Challenges in Data Quality Assurance in Pervasive Health Monitoring Systems

  • Janani Sriram
  • Minho Shin
  • David Kotz
  • Anand Rajan
  • Manoj Sastry
  • Mark Yarvis


Wearable, portable, and implantable medical sensors have ushered in a new paradigm for healthcare in which patients can take greater responsibility and caregivers can make well-informed, timely decisions. Health-monitoring systems built on such sensors have huge potential benefit to the quality of healthcare and quality of life for many people, such as patients with chronic medical conditions (such as blood-sugar sensors for diabetics), people seeking to change unhealthy behavior (such as losing weight or quitting smoking), or athletes wishing to monitor their condition and performance. To be effective, however, these systems must provide assurances about the quality of the sensor data. The sensors must be applied to the patient by a human, and the sensor data may be transported across multiple networks and devices before it is presented to the medical team. While no system can guarantee data quality, we anticipate that it will help for the system to annotate data with some measure of confidence. In this paper, we take a deeper look at potential health-monitoring usage scenarios and highlight research challenges required to ensure and assess quality of sensor data in health-monitoring systems.


IEEE Pervasive Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chris R. Baker, Kenneth Armijo, Simon Belka, Merwan Benhabib, Vikas Bhargava, Nathan Burkhart, Artin Der Minassians, Gunes Dervisoglu, Lilia Gutnik, M. Brent Haick, Christine Ho, Mike Koplow, Jennifer Mangold, Stefanie Robinson, Matt Rosa, Miclas Schwartz, Christo Sims, Hanns Stoffregen, Andrew Water-bury, Eli S. Leland, Trevor Pering, and Paul K. Wright. Wireless sensor networks for home health care. In AINAW’07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, pages 832–837. IEEE Computer Society, 2007.Google Scholar
  2. 2.
    Maurizio Borsotto, C.T. Savell, Jaques Reifman, Reed W. Hoyt, Gavin Nunns, and Christopher J. Crick. Life-signs determination model for warfighter physiological status monitoring. Technical report, U.S. Army and GCAS Inc., Sept 2004.Google Scholar
  3. 3.
    H.S. Carvalho, W.B. Heinzelman, A.L. Murphy, and C.J.N. Coelho. A general data fusion architecture. Proceedings of the Sixth International Conference of Information Fusion, 2:1465–1472, 2003.Google Scholar
  4. 4.
    D. Ceer. Pervasive medical devices: less invasive, more productive. IEEE Pervasive Computing, 5(2):85–87, April-June 2006.Google Scholar
  5. 5.
    Chung-Min Chen, Hira Agrawal, Munir Cochinwala, and David Rosenbluth. Stream query processing for healthcare bio-sensor applications. In ICDE ’04: Proceedings of the 20th International Conference on Data Engineering, page 791. IEEE Computer Society, 2004.Google Scholar
  6. 6.
    Sriram Cherukuri, Krishna K. Venkatasubramanian, and Sandeep K. S. Gupta. BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In Proceedings of the 2003 International Conference on Parallel Processing Workshops, page 432, Los Alamitos, CA, USA, 2003. IEEE Computer Society.Google Scholar
  7. 7.
    Ahyoung Choi and Woontack Woo. Context based physiological signal analysis in a ubiquitous VR environment. In Dongpyo Hong and Seokhee Jeon, editors, ISUVR, volume 260 of CEUR Workshop Proceedings., 2007.Google Scholar
  8. 8.
    FDA. FDA’s human factors program. As viewed April 2008.
  9. 9.
    MIT Laboratory for Computational Physiology. Integrating Data, Models, and Reasoning in Critical Care project, A Bioengineering Research Partnership. Project web site, as viewed March 2008.
  10. 10.
    Liliana Grajales and IonV. Nicolaescu. Wearable multisensor heart rate monitor. In BSN ’ 06:Proceedingsof the International Workshop on Wearable and Implantable Body Sensor Networks, pages 154–157. IEEE Computer Society, April 2006.Google Scholar
  11. 11.
    Daniel Halperin, Thomas S. Heydt-Benjamin, KevinFu, TadayoshiKohno, and William H. Maisel. Security and privacy for implantable medical devices. IEEE Pervasive Computing, 7(l):30–39, Jan.-March 2008.Google Scholar
  12. 12.
    HIPAA. As viewed April 2008.
  13. 13.
    University of Oxford Invensys UTC, Department Engineering Science. Self Validating sensor project at University of Oxford. Project web site, as viewed March 2008.
  14. 14.
    Evangelos Bekiaris Ioannis G. Damousis, Dimitrios Tzovaras. Unobtrusive multimodal biometric authentication: The HUMABIO project concept. EURASIP Journal on Advances in Signal Processing, 2008.Google Scholar
  15. 15.
    David Jea, Jason Liu, Thomas Schmid, and Mani B Srivastava. Hassle free fitness monitoring. In Proceedings of the 2nd International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet), Jun. 2008.Google Scholar
  16. 16.
    Andrew D. Jurik and Alfred C. Weaver. Remote medical monitoring. Computer, 41(4):96–99, 2008.CrossRefGoogle Scholar
  17. 17.
    Boris P. Kovatchev, Christopher King, Marc Breton, and Stacey Anderson. Clinical assessment and mathematical modeling of the accuracy of continuous glucose sensors (cgs). In EMBS ’06: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, volume 30, pages 71–74, Sep. 2006. Communications Review, 11(3): 12–30, 2007.Google Scholar
  18. 18.
    Prajakta Kulkarni and Yusuf Öztürk. Requirements and design spaces of mobile medical care. SIGMOBILE Mobile Computing Google Scholar
  19. 19.
    I. Maglogiannis, E. Zafiropoulos, A. Platis, and C. Lambrinoudakis. Risk analysis of a patient monitoring system using bayesian network modeling. J. of Biomedical Informatics, 39(6):637–647, 2006.CrossRefGoogle Scholar
  20. 20.
    I. Mohomed, A. Misra, M. Ebling, and W. Jerome. Harmoni: Context-aware filtering of sensor data for continuous remote health monitoring. PerCom 2008: Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pages 248–251, March 2008.Google Scholar
  21. 21.
    Joanna Alicja Muras, Vinny Cahill, and Emma Katherine Stokes. Ataxonomy of pervasive healthcare systems. Proceedings of the Pervasive Health Conference and Workshops, pages 1–10, 2006.Google Scholar
  22. 22.
    John O. Donoghue, John Herbert, and David Sammon. Patient sensors: A data quality perspective. InPro-ceedings of the 6th International Conference on Smart Homes and Health Telematics, pages 54–61, 2008.Google Scholar
  23. 23.
    Department of Electrical Engineering and Berkeley Computer Science, University of California. Center for Biomedical Informatics in Critical Care (C-BICC) project at UC Berkeley. Project web site, as viewed March 2008.
  24. 24.
    U.S. Department of Health and Office of the National Coordinator for Health Information Technology Human Services. Remote Monitoring, detailed use case. Detailed use case document published on March 21, 2008.
  25. 25.
    Christian Peter, Eric Ebert, and Helmut Beikirch. Awearable multi-sensor system for mobile acquisition of emotion-related physiological data. In ACII ’05: Proceedings of the 1st International Conference on Affective Computing and Intelligent Interaction, Lecture Notes in Computer Science, pages 691–698. Springer, 2005.Google Scholar
  26. 26.
    StephaneLo Presti, Michael Butler, Michael Leuschel, and Chris Booth. Atrust analysis methodology for pervasive computing systems. In Proceedings of the 7th International Workshop on Trustin Agent Societies, volume 3577 of LNCS, pages 129–143. Springer, 2004.Google Scholar
  27. 27.
    StephaneLo Presti, Michael Butler, Michael Leuschel, Colin Snook, and PhillipTurner. Formal modelling and verification of trust in a pervasive application. Technical report, Trusted Software Agents and Services for Pervasive Information Environments, University of Southampton, June 2004. Available as project deliverable at url=–01vl.pdf
  28. 28.
    Stephane Lo Presti, Mark Cusack, Chris Booth, David Allsopp, Mike Kirton, Nick Exon, and Patrick Beau-tement. Trust issues in pervasive environments. Technical report, Trusted Software Agents and Services for Pervasive Information Environments project, University of Southampton, Sept 2003. Available as Project deliverable at -WP2–01vl.pdf
  29. 29.
    Maxime Raya, Panagiotis (Panos) Papadimitratos, Virgil Gligor, and Jean-Pierre Hubaux. On data-centric trust establishment in ephemeral ad hoc networks. In INFOCOM ’08: Proceedings of the 27th Conference on Computer Communications, pages 1238–1246. IEEE Computer Society, April 2008.Google Scholar
  30. 30.
    Jatinder Singh, Jean Bacon, and Ken Moody. Dynamic trust domains for secure, private, technology-assisted living. In ARES ’07: Proceedings of the The Second International Conference on Availability, Reliability and Security, pages 27–34. IEEE Computer Society, 2007.Google Scholar
  31. 31.
    Nesime Tatbul, Mark Buller, Reed Hoyt, Steve Mullen, and Stan Zdonik. Confidence-based data management for personal area sensor networks. In DMSN ’04: Proceeedings of the 1st international workshop on Data management for sensor networks, pages 24–31. ACM, 2004.Google Scholar
  32. 32.
    Trusted Computing Group (TCG). Project web site, as viewed April 2008.
  33. 33.
    Surapa Thiemjarus, Benny Lo, and Guang-ZhongYang. Context aware sensing -what’s the significance? In Perspective in Pervasive Computing, pages 163–170, October 2005.Google Scholar
  34. 34.
    Upkar Varshney. Pervasive healthcare and wireless health monitoring. Mobile Networks and Applications, 12(2–3):113–127, 2007.CrossRefGoogle Scholar

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2009

Authors and Affiliations

  • Janani Sriram
    • 1
  • Minho Shin
    • 1
  • David Kotz
    • 1
  • Anand Rajan
    • 2
  • Manoj Sastry
    • 2
  • Mark Yarvis
    • 2
  1. 1.Institute for Security Technology StudiesDartmouth CollegeHanover, NH
  2. 2.Intel CorporationHillsboro, OR

Personalised recommendations