2012
DOI: 10.3390/s120912606
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

Abstract: Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wirele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(29 citation statements)
references
References 34 publications
0
29
0
Order By: Relevance
“…& Security and privacy aspects in BSNs. In the study of Sahoo (2012), a three tier security architecture for mHealth applications is proposed, using light weight data confidentiality and authentication protocols to preserve the patients' privacy [52]. & General security or privacy aspects.…”
Section: Security and Privacy Literature Reviewmentioning
confidence: 99%
“…& Security and privacy aspects in BSNs. In the study of Sahoo (2012), a three tier security architecture for mHealth applications is proposed, using light weight data confidentiality and authentication protocols to preserve the patients' privacy [52]. & General security or privacy aspects.…”
Section: Security and Privacy Literature Reviewmentioning
confidence: 99%
“…where is the energy consumption of the host, CPU is the sum of energy consumption of all CPU operations and operations with a separately specified electric current, and COMM International Journal of Distributed Sensor Networks 11 (1) procedure BindMessagesWithRequests( ℎ ) ⊳ Procedure binds messages from the buffers with matching requests.…”
Section: Energy Analysismentioning
confidence: 99%
“…Typically in mHealth systems researchers focus on securing every communication link separately [14,17]. Solutions require maintaining dedicated public and private keys for sensor-to-sensor, sensorto-smartphone, and smartphone-to-cloud [14].…”
Section: Related Workmentioning
confidence: 99%
“…Solutions require maintaining dedicated public and private keys for sensor-to-sensor, sensorto-smartphone, and smartphone-to-cloud [14]. This introduces significant overhead in the deployment of the mHealth system and also blocks storage in already resource constrained sensors.…”
Section: Related Workmentioning
confidence: 99%