring system for thenursing home is proposed which uses the wireless sensor

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 10: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

10 Journal of Electrical and Computer Engineering

Table 5 Comparison of related system performance

Monitoringsystems

System performanceSuitable for

nursing homesMain technicalshortcomingsReal-time Data

comprehensivenessSecurity and

privacy

Computationaland

communicationcosts

Reference [21] Medium Industrial data Low medium No Lack of security

Reference [22] Medium Industrial data Low High NoCommunicationcosts are highLack of security

Reference [23] High Location data Medium High YesComputationalcosts are highData are not

comprehensive

Reference [24] Medium Health data Low Low Yes Data are notcomprehensive

The systemproposed High Comprehensive data High Low Yes No

network to collect the basic health data but lacks the consid-eration of security and privacy protection Specific analysisand comparison are shown in Table 5

Compared with the monitoring system shown in Table 5the system has four characteristics high real-time moni-toring small network delay comprehensive data collectioninvolving location information diet and exercise data collec-tion security and privacy protection mechanism embeddedin the module design the use of lightweight mobile securityarchitecture computing and low communication cost

6 Conclusion

According to the characteristics and needs of the nursinghome this paper designed a health monitoring system withlightweight security and privacy protection which is focusedon vertical and horizontal aspects health data collection andsecurity and privacy protection From the vertical aspectRFID dual-frequency band virtual route location algorithmand diet and exercise data acquisition based on RFID areadopted in the health data collection From the horizontalaspect a lightweight RFID authentication protocol based onHash function is embedded into each collection modulewhich has high security and low computation cost Throughthe performance analysis and testing we can see that thesystem has characteristics of high security high real-timeand high data comprehensive and low computational andcommunication complexity and fully meets the needs ofhealth monitoring system for the nursing homes

Competing Interests

The authors declare that there is no conflict of interestsregarding the publication of this paper

Acknowledgments

This work was supported in part by Educational Commissionof Anhui Province under Grant 2015jyxm237 and in partby the Foundation of University Research and InnovationPlatform Team for Intelligent Perception and Computing ofAnhui Province

References

[1] M H Y Shum V W Q Lou K Z J He C C H Chen andJ Wang ldquoThe lsquoLeap Forwardrsquo in nursing home development inUrban China future policy directionsrdquo Journal of the AmericanMedical Directors Association vol 16 no 9 pp 784ndash789 2015

[2] N Kumar K Kaur S C Misra and R Iqbal ldquoAn intelligentRFID-enabled authentication scheme for healthcare applica-tions in vehicular mobile cloudrdquo Peer-to-Peer Networking andApplications vol 9 no 5 pp 824ndash840 2016

[3] N K Suryadevara and S C Mukhopadhyay ldquoWireless sensornetwork based home monitoring system for wellness determi-nation of elderlyrdquo IEEE Sensors Journal vol 12 no 6 pp 1965ndash1972 2012

[4] J E Morley G Caplan M Cesari et al ldquoInternational surveyof nursing home research prioritiesrdquo Journal of the AmericanMedical Directors Association vol 15 no 5 pp 309ndash312 2014

[5] J E Morley ldquoUnder nutrition a major problem in nursinghomesrdquo Synthetic Communications vol 44 no 8 pp 1019ndash10422014

[6] H Makimura K Watanabe H Igarashi and H Waki ldquoMoni-toring system of railway using passive RFID inUHF bandrdquo IEEJTransactions on Electronics Information and Systems vol 132no 5 pp 691ndash696 2012

[7] L M Wang and S M Xiong Introduction to the Internet ofThings Engineering Tsinghua University Press Beijing China2011

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 11: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

Journal of Electrical and Computer Engineering 11

[8] J C Chen and T J Collins ldquoCreation of a RFID based real timetracking (R-RTT) system for small healthcare clinicsrdquo Journalof Medical Systems vol 36 no 6 pp 3851ndash3860 2012

[9] N Li and B Becerik-Gerber ldquoPerformance-based evaluationof RFID-based indoor location sensing solutions for the builtenvironmentrdquo Advanced Engineering Informatics vol 25 no 3pp 535ndash546 2011

[10] K Liu and Z C Ji ldquoResearch on RFID reader network trackingalgorithmrdquo Computer Engineering vol 38 no 18 pp 248ndash2502012

[11] M Arebey M A Hannan H Basri R A Begum and HAbdullah ldquoSolid waste monitoring system integration basedon RFID GPS and camerardquo in Proceedings of the InternationalConference on Intelligent and Advanced Systems (ICIAS rsquo10) pp1ndash5 June 2010

[12] Y Tao X Zhou Y Ma and F Zhao ldquoMobile mutual authenti-cation protocol based on hash functionrdquo Journal of ComputerApplications vol 36 no 3 pp 657ndash660 2016

[13] S-J Zhou W-Q Zhang and J-Q Luo ldquoSurvey of privacy ofradio frequency identification technologyrdquo Journal of Softwarevol 26 no 4 pp 960ndash976 2015

[14] A Wickramasinghe D C Ranasinghe C Fumeaux K D Hilland R Visvanathan ldquoSequence learning with passive RFIDsensors for real time bed-egress recognition in older peoplerdquoIEEE Journal of Biomedical and Health Informatics p 1 2016

[15] B Fabian T Ermakova and C Muller ldquoSHARDIS a privacy-enhanced discovery service for RFID-based product informa-tionrdquo IEEE Transactions on Industrial Informatics vol 8 no 3pp 707ndash718 2012

[16] X L Liu H Qi Q K Li et al ldquoEfficient detection ofcloned attacks for large-scale RFID systemsrdquo in Algorithms andArchitectures for Parallel Processing vol 8630 of Lecture Notes inComputer Science pp 85ndash99 Springer International PublishingBerlin Germany 2014

[17] A Arbit Y Oren and A Wool ldquoA secure supply-chain RFIDsystem that respects your privacyrdquo IEEE Pervasive Computingvol 13 no 2 pp 52ndash60 2014

[18] H Jannati and B Bahrak ldquoSecurity analysis of an RFID tagsearch protocolrdquo Information Processing Letters vol 116 no 10pp 618ndash622 2016

[19] X YWang F X Jing andYQWang ldquoAn improved hash-basedRFID security authentication algorithmrdquo Journal of ShangdongUniversity vol 49 no 9 pp 154ndash159 2014

[20] D-Z Sun and J-D Zhong ldquoA hash-based RFID securityprotocol for strong privacy protectionrdquo IEEE Transactions onConsumer Electronics vol 58 no 4 pp 1246ndash1252 2012

[21] H M Zheng Y J Wang K Chen and J T Zhang ldquoDesignof wireless remote security monitoring system for tower cranefleetrdquo Journal of Electronic Measurement and Instrumentationvol 28 no 5 pp 520ndash527 2014

[22] L Shen Z Zhao and X Yu ldquoDesign of remote monitoringinternet of things system for new optical fiber smart structurerdquoJournal of Nanjing University of Aeronautics and Astronauticsvol 3 no 47 pp 453ndash458 2015

[23] F-M Li N Jiang J Xiong and J-Y Zhang ldquoMulti-objecttracking scheme with pyroelectric infrared sensor and videocamera coordinationrdquo Acta Electronica Sinica vol 42 no 4 pp672ndash678 2014

[24] Y-J Chang C-H Chen L-F Lin R-P Han W-T Huang andG-C Lee ldquoWireless sensor networks for vital signsmonitoring

application in a nursing homerdquo International Journal of Dis-tributed Sensor Networks vol 2012 Article ID 685107 12 pages2012

[25] G-X Han and C-R Li ldquoImprovement on moving objecttracking method for network video surveillancerdquo Journal onCommunications vol 35 pp 160ndash164 2014

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of

Page 12: Health Monitoring System for Nursing Homes with ...downloads.hindawi.com/journals/jece/2017/1360289.pdf · Health Monitoring System for Nursing Homes with Lightweight Security and

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttpwwwhindawicom Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporation httpwwwhindawicom

Journal ofEngineeringVolume 2014

Submit your manuscripts athttpswwwhindawicom

VLSI Design

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation httpwwwhindawicom

Volume 2014

The Scientific World JournalHindawi Publishing Corporation httpwwwhindawicom Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Modelling amp Simulation in EngineeringHindawi Publishing Corporation httpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttpwwwhindawicom Volume 2014

DistributedSensor Networks

International Journal of