Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications

[1]  Enzo Baccarelli,et al.  P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks , 2017, The Journal of Supercomputing.

[2]  Ibrahim AlShourbaji,et al.  A Study of Cyber Security Awareness in Educational Environment in the Middle East , 2016, J. Inf. Knowl. Manag..

[3]  Anurag Tewari,et al.  Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review , 2016 .

[4]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[5]  Avishai Wool,et al.  Implementing public-key cryptography on passive RFID tags is practical , 2015, International Journal of Information Security.

[6]  Hu Xiong,et al.  Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Hoh Peter In,et al.  A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..

[8]  Ye Tian,et al.  An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks , 2014, Int. J. Distributed Sens. Networks.

[9]  Haider Abbas,et al.  Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review , 2014, Journal of Medical Systems.

[10]  Xiaodong Lin,et al.  Socialized WBANs in mobile sensing environments , 2014, IEEE Network.

[11]  Remus Brad,et al.  Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review , 2014, ArXiv.

[12]  Young-Sil Lee,et al.  Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[13]  Rachid Latif,et al.  Developing a Real Time Electrocardiogram System Using Virtual Bio-Instrumentation , 2014, Journal of Medical Systems.

[14]  Hoon-Jae Lee,et al.  An Embedded Encryption Protocol for Healthcare Networks Security , 2014 .

[15]  Abdul Fuad Abdul Rahman,et al.  Forensics readiness for Wireless Body Area Network (WBAN) system , 2014, 16th International Conference on Advanced Communication Technology.

[16]  Zhenguo Zhao,et al.  An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.

[17]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[18]  Shikha Pathania,et al.  SECURITY ISSUES IN WIRELESS BODY AREA NETWORK , 2014 .

[19]  Borko Furht,et al.  Anomaly Detection in Medical Wireless Sensor Networks using SVM and Linear Regression Models , 2014, Int. J. E Health Medical Commun..

[20]  Mukesh Singhal,et al.  An efficient routing algorithm to preserve k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-coverage , 2013, The Journal of Supercomputing.

[21]  Samaher Hussein Ali Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.

[22]  Hoon-Jae Lee,et al.  Efficient Encryption Scheme based on Elliptic Curve Cryptography (ECC) and Symmetric algorithm in Wireless Body Area Networks (WBANs) , 2013 .

[23]  Mario Cagalj,et al.  LIRA: A new key deployment scheme for Wireless Body Area Networks , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).

[24]  Mohammad Javad Kargar,et al.  Wireless Body Area Network: From Electronic Health Security Perspective , 2013 .

[25]  Kyong-jin Kim,et al.  Privacy Care Architecture in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[26]  Sana Ullah,et al.  A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications , 2013, Int. J. Distributed Sens. Networks.

[27]  M. F. Abdollah,et al.  A biometric-based security for data authentication in Wireless Body Area Network (WBAN) , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[28]  Ming Li,et al.  Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.

[29]  Ramesh Kumar,et al.  State Of The Art : Security In Wireless Body Area Networks , 2013 .

[30]  Mohammad Abdur Razzaque,et al.  Security and Privacy in Wireless Body Area Networks for Health Care Applications , 2013, Wireless Networks and Security.

[31]  Towards the Development of Cross Layer Approach for Energy Efficiency and Mobile Wireless Body Area Networks , 2013 .

[32]  Yue Yin,et al.  A Research on Security and Privacy Issues for Patient related Data in Medical Organization System , 2013 .

[33]  Xiaohui Liang,et al.  HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..

[34]  Garth V. Crosby,et al.  Wireless Body Area Networks for Healthcare: A Survey , 2012 .

[35]  Nadeem Javaid,et al.  Performance Study of Localization Techniques in Wireless Body Area Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[36]  Kyung Sup Kwak,et al.  An efficient certificateless remote anonymous authentication scheme for wireless body area networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[37]  Min Chen,et al.  An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN) , 2011, 2011 IEEE International Conference on Communications (ICC).

[38]  Cheong Boon Soh,et al.  Opportunistic routing for body area network , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[39]  Shirley Beul-Leusmann,et al.  E-Health, Assistive Technologies and Applications for Assisted Living: Challenges and Solutions , 2011 .

[40]  Xuemin Shen,et al.  PEACE: An efficient and secure patient-centric access control scheme for eHealth care system , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[41]  Mohammed Feham,et al.  Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..

[42]  Jong Hyuk Park,et al.  Hybrid security protocol for wireless body area networks , 2011, Wirel. Commun. Mob. Comput..

[43]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[44]  샤나즈 A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network , 2011 .

[45]  Muhammad Ibrahim,et al.  SPINS: Security Protocols for Sensor Networks , 2011 .

[46]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[47]  Ingrid Moerman,et al.  A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.

[48]  Yuguang Fang,et al.  Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[49]  Jim Morrison,et al.  An energy analysis of IEEE 802.15.6 scheduled access modes , 2010, 2010 IEEE Globecom Workshops.

[50]  A. Shanmugam,et al.  A Novel Intrusion Detection System for Wireless Body Area Network in Health Care Monitoring , 2010 .

[51]  J. Gialelis,et al.  Imposing holistic privacy and data security on person centric ehealth monitoring infrastructures , 2010, The 12th IEEE International Conference on e-Health Networking, Applications and Services.

[52]  Kyung Sup Kwak,et al.  Towards security issues and solutions in Wireless Body Area Networks , 2010, INC2010: 6th International Conference on Networked Computing.

[53]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[54]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[55]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[56]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[57]  Madjid Merabti,et al.  Security in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[58]  Carmen C. Y. Poon,et al.  A biometric method to secure telemedicine systems , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[59]  Jin Li,et al.  Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.

[60]  C. Redhead The Health Information Technology for Economic and Clinical Health (HITECH) Act , 2009 .

[61]  J. Misic Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters , 2008, Annual IEEE International Conference on Pervasive Computing and Communications.

[62]  J. Misic,et al.  Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[63]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[64]  M. Ferdous,et al.  A Taxonomy of Attack Methods on Peer-to-Peer Network , 2007 .

[65]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[66]  F. Backes Transparent bridges for interconnection of IEEE 802 LANs , 1988, IEEE Network.