Guidelines for Using Wi-Fi for Medical Devices

11 Min Read

On a recent LinkedIn group discussion, the following question was posed by Taimoore (Tim) Rajah of the NIH:

On a recent LinkedIn group discussion, the following question was posed by Taimoore (Tim) Rajah of the NIH:

wireless medical devicesWe are encountering many hospital which are still based on wired LAN technology for medical device connectivity. Many have mentioned their gripes and major concerns about using Wi-Fi technology for patient monitoring and drug delivery monitoring in the OR as well as ICU departments.

Many hospitals are still using WMTS telemetry in their more critical patient monitoring areas. This is very expensive and maintenance for such a system is costly.

Can you tell us what are the major criteria to ensure a reliable safe and secure Wi-Fi network for medical devices?

If a hospital decides to use Wi-Fi technology, what are the proper guidelines to which they must adhere, to ensure that their current and future Wi-Fi network will be stable, reliable, safe and secure? What are the important features they should consider seriously before embarking on using this type of technology?

Great questions. Here we go with some answers:

I’ve written before on WMTS and Wi-Fi, and you can read those two posts for more in depth discussions on applying those technologies to medical devices.

WMTS

Relative to this discussion, the key advantage of WMTS is that it is dedicated to one application (telemetry monitors, or with Philips, patient monitors including telemetry) from one manufacturer. The deployment of this one application in the hospital changes little over time. This means that designing the networks is more simple, and once deployed, they change little. The resulting perception is that WMTS is more reliable and easier to manage than Wi-Fi. In reality, if we tried to do with WMTS what is regularly done with Wi-Fi in hospitals, WMTS would be an unmitigated failure. Or to put it more positively, if we used Wi-Fi like we use WMTS, Wi-Fi would appear to have the same advantages as WMTS.

The flip side of WMTS strength is that: 1) the technology is proprietary to the manufacturer, thus increasing purchase and switching costs, 2) the absence of industry standards for WMTS that ensure interoperability and coexistence across manufacturers limits one manufacturer’s installation per hospital, and 3) the limited available bandwidth for WMTS (possibly being further reduced by FCC) greatly limits the number of devices that can be supported in one installation. Just the fact that medical devices beyond just patient monitors are wireless means that Wi-Fi is going to be used in any event.

Wi-Fi

Wi-Fi adoption in hospitals in the US and Canada is well over 90 percent. As hospitals world wide deploy IT for portable and mobile applications, Wi-Fi is the wireless technology that will be used. Wi-Fi has the following advantages: 1) industry standards, and test and certification organizations (like the Wi-Fi Alliance) provide interoperability and coexistence across manufacturer’s products, 2) the bandwidth designated for Wi-Fi is significant, 3) Wi-Fi frequency allocations are world wide enabling manufacturers to create one product for multiple international markets, 4) the adoption of Wi-Fi for consumer and commercial applications provides a tremendous economy of scale that benefits health care, and 5) there is a substantial infrastructure by way of resellers, consultants, test labs and third party tools for the management and monitoring of Wi-Fi networks.

Some day, I will write a companion blog post for Why Medical Device Makers Love/Hate Wi-Fi from the hospital’s point of view.

Wi-Fi and Medical Devices

Due to the continued automation of health care delivery, medical devices are being transformed into information appliances intended to integrate with the enterprise IT infrastructure. Increasingly, connectivity features are becoming necessary features required to drive buyer adoption.

In fairness to hospitals who have struggled with wireless medical device implementations, many medical device manufacturers are not very enterprise IT savvy. Especially early on, some wireless medical device systems were pretty limited; they did not have sufficient authentication or encryption features and their ability to coexist with other traffic in an enterprise IT network was sometimes severely limited. The good news is that many medical device manufacturers are getting pretty good at meeting enterprise IT requirements. A red flag here is the vendor who insists they must have a dedicated VLAN and/or SSID. Vendors making these claims are either still selling application software that was written 20+ years ago when medical device networks were all private, or are behind on building up their enterprise IT chops.

The criteria for safe and effective use of Wi-Fi in medical device systems is defined by the medical device product specifications (especially those related to wireless connectivity) and the manufacturer’s recommendations pertaining to the management, maintenance and testing of the wireless medical device system. The development of the criteria, and fulfillment of the criteria in the resulting design, is a consequence of the manufacturer following the FDA Quality System regulation. The definition of the criteria, and resulting fulfillment of the criteria by the design is reviewed by FDA when the manufacturer submits the artifacts created as a consequence of following the Quality System in the form of a 510(k) submission.

The criteria for safe and effective wireless connectivity is inexorably entwined with the design of the wireless medical device. For a buyer to mandate certain criteria for safe and effective use would mean that the buyer is also specifying certain design decisions. Consequently, in most cases, buyers should seek to determine the criteria for safe and effective use of Wi-Fi from the manufacturer. This will include specifications for things like signal access point strength, time to associate with the network under various scenarios, time to roam across access points or subnets, etc. Supported configuration such as an Quality of Service settings, authentication and encryption will also be specified by the manufacturer.

In summary, the criteria for safe and effective wireless networking can be divided between performance specifications, configuration settings, and hardware specifications and configuration (e.g., specifying manufacturer, model and firmware release for an access point controller).

When a manufacturer installs their wireless medical device system, they’ll ensure the enterprise wireless network (and all the rest of the IT infrastructure) meets design specifications. At this point, it is the buyer’s responsibility to get those specifications from the manufacturer so that the hospital can ensure that the network and related IT infrastructure continue to remain within specifications over time – thus ensuring ongoing safe and effective wireless networking.

In no time hospitals end up having to juggle a number of sets of these specifications for patient monitors, infusion pumps, EKG carts, diagnostic POCT devices, not to mention wireless VoIP systems, computers on wheels, wireless bar code readers and other IT equipment. Prior to any changes – adding new applications, revising existing applications, upgrading infrastructure, or changing network configuration settings – the hospital must ensure that planned changes are supported by all the systems that run on their infrastructure. This requires ongoing communications with medical device manufacturers, especially as it relates to support for new network gear and firmware upgrades.

What Makes Wi-Fi Hard for Providers

Any wireless network must be designed to meet the requirements of the applications deployed on the network, along with addressing coverage and environmental factors (like the impact of construction materials and design on RF performance). Any change in the applications and/or physical plant, require a technical assessment – a site survey for Wi-Fi networks – and possibly a redesign of the network. Things often change in hospitals.

In my experience, hospitals could do better in anticipating and planning for future needs. And by now, most hospitals should have learned that networks must be designed to support specific applications. I can’t tell you how many stories I’ve heard about hospitals who just got their Wi-Fi working well with computers on wheels or a meds administration system and decided to just buy a VoIP phone switch and wireless handsets to implement wireless VoIP – only to have the implementation fail because the network was never designed to support wireless VoIP. After living through something like that (especially if our network VAR didn’t try to warn us off) we’d probably all hate Wi-Fi.

With the advent of wireless medical device systems hospitals need to evolve their IT governance – especially risk management, configuration management and change control) from a mission-critical level to a safety-critical level. Change control in particular should utilize a risk management approach that looks beyond privacy and security to include risks to patient safety. You can read more on safety-critical governance here.

Summary

The secret sauce here is not some ultimate set of specifications, but the use of a rigorous process on the part of both manufacturers and buyers. Wi-Fi networks are intended to support numerous applications from multiple vendors; they will never be as simple and easy to manage as WMTS. Only be reliably following the best practices for installing and managing wireless networks will they provide optimal levels of reliability and performance.

(Wifi for medical devices / shutterstock)

TAGGED:
Share This Article
Exit mobile version