Handbook of Computer Networks and Cyber Security 2020
DOI: 10.1007/978-3-030-22277-2_7
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Issues in Wireless Sensor and Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 43 publications
0
16
0
Order By: Relevance
“…Reputation systems have been developed in order to identify compromised nodes based on their behavior. Reputation is based on a collection of evidence of good and bad behavior is undertaken by other entities [50].…”
Section: A Trust and Reputation Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…Reputation systems have been developed in order to identify compromised nodes based on their behavior. Reputation is based on a collection of evidence of good and bad behavior is undertaken by other entities [50].…”
Section: A Trust and Reputation Systemsmentioning
confidence: 99%
“…The patient health data observed by the sensor nodes must be secure, has limited access, and should not mix with other patient data during collection as well as transmission. Moreover, an efficient security model for resource-constrained WBANs should be accurate, costeffective, real-time responsive, scalable, transparent, and less complex since BANs deals with sensitive and significant health data [45][46][47][48][49][50][51][52].…”
Section: B Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, by employing the sector-based distance vector (DV) protocol for the earliest contact between patients and doctors, the suggested technique gives non-critical patient communications more priority. Roy et al [17] explained the security and privacy issues in the wireless body area networks and also suggested adding a cybersecurity mechanism to defend the security challenges. Zhen et al [18] developed the privacy protection scheme with the cooperation of mobile edge computing for wireless body area networks.…”
Section: Security Issues In Wbanmentioning
confidence: 99%