2013
DOI: 10.1007/978-3-642-36169-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Wireless Body Area Networks for Health Care Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 54 publications
(44 citation statements)
references
References 31 publications
0
38
0
2
Order By: Relevance
“…• Jamming Attack: The adversary tries to prevent the reception of signals at the sensor nodes in the network [13]. • Tampering Attack: Sensors are physically tampered which may damage a sensor, replace the entire sensor, or a part of its hardware to acquire patient's information or shared cryptographic keys [14]. • Unfairness Attack: Attackers intercept the medium access control (MAC) precedence.…”
Section: Security In Wireless Body Area Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…• Jamming Attack: The adversary tries to prevent the reception of signals at the sensor nodes in the network [13]. • Tampering Attack: Sensors are physically tampered which may damage a sensor, replace the entire sensor, or a part of its hardware to acquire patient's information or shared cryptographic keys [14]. • Unfairness Attack: Attackers intercept the medium access control (MAC) precedence.…”
Section: Security In Wireless Body Area Networkmentioning
confidence: 99%
“…• Wormhole Attack: Attacker receives packets at one point in the network, tunnels them to another point Authentication methods in wireless body area networks M. Masdari and S. Ahmadzadeh in the network, and then replays them into the network from that point [15][16][17]. • Flooding Attack: It is conducted to exhaust the WBANs resources by sending a large number of packets [14,24]. • Denial of Service (DoS) Attack: Attacker denies the services to the WBAN users [15,25,26].…”
Section: Security In Wireless Body Area Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In the early 20 th century, Tesla 14,15 attempted to transmit power wirelessly even before the dawn of the electrical power grid. His proposal, like many others 16,17 , requires the generation of large electric fields in order for a reasonable amount of power to be transmitted. In order to avoid the need for large electric fields, recent arXiv:1605.08931v1 [cond-mat.mes-hall] 28 May 2016 efforts have turned towards magnetic systems.…”
Section: Introductionmentioning
confidence: 97%
“…The security mechanisms deployed in WSNs are not the best solutions for WBANs [2]. WBAN applications require different security services [5,6].Wireless communication is prone to different attacks [7]. Communications through a wireless network make the information prone to eavesdropping, modification, or loss.…”
mentioning
confidence: 99%