2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) 2019
DOI: 10.1109/ismict.2019.8743798
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Security Threats, Solutions and Challenges in WBANs for Healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 42 publications
0
9
0
1
Order By: Relevance
“…The unmanned aerial vehicle possesses sudden topology changes, fastest data transmission, next-hop selection and also eliminates the dissemination loops with the efficient routing mechanism in Flying AdHoc Network (FANET). Mucchi et al [74] explained the overview of security threats in WBAN, and this article differentiates the in or on-body architecture. Current trending factors such as secure mobile communication, cross-technology machine, physical layer security, cognitive radio, and block-chain plays a vital role in healthcare applications.…”
Section: Recommendationmentioning
confidence: 99%
“…The unmanned aerial vehicle possesses sudden topology changes, fastest data transmission, next-hop selection and also eliminates the dissemination loops with the efficient routing mechanism in Flying AdHoc Network (FANET). Mucchi et al [74] explained the overview of security threats in WBAN, and this article differentiates the in or on-body architecture. Current trending factors such as secure mobile communication, cross-technology machine, physical layer security, cognitive radio, and block-chain plays a vital role in healthcare applications.…”
Section: Recommendationmentioning
confidence: 99%
“…Health data can flow from patient to cloud and from cloud to others (health operators) by using different channels (often wireless), which not always can be assumed secure. A trusted and secure domain for the health data should be assured, so that there is no segment which has a lower security then others [ 22 , 23 ]. In addition to classical cryptography, modern security techniques should be added, such as physical-layer security and crypto-key extraction from health signals in order to provide additional level of security and authentication of personal devices extracting the health data.…”
Section: Ict Architecture Modelmentioning
confidence: 99%
“…Além disso, as estruturas de dados da cadeia de blocos também são adequadas para coletar dados de sensores e aplicativos móveis, aprimorando a análise dos riscos versus os benefícios dos tratamentos, bem como dos resultados relatados pelos pacientes. Portanto, essa tecnologia é vista como uma solução promissora para futuros serviços de saúde [de Oliveira et al, 2019] e sua integração com as últimas pesquisas sobre segurança é crucial para a implementação de uma arquitetura de saúde segura que suporte serviços médicos avançados [Mucchi et al, 2019].…”
Section: Gerenciamento Dos Dadosunclassified