A survey on security issues and wearable sensors in wireless body area network for healthcare system

Author(s):  
Ibrahim Abdulai Sawaneh ◽  
Ibrahim Sankoh ◽  
David Kanume Koroma
2018 ◽  
Vol Volume-2 (Issue-4) ◽  
pp. 362-368
Author(s):  
Sandeep K S ◽  
Hari Krishnan ◽  
Soumya K N | C R Manjunath ◽  

2020 ◽  
Vol 16 (2) ◽  
pp. 155014772090679
Author(s):  
Rui Guo ◽  
Chaoyuan Zhuang ◽  
Huixian Shi ◽  
Yinghui Zhang ◽  
Dong Zheng

Wireless body area network includes some tiny wearable sensors for monitoring the physiological data of user, which has been a promising method of promoting the quality and efficiency greatly in healthcare. The collected physical signs are aggregated into the medical documents and uploaded to cloud server for utilizing by the remote user. As these files are highly sensitive privacy data, there is a vital challenge that constructs a secure and efficient communication architecture in this application scenario. Based on this standpoint, we present a lightweight verifiability ciphertext-policy attribute-based encryption protocol with outsourced decryption in this article. Specifically, our construction enjoys the following six features: (1) Although the outsourced decryption enables to save the computation overhead of the data user sharply in an attribute-based encryption scheme, the ciphertext is out of control and the correctness cannot be guaranteed by the data owner. The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 112
Author(s):  
Antony Kumar K ◽  
C Saranya Jothi ◽  
S Ravikumar ◽  
V Usha

Remote Body Area Networks are relied on to expect a basic part in the field of patient-thriving checking inside the not so distant future, which increases beast thought among specialists beginning late. One of the inconveniences is to build up a protected correspondence design among sensors and clients, while watching out for the typical security and protection concerns. In this paper, we propose a correspondence planning for BANs, and outline a course of action to secure the information exchanges between introduced/wearable sensors. Our course of action accomplishes an area based access control by utilizing an entry control tree portrayed by the attributes of the information. We likewise outline two customs to safely recover the touchy information from a BAN and instruct the sensors in a BAN.


2016 ◽  
Vol 833 ◽  
pp. 179-184
Author(s):  
Nur Alia Athirah Mohtadzar ◽  
Shigeru Takayama

Wireless Body Area Network or known as BAN, is a system consists of various kinds of wearable sensors to measure condition of human body. Wrist, waist and shoulder modules from BAN system can help to monitor, analyze and provide advice to the user in order to perform a moderate exercise. The availability of small, low-cost networked sensors combined with advanced signal processing and information extraction is driving a revolution in physiological monitoring and intervention. BAN system is enabling technologies for accurate measurements in healthcare systems, enhance sports and fitness training, life-style monitoring and individualized security.


Sign in / Sign up

Export Citation Format

Share Document