System Architecture and Economic Value-Chain Models for Healthcare Privacy and Security Control in Large-Scale Wireless Sensor Networks

Cited 0 time in webofscience Cited 2 time in scopus
  • Hit : 507
  • Download : 336
In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the patient and wearable ECG sensor, network service, healthcare service, emergency service, and PKI service providers. To enhance the security level control for the patient’s medical privacy, individual private and public keys should be stored on smart cards. All the patient and service providers in the proposed security control architecture should have suitable secure private and public keys to access medical data and diagnosis results with RFID/GPS tracking information for emergency service. By enforcing the requirements of necessary keys among the patient and service providers, the patient’s ECG data can be protected and effectively controlled over the open medical directory service. Consequently, the proposed architecture for ubiquitous RFID healthcare system using the smart card terminal is appropriate to build up medical privacy policies in future ubiquitous sensor networking and home networking environments. In addition, we have analyzed an economic value-chain model based on the proposed architecture consisting of RFID, GPS, PDA, ECG sensor, and smart card systems in large-scale wireless sensor networks and have also derived customer needs in the proposed service architecture using the value-chain model. Therefore, we also conclude that the business and technology issues for the service providers should exist in the networks.
Publisher
Springer Verlag (Germany)
Issue Date
2006
Keywords

System Architecture; Economic Value-Chain Models; Healthcare Privacy; Security Control; Large-Scale Wireless Sensor Networks

Citation

Lecture Notes in Computer Science, Vol.4158, pp.511–520

ISBN
978-3-540-38619-3
ISSN
0302-9743
DOI
10.1007/11839569_50
URI
http://hdl.handle.net/10203/13603
Appears in Collection
MG-Journal Papers(저널논문)

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0