Skip to main content

Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks

  • Conference paper
Book cover Computer Safety, Reliability, and Security (SAFECOMP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4166))

Included in the following conference series:

Abstract

In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the patient and wearable ECG sensor, network service, healthcare service, emergency service, and PKI service providers. To enhance the security level control for the patient’s medical privacy, individual private and public keys should be stored on smart cards. All the patient and service providers in the proposed security control architecture should have suitable secure private and public keys to access medical data and diagnosis results with RFID/GPS tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and service providers, the patient’s ECG data can be protected and effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system using the smart card terminal is appropriate to build up medical privacy policies in future ubiquitous sensor networking and home networking environments. In addition, we have analyzed an economic value-chain model based on the proposed architecture consisting of RFID, GPS, PDA, ECG sensor, and smart card systems in large-scale wireless sensor networks and have also analyzed two market derivers – customer demands and technology – in the proposed service architecture using the value-chain model. Finally, policy modeling for privacy and security protection for customers, service providers, and regulatory agency is considered to promote beneficial utilization of the collected healthcare data and derived new business of healthcare applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Song, W.J., Son, S.H., Choi, M.K., Kang, M.H.: Privacy and Security Control Architecture for Ubiquitous RFID Healthcare System in Wireless Sensor Networks. In: Proceedings in the IEEE ICCE 2006 (January 2006)

    Google Scholar 

  2. Choi, S.S., Song, W.J., Choi, M.K., Son, S.H.: Ubiquitous RFID Healthcare Systems Analysis on PhysioNet Grid Portal Services Using Petri Nets. In: Proceedings in the IEEE ICICS 2005 (December 2005)

    Google Scholar 

  3. Moody, G.B., Mark, R.G., Goldberger, A.L.: PhysioNet: A Web-Based Resource for the Study of Physiologic Signals. IEEE Engineering in Medicine and Biology 20(3), 70–75 (2001)

    Article  Google Scholar 

  4. Finkenzeller, K.: RFID Handbook, 2nd edn. Wiley & Sons, Chichester (2003)

    Book  Google Scholar 

  5. Nam, D.S., Youn, C.H., Lee, B.H., Clifford, G., Healey, J.: QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 352–359. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Eysenbach, G.: What is e-healthcare? Journal of Medical Internet Research 3(2) (2001)

    Google Scholar 

  7. Marconi, J.: E-Health: Navigating the Internet for Health Information Healthcare. Advocacy White Paper, Healthcare Information and Management Systems Society (May 2002)

    Google Scholar 

  8. Joseph, J., Fellenstein, C.: Grid Computing. Prentice Hall, Englewood Cliffs (2004)

    Google Scholar 

  9. Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer 36(10), 103–105 (2003)

    Google Scholar 

  10. Fancher, C.H.: In Your Pocket: Smartcards. IEEE Spectrum 34(2), 47–53 (1997)

    Article  Google Scholar 

  11. Baldwin, R.W., Chang, C.V.: Locking the e-safe. IEEE Spectrum 34(2), 40–46 (1997)

    Article  Google Scholar 

  12. Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, New York (2000)

    Google Scholar 

  13. ISO/IEC 7816-1:1998, Identification Cards – Integrated Circuit(s) Cards with Contacts - Part 1: Physical Characteristics, International Organization for Standardization (1998)

    Google Scholar 

  14. Song, W.J., Kim, W.H., Kim, B.G., Ahn, B.H., Choi, M.K., Kang, M.H.: Smart Card Terminal Systems Using ISO/IEC 7816-3 Interface and 8051 Microprocessor Based on the System-on-Chip. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 364–371. Springer, Heidelberg (2003)

    Google Scholar 

  15. NHS, NHS IT Standards Handbook, National Health Service (NHS) Information Authority (June 2001)

    Google Scholar 

  16. Porter, M.E.: Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press, New York (1980)

    Google Scholar 

  17. Olla, P., Patel, N.V.: A Value Chain Model for Mobile Data Service Providers. Telecommunications Policy 26(9-10), 551–571 (2002)

    Article  Google Scholar 

  18. Lee, Y.H., Kim, H.W., Kim, Y.J., Sohn, H.: A New Conceptual Framework for Designing Ubiquitous Business Model. IE Interfaces 19(1), 9–18 (2006)

    MathSciNet  Google Scholar 

  19. Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In: Proceedings of the 2001 ACM Conference on Electronic Commerce, Association for Computing Machinery, pp. 38–47 (October 2001)

    Google Scholar 

  20. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation (April 2002), http://www.w3.org/P3P/

  21. Janczewski, L., Shi, F.X.: Development of Information Security Baselines for Healthcare Information Systems in New Zealand. Computers & Security 21(2), 172–192 (2002)

    Article  Google Scholar 

  22. Gobuty, D.E. and Joint NEMA/COCIR/JIRA Security & Privacy Committee (SPC): Organizing Security and Privacy Enforcement in Medical Imaging Technology. In: International Congress Series, vol. 1256, pp. 319–329 (June 2003)

    Google Scholar 

  23. Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th United States Congress (1996), http://www.aspe.hhs.gov/admnsimp/pl104191.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Song, W.J., Cho, M.K., Ha, I.S., Choi, M.K. (2006). Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_18

Download citation

  • DOI: https://doi.org/10.1007/11875567_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45762-6

  • Online ISBN: 978-3-540-45763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics