Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications

被引:177
作者
Al-Janabi, Samaher [1 ]
Al-Shourbaji, Ibrahim [2 ]
Shojafar, Mohammad [3 ]
Shamshirband, Shahaboddin [4 ]
机构
[1] Univ Babylon, Fac Sci Women, Dept Comp Sci, Hillah, Iraq
[2] Jazan Univ, Comp Network Dept, Comp Sci & Informat Syst Coll, Jazan 828226649, Saudi Arabia
[3] Sapienza Univ Rome, Dept Informat Engn Elect & Telecommun DIET, Via Eudossiana 18, I-00184 Rome, Italy
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
关键词
Wireless Body Area Network (WBAN); Security; Privacy; Threats; Attacks; Healthcare systems;
D O I
10.1016/j.eij.2016.11.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient's health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient's records are kept safe from intruder's danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored. (C) 2016 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.
引用
收藏
页码:113 / 122
页数:10
相关论文
共 44 条
[1]  
Ahmadi A, 2014, J SUPERCOMPUT, V68, P599, DOI 10.1007/s11227-013-1054-0
[2]   Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications [J].
Al Ameen, Moshaddique ;
Liu, Jingwei ;
Kwak, Kyungsup .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) :93-101
[3]   A Study of Cyber Security Awareness in Educational Environment in the Middle East [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim .
JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2016, 15 (01)
[4]  
[Anonymous], 2011, IJ NETWORK SECURITY
[5]  
[Anonymous], COMPLEMENTARY ALTERN, DOI DOI 10.1016/j.trb.2013.10.007
[6]  
[Anonymous], J MED SYST
[7]  
[Anonymous], ASTL SIA
[8]   Implementing public-key cryptography on passive RFID tags is practical [J].
Arbit, Alex ;
Livne, Yoel ;
Oren, Yossef ;
Wool, Avishai .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :85-99
[9]  
Crosby GV., 2012, International Journal of Ad hoc, Sensor Ubiquitous Computing (IJASUC), V3, P1, DOI [10.5121/ijasuc.2012.3301, DOI 10.5121/IJASUC.2012.3301]
[10]  
Ferdous S., 2007, P 1 INDIAN C COMPUTA, VVolume 2007, P132