Skip to main content
Erschienen in: Wireless Personal Communications 2/2022

22.08.2021

Challenges and Developments in Secure Routing Protocols for Healthcare in WBAN: A Comparative Analysis

verfasst von: Ripty Singla, Navneet Kaur, Deepika Koundal, Anuj Bharadwaj

Erschienen in: Wireless Personal Communications | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rise in life expectancy of humans, COVID-19 pandemic and growing cost of medical services has brought up huge challenges for the government and healthcare industry. Due to unhealthy lifestyle, there is an increased need for continual health monitoring and diagnosis of diseases. Wireless Body Area Network (WBAN) is attracted attention of researchers as various biosensors can be embedded in or worn on the body of human beings for the measurement of health parameters. The patient’s health data is then sent wirelessly to the physician for health analysis. The biosensors used to measure physiological parameters have limited power due to its small size and hence smaller form factor. For the longevity of the network, it is imperative to transmit the data in an energy-efficient manner. Moreover, the health information of the patient is stringently private. Hence, the privacy and security of transmitted information needs to be ensured. It necessitates the development of effective, lightweight and secure routing protocols that provides security with minimal use of resources. This paper has identified the numerous security requirements in WBANs and has provided the extensive review on existing secure routing protocols reported in the literature. A comparative analysis of the various existing state-of-the art secure routing protocols and critical analysis based on security techniques along with different performance parameters has been presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Suzman, R., & Beard, J. (2015). Global health and aging: preface. National Institute on Aging website. Suzman, R., & Beard, J. (2015). Global health and aging: preface. National Institute on Aging website.
2.
Zurück zum Zitat American Hospital Association. (2007). When I’m 64: How boomers will change health care (pp. 00–10). Chicago: American Hospital Association. American Hospital Association. (2007). When I’m 64: How boomers will change health care (pp. 00–10). Chicago: American Hospital Association.
3.
Zurück zum Zitat Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658–1686. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658–1686.
4.
Zurück zum Zitat Fried, L. P., Ferrucci, L., Darer, J., Williamson, J. D., & Anderson, G. (2004). Untangling the concepts of disability, frailty, and comorbidity: Implications for improved targeting and care. The Journals of Gerontology Series A: Biological Sciences and Medical Sciences, 59(3), M255–M263. Fried, L. P., Ferrucci, L., Darer, J., Williamson, J. D., & Anderson, G. (2004). Untangling the concepts of disability, frailty, and comorbidity: Implications for improved targeting and care. The Journals of Gerontology Series A: Biological Sciences and Medical Sciences, 59(3), M255–M263.
5.
Zurück zum Zitat Kulli, V. (2020). The Management of the Development of a Geriatric-Friendly Practice Toolkit for Use in the Primary Care Setting: a Multi-Tiered Intervention to Improve the Health of Older Adults. Doctoral dissertation, University of Pittsburgh. Kulli, V. (2020). The Management of the Development of a Geriatric-Friendly Practice Toolkit for Use in the Primary Care Setting: a Multi-Tiered Intervention to Improve the Health of Older Adults. Doctoral dissertation, University of Pittsburgh.
6.
Zurück zum Zitat Cypher, D., Chevrollier, N., Montavont, N., & Golmie, N. (2006). Prevailing over wires in healthcare environments: Benefits and challenges. IEEE Communications Magazine, 44(4), 56–63. Cypher, D., Chevrollier, N., Montavont, N., & Golmie, N. (2006). Prevailing over wires in healthcare environments: Benefits and challenges. IEEE Communications Magazine, 44(4), 56–63.
7.
Zurück zum Zitat Honeine, P., Mourad, F., Kallas, M., Snoussi, H., Amoud, H., & Francis, C. (2011, May). Wireless sensor networks in biomedical: Body area networks. In International Workshop on Systems, Signal Processing and their Applications, WOSSPA (pp. 388–391). IEEE. Honeine, P., Mourad, F., Kallas, M., Snoussi, H., Amoud, H., & Francis, C. (2011, May). Wireless sensor networks in biomedical: Body area networks. In International Workshop on Systems, Signal Processing and their Applications, WOSSPA (pp. 388–391). IEEE.
8.
Zurück zum Zitat Van Dam, K., Pitchers, S., & Barnard, M. (2001). Body area networks: Towards a wearable future. In Proceedings of WWRF kick off meeting, Munich, Germany, March 6–7, 2001. Van Dam, K., Pitchers, S., & Barnard, M. (2001). Body area networks: Towards a wearable future. In Proceedings of WWRF kick off meeting, Munich, Germany, March 6–7, 2001.
9.
Zurück zum Zitat IEEE Standards Association. (2012). IEEE Standard for local and metropolitan area networks—Part 15.6: Wireless body area networks. IEEE Standard for Information Technology, IEEE, 802(6), 1–271. IEEE Standards Association. (2012). IEEE Standard for local and metropolitan area networks—Part 15.6: Wireless body area networks. IEEE Standard for Information Technology, IEEE, 802(6), 1–271.
10.
Zurück zum Zitat Latré, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18. Latré, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.
11.
Zurück zum Zitat Bangash, J. I., Abdullah, A. H., Anisi, M. H., & Khan, A. W. (2014). A survey of routing protocols in wireless body sensor networks. Sensors, 14(1), 1322–1357. Bangash, J. I., Abdullah, A. H., Anisi, M. H., & Khan, A. W. (2014). A survey of routing protocols in wireless body sensor networks. Sensors, 14(1), 1322–1357.
12.
Zurück zum Zitat Lohr, K. N., & Donaldson, M. S. (Eds.). (1994). Health data in the information age: Use, disclosure, and privacy. National Academies Press. Lohr, K. N., & Donaldson, M. S. (Eds.). (1994). Health data in the information age: Use, disclosure, and privacy. National Academies Press.
13.
Zurück zum Zitat Pathania, S., & Bilandi, N. (2014). Security issues in wireless body area network. Int J Comput Sci Mobile Comput, 3(4), 1171–1178. Pathania, S., & Bilandi, N. (2014). Security issues in wireless body area network. Int J Comput Sci Mobile Comput, 3(4), 1171–1178.
14.
Zurück zum Zitat Raja, K. S., & Kiruthika, U. (2015). An energy efficient method for secure and reliable data transmission in wireless body area networks using RelAODV. Wireless Personal Communications, 83(4), 2975–2997. Raja, K. S., & Kiruthika, U. (2015). An energy efficient method for secure and reliable data transmission in wireless body area networks using RelAODV. Wireless Personal Communications, 83(4), 2975–2997.
15.
Zurück zum Zitat Khan, Z. A., Sivakumar, S., Phillips, W., & Aslam, N. (2014). A new patient monitoring framework and energy-aware peering routing protocol (EPR) for body area network communication. Journal of Ambient Intelligence and Humanized Computing, 5(3), 409–423. Khan, Z. A., Sivakumar, S., Phillips, W., & Aslam, N. (2014). A new patient monitoring framework and energy-aware peering routing protocol (EPR) for body area network communication. Journal of Ambient Intelligence and Humanized Computing, 5(3), 409–423.
16.
Zurück zum Zitat Lai, X., Liu, Q., Wei, X., Wang, W., Zhou, G., & Han, G. (2013). A survey of body sensor networks. Sensors, 13(5), 5406–5447. Lai, X., Liu, Q., Wei, X., Wang, W., Zhou, G., & Han, G. (2013). A survey of body sensor networks. Sensors, 13(5), 5406–5447.
17.
Zurück zum Zitat Kaur, N., & Singh, S. (2017). Optimized cost effective and energy efficient routing protocol for wireless body area networks. Ad Hoc Networks, 61, 65–84. Kaur, N., & Singh, S. (2017). Optimized cost effective and energy efficient routing protocol for wireless body area networks. Ad Hoc Networks, 61, 65–84.
18.
Zurück zum Zitat Sangwan, A., & Bhattacharya, P. P. (2015). Wireless body sensor networks: A review. International Journal of Hybrid Information Technology, 8(9), 105–120. Sangwan, A., & Bhattacharya, P. P. (2015). Wireless body sensor networks: A review. International Journal of Hybrid Information Technology, 8(9), 105–120.
19.
Zurück zum Zitat Zriqat, I. A. A., & Altamimi, A. M. (2016). Security and privacy issues in eHealthcare systems: Towards trusted services. International Journal of Advanced Computer Science and Applications, 7(9), 229–236. Zriqat, I. A. A., & Altamimi, A. M. (2016). Security and privacy issues in eHealthcare systems: Towards trusted services. International Journal of Advanced Computer Science and Applications, 7(9), 229–236.
20.
Zurück zum Zitat Javadi, S. S., & Razzaque, M. A. (2013). Security and privacy in wireless body area networks for health care applications. In S. Khan & A. S. K. Pathan (Eds.), Wireless networks and security (pp. 165–187). Springer. Javadi, S. S., & Razzaque, M. A. (2013). Security and privacy in wireless body area networks for health care applications. In S. Khan & A. S. K. Pathan (Eds.), Wireless networks and security (pp. 165–187). Springer.
25.
Zurück zum Zitat Ullah, I., Zeadally, S., Amin, N. U., Khan, M. A., & Khattak, H. (2021). Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocessors and Microsystems, 81, 103477. Ullah, I., Zeadally, S., Amin, N. U., Khan, M. A., & Khattak, H. (2021). Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocessors and Microsystems, 81, 103477.
26.
Zurück zum Zitat Nidhya, R., Shanthi, S., & Kumar, M. (2021). A novel encryption design for wireless body area network in remote healthcare system using enhanced RSA algorithm. In S. Satapathy, V. Bhateja, B. Janakiramaiah, & Y. W. Chen (Eds.), Intelligent system design (pp. 255–263). Springer. Nidhya, R., Shanthi, S., & Kumar, M. (2021). A novel encryption design for wireless body area network in remote healthcare system using enhanced RSA algorithm. In S. Satapathy, V. Bhateja, B. Janakiramaiah, & Y. W. Chen (Eds.), Intelligent system design (pp. 255–263). Springer.
27.
Zurück zum Zitat Joshi, A., & Mohapatra, A. K. (2020). A novel lightweight authentication protocol for body area networks based on elliptic-curve cryptography. Journal of Information and Optimization Sciences, 41(7), 1645–1672. Joshi, A., & Mohapatra, A. K. (2020). A novel lightweight authentication protocol for body area networks based on elliptic-curve cryptography. Journal of Information and Optimization Sciences, 41(7), 1645–1672.
28.
Zurück zum Zitat Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communications, 17(1), 51–58. Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communications, 17(1), 51–58.
32.
Zurück zum Zitat Touijer, B., Maissa, Y. B., & Mouline, S. (2021). IEEE 802.15. 6 CSMA/CA access method for WBANs: Performance evaluation and new backoff counter selection procedure. Computer Networks, 188, 107759. Touijer, B., Maissa, Y. B., & Mouline, S. (2021). IEEE 802.15. 6 CSMA/CA access method for WBANs: Performance evaluation and new backoff counter selection procedure. Computer Networks, 188, 107759.
33.
Zurück zum Zitat Shen, G., Song, W., Gui, Y. and Gao, H., (2020) Access control for wireless body area networks. In: International conference on security and privacy in new computing environments (pp. 244–254). Springer, Cham. Shen, G., Song, W., Gui, Y. and Gao, H., (2020) Access control for wireless body area networks. In: International conference on security and privacy in new computing environments (pp. 244–254). Springer, Cham.
34.
Zurück zum Zitat Ibrahim, A.A. and Bayat, O., 2020, June. Medium Access Control Protocol-based Energy and Quality of Service routing scheme for WBAN. In 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1–6). IEEE. Ibrahim, A.A. and Bayat, O., 2020, June. Medium Access Control Protocol-based Energy and Quality of Service routing scheme for WBAN. In 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1–6). IEEE.
35.
Zurück zum Zitat La Manna, M., Perazzo, P., & Dini, G. (2021). SEA-BREW: A scalable attribute-based encryption revocable scheme for low-bitrate IoT wireless networks. Journal of Information Security and Applications, 58, 102692. La Manna, M., Perazzo, P., & Dini, G. (2021). SEA-BREW: A scalable attribute-based encryption revocable scheme for low-bitrate IoT wireless networks. Journal of Information Security and Applications, 58, 102692.
36.
Zurück zum Zitat Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal, 18(2), 113–122. Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal, 18(2), 113–122.
37.
Zurück zum Zitat Balasubramanyn, V.B., Thamilarasu, G. and Sridhar, R., (2007) Security solution for data integrity in wireless biosensor networks. In: Distributed computing systems workshops, 2007. ICDCSW'07. 27th International Conference on (pp. 79–79). IEEE. Balasubramanyn, V.B., Thamilarasu, G. and Sridhar, R., (2007) Security solution for data integrity in wireless biosensor networks. In: Distributed computing systems workshops, 2007. ICDCSW'07. 27th International Conference on (pp. 79–79). IEEE.
38.
Zurück zum Zitat Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101. Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.
39.
Zurück zum Zitat Saba, T., Haseeb, K., Ahmed, I., & Rehman, A. (2020). Secure and energy-efficient framework using internet of medical things for e-healthcare. Journal of Infection and Public Health, 13(10), 1567–1575. Saba, T., Haseeb, K., Ahmed, I., & Rehman, A. (2020). Secure and energy-efficient framework using internet of medical things for e-healthcare. Journal of Infection and Public Health, 13(10), 1567–1575.
40.
Zurück zum Zitat Alzubi, A., & Sari, A. (2016). Deployment of hash function to enhance message integrity in wireless body area network (WBAN). International Journal of Communications, Network and System Sciences, 9(12), 613. Alzubi, A., & Sari, A. (2016). Deployment of hash function to enhance message integrity in wireless body area network (WBAN). International Journal of Communications, Network and System Sciences, 9(12), 613.
41.
Zurück zum Zitat Shanmugapriya, I., & Kumar, S. V. (2020). Pseudonym public key based sakai-kasahara certificateless signcryption for securing communication in WBAN. Journal of Critical Reviews, 7(6), 70–77. Shanmugapriya, I., & Kumar, S. V. (2020). Pseudonym public key based sakai-kasahara certificateless signcryption for securing communication in WBAN. Journal of Critical Reviews, 7(6), 70–77.
42.
Zurück zum Zitat Kumar, R., & Mukesh, R. (2013). State of the art: Security in wireless body area networks. International Journal of Computer Science & Engineering Technology (IJCSET), 4(05), 622–630. Kumar, R., & Mukesh, R. (2013). State of the art: Security in wireless body area networks. International Journal of Computer Science & Engineering Technology (IJCSET), 4(05), 622–630.
45.
Zurück zum Zitat Bengag, A., Bengag, A., & Moussaoui, O. (2020). Attacks classification and a novel IDS for detecting jamming attack in WBAN. Advances in Science, Technology and Engineering Systems Journal, 5(2), 80–86. Bengag, A., Bengag, A., & Moussaoui, O. (2020). Attacks classification and a novel IDS for detecting jamming attack in WBAN. Advances in Science, Technology and Engineering Systems Journal, 5(2), 80–86.
46.
Zurück zum Zitat Arora K., Mahajan S. (2021) Detecting denial-of-service attack using dendritic cell approach. In D. Goyal, A.K. Gupta, V. Piuri, M. Ganzha, & M. Paprzycki (Eds.), Proceedings of the second international conference on information management and machine intelligence. Lecture notes in networks and systems (vol. 166). Singapore: Springer. https://doi.org/10.1007/978-981-15-9689-6_55. Arora K., Mahajan S. (2021) Detecting denial-of-service attack using dendritic cell approach. In D. Goyal, A.K. Gupta, V. Piuri, M. Ganzha, & M. Paprzycki (Eds.), Proceedings of the second international conference on information management and machine intelligence. Lecture notes in networks and systems (vol. 166). Singapore: Springer. https://​doi.​org/​10.​1007/​978-981-15-9689-6_​55.
47.
Zurück zum Zitat Alsubaie, F, Al-Akhras, M and Alzahrani, H. A., (2020) Using machine learning for intrusion detection system in wireless body area network. In: 2020 First international conference of smart systems and emerging technologies (SMARTTECH), Riyadh, Saudi Arabia, 2020 (pp. 100–104). https://doi.org/10.1109/SMART-TECH49988.2020.00036. Alsubaie, F, Al-Akhras, M and Alzahrani, H. A., (2020) Using machine learning for intrusion detection system in wireless body area network. In: 2020 First international conference of smart systems and emerging technologies (SMARTTECH), Riyadh, Saudi Arabia, 2020 (pp. 100–104). https://​doi.​org/​10.​1109/​SMART-TECH49988.​2020.​00036.
48.
Zurück zum Zitat Muhsin, Y. A., & Yassin, A. A. (2020). Design a lightweight authentication scheme for WBAN in healthcare systems. Journal of Basrah Researches (Sciences), 46(1), 160–170. Muhsin, Y. A., & Yassin, A. A. (2020). Design a lightweight authentication scheme for WBAN in healthcare systems. Journal of Basrah Researches (Sciences), 46(1), 160–170.
49.
Zurück zum Zitat Corral-Plaza, D., Reich, O., Hübner, E., Wagner, M., & Medina-Bulo, I., (2019). A sensor fusion system identifying complex events for localisation estimation. In Proceedings of the 16th international conference on applied computing. Corral-Plaza, D., Reich, O., Hübner, E., Wagner, M., & Medina-Bulo, I., (2019). A sensor fusion system identifying complex events for localisation estimation. In Proceedings of the 16th international conference on applied computing.
50.
Zurück zum Zitat Sundar, S., Kumar, R., & Kittur, H. M. (2020). Improved indoor location tracking system for mobile nodes. International Journal of Computer Aided Engineering and Technology, 12(1), 1–16. Sundar, S., Kumar, R., & Kittur, H. M. (2020). Improved indoor location tracking system for mobile nodes. International Journal of Computer Aided Engineering and Technology, 12(1), 1–16.
52.
Zurück zum Zitat Poongodi, T., Rathee, A., Indrakumari, R., & Suresh, P. (2020). IoT sensing capabilities: Sensor deployment and node discovery, wearable sensors, wireless body area network (WBAN), data acquisition. In S. L. Peng, S. Pal, & L. Huang (Eds.), Principles of internet of things (IoT) ecosystem: Insight paradigm (pp. 127–151). Springer. Poongodi, T., Rathee, A., Indrakumari, R., & Suresh, P. (2020). IoT sensing capabilities: Sensor deployment and node discovery, wearable sensors, wireless body area network (WBAN), data acquisition. In S. L. Peng, S. Pal, & L. Huang (Eds.), Principles of internet of things (IoT) ecosystem: Insight paradigm (pp. 127–151). Springer.
53.
Zurück zum Zitat Cherukuri, S., Venkatasubramanian, K. K., & Gupta, S. K. (2003). BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In Parallel processing workshops, 2003. Proceedings. 2003 International conference on (pp. 432–439). IEEE. Cherukuri, S., Venkatasubramanian, K. K., & Gupta, S. K. (2003). BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In Parallel processing workshops, 2003. Proceedings. 2003 International conference on (pp. 432–439). IEEE.
55.
Zurück zum Zitat Umar, M., Wu, Z., & Liao, X. (2021). Channel characteristics aware zero knowledge proof based authentication scheme in body area networks. Ad Hoc Networks, 112, 102374. Umar, M., Wu, Z., & Liao, X. (2021). Channel characteristics aware zero knowledge proof based authentication scheme in body area networks. Ad Hoc Networks, 112, 102374.
56.
Zurück zum Zitat Tan, X., Zhang, J., Zhang, Y., Qin, Z., Ding, Y., & Wang, X. (2020). A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network. Tsinghua Science and Technology, 26(1), 36–47. Tan, X., Zhang, J., Zhang, Y., Qin, Z., Ding, Y., & Wang, X. (2020). A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network. Tsinghua Science and Technology, 26(1), 36–47.
58.
Zurück zum Zitat Umar, M., Wu, Z., & Liao, X. (2020). Mutual authentication in body area networks using signal propagation characteristics. IEEE Access, 8, 66411–66422. Umar, M., Wu, Z., & Liao, X. (2020). Mutual authentication in body area networks using signal propagation characteristics. IEEE Access, 8, 66411–66422.
59.
Zurück zum Zitat Rehman, Z. U., Altaf, S., & Iqbal, S. (2020). An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access, 8, 175385–175397. Rehman, Z. U., Altaf, S., & Iqbal, S. (2020). An efficient lightweight key agreement and authentication scheme for WBAN. IEEE Access, 8, 175385–175397.
60.
Zurück zum Zitat Wang, C., Zheng, W., Ji, S., Liu, Q. and Wang, A., (2018). Identity-based fast authentication scheme for smart mobile devices in body area networks. Wireless Communications and Mobile Computing, 2018. Wang, C., Zheng, W., Ji, S., Liu, Q. and Wang, A., (2018). Identity-based fast authentication scheme for smart mobile devices in body area networks. Wireless Communications and Mobile Computing, 2018.
61.
Zurück zum Zitat Chatterjee, K. (2019). An improved authentication protocol for wireless body sensor networks applied in healthcare applications. Wireless Personal Communications, 111, 1–19. Chatterjee, K. (2019). An improved authentication protocol for wireless body sensor networks applied in healthcare applications. Wireless Personal Communications, 111, 1–19.
62.
Zurück zum Zitat Kumar, P., & Lee, H. J. (2012). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91. Kumar, P., & Lee, H. J. (2012). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91.
63.
Zurück zum Zitat Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE 802.15. 4 security framework for wireless body area networks. Sensors, 11(2), 1383–1395. Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE 802.15. 4 security framework for wireless body area networks. Sensors, 11(2), 1383–1395.
64.
Zurück zum Zitat Roy, S., & Biswas, S. (2019). A novel trust evaluation model based on data freshness in WBAN. In Proceedings of international ethical hacking conference 2018 (pp. 223–232). Singapore: Springer. Roy, S., & Biswas, S. (2019). A novel trust evaluation model based on data freshness in WBAN. In Proceedings of international ethical hacking conference 2018 (pp. 223–232). Singapore: Springer.
65.
Zurück zum Zitat Saha, S., & Anvekar, D. K. (2017). A poly_hop message routing approach through node and data classification for optimizing energy consumption and enhanced reliability in WBAN. In: 2017 International conference on smart technologies for smart nation (SmartTechCon) (pp. 788–792). IEEE. Saha, S., & Anvekar, D. K. (2017). A poly_hop message routing approach through node and data classification for optimizing energy consumption and enhanced reliability in WBAN. In: 2017 International conference on smart technologies for smart nation (SmartTechCon) (pp. 788–792). IEEE.
66.
Zurück zum Zitat Thomas, J. (2009). Medical records and issues in negligence. Indian Journal of Urology: IJU: Journal of the Urological Society of India, 25(3), 384. Thomas, J. (2009). Medical records and issues in negligence. Indian Journal of Urology: IJU: Journal of the Urological Society of India, 25(3), 384.
67.
Zurück zum Zitat Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless communications, 17(1), 51–58. Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless communications, 17(1), 51–58.
68.
Zurück zum Zitat Bruhadeshwar, B., Kothapalli, K., Poornima, M. and Divya, M., (2009). Routing protocol security using symmetric key based techniques. In: 2009 International conference on availability, reliability and security (pp. 193–200). IEEE. Bruhadeshwar, B., Kothapalli, K., Poornima, M. and Divya, M., (2009). Routing protocol security using symmetric key based techniques. In: 2009 International conference on availability, reliability and security (pp. 193–200). IEEE.
69.
Zurück zum Zitat Saleem, S., Ullah, S., & Yoo, H. S. (2009). On the security issues in wireless body area networks. JDCTA, 3(3), 178–184. Saleem, S., Ullah, S., & Yoo, H. S. (2009). On the security issues in wireless body area networks. JDCTA, 3(3), 178–184.
70.
Zurück zum Zitat Law, Y., Doumen, J., & Hartel, P. (2004). Survey and benchmark of block ciphers for wireless sensor networks. Technical Report TR-CTIT-04–07, Centre for Telematics and Information Technology. The Netherlands: University of Twente. Law, Y., Doumen, J., & Hartel, P. (2004). Survey and benchmark of block ciphers for wireless sensor networks. Technical Report TR-CTIT-04–07, Centre for Telematics and Information Technology. The Netherlands: University of Twente.
71.
Zurück zum Zitat Sampangi, R.V., Dey, S., Urs, S.R. and Sampalli, S., (2012). A security suite for wireless body area networks. arXiv preprint arXiv:1202.2171 Sampangi, R.V., Dey, S., Urs, S.R. and Sampalli, S., (2012). A security suite for wireless body area networks. arXiv preprint arXiv:​1202.​2171
72.
Zurück zum Zitat Baqai, A., Umrani, F. A., & Chowdhry, B. S. (2017). A novel protocol with patient and node identification for optical WBAN with inherent security and interference rejection. Wireless Personal Communications, 95(4), 4211–4224. Baqai, A., Umrani, F. A., & Chowdhry, B. S. (2017). A novel protocol with patient and node identification for optical WBAN with inherent security and interference rejection. Wireless Personal Communications, 95(4), 4211–4224.
73.
Zurück zum Zitat Baqai, A. (2014). Design, development and implementation of the IR signaling techniques for monitoring ambient and body temperature. Mehran University Research Journal of Engineering and Technology, 33(3), 365–366. Baqai, A. (2014). Design, development and implementation of the IR signaling techniques for monitoring ambient and body temperature. Mehran University Research Journal of Engineering and Technology, 33(3), 365–366.
74.
Zurück zum Zitat Kumar, P., & Sharma, A. (2018). Data security using genetic algorithm in wireless body area network. International Journal of Advanced Studies of Scientific Research, 3(9), 5. Kumar, P., & Sharma, A. (2018). Data security using genetic algorithm in wireless body area network. International Journal of Advanced Studies of Scientific Research, 3(9), 5.
75.
Zurück zum Zitat Lin, C. H., Wu, J. X., Chen, P. Y., Li, C. M., Pai, N. S., & Kuo, C. L. (2021). Symmetric cryptography with a chaotic map and a multilayer machine learning network for physiological signal infosecurity: Case study in electrocardiogram. IEEE Access, 9, 26451–26467. Lin, C. H., Wu, J. X., Chen, P. Y., Li, C. M., Pai, N. S., & Kuo, C. L. (2021). Symmetric cryptography with a chaotic map and a multilayer machine learning network for physiological signal infosecurity: Case study in electrocardiogram. IEEE Access, 9, 26451–26467.
76.
Zurück zum Zitat Pareek, N. K., Patidar, V., & Sud, K. K. (2013). Diffusion–substitution based gray image encryption scheme. Digital Signal Processing, 23(3), 894–901.MathSciNet Pareek, N. K., Patidar, V., & Sud, K. K. (2013). Diffusion–substitution based gray image encryption scheme. Digital Signal Processing, 23(3), 894–901.MathSciNet
77.
Zurück zum Zitat Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., & Mosavi, M. R. (2014). A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems, 20(1), 45–64.MATH Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., & Mosavi, M. R. (2014). A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems, 20(1), 45–64.MATH
78.
Zurück zum Zitat Anwar, S., & Meghana, S. (2019). A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications, 78(19), 27569–27590. Anwar, S., & Meghana, S. (2019). A pixel permutation based image encryption technique using chaotic map. Multimedia Tools and Applications, 78(19), 27569–27590.
79.
Zurück zum Zitat San-Um, W., & Chuayphan, N. (2014). A lossless physical-layer encryption scheme in medical picture archiving and communication systems using highly-robust chaotic signals. In: The 7th 2014 biomedical engineering international conference (pp. 1–5). IEEE. San-Um, W., & Chuayphan, N. (2014). A lossless physical-layer encryption scheme in medical picture archiving and communication systems using highly-robust chaotic signals. In: The 7th 2014 biomedical engineering international conference (pp. 1–5). IEEE.
80.
Zurück zum Zitat Telem, A. N. K., Segning, C. M., Kenne, G., & Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014, 19. Telem, A. N. K., Segning, C. M., Kenne, G., & Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014, 19.
81.
Zurück zum Zitat Yang, T.-L., Lin, C.-H., Chen, W.-L., Lin, H.-Y., Chen-San, Su., & Liang, C.-K. (2019). Hash transformation and machine learning-based decision-making classifier improved the accuracy rate of automated Parkinson’s disease screening. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 28(1), 72–82. Yang, T.-L., Lin, C.-H., Chen, W.-L., Lin, H.-Y., Chen-San, Su., & Liang, C.-K. (2019). Hash transformation and machine learning-based decision-making classifier improved the accuracy rate of automated Parkinson’s disease screening. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 28(1), 72–82.
82.
Zurück zum Zitat Yang, T. L., Kan, P. J., Lin, C. H., Lin, H. Y., Chen, W. L., & Yau, H. T. (2019). Using polar expression features and nonlinear machine learning classifier for automated Parkinson’s disease screening. IEEE Sensors Journal, 20(1), 501–514. Yang, T. L., Kan, P. J., Lin, C. H., Lin, H. Y., Chen, W. L., & Yau, H. T. (2019). Using polar expression features and nonlinear machine learning classifier for automated Parkinson’s disease screening. IEEE Sensors Journal, 20(1), 501–514.
83.
Zurück zum Zitat Wu, J. X., Chen, P. Y., Li, C. M., Kuo, Y. C., Pai, N. S., & Lin, C. H. (2020). Multilayer fractional-order machine vision classifier for rapid typical lung diseases screening on digital chest X-Ray images. IEEE Access, 8, 105886–105902. Wu, J. X., Chen, P. Y., Li, C. M., Kuo, Y. C., Pai, N. S., & Lin, C. H. (2020). Multilayer fractional-order machine vision classifier for rapid typical lung diseases screening on digital chest X-Ray images. IEEE Access, 8, 105886–105902.
84.
Zurück zum Zitat Chougrad, H., Zouaki, H., & Alheyane, O. (2018). Deep convolutional neural networks for breast cancer screening. Computer Methods and Programs in Biomedicine, 157, 19–30. Chougrad, H., Zouaki, H., & Alheyane, O. (2018). Deep convolutional neural networks for breast cancer screening. Computer Methods and Programs in Biomedicine, 157, 19–30.
85.
Zurück zum Zitat Li, T. H. S., Liu, C. Y., Kuo, P. H., Fang, N. C., Li, C. H., Cheng, C. W., Hsieh, C. Y., Wu, L. F., Liang, J. J., & Chen, C. Y. (2017). A three-dimensional adaptive PSO-based packing algorithm for an IoT-based automated e-fulfillment packaging system. IEEE Access, 5, 9188–9205. Li, T. H. S., Liu, C. Y., Kuo, P. H., Fang, N. C., Li, C. H., Cheng, C. W., Hsieh, C. Y., Wu, L. F., Liang, J. J., & Chen, C. Y. (2017). A three-dimensional adaptive PSO-based packing algorithm for an IoT-based automated e-fulfillment packaging system. IEEE Access, 5, 9188–9205.
87.
Zurück zum Zitat Darwish, A., & Hassanien, A. E. (2011). Wearable and implantable wireless sensor network solutions for healthcare monitoring. Sensors, 11(6), 5561–5595. Darwish, A., & Hassanien, A. E. (2011). Wearable and implantable wireless sensor network solutions for healthcare monitoring. Sensors, 11(6), 5561–5595.
88.
Zurück zum Zitat He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine, 53(1), 71–77. He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. IEEE Communications Magazine, 53(1), 71–77.
89.
Zurück zum Zitat Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2013). Certificate less remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332–342. Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2013). Certificate less remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332–342.
90.
Zurück zum Zitat Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems, 38(2), 13. Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems, 38(2), 13.
91.
Zurück zum Zitat Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) Google Scholar. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) Google Scholar.
92.
Zurück zum Zitat Manfredi, S. (2012). Reliable and energy-efficient cooperative routing algorithm for wireless monitoring systems. IET Wireless Sensor Systems, 2(2), 128–135. Manfredi, S. (2012). Reliable and energy-efficient cooperative routing algorithm for wireless monitoring systems. IET Wireless Sensor Systems, 2(2), 128–135.
93.
Zurück zum Zitat Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., & Choo, K. K. R. (2017). An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering, 61, 238–249. Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., & Choo, K. K. R. (2017). An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering, 61, 238–249.
94.
Zurück zum Zitat Liu, J., Zhang, L., & Sun, R. (2016). 1-Raap: An efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors, 16, 728. Liu, J., Zhang, L., & Sun, R. (2016). 1-Raap: An efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors, 16, 728.
95.
Zurück zum Zitat Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security, 10(7), 1442–1455. Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security, 10(7), 1442–1455.
96.
Zurück zum Zitat Singla, R., & Kaur, N. (2018). Compressed and secure energy efficient routing protocol for WBAN. International Journal of Computer Sciences and Engineering, 6(7), 254–260. Singla, R., & Kaur, N. (2018). Compressed and secure energy efficient routing protocol for WBAN. International Journal of Computer Sciences and Engineering, 6(7), 254–260.
97.
Zurück zum Zitat Malmivuo, J., & Plonsey, R. (1995). Bioelectromagnetism: Principles and applications of bioelectric and biomagnetic fields. Oxford University Press. Malmivuo, J., & Plonsey, R. (1995). Bioelectromagnetism: Principles and applications of bioelectric and biomagnetic fields. Oxford University Press.
98.
Zurück zum Zitat Guennoun, M., Zandi, M., & El-Khatib, K. (2008). On the use of biometrics to secure wireless biosensor networks. In: 2008 3rd International conference on information and communication technologies: From theory to applications (pp. 1–5). IEEE. Guennoun, M., Zandi, M., & El-Khatib, K. (2008). On the use of biometrics to secure wireless biosensor networks. In: 2008 3rd International conference on information and communication technologies: From theory to applications (pp. 1–5). IEEE.
99.
Zurück zum Zitat Mana, M., Feham, M., & Bensaber, B. A. (2009). SEKEBAN (Secure and Efficient Key Exchange for wireless Body Area Network). International Journal of Advanced Science and Technology. Mana, M., Feham, M., & Bensaber, B. A. (2009). SEKEBAN (Secure and Efficient Key Exchange for wireless Body Area Network). International Journal of Advanced Science and Technology.
100.
Zurück zum Zitat Haque, M. M., Pathan, A. S. K., & Hong, C.S. (2008). Securing U-healthcare sensor networks using public key based scheme. In: 2008 10th International conference on advanced communication technology (Vol. 2, pp. 1108–1111). IEEE. Haque, M. M., Pathan, A. S. K., & Hong, C.S. (2008). Securing U-healthcare sensor networks using public key based scheme. In: 2008 10th International conference on advanced communication technology (Vol. 2, pp. 1108–1111). IEEE.
101.
Zurück zum Zitat Großschädl, J., Szekely, A., & Tillich, S. (2007). The energy cost of cryptographic key establishment in wireless sensor networks. In: Proceedings of the 2nd ACM symposium on information, computer and communications security (pp. 380–382). Großschädl, J., Szekely, A., & Tillich, S. (2007). The energy cost of cryptographic key establishment in wireless sensor networks. In: Proceedings of the 2nd ACM symposium on information, computer and communications security (pp. 380–382).
102.
Zurück zum Zitat Wang, H., Fang, H., Xing, L., & Chen, M. (2011). An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks (WBAN). In: 2011 IEEE international conference on communications (ICC) (pp. 1–5). IEEE. Wang, H., Fang, H., Xing, L., & Chen, M. (2011). An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks (WBAN). In: 2011 IEEE international conference on communications (ICC) (pp. 1–5). IEEE.
103.
Zurück zum Zitat Khan, F. A., Ali, A., Abbas, H., & Haldar, N. A. H. (2014). A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Computer Science, 34, 511–517. Khan, F. A., Ali, A., Abbas, H., & Haldar, N. A. H. (2014). A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks. Procedia Computer Science, 34, 511–517.
104.
Zurück zum Zitat Chen, H., Ding, D., Su, S. and Yin, J., (2020). Biometrics-based cryptography scheme for E-Health systems. In: Journal of Physics: Conference Series (Vol. 1550, p. 022039). IOP Publishing. Chen, H., Ding, D., Su, S. and Yin, J., (2020). Biometrics-based cryptography scheme for E-Health systems. In: Journal of Physics: Conference Series (Vol. 1550, p. 022039). IOP Publishing.
105.
Zurück zum Zitat Juels, A., & Sudan, M. (2002) A fuzzy vault scheme. In: IEEE International symposium on information theory (pp. 408–415). Lausanne. Juels, A., & Sudan, M. (2002) A fuzzy vault scheme. In: IEEE International symposium on information theory (pp. 408–415). Lausanne.
106.
Zurück zum Zitat Sammoud, A., Chalouf, M. A., Hamdi, O., Montavont, N., & Bouallegue, A. (2020). A new biometrics-based key establishment protocol in WBAN: Energy efficiency and security robustness analysis. Computers & Security, 96, 101838. Sammoud, A., Chalouf, M. A., Hamdi, O., Montavont, N., & Bouallegue, A. (2020). A new biometrics-based key establishment protocol in WBAN: Energy efficiency and security robustness analysis. Computers & Security, 96, 101838.
107.
Zurück zum Zitat Jammali, N., & Fourati, L.C. (2015). PFKA: A physiological feature based key agreement for wireless body area network. In 2015 International conference on wireless networks and mobile communications (WINCOM) (pp. 1–8). IEEE. Jammali, N., & Fourati, L.C. (2015). PFKA: A physiological feature based key agreement for wireless body area network. In 2015 International conference on wireless networks and mobile communications (WINCOM) (pp. 1–8). IEEE.
108.
Zurück zum Zitat Zaghouani, E. K., Jemai, A., Benzina, A. and Attia, R., (2015). ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN. In: 2015 23rd European signal processing conference (EUSIPCO) (pp. 81–85). IEEE. Zaghouani, E. K., Jemai, A., Benzina, A. and Attia, R., (2015). ELPA: A new key agreement scheme based on linear prediction of ECG features for WBAN. In: 2015 23rd European signal processing conference (EUSIPCO) (pp. 81–85). IEEE.
109.
Zurück zum Zitat Bui, F. M., & Hatzinakos, D. (2007). Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling. EURASIP Journal on Advances in Signal Processing, 2008, 1–16.MATH Bui, F. M., & Hatzinakos, D. (2007). Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling. EURASIP Journal on Advances in Signal Processing, 2008, 1–16.MATH
110.
Zurück zum Zitat Poon, C. C., Zhang, Y. T., & Bao, S. D. (2006). A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4), 73–81. Poon, C. C., Zhang, Y. T., & Bao, S. D. (2006). A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine, 44(4), 73–81.
111.
Zurück zum Zitat Venkatasubramanian, K.K., Banerjee, A. and Gupta, S.K., (2008). EKG-based key agreement in body sensor networks. In: IEEE Infocom Workshops 2008 (pp. 1–6). IEEE. Venkatasubramanian, K.K., Banerjee, A. and Gupta, S.K., (2008). EKG-based key agreement in body sensor networks. In: IEEE Infocom Workshops 2008 (pp. 1–6). IEEE.
112.
Zurück zum Zitat Farooq, S., Prashar, D., & Jyoti, K. (2018). Hybrid encryption algorithm in wireless body area networks (WBAN). In R. Singh, S. Choudhury, & A. Gehlot (Eds.), Intelligent communication, control and devices (pp. 401–410). Springer. Farooq, S., Prashar, D., & Jyoti, K. (2018). Hybrid encryption algorithm in wireless body area networks (WBAN). In R. Singh, S. Choudhury, & A. Gehlot (Eds.), Intelligent communication, control and devices (pp. 401–410). Springer.
113.
Zurück zum Zitat Pan, J., Li, S., & Xu, Z. (2012). Security mechanism for a wireless-sensor-network-based healthcare monitoring system. IET Communications, 6(18), 3274–3280. Pan, J., Li, S., & Xu, Z. (2012). Security mechanism for a wireless-sensor-network-based healthcare monitoring system. IET Communications, 6(18), 3274–3280.
114.
Zurück zum Zitat Liu, J., & Kwak, K. S. (2010). Hybrid security mechanisms for wireless body area networks. In: Ubiquitous and future networks (ICUFN), 2010 Second international conference on (pp. 98–103). IEEE. Liu, J., & Kwak, K. S. (2010). Hybrid security mechanisms for wireless body area networks. In: Ubiquitous and future networks (ICUFN), 2010 Second international conference on (pp. 98–103). IEEE.
115.
Zurück zum Zitat Barua, M., Alam, M. S., Liang, X., & Shen, X. (2011, March). Secure and quality of service assurance scheduling scheme for wban with application to ehealth. In 2011 IEEE Wireless Communications and Networking Conference (pp. 1102–1106). IEEE. Barua, M., Alam, M. S., Liang, X., & Shen, X. (2011, March). Secure and quality of service assurance scheduling scheme for wban with application to ehealth. In 2011 IEEE Wireless Communications and Networking Conference (pp. 1102–1106). IEEE.
116.
Zurück zum Zitat Drira, W., Renault, E. and Zeghlache, D., (2012). A hybrid authentication and key establishment scheme for wban. In: Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on (pp. 78–83). IEEE. Drira, W., Renault, E. and Zeghlache, D., (2012). A hybrid authentication and key establishment scheme for wban. In: Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on (pp. 78–83). IEEE.
117.
Zurück zum Zitat Irum, S., Ali, A., Khan, F. A., & Abbas, H. (2013). A hybrid security mechanism for intra-WBAN and inter-WBAN communications. International Journal of Distributed Sensor Networks, 9(8), 842608. Irum, S., Ali, A., Khan, F. A., & Abbas, H. (2013). A hybrid security mechanism for intra-WBAN and inter-WBAN communications. International Journal of Distributed Sensor Networks, 9(8), 842608.
118.
Zurück zum Zitat Muhammad, K.-U.R.S., Lee, H., Lee, S., & Lee, Y.-K. (2010). BARI+: A biometric based distributed key management approach for wireless body area networks. Sensors, 10(4), 3911–3933. Muhammad, K.-U.R.S., Lee, H., Lee, S., & Lee, Y.-K. (2010). BARI+: A biometric based distributed key management approach for wireless body area networks. Sensors, 10(4), 3911–3933.
119.
Zurück zum Zitat He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590–2601. He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590–2601.
120.
Zurück zum Zitat Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Li, X. (2015). Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. Journal of Medical Systems, 39(11), 140. Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Li, X. (2015). Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. Journal of Medical Systems, 39(11), 140.
121.
Zurück zum Zitat Hercigonja, Z. (2016). Comparative analysis of cryptographic algorithms. International Journal of Digital Technology & Economy, 1(2), 127–134. Hercigonja, Z. (2016). Comparative analysis of cryptographic algorithms. International Journal of Digital Technology & Economy, 1(2), 127–134.
122.
Zurück zum Zitat Priya, C. L., & Visalakshi, U. S. (2017). Secure and efficient communication using ECC algorithm in wireless body area network. International Journal of Engineering Science, 7, 10073. Priya, C. L., & Visalakshi, U. S. (2017). Secure and efficient communication using ECC algorithm in wireless body area network. International Journal of Engineering Science, 7, 10073.
123.
Zurück zum Zitat Harba, E. S. I. (2017). Secure data encryption through a combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research, 7(4), 1781–1785. Harba, E. S. I. (2017). Secure data encryption through a combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research, 7(4), 1781–1785.
124.
Zurück zum Zitat Basnet, A., Alsadoon, A., Prasad, P. W. C., Alsadoon, O. H., Pham, L., & Elchouemi, A. (2019). A novel secure patient data transmission through wireless body area network: Health tele-monitoring. International Journal of Communication Networks and Information Security, 11(1), 93–104. Basnet, A., Alsadoon, A., Prasad, P. W. C., Alsadoon, O. H., Pham, L., & Elchouemi, A. (2019). A novel secure patient data transmission through wireless body area network: Health tele-monitoring. International Journal of Communication Networks and Information Security, 11(1), 93–104.
Metadaten
Titel
Challenges and Developments in Secure Routing Protocols for Healthcare in WBAN: A Comparative Analysis
verfasst von
Ripty Singla
Navneet Kaur
Deepika Koundal
Anuj Bharadwaj
Publikationsdatum
22.08.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08969-0

Weitere Artikel der Ausgabe 2/2022

Wireless Personal Communications 2/2022 Zur Ausgabe

Neuer Inhalt