2008
DOI: 10.1007/978-3-540-85209-4_8
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks

Abstract: The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person's vital functions, is an enabler in providing better personal health care whilst enhancing the quality of life. A critical factor in the acceptance of WBANs is providing appropriate security and privacy protection of the wireless communication. This paper first describes a general health care platform and pinpoints the security challenges and requirements. Further it proposes and analyzes the CICADA-S protoco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…In [96] a security mechanism was added to CICADA. Doing so, CICADA-S became one of the first protocols where appropriate security mechanisms are incorporated into the communication protocol while addressing the life-cycle of the sensors.…”
Section: Securitymentioning
confidence: 99%
“…In [96] a security mechanism was added to CICADA. Doing so, CICADA-S became one of the first protocols where appropriate security mechanisms are incorporated into the communication protocol while addressing the life-cycle of the sensors.…”
Section: Securitymentioning
confidence: 99%
“…It is of note mention that none of the papers reviewed in this survey addresses security issues in cross-layer design or in WBAN data management. In [62], the authors propose a security-aware cross-layer protocol with low impact on power consumption called CICADA-S based on CICADA [28]. The authors propose the management of encrypted keys and authentication codes to prevent security issues like packet sniffing or intrusive nodes joining the network, the physical and medium access layers in both medical and non-medical applications.…”
Section: Securitymentioning
confidence: 99%
“…Also, all communication information in CICADA is sent in plain text instead of being protected and unauthorized nodes are capable of joining the network without authorization. An updated version of CICADA, namely CICADA-S has been designed in [32] to encounter the privacy and security issues that had not been considered in CICADA. CICADA-S has four main states in terms of security: secure initialization phase, sensor (re) joining the BAN, key update procedure within the BAN and a sensor leaving the BAN.…”
Section: B Controlling Access With Distributed Slot Assignment Protomentioning
confidence: 99%
“…CICADA-S has four main states in terms of security: secure initialization phase, sensor (re) joining the BAN, key update procedure within the BAN and a sensor leaving the BAN. These phases have little impact on the throughput and power consumption [32].…”
Section: B Controlling Access With Distributed Slot Assignment Protomentioning
confidence: 99%