2011 IEEE Wireless Communications and Networking Conference 2011
DOI: 10.1109/wcnc.2011.5779285
|View full text |Cite
|
Sign up to set email alerts
|

Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth

Abstract: Wireless Body Area Network (WBAN) is gaining popularity due to its large scale of applications in eHealth. Due to its critical and real-time nature, eHealth care system must provide security, privacy, and quality of service (QoS) support, in order to provide an efficient, valuable and fully reliable assistance to patients. This paper studies packet scheduling schemes for realtime transmission in WBAN with proper security and privacy. Real-time and non real-time traffic are classified to minimize the waiting ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(30 citation statements)
references
References 12 publications
0
29
0
1
Order By: Relevance
“…The QoS is ensured by providing high message delivery reliability [48], and the communication is made secure by using PKC-based key agreement. An Exclusive Based System (EBS)-based cluster key agreement is proposed in [49].…”
Section: Non-physiological-value-based Key Agreementmentioning
confidence: 99%
“…The QoS is ensured by providing high message delivery reliability [48], and the communication is made secure by using PKC-based key agreement. An Exclusive Based System (EBS)-based cluster key agreement is proposed in [49].…”
Section: Non-physiological-value-based Key Agreementmentioning
confidence: 99%
“…Privacy is a major requirement in EHealth applications, as the user sensed medical data transferring in wireless environment from the sensor to the platform [144].…”
Section: Challenges Of Ehealth Solution Developmentmentioning
confidence: 99%
“…Security will mean the embedded devices' ability to contain sensitive information and to hold down its end of a secure communication. Different solution has been proposed to prove the need of privacy and authenticity in a given network [2][3][4][5].…”
Section: Literature Reviewmentioning
confidence: 99%