2014
DOI: 10.3390/s141222619
|View full text |Cite
|
Sign up to set email alerts
|

Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

Abstract: Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(28 citation statements)
references
References 45 publications
(65 reference statements)
0
28
0
Order By: Relevance
“…Additionally, the interest is getting more to join and help theoretical forensic-by-model as shown in [20]. In the present method of access control that is based on EBA [21], [22], sensors are required to encrypt IoT information with EBA method. User that is having the policies of access control can decrypt the information that is encrypted.…”
Section: Literature Surveymentioning
confidence: 99%
“…Additionally, the interest is getting more to join and help theoretical forensic-by-model as shown in [20]. In the present method of access control that is based on EBA [21], [22], sensors are required to encrypt IoT information with EBA method. User that is having the policies of access control can decrypt the information that is encrypted.…”
Section: Literature Surveymentioning
confidence: 99%
“…There are 4 CNs in the first cluster, and these CNs collect the data around them. Then, the data is encrypted according to formula (3). The plaintext and ciphertext of data are shown in Table 3.…”
Section: A Case Studymentioning
confidence: 99%
“…Recently, the wearable wireless sensors become powerful and rapidly expanding in healthcare monitoring [1][2][3]. The wearable sensors can be used to collect and transmit the data to the users.…”
Section: Introductionmentioning
confidence: 99%
“…Two of the most known are PBC [18] and jPBC [9]. Others for example, have been proposed to target specifically computing constrained devices [1,17,22,26]. However, these APIs are mainly focused for layer 2 of Figure 1 and provide some specific implementations for layer 3, leading to a gap for an easy incorporation of PBC and ABE in IT information systems at layer 5.…”
Section: Introductionmentioning
confidence: 99%