2014 International Conference on Information Technology 2014
DOI: 10.1109/icit.2014.73
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…The important issues related to the security of WBAN were summarized in Refs. [5,6,9]: data reliability, data security, data freshness, scalability, and privacy protection. Among these problems, it is crucial to ensure data reliability, which is an important basis for the implementation of other security measures.…”
Section: Related Work 21 Node Authentication Of Wbanmentioning
confidence: 99%
See 1 more Smart Citation
“…The important issues related to the security of WBAN were summarized in Refs. [5,6,9]: data reliability, data security, data freshness, scalability, and privacy protection. Among these problems, it is crucial to ensure data reliability, which is an important basis for the implementation of other security measures.…”
Section: Related Work 21 Node Authentication Of Wbanmentioning
confidence: 99%
“…In recent years, several approaches have been proposed to address the privacy and security issues caused by the open features of WBAN [5] . However, most of the methods are oriented to data transmission process.…”
Section: Introductionmentioning
confidence: 99%
“…Both entities need to perform this process. If (5) phone and sensor nodes simultaneously execute pseudo-random sequence generator to generate Ci; (6) e sensor node calculates the value of α by α � E Ks (Ci⊕Ri), and then sends it to phone; (7) phone reads the database to get Ri′, and calculates Ri by Ri � D Kx (α)⊕Ci; (8) IF the error between Ri and Ri′ is within the acceptable range, threshold(Ri, Ri′) < t; (9) THEN phone authenticates the sensor node successfully, considers the sensor node to be a trusted entity, and sends authentication success message, Auth � accept; (10) ELSE send authentication failure message, Auth � reject; (11) phone calculates β by β � E Kx (Ci⊕Ri′) and sends it to sensor node; (12) END IF (13) IF the error between Ri and Ri ′ is within the acceptable range, threshold(Ri, Ri′) < t; Security and Communication Networks the final result is the same, then it can be considered that the message has not been tampered within the transmission process, as shown in Figure 5.…”
Section: Design Of Safety Assurancementioning
confidence: 99%
“…With the aggravation of the aging of the social population, the number of chronic disease cases that need to consume a lot of human, material, and financial resources is also increasing. BAN has become the best choice to solve this problem [7]. e medical sensor equipment deployed in the BAN collects physiological data of different indicators of the human body.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography plays a vital role in secure data transmission for wireless body area network (WBAN) applications [1][2][3]. The cryptographic algorithms are generally based on secret key and public key systems [4].…”
Section: Introductionmentioning
confidence: 99%