2021
DOI: 10.3390/asi4040076
|View full text |Cite
|
Sign up to set email alerts
|

Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications

Abstract: Assuring security and privacy of data is a key challenge for organizations when developing WBAN applications. The reasons for this challenge include (i) developers have limited knowledge of market-specific regulatory requirements and security standards, and (ii) there are a vast number of security controls with insufficient implementation detail. To address these challenges, we have developed a WBAN data security and privacy risk management framework. The goal of this paper is trifold. First, we present the me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Inadequate software security practices can leave WBAN devices vulnerable to exploitation [62]. Outdated firmware, lack of software updates, and unpatched vulnerabilities can be exploited by attackers [63].…”
Section: Insufficient Software Securitymentioning
confidence: 99%
“…Inadequate software security practices can leave WBAN devices vulnerable to exploitation [62]. Outdated firmware, lack of software updates, and unpatched vulnerabilities can be exploited by attackers [63].…”
Section: Insufficient Software Securitymentioning
confidence: 99%
“…According to the study analysis, each of the three main assets has multiple types. HIoT can be wearables [ 90 , 91 ], mHealth [ 92 ], WBAN [ 93 ] or Medical IoT/miniaturized wireless biomedical devices (MWBDs) [ 45 ]. IdM can be conventional, centralized, federated, user-centric, and decentralized [ 94 ].…”
Section: Taxonomymentioning
confidence: 99%
“…These studies can be classified into security risk studies that propose security risk management frameworks, or studies that conducted a risk assessment, risk analysis, threat modelling, security risk evaluation, and security risk penetration in the three main assets (HIoT, IdM, and BC). HIoT studies either studied HIoT/MIoT generally or focused on one of the HIoT branches, such as wearables [ 90 , 91 ], WBAN [ 93 ], mHealth [ 92 ], or miniaturized wireless biomedical devices (MWBDs) [ 45 ].…”
Section: Risk Management Frameworkmentioning
confidence: 99%
See 2 more Smart Citations