2021
DOI: 10.1016/j.cose.2021.102211
|View full text |Cite
|
Sign up to set email alerts
|

A survey on wireless body area networks: architecture, security challenges and research opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 113 publications
(59 citation statements)
references
References 112 publications
(177 reference statements)
0
59
0
Order By: Relevance
“…1. The principal function of the WSMD to collect physiological parameters through a series of low-power, noninvasive, and micro-sensor nodes based on WBAN (wireless body area network) technology [32][33]. The WSMD then sends these data to the HSMS for storage and analysis using Bluetooth and Wi-Fi wireless communication technologies [34][35].…”
Section: Methodsmentioning
confidence: 99%
“…1. The principal function of the WSMD to collect physiological parameters through a series of low-power, noninvasive, and micro-sensor nodes based on WBAN (wireless body area network) technology [32][33]. The WSMD then sends these data to the HSMS for storage and analysis using Bluetooth and Wi-Fi wireless communication technologies [34][35].…”
Section: Methodsmentioning
confidence: 99%
“…In the literature, there are various surveys on WBANs [3][4][5][6][7][8][9][10][11][12][13][14][15]. However, the majority of these surveys have focused on the applications [16,17], technologies [18][19][20], standards [21], and design issues [17,[22][23][24] of WBANs rather than evaluating various research efforts made towards achieving efficient MAC protocols for WBANs, which is the main objective of this survey.…”
Section: Related Survey Papermentioning
confidence: 99%
“…The program checks a Web site for dangerous content, then either deletes the content and displays an error message on the screen, or opens the Web page itself, but sends the information to the server and to the parent's personal account. Parents, in turn, can choose the status of the viewed content and block it [15][16][17].…”
Section: Development Of a Security Monitoring Systemmentioning
confidence: 99%