scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications

TL;DR: This paper reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications and covers the state-of-art security measures and research.
About: This article is published in Egyptian Informatics Journal.The article was published on 2017-07-01 and is currently open access. It has received 263 citations till now. The article focuses on the topics: Security service & Cloud computing security.
Citations
More filters
Journal ArticleDOI
TL;DR: A new architecture for the implementation of IoT to store and process scalable sensor data (big data) for health care applications and uses MapReduce based prediction model to predict the heart diseases is proposed.

393 citations

Journal ArticleDOI
TL;DR: Concerns as blockchain technology has its own specific vulnerabilities and issues that need to be addressed, such as mining incentives, mining attacks, and key management are highlighted in this survey paper.

377 citations

Journal ArticleDOI
TL;DR: The architectural limitations of existing WBAN communication frameworks are described and a source of motivation towards future development of research incorporating Software Defined Networking (SDN), Energy Harvesting and Blockchain technology into WBAN are provided.

109 citations

Journal ArticleDOI
TL;DR: This paper reviews the current state of the art on IoT architectures for ELEs and healthcare systems, with a focus on the technologies, applications, challenges, opportunities, open-source platforms, and operating systems.
Abstract: Internet of Things (IoT) is an evolution of the Internet and has been gaining increased attention from researchers in both academic and industrial environments. Successive technological enhancements make the development of intelligent systems with a high capacity for communication and data collection possible, providing several opportunities for numerous IoT applications, particularly healthcare systems. Despite all the advantages, there are still several open issues that represent the main challenges for IoT, e.g., accessibility, portability, interoperability, information security, and privacy. IoT provides important characteristics to healthcare systems, such as availability, mobility, and scalability, that offer an architectural basis for numerous high technological healthcare applications, such as real-time patient monitoring, environmental and indoor quality monitoring, and ubiquitous and pervasive information access that benefits health professionals and patients. The constant scientific innovations make it possible to develop IoT devices through countless services for sensing, data fusing, and logging capabilities that lead to several advancements for enhanced living environments (ELEs). This paper reviews the current state of the art on IoT architectures for ELEs and healthcare systems, with a focus on the technologies, applications, challenges, opportunities, open-source platforms, and operating systems. Furthermore, this document synthesizes the existing body of knowledge and identifies common threads and gaps that open up new significant and challenging future research directions.

106 citations


Cites background from "Survey of main challenges (security..."

  • ...Currently, there is a vast diversity of communication protocols with different battery dependability and data range transmissions, such as Wi-Fi, ZigBee, and mobile networks [29]....

    [...]

  • ...Currently, there are different healthcare systems that incorporate several technologies to monitor several human physiological status and environmental parameters using different wireless communications technologies, such as ZigBee, 3G, Bluetooth, Ethernet, and Wi-Fi [3]....

    [...]

  • ...The Bluetooth and Zigbee protocols are usually used for device-to-device communication, as well as Wi-Fi and mobile networks technologies, such as 3G/4G, have been used recurrently to provide Internet access [139]....

    [...]

  • ...The most used technologies, used in six studies, are the Bluetooth protocol and the GPRS/ 3G / HDSPA / 4G, with Wi-Fi in second place....

    [...]

  • ...Smartphones are equipped with short-range communication technologies, such as Bluetooth and Wi-Fi, but also long-range technologies, such as GPRS, UMTS, and 3G/4G, that can be used for monitoring co-morbid patients remotely using short-range communication inside hospitals and long-range communication inside patients’ home [68]....

    [...]

Journal ArticleDOI
TL;DR: A survey of different data collection and secure transmission schemes where fog computing based architectures are considered is presented in this article, where fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio.
Abstract: Internet of medical things (IoMT) is getting researchers’ attention due to its wide applicability in healthcare Smart healthcare sensors and IoT enabled medical devices exchange data and collaborate with other smart devices without human interaction to securely transmit collected sensitive healthcare data towards the server nodes Alongside data communications, security and privacy is also quite challenging to securely aggregate and transmit healthcare data towards Fog and cloud servers We explored the existing surveys to identify a gap in literature that a survey of fog-assisted secure healthcare data collection schemes is yet contributed in literature This paper presents a survey of different data collection and secure transmission schemes where Fog computing based architectures are considered A taxonomy is presented to categorize the schemes Fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio We present a summary of these scheme along with analytical discussion Finally, a number of open research challenges are identified Moreover, the schemes are explored to identify the challenges that are addressed in each scheme

104 citations

References
More filters
Proceedings ArticleDOI
16 Jul 2001
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Abstract: As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and useful, and has not concentrated on security.We present a suite of security building blocks optimized for resource-constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and mTESLA SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide efficient broadcast authentication, which is an important mechanism for sensor networks. mTESLA is a new protocol which provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

2,703 citations

Journal ArticleDOI
TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Abstract: Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and μTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. μTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

2,298 citations

Book ChapterDOI
10 Sep 2007
TL;DR: An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
Abstract: With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present . Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers.

2,202 citations

Journal Article
TL;DR: In this paper, the authors describe an ultra-lightweight block cipher, present, which is suitable for extremely constrained environments such as RFID tags and sensor networks, but it is not suitable for very large networks such as sensor networks.
Abstract: With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present . Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for present are competitive with today's leading compact stream ciphers.

1,750 citations

Journal ArticleDOI
TL;DR: The current state-of-art of WBANs is surveyed based on the latest standards and publications, and open issues and challenges within each area are explored as a source of inspiration towards future developments inWBANs.
Abstract: Recent developments and technological advancements in wireless communication, MicroElectroMechanical Systems (MEMS) technology and integrated circuits has enabled low-power, intelligent, miniaturized, invasive/non-invasive micro and nano-technology sensor nodes strategically placed in or around the human body to be used in various applications, such as personal health monitoring. This exciting new area of research is called Wireless Body Area Networks (WBANs) and leverages the emerging IEEE 802.15.6 and IEEE 802.15.4j standards, specifically standardized for medical WBANs. The aim of WBANs is to simplify and improve speed, accuracy, and reliability of communication of sensors/actuators within, on, and in the immediate proximity of a human body. The vast scope of challenges associated with WBANs has led to numerous publications. In this paper, we survey the current state-of-art of WBANs based on the latest standards and publications. Open issues and challenges within each area are also explored as a source of inspiration towards future developments in WBANs.

1,359 citations


"Survey of main challenges (security..." refers background in this paper

  • ...In fact, security, privacy and Quality of Service (QoS) need to be assessed [67,68]....

    [...]