2015
DOI: 10.1007/978-3-319-19210-9_5
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…E.Authentication: Authentication is the process or action of verifying the identity of a user or process.In order to identify legitimate nodes between mHealth devices in mHealth systems, there is a process required to identify whether the received data is coming from authentic nodes [27]. Some processes include using passwords and biometrics (e.g.…”
Section: ) Security Requirementsmentioning
confidence: 99%
See 2 more Smart Citations
“…E.Authentication: Authentication is the process or action of verifying the identity of a user or process.In order to identify legitimate nodes between mHealth devices in mHealth systems, there is a process required to identify whether the received data is coming from authentic nodes [27]. Some processes include using passwords and biometrics (e.g.…”
Section: ) Security Requirementsmentioning
confidence: 99%
“…fingerprint, retina scan, voice recognition) to identify the user in order to gain access to mHealth devices. There are numerous types of security mechanisms such as digital signatures, digital certificates, or public key encryption that can provide the authentication process before transmitting healthcare data [27].…”
Section: ) Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…Security aspects are therefore critical in dealing with health-related information such as privacy in wireless body area networks (WBAN), and has been included for review in this article despite extensive and comprehensive research having being completed by many researchers in network and information security in the health area [9][10][11]. During app implementation, development of algorithms and logics on the predictions for individual and generic data need to be considered as this is crucial to analyzing and producing meaningful and useful information.…”
Section: F(x) =mentioning
confidence: 99%
“…By combining various data sources, it is possible to determine a situation or activity as physiological data are related to each other. When a user is running, for instance, the heart rate increases, body temperature goes up [21] and respiration rate also rises, and this information can be read together.…”
Section: Activity Determinationmentioning
confidence: 99%