2021
DOI: 10.1007/s10776-021-00538-3
|View full text |Cite
|
Sign up to set email alerts
|

A Perspective Review of Security Challenges in Body Area Networks for Healthcare Applications

Abstract: Body area network (BAN) connects sensors and actuators to the human body in order to collect patient’s information and transmitting it to doctors in a confined space with limited users. wireless body area network (WBAN) is derived from wireless sensor networks (WSN) and enables to transfer of the patient's information with a wide range of communication due to the limitations of the wired body area network. It plays a vital role in healthcare monitoring, healthcare systems, medical field, sports field, and mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 70 publications
(111 reference statements)
0
13
0
Order By: Relevance
“…The technique was used for the detection of Parkinson's disease and transmitted using unmanned aerial vehicles. Experimental results showed low latency with high accuracy 23 …”
Section: Related Workmentioning
confidence: 93%
See 1 more Smart Citation
“…The technique was used for the detection of Parkinson's disease and transmitted using unmanned aerial vehicles. Experimental results showed low latency with high accuracy 23 …”
Section: Related Workmentioning
confidence: 93%
“…Experimental results showed low latency with high accuracy. 23 Nayyar et al 26,27 analyzed the different routing protocols such as ad hoc on demand distance vector routing protocol, destination sequence distance vector, dynamic source routing, optimized link state routing, ad hoc on demand multipath distance vector, and hybrid wireless mesh routing protocol. All these routing protocols were applied in flying ad hoc networks, and the network performance was compared.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we believe that this article lacks to present the true picture of security challenges of these networks. Ananthi et al [36] In this paper, the authors discussed general security challenges associated with WBAN. Furthermore, the authors also discussed different safety, data transmission, and reliability concerns associated with WBAN.…”
Section: Referencesmentioning
confidence: 99%
“…Adversaries can implant a malevolent node in a non-line-of-sight (NLOS) location that can inject fake data and even receive legal data while acting as a legal device [ 128 ]. Thus, it is very important to validate the authenticity of the BAN devices that they claim to be [ 129 ].…”
Section: Wban Technical Issuesmentioning
confidence: 99%
“…User authentication can be established using well-informed mechanisms, such as username/password, PINs, fingerprints, etc. Similarly, a proper access control mechanism (e.g., Access Control Lists) must be devised to ensure authorized access to data [ 129 ].…”
Section: Wban Technical Issuesmentioning
confidence: 99%