System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks

  • Won Jay Song
  • Im Sook Ha
  • Mun Kee Choi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4158)


In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the patient and wearable ECG sensor, network service, healthcare service, emergency service, and PKI service providers. To enhance the security level control for the patient’s medical privacy, individual private and public keys should be stored on smart cards. All the patient and service providers in the proposed security control architecture should have suitable secure private and public keys to access medical data and diagnosis results with RFID/GPS tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and service providers, the patient’s ECG data can be protected and effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system using the smart card terminal is appropriate to build up medical privacy policies in future ubiquitous sensor networking and home networking environments. In addition, we have analyzed an economic value-chain model based on the proposed architecture consisting of RFID, GPS, PDA, ECG sensor, and smart card systems in large-scale wireless sensor networks and have also derived customer needs in the proposed service architecture using the value-chain model. Therefore, we also conclude that the business and technology issues for the service providers should exist in the networks.


Service Provider Wireless Sensor Network National Health Service Smart Card Network Service Provider 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Song, W.J., Son, S.H., Choi, M.K., Kang, M.H.: Privacy and Security Control Architecture for Ubiquitous RFID Healthcare System in Wireless Sensor Networks. In: Proceedings in the IEEE ICCE (January 2006)Google Scholar
  2. 2.
    Choi, S.S., Song, W.J., Choi, M.K., Son, S.H.: Ubiquitous RFID Healthcare Systems Analysis on PhysioNet Grid Portal Services Using Petri Nets. In: Proceedings in the IEEE ICICS 2005 (December 2005)Google Scholar
  3. 3.
    Moody, G.B., Mark, R.G., Goldberger, A.L.: PhysioNet: A Web-Based Resource for the Study of Physiologic Signals. IEEE Engineering in Medicine and Biology 20(3), 70–75 (2001)CrossRefGoogle Scholar
  4. 4.
    Finkenzeller, K.: RFID Handbook, 2nd edn. Wiley & Sons, Chichester (2003)CrossRefGoogle Scholar
  5. 5.
    Nam, D.S., Youn, C.H., Lee, B.H., Clifford, G., Healey, J.: QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 352–359. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Eysenbach, G.: What is e-healthcare? Journal of Medical Internet Research 3(2) (2001)Google Scholar
  7. 7.
    Marconi, J.: E-Health: Navigating the Internet for Health Information Healthcare. In: Advocacy White Paper. Healthcare Information and Management Systems Society (May 2002)Google Scholar
  8. 8.
    Joseph, J., Fellenstein, C.: Grid Computing. Prentice-Hall, Englewood Cliffs (2004)Google Scholar
  9. 9.
    Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer 36(10), 103–105 (2003)Google Scholar
  10. 10.
    Fancher, C.H.: In Your Pocket: Smartcards. IEEE Spectrum 34(2), 47–53 (1997)CrossRefGoogle Scholar
  11. 11.
    Baldwin, R.W., Chang, C.V.: Locking the e-safe. IEEE Spectrum 34(2), 40–46 (1997)CrossRefGoogle Scholar
  12. 12.
    Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, Chichester (2000)Google Scholar
  13. 13.
    ISO/IEC 7816-1:1998, Identification Cards – Integrated Circuit(s) Cards with Contacts - Part 1: Physical Characteristics, International Organization for Standardization (1998)Google Scholar
  14. 14.
    Song, W.J., Kim, W.H., Kim, B.G., Ahn, B.H., Choi, M.K., Kang, M.H.: Smart Card Terminal Systems Using ISO/IEC 7816-3 Interface and 8051 Microprocessor Based on the System-on-Chip. In: CHARME 2003. LNCS, vol. 2860, pp. 364–371 (2003)Google Scholar
  15. 15.
    NHS: NHS IT Standards Handbook, National Health Service (NHS) Information Authority (June 2001)Google Scholar
  16. 16.
    Porter, M.E.: Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press, New York (1980)Google Scholar
  17. 17.
    Olla, P., Patel, N.V.: A Value Chain Model for Mobile Data Service Providers. Telecommunications Policy 26(9-10), 551–571 (2002)CrossRefGoogle Scholar
  18. 18.
    Lee, Y.H., Kim, H.W., Kim, Y.J., Sohn, H.: A New Conceptual Framework for Designing Ubiquitous Business Model. IE Interfaces 19(1), 9–18 (2006)MathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Won Jay Song
    • 1
  • Im Sook Ha
    • 2
  • Mun Kee Choi
    • 2
  1. 1.Department of Computer ScienceUniversity of VirginiaUSA
  2. 2.School of IT BusinessInformation and Communications UniversityKorea

Personalised recommendations