Figure - available from: International Journal of Wireless Information Networks
This content is subject to copyright. Terms and conditions apply.
Source publication
Body area network (BAN) connects sensors and actuators to the human body in order to collect patient’s information and transmitting it to doctors in a confined space with limited users. wireless body area network (WBAN) is derived from wireless sensor networks (WSN) and enables to transfer of the patient's information with a wide range of communica...
Citations
... [64] Wireless body area networks are experienced in active and passive attacks. [65] Wearable sensors can be easily carried at any time and location due to their size and wireless connection. However, it allows one to connect remotely with an unknown contact, which can lead to security flaws. ...
Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.
... Because WBANs measure physiological activity in humans, which varies more periodically, the application data streams show rather constant rates [39]. The tiny, samrt wireless sensors that make up BANs are in charge of collecting and relaying to carers the vital indicators of a patient [125]. WBAN can be used in transfer the information of the patients into a wide communication ranges. ...
... In healthcare, WBANs play a crucial role in improving patients' quality of life by enabling continuous monitoring and personalized healthcare interventions. Three categories can be used to describe WBAN: beyond-WBAN communication, intra-WBAN communication, and inter-WBAN communication [125]. WBANs can be either wearable, i.e., used on the body surface of a human or implantable, i.e., inserted inside the human body [128]. ...
The unexpectedly high number of deaths caused by inadequate medical care is, to date, considered as a serious problem. Besides, the ratio of elderly people who require continuous care is rising. Therefore, a patient monitoring system (PMS) also known as remote patient monitoring (RPM) using the latest Internet of Things (IoT) technology becomes a viable solution that can provide efficient healthcare from a remote distance. PMS monitors timely physiological signals of a patient’s health and can reduce the healthcare costs of treatment significantly. In PMS, different health and vital signs issues such as body temperature, heart rate, sleep monitoring, fall detection, and blood pressure can be checked effectively in real-time. To this end, this paper provides a clear vision of electronic healthcare assistance based on PMS and explores the applications of IoT that allow efficient medical services in healthcare systems. In particular, the objective of this paper is to provide a review of PMS, current research, and the challenges associated with this area. Besides, the essential services that can be offered by PMS for monitoring human activities are also discussed. Furthermore, the communication networks and protocols that are required to endure efficient healthcare systems are explained. Finally, this paper discusses several research challenges and open issues that can be investigated for further work. Overall, this paper offers valuable insights for both industry professionals and academic researchers, exploring potential avenues for new research directions.
... In addition, they are available real time data that is crucial for medical intervention at suitable time and development the individual healthcare approaches [8,9]. Where, WBAN network improve this ability by allowing continuous communications among the wearable devices, so it is enhanced an integrated environment to transfer and analyze healthcare data [10,11]. This integration introduces for healthcare providers an inclusive visible to help them making overall clinic decisions. ...
... These strategies must not only cater to health monitoring requirements but also guarantee the secure transmission and storage of health data [19]. However, due to the intrinsic limitations of WBANs in terms of resources (i.e., communication bandwidth and energy supplies are both scarce), most traditional security solutions designed for other networks simply cannot be applied directly or effectively to WBANs [10,11]. As a result, security in the WBAN becomes an important research question raising unique design problems of these networks. ...
Public health monitoring systems, which are an integral part of diseases monitoring system and policies formulation, progressively rely on complex networks to collect and analyze
the data, then make the public health statistics. These systems play an essential role in detecting diseases outbreaks, constraining spread directions, and formulating policies for
public health. This manuscript proposes development of continuous health monitoring system, which is designed to monitor individual health cases in real time. Where, the
system is used to securely transfer the participating individual’s data to a medical server, to ease the early detection of abnormal health cases. First, the most important contribution
of this manuscript is the recommendation to implement a continuous health monitoring system as a public health service. In order to improve the proposed system, experimental analysis are conducted to focus on improving network performance and reducing price. These analyses include assessing different network protocols and their configurations to specify the most effective and reliable method to transfer data. While the second
contribution is to develop a new wearable device characterized by its lightweight design and low power consumption. This device considers as one of the basic components for the proposed system. It is provided by different sensors to monitor numerous of health conditions and is able to quickly switch between sleep and wake up modes to conserve energy. These features make the proposed device an effective tool for monitoring public health. Furthermore, this manuscript suggests a security model designed especially for wearable devices with limited resources to meet a serious need in the age of digital information security. The suggested security model assurances the secure handling and
transferring the sensitive health data, which is considered the most important demand of public health monitoring system.
... Ensuring the privacy of health data while providing necessary access for authorized entities is a challenging task. Implementing effective privacy-preserving techniques, such as data anonymization and secure data storage and transmission, requires careful consideration and adherence to privacy regulations and standards [161]- [163]. ...
Wireless Body Area Networks (WBANs) have emerged as a promising technology for remote health monitoring and healthcare applications. However, ensuring the security and privacy of sensitive health data in WBANs is crucial to foster user trust and prevent unauthorized access or data breaches. This paper provides an overview of the key challenges, techniques, and research gaps in WBAN security and privacy. The findings indicate that the challenges in WBAN security and privacy include resource constraints, compatibility issues, privacy concerns, dynamic network environments, security and usability trade-offs, emerging threat landscape, and user awareness and education. To address these challenges, various security techniques have been developed, such as authentication and authorization mechanisms, encryption, access control, secure communication protocols, intrusion detection systems, and privacy-preserving data handling techniques. Despite the progress made, there are research gaps that require further investigation. These research gaps include the development of secure and lightweight authentication mechanisms, privacy-preserving data analysis techniques, trust and security management frameworks, resilience to insider threats, security of data aggregation and fusion, user-centric security designs, and addressing legal and ethical considerations. Addressing these research gaps and challenges requires collaboration between researchers, device manufacturers, policymakers, and end-users. Ongoing research and innovation are necessary to develop robust security techniques, privacy-enhancing technologies, and user-friendly solutions tailored for WBANs. Additionally, compliance with privacy regulations, user education, and awareness are critical for responsible and ethical use of WBANs.
... Wireless body area network is an advanced medical branch of wireless sensor network, which can help the doctor to monitor the physical condition of patients, analyze the body data and establish instant communications [1]. Normally, the cloud-assisted WBAN generates and uploads a great deal of data to the medical cloud (MC) [2,3]. However, the data in the MC is suffering many security problems, such as data tampering, eavesdropping, and so on. ...
The rapid development of wireless sensors has accelerated the popularity of wireless body area network (WBAN). WBAN use multiple sensors to collect the patient’s body data, and the data is transferred to the medical cloud for processing and analyzing. In order to protect the data in the medical cloud, some heterogeneous signcryption schemes that support equality test have been proposed. However, we observe that these schemes use the same cryptographic parameters in different cryptographic systems. In addition, most of these schemes cannot resist the replay attack (RRA) or know session temporary key attack (RKSTKA). To deal with these problems, this paper presents a cross domain heterogeneous signcryption scheme with equality test (CDSCET) for WBAN. In CDSCET, the ciphertexts are from certificateless cryptographic system to public key infrastructure, where two different cryptosystems use different cryptographic parameters. CDSCET can realize confidentiality, integrity, authentication, RRA and RKSTKA. Moreover, compared with three latest schemes, CDSCET has reduced the total computation cost by at least 56.46%.
... To provide services to patients, they need to register and the sensed data may be forwarded to the cloud servers for analysis. Thereafter, the medical experts or actuators can remotely offer some services to the patients based on the received data [13][14][15][16][17][18]. Due to the offered convenience, reliability and efficiency, WBANs have received much interest in the field of health monitoring [19]. ...
Wireless body area networks have gained popularity due to their ability to enhance efficiency, flexibility, convenience and the quality of life. In this environment, the patient physiological data is collected by the biosensors and transmitted over public channels to remote servers. Here, the data is analyzed to facilitate decision making such as injection of some drugs into the patient's body. During the message exchange over public channels, numerous active and passive attacks can be launched. Although many protocols have been developed to address these issues, many vulnerabilities and performance constraints are inherent in these schemes. As such, the design of secure and efficient security protocols suitable for wireless body area networks is still a challenging task. In this paper, a three-factor authentication protocol is developed which encompass patient biometric data, smart card and password. Its formal analysis using both Real-Or-Random (ROR) model and Burrows-Abadi-Needham (BAN) logic shows that it is provably secure. In addition, the semantic security analysis shows that it is secure under the Dolev-Yao (DY) and Canetti-Krawczyk (CK) threat models. In terms of performance, it is demonstrated to result in a 43.98% reduction in computation overheads, 18.18% in number of supported security characteristics and a 19.05% reduction in space complexities.
... As a result, improved collaboration methods for threat detection across IoT devices that respect users' security and privacy are required. Federated learning with MPC may provide a safer and more private solution for IoT devices to work together on threat detection [27]. The motivation behind the proposed work is the benefits of federated learning and MPC to handle the decentralized and distributed nature of the IoT environment. ...
... Therefore, we believe that this article lacks to present the true picture of security challenges of these networks. Ananthi et al. [36] In this paper, the authors discussed general security challenges associated with WBAN. Furthermore, the authors also discussed different safety, data transmission, and reliability concerns associated with WBAN. ...
... Osamy et al. [34] Ijemaru et al. [35] Ananthi et al. [36] Sadkhan et al. [37] Al-Nasser et al. [38] Huanan et al. [39] Our survey pa- ...
In the recent past, patient wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to the information anywhere and every time to improve the life standard of multifarious disease effected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders, etc. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user’s or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up the underlined limitations to discuss the open security challenges of SWSN that need the concerned authorities’ attention. Based on this, we will pave a road map for the future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students that why this paper is in time and needed in the presence of rival papers.
... In [20], Ananthi and Jose conducted a thorough research on the WBAN security challenges for medical care applications. In this research, they investigated and tested the methods and events that lead to increasing security and speeding up the reliability of the WBAN. ...
Wireless body area networks (WBANs) are a new advance utilized in recent years to increase the quality of human life by monitoring the conditions of patients inside and outside hospitals, the activities of athletes, military applications, and multimedia. WBANs consist of intelligent micro- or nano-sensors capable of processing and sending information to the base station (BS). Sensors embedded in the bodies of individuals can enable vital information exchange over wireless communication. Network forming of these sensors envisages long-term medical care without restricting patients’ normal daily activities as part of diagnosing or caring for a patient with a chronic illness or monitoring the patient after surgery to manage emergencies. This paper reviews WBAN, its security challenges, body sensor network architecture and functions, and communication technologies. The work reported in this paper investigates a significant security-level challenge existing in WBAN. Lastly, it highlights various mechanisms for increasing security and decreasing energy consumption.
... A total of 7920 photos are included in this database, consisting of 12 images taken of the index as well as middle fingers of both hands of 165 individuals. Because there are more participants in the PolyU FKP database than in the FV database (165 > 106), we only selected 106 of these individuals [30]. This presumption is required to accomplish the FV and FKP modalities fusion for the training and testing stages. ...
Nowadays, there is a growing demand for information security and security rules all across the world. Intrusion detection (ID) is a critical technique for detecting dangers in a network during data transmission. Artificial Intelligence (AI) methods support the Internet of Things (IoT) and smart cities by creating gadgets replicating intelligent behavior and enabling decision making with little or no human intervention. This research proposes novel technique for secure data transmission and detecting an intruder in a biometric authentication system by feature extraction with classification. Here, an intruder is detected by collecting the biometric database of the smart building based on the IoT. These biometric data are processed for noise removal, smoothening, and normalization. The processed data features are extracted using the kernel-based principal component analysis (KPCA). Then, the processed features are classified using the convolutional VGG−16 Net architecture. Then, the entire network is secured using a deterministic trust transfer protocol (DTTP). The suggested technique’s performance was calculated utilizing several measures, such as the accuracy, f-score, precision, recall, and RMSE. The simulation results revealed that the proposed method provides better intrusion detection outcomes.