Utilization of TETRA Networks for Health Information Transfer

Utilization of TETRA Networks for Health Information Transfer

DOI: 10.4018/978-1-61520-805-0.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Rapid advances in information technology and wireless communications are leading to the emergence of a new type of information infrastructure that has the potential of supporting an array of advanced services for healthcare. Today’s healthcare professionals need to be connected to the network always. Continuous connectivity is the watchword of these demanding users, who need to communicate over the network seamlessly and stay connected everywhere in emergency cases. TETRA technology provides several ways of protecting the privacy and security of communication, such as authentication, air interface encryption and end-to-end encryption. Using a TETRA network can benefit not only ambulance crews, but also medical personnel at remote locations. Even though doctors are rarely present in ambulances, they can use the transmitted medical data to make a formal diagnosis, enabling treatment to be started and saving several critical minutes before arrival at the hospital. The objective of this chapter is to study how simply can a healthcare professional collect physiological data from mobile and/or remote patients and how securely and reliably health information can be transferred from emergency places to hospitals through a TETRA network.
Chapter Preview
Top

Introduction

Cost reduction pressures and the need for shortened in-patient stays are promoting the use of wireless patient monitoring systems in hospitals. Their contribution to better process management, superior flexibility and increased efficiency within hospitals is further underlining the appeal of wireless networking options for patient monitoring systems.

Wireless connectivity has encouraged an overall rise in productivity through improved workflow and data management. Wireless patient monitors have also supported enhanced flexibility within the hospital environment by enabling remote monitoring of patients.

Telemedicine applications, including those based on wireless technologies, span the areas of emergency health care: telecardiology, teleradiology, telepathology, teledermatology, teleophtlalmology, teleoncology, and telepsychiatry. In addition, health telematics applications, enabling the availability of prompt and expert medical care, have been exploited for the provision of healthcare services at understaffed areas, such as rural health centers, ambulance vehicles, ships, trains, and airplanes, as well as for home monitoring.

The primary problem with tiny, low power sensors is establishing and maintaining wireless links in the presence of so many high power devices radiating noise. This noise will change through out the day so that a continuously adapting routing technique is needed. Unfortunately, several challenges exist such as:

  • 1.

    Deploying sensors to provide propser sensor converage.

  • 2.

    Balancing resource usage to maximize sensor lifetime.

  • 3.

    Communicating messages reliably among the nodes (healthcare provider, patient, emergency vehicles) using multihop paths.

  • 4.

    Prioritizing routing messages, i.e., emergency call vs. outgoing patients.

  • 5.

    Authenticating data links as well as securing the data to ensure patience confidentiality.

Top

Background

High quality health care requires individuals to share sensitive personal information with their doctors and other healthcare professionals. This information is necessary to make the most accurate diagnoses and provide the best treatment. It may be shared with others, such as insurance companies, pharmacies, researchers, and employers, for many reasons. If patients are not confident that this information will be kept confidential, they will not be forthright and reveal accurate and complete information. If healthcare providers are not confident that the organization that is responsible for the healthcare record will keep it confidential they will limit what patients add to the record. Either of these actions is likely to result in inferior healthcare. The privacy and security of personal health information has become a major public concern.

Most common security problem within the healthcare systems is the access of the employees (threat from inside). Specifically people who work in a hospital have the ability to view protected health information (PHI) of anybody. This raises the probability for a legal action, which cause major impacts. It is conceivable how important is to enforce security policies. It is important the introduction of security policies which the decisions made by people who have the authority and set boundaries under which the staff could operate. Exclusive of the inside threat, it is possible to occur damage in a healthcare system from outside threat such as hackers. In this case it is very important to develop mechanisms which minimize the risk. So we have not to allow an insecure Internet connection in the internal network of the healthcare system.

The first security risk is the failure to protect sensitive data beyond encryption.

The second security risk is the inability to accurately manage mobile computer assets. Under HIPAA, healthcare organizations must be able to audit how many computers they have in their inventory, where they are assigned, who is logging into them, what software is installed and where the computer is located.

The third security risk is sensitive information on public terminals. Nursing stations, public information terminals and help stations allow for greater risk of data breaches. Unattended stationary computers should always be monitored and protected with an authentication prompt.

Complete Chapter List

Search this Book:
Reset