Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks

  • Won Jay Song
  • Moon Kyo Cho
  • Im Sook Ha
  • Mun Kee Choi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4166)


In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the patient and wearable ECG sensor, network service, healthcare service, emergency service, and PKI service providers. To enhance the security level control for the patient’s medical privacy, individual private and public keys should be stored on smart cards. All the patient and service providers in the proposed security control architecture should have suitable secure private and public keys to access medical data and diagnosis results with RFID/GPS tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and service providers, the patient’s ECG data can be protected and effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system using the smart card terminal is appropriate to build up medical privacy policies in future ubiquitous sensor networking and home networking environments. In addition, we have analyzed an economic value-chain model based on the proposed architecture consisting of RFID, GPS, PDA, ECG sensor, and smart card systems in large-scale wireless sensor networks and have also analyzed two market derivers – customer demands and technology – in the proposed service architecture using the value-chain model. Finally, policy modeling for privacy and security protection for customers, service providers, and regulatory agency is considered to promote beneficial utilization of the collected healthcare data and derived new business of healthcare applications.


Service Provider Wireless Sensor Network National Health Service Smart Card Privacy Preference 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Song, W.J., Son, S.H., Choi, M.K., Kang, M.H.: Privacy and Security Control Architecture for Ubiquitous RFID Healthcare System in Wireless Sensor Networks. In: Proceedings in the IEEE ICCE 2006 (January 2006)Google Scholar
  2. 2.
    Choi, S.S., Song, W.J., Choi, M.K., Son, S.H.: Ubiquitous RFID Healthcare Systems Analysis on PhysioNet Grid Portal Services Using Petri Nets. In: Proceedings in the IEEE ICICS 2005 (December 2005)Google Scholar
  3. 3.
    Moody, G.B., Mark, R.G., Goldberger, A.L.: PhysioNet: A Web-Based Resource for the Study of Physiologic Signals. IEEE Engineering in Medicine and Biology 20(3), 70–75 (2001)CrossRefGoogle Scholar
  4. 4.
    Finkenzeller, K.: RFID Handbook, 2nd edn. Wiley & Sons, Chichester (2003)CrossRefGoogle Scholar
  5. 5.
    Nam, D.S., Youn, C.H., Lee, B.H., Clifford, G., Healey, J.: QoS-Constrained Resource Allocation for a Grid-Based Multiple Source Electrocardiogram Application. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 352–359. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Eysenbach, G.: What is e-healthcare? Journal of Medical Internet Research 3(2) (2001)Google Scholar
  7. 7.
    Marconi, J.: E-Health: Navigating the Internet for Health Information Healthcare. Advocacy White Paper, Healthcare Information and Management Systems Society (May 2002)Google Scholar
  8. 8.
    Joseph, J., Fellenstein, C.: Grid Computing. Prentice Hall, Englewood Cliffs (2004)Google Scholar
  9. 9.
    Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer 36(10), 103–105 (2003)Google Scholar
  10. 10.
    Fancher, C.H.: In Your Pocket: Smartcards. IEEE Spectrum 34(2), 47–53 (1997)CrossRefGoogle Scholar
  11. 11.
    Baldwin, R.W., Chang, C.V.: Locking the e-safe. IEEE Spectrum 34(2), 40–46 (1997)CrossRefGoogle Scholar
  12. 12.
    Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, New York (2000)Google Scholar
  13. 13.
    ISO/IEC 7816-1:1998, Identification Cards – Integrated Circuit(s) Cards with Contacts - Part 1: Physical Characteristics, International Organization for Standardization (1998)Google Scholar
  14. 14.
    Song, W.J., Kim, W.H., Kim, B.G., Ahn, B.H., Choi, M.K., Kang, M.H.: Smart Card Terminal Systems Using ISO/IEC 7816-3 Interface and 8051 Microprocessor Based on the System-on-Chip. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 364–371. Springer, Heidelberg (2003)Google Scholar
  15. 15.
    NHS, NHS IT Standards Handbook, National Health Service (NHS) Information Authority (June 2001)Google Scholar
  16. 16.
    Porter, M.E.: Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press, New York (1980)Google Scholar
  17. 17.
    Olla, P., Patel, N.V.: A Value Chain Model for Mobile Data Service Providers. Telecommunications Policy 26(9-10), 551–571 (2002)CrossRefGoogle Scholar
  18. 18.
    Lee, Y.H., Kim, H.W., Kim, Y.J., Sohn, H.: A New Conceptual Framework for Designing Ubiquitous Business Model. IE Interfaces 19(1), 9–18 (2006)MathSciNetGoogle Scholar
  19. 19.
    Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In: Proceedings of the 2001 ACM Conference on Electronic Commerce, Association for Computing Machinery, pp. 38–47 (October 2001)Google Scholar
  20. 20.
    The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation (April 2002),
  21. 21.
    Janczewski, L., Shi, F.X.: Development of Information Security Baselines for Healthcare Information Systems in New Zealand. Computers & Security 21(2), 172–192 (2002)CrossRefGoogle Scholar
  22. 22.
    Gobuty, D.E. and Joint NEMA/COCIR/JIRA Security & Privacy Committee (SPC): Organizing Security and Privacy Enforcement in Medical Imaging Technology. In: International Congress Series, vol. 1256, pp. 319–329 (June 2003)Google Scholar
  23. 23.
    Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th United States Congress (1996),

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Won Jay Song
    • 1
  • Moon Kyo Cho
    • 2
  • Im Sook Ha
    • 2
  • Mun Kee Choi
    • 2
  1. 1.Department of Computer ScienceUniversity of VirginiaUSA
  2. 2.School of IT BusinessInformation and Communications UniversityKorea

Personalised recommendations