A Survey on the Development of Security Mechanisms for Body Area Networks

被引:13
|
作者
Karaoglan, Duygu [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
来源
COMPUTER JOURNAL | 2014年 / 57卷 / 10期
关键词
body area networks; security mechanisms; elliptic curve cryptography; bio-cryptography; fuzzy commitment; fuzzy vault; ELLIPTIC CURVE CRYPTOGRAPHY; SENSOR NETWORKS; HEALTH-CARE; SYSTEM; ECG; AUTHENTICATION; TELEMEDICINE; CHALLENGES; BIOMETRICS; MODEL;
D O I
10.1093/comjnl/bxt077
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in lightweight, small-sized and low-power sensors led to the development of wearable biosensors, and thus, to the accurate monitoring of human periphery. On top of this, pervasive computing has been improved and technologies have been matured enough to build plug-and-play body area networks (BANs). In a BAN, the main functionality of a node is to effectively and efficiently collect data from vital body parts, share it with the neighbors and make decisions accordingly. Because of the fact that the captured phenomenon is highly sensitive to privacy breaches in addition to being transmitted using the wireless communication medium, BANs require a security infrastructure. However, due to the extreme energy scarcity, bandwidth and storage constraints of the nodes, conventional solutions are inapplicable. In this survey, we present an overview of BANs and provide a detailed investigation into the developed security infrastructures. We examined the literature and combined the corresponding proposals under two major classes: (i) pure-cryptographic security mechanisms and (ii) bio-cryptographic security mechanisms. Pure-cryptographic methods include constructions based on the well-known symmetric or asymmetric cryptography primitives and they are suitable for securing the communication between any two network entities. On the other hand, bio-cryptographic methods benefit from the network's context-awareness and to the best of our knowledge, they have been utilized only for the communication among the biosensors.
引用
收藏
页码:1484 / 1512
页数:29
相关论文
共 50 条
  • [21] An ASIC Implementation of Security Scheme for Body Area Networks
    Wang, Junchao
    Han, Kaining
    Alexandridis, Anastasios
    Zilic, Zeljko
    Pang, Yu
    Lin, Jinzhao
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [22] WIRELESS BODY AREA NETWORKS: SECURITY AND PRIVACY ISSUES
    Muka, Romina
    Vukatana, Kreshnik
    Sevrani, Kozeta
    INTERNATIONAL JOURNAL OF ECOSYSTEMS AND ECOLOGY SCIENCE-IJEES, 2020, 10 (03): : 535 - 542
  • [23] DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS
    Li, Ming
    Lou, Wenjing
    Ren, Kui
    IEEE WIRELESS COMMUNICATIONS, 2010, 17 (01) : 51 - 58
  • [24] Security Challenges and Solutions for Wireless Body Area Networks
    Bharathi, K. R. Siva
    Venkateswari, R.
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 275 - 283
  • [25] A biometric security scheme for wireless body area networks
    Dodangeh, Peyman
    Jahangir, Amir Hossein
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 62 - 74
  • [26] Hybrid security protocol for wireless body area networks
    Jang, Chol Soon
    Lee, Deok Gyu
    Han, Jong-wook
    Park, Jong Hyuk
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 277 - 288
  • [27] Analysis of Security Issues in Wireless Body Area Networks in Heterogeneous Networks
    Muthuvel, Somasundaram
    Rajagopal, Sivakumar
    Subramaniam, Shamala K.
    SENSORS, 2022, 22 (19)
  • [28] Survey on security in intra-body area network communication
    Kompara, Marko
    Holbl, Marko
    AD HOC NETWORKS, 2018, 70 : 23 - 43
  • [29] A Survey on Mobility Support in Wireless Body Area Networks
    Kim, Beom-Su
    Kim, Kyong Hoon
    Kim, Ki-Il
    SENSORS, 2017, 17 (04)
  • [30] Security mechanisms and their performance impacts on wireless local area networks
    Gurkas, G. Zeynep
    Zaim, A. Halim
    Ali Aydin, M.
    ISCN '06: PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORKS, 2006, : 123 - +