Abstract

Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN.

Highlights

  • A Body Area Network (BAN) is a short-range wireless network comprised of devices positioned in, on, and around the body

  • Inter-Wireless Body Area Network (WBAN) communication: This level bridge the gap between the Personnel Server (PS) and the user via access points (APs) that are considered an important part of the network and may be positioned in a way that can allow for emergencies cases

  • This work reviewed the deployment of WBANs in terms of security and privacy

Read more

Summary

INTRODUCTION

A Body Area Network (BAN) is a short-range wireless network comprised of devices positioned in, on, and around the body. This new, inherently personal type of network uses wearable and implanted electronic circuits. A smart phone can remotely access the information sensed by the sensors or a Personal Digital Assistant www.ijoscience.com (PDA) between the patient and a doctor, nurses, pharmacies who take sensitive decisions or actions depending on the information acquired from those sensors [7]. Any patient’s vital information should be stored, used and considered sensitive, but it can be especially so for patients with a socially unaccepted disease Any failure of this type of patient’s health information could lead to humiliation, wrong treatments, relationship issues, or even job loss [14,15]. The communication signals within the region use a Personnel Server (PS) that acts as a gateway, to transfer the information to the level (i.e. access point that is present in Tier 2)

Tier-2
Tier-3
LITERATURE REVIEW
User authentication for notebook computers
Room entry control
Fitness monitoring
Data Integrity
Data Freshness
Availability of the network
Data Authentication
Secure Management
Secure Localization
Accountability
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.