A survey on security and authentication in wireless body area networks

被引:52
作者
Narwal, Bhawna [1 ]
Mohapatra, Amar Kumar [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, IT Dept, Delhi, India
关键词
Authentication; Biometric; Challenges; Healthcare; Open issues; Security; Wireless body area network; ANONYMOUS MUTUAL AUTHENTICATION; ZERO-KNOWLEDGE PROOF; KEY AGREEMENT SCHEME; HEALTH-CARE-SYSTEMS; USER AUTHENTICATION; SENSOR NETWORK; PROTOCOL; PASSWORD; CRYPTOGRAPHY; LIGHTWEIGHT;
D O I
10.1016/j.sysarc.2020.101883
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Body Area Networks (WBAN) is often envisioned as a paradigm shift from the traditional healthcare system to the modern E-Healthcare system. The patient's vitals sensed by the sensors are highly sensitive, confidential, and susceptible to various attacks from adversaries. For the WBAN being a concrete application of the healthcare system, it is paramount to ensure that the data sensed by the WBAN sensors is safe and not exposed to unauthorised entities and security threats. In light of this, strong security solutions and authentication schemes are needed for the success and large scale adoption of the WBANs. To this end, a plethora of security solutions and authentication schemes have been suggested by the researchers over the last two decades. However, the absence of a clear and cohesive study in view of security and authentication does not serve the bigger goal of providing a bird-eye view of the domain. To fulfill the objectives mentioned above, we approach in the following manner. Firstly, an extensive review of the security essentials, security threats, attackers, and attack techniques, and current existing solutions are provided with a detailed classification of security mechanisms in the WBANs. Secondly, a detailed discussion on authentication, design, and development of the authentication scheme and its classification, adversary models and security protocol verifiers is provided. Furthermore, this work outlines the applications, open research issues, recommendations for future authentication schemes and future trends for the WBANs. All in all, this survey elaborates the functionality of WBAN, its technologies, building blocks, and a much wider view of WBAN in terms of security and authentication.
引用
收藏
页数:45
相关论文
共 178 条
[1]   Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) :4815-4828
[2]   Efficient Design of a Novel ECC-Based Public Key Scheme for Medical Data Protection by Utilization of NanoPi Fire [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (03) :1328-1339
[3]   Wireless body area networks: a comprehensive survey [J].
Abidi B. ;
Jilbab A. ;
Mohamed E.H. .
Journal of Medical Engineering and Technology, 2020, 44 (03) :97-107
[4]  
Abina P., 2014, J ADV RES ELECT ELEC, V3, P7954
[5]  
Akhtar F, 2017, IT PROF, V19, P32, DOI 10.1109/MITP.2017.34
[6]  
Al Rasyid MUH, 2016, 2016 INTERNATIONAL ELECTRONICS SYMPOSIUM (IES), P409, DOI 10.1109/ELECSYM.2016.7861041
[7]  
Al Shayokh M, 2016, 2016 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), P12, DOI 10.1109/ICCEREC.2016.7814973
[8]   Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim ;
Shojafar, Mohammad ;
Shamshirband, Shahaboddin .
EGYPTIAN INFORMATICS JOURNAL, 2017, 18 (02) :113-122
[9]   Trust in IoT: dynamic remote attestation through efficient behavior capture [J].
Ali, Toqeer ;
Nauman, Muhammad ;
Jan, Salman .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01) :409-421
[10]  
ALMAHMUD A, 2012, INT J COMPUT APPL, V41, P18, DOI DOI 10.5120/5602-7858