2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 2010
DOI: 10.1109/sutc.2010.61
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring

Abstract: A case study of security risk analysis of a wireless body area network for remote health monitoring as a after measure fordeploying security and privacy features is introduced in this paper. The target system has a scalable platform that requires minimum human interaction during setup and monitoring. The core components of the system include: (i) biosensor/transceiver pairs, (ii) hardware modules to automatically setup the wireless body area network, (iii) data delivery mechanism to an internet sever, and (iv)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
40
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 74 publications
(45 citation statements)
references
References 15 publications
0
40
0
2
Order By: Relevance
“…Therefore, due to the sensitive nature of this information, there is an obvious need to secure these data during their collections, transmissions and even their storages. Yao et al (2010) agree with Lim et al (2010) on the necessity to secure the transmission between RFID tags and the local server. On the other hand, Bluetooth encryption E0 techniques were used for securing the connection between the hub and the mobile device in the study presented Barnickel et al (2010).…”
Section: Ubiquitous Health Barriersmentioning
confidence: 90%
See 4 more Smart Citations
“…Therefore, due to the sensitive nature of this information, there is an obvious need to secure these data during their collections, transmissions and even their storages. Yao et al (2010) agree with Lim et al (2010) on the necessity to secure the transmission between RFID tags and the local server. On the other hand, Bluetooth encryption E0 techniques were used for securing the connection between the hub and the mobile device in the study presented Barnickel et al (2010).…”
Section: Ubiquitous Health Barriersmentioning
confidence: 90%
“…In order for this technology (U-health monitoring technology) to become feasible, a number of challenges are facing its presence. These challenges are related to the deployment of this technology (Lim et al, 2010) and to issues such as resource constraints, user mobility, cost, heterogeneity of devices, scalability, security and privacy. While Znati (2005) believes that challenges associated to sensor technology features also exist, such as Quality of Service (QoS), low power consumption and security of the wireless devices.…”
Section: Ubiquitous Health Barriersmentioning
confidence: 99%
See 3 more Smart Citations