Advertisement

Security Challenges and Solutions for Wireless Body Area Networks

  • K. R. Siva Bharathi
  • R. Venkateswari
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810)

Abstract

Wireless Body Area Networks (WBANs) are special purpose Wireless Sensor Networks, which is used to provide competent communication solutions for health care and medicinal applications. The rapid technological advancements in the field of sensors, MEMS, and the wireless communication enable the design and implementation of Wireless Body Area Networks. The most prominent application of WBANs is in healthcare but it also finds its applications in consumer electronics, sports safety, lifestyle, defense, and much more. WBANs are usually smaller networks when compared to WSNs but still, they are vulnerable to a massive number of security attacks. In this paper, we provide an overview of the Wireless Body Area Networks (WBANs), its applications, and security aspects. Various security threats and their countermeasures in WBANs are discussed based on the latest reviews and publications.

Keywords

WBAN Security Attacks Healthcare 

References

  1. 1.
    Samaher, A.J., Ibrahim, A.S., Shojafar, M., Shahaboddin, S.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 18, 113–122 (2017)CrossRefGoogle Scholar
  2. 2.
    Jamil, Y.K., Mehmet, R.Y.: New developments n Bio-medical Engineering, 2nd edn. InTech, Croatia (2010)Google Scholar
  3. 3.
    Kennelly, R.J.: The IEEE 1073 for medical device communications. In: IEEE Systems Readiness Technology Conference AUTOTESTCON ‘98. IEEE (2002)Google Scholar
  4. 4.
    Toorani, M.: On vulnerabilities of the security association in the IEEE 802.15.6 Standard. In: International Conference on Financial Cryptography and Data Security, vol. 8926, pp. 245–260 (2015)Google Scholar
  5. 5.
    Donoghue, J., Herbert, J., Sammon, D.: Patient sensors: a data quality perspective. In: International Conference on Smart Homes and Health Telematics, pp. 54–61. Springer (2008)Google Scholar
  6. 6.
    Donoghue, J., Herbert, J.: Data management within mHealth environments: patient sensors, mobile devices, and databases. J. Data Inf. Qual. 4(1), 5:1–5:20 (2012)Google Scholar
  7. 7.
    Lai, D., Begg, R.K., Palaniswami, M.: Healthcare Sensor Networks: Challenges Towards Practical Implementation. CRC Press (2011)Google Scholar
  8. 8.
    Donoghue, J., Herbert, J., Fensli, R., Dineen, S.: Sensor validation within a pervasive medical environment. In: 5th IEEE Conference on Sensors, pp. 972–975 (2006)Google Scholar
  9. 9.
    Ajmal, S., Djahel, S., Zhang, Z.: Toward energy-efficient and trustworthy eHealth monitoring system. In: Wireless Communication over Zigbee for Automotive Inclination Measurement-China Communications (2015)Google Scholar
  10. 10.
    Toorani, M.: Security analysis of the IEEE 802.15.6 standard. Int. J. Commun Syst 29, 2471–2489 (2016)CrossRefGoogle Scholar
  11. 11.
    Pejman, N.: Wireless body area networks: attacks and countermeasures. Int. J. Sci. Eng. Res. 6(9) (2015)Google Scholar
  12. 12.
    Balamurugan, G., Bhagyaveni, M.A.: Random Codekey Selection Using Codebook without Pre-Shared Keys for Anti-jamming in WBAN, vol. 51. Elsevier (2016)Google Scholar
  13. 13.
    Mishra, S., Dhurandher, S., Rayankula, A., Agrawal, D.: Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Comput. Electr. Eng. 36(2), 367–382 (2010)Google Scholar
  14. 14.
    Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digit. Content Technol. Appl. 3(3) (2009)Google Scholar
  15. 15.
    Deng, H., Sun, X., Wang, B., Cao, Y.: Selective forwarding attack detection using watermark in WSNs. In: International Colloquium on Computing, Communication, Control and Management. IEEE (2009)Google Scholar
  16. 16.
    Hae, Y.L., Tae, H.C.: Fuzzy-based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. Springer, pp. 535–544(2007)Google Scholar
  17. 17.
    Tumrong, W.C., Varakulsiripunth, R.: Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. In: International Conference on Information Communication and Signal Processing. IEEE (2009)Google Scholar
  18. 18.
    Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks, In: Proceedings of the 20th International Parallel and Distributed Processing Symposium (2006)Google Scholar
  19. 19.
    Hu, Y.C., Perrig, A., Johnson, D.B.: A defence against wormhole attacks in wireless networks. In: Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications, vol. 3 (2003)Google Scholar
  20. 20.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The sybilattack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (2004)Google Scholar
  21. 21.
    UdayaSuriya, R.D., Rajamani, V.: Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci. World J. 2015 (2015)Google Scholar
  22. 22.
    Hamid, M.A., Mamun, O., Rashid, M., Hong, C.S.: Routing security in sensor network: Hello flood attack and defense. In: IEEE ICNEWS, pp. 2–4 (2006)Google Scholar
  23. 23.
    Kaur, P., Gurm, J.S.: Detect and prevent HELLO FLOOD attack using centralized technique in WSN. Int. J. Comput. Sci. Eng. Technol. 7 (2016)Google Scholar
  24. 24.
    Deng, J., Han, R., Meshra, S.: Defending against Path-based DoS attacks in wireless sensor networks. In: Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)Google Scholar
  25. 25.
    Anass, R., Fatiha, E., Bouhorma, M.: The internet of things for healthcare monitoring: security review and proposed solution. In: Third International IEEE Colloquium on Information Science and Technology (2015)Google Scholar
  26. 26.
    Zhang, J., Xue, N.: A Secure System for Pervasive Social NetworkbasedHealthcare, Article in IEEE Access (2016)Google Scholar
  27. 27.
    Sotiriadis, S., Petrakis, E.: Future Internet Systems Design and Implementation: Cloud and IoT Services Based on IoT-A and FIWARE. Springer (2017)Google Scholar
  28. 28.
    Li, M., Lou, W.: Data security and privacy in wireless body area networks. IEEE Wirel Commun. 1536–1284 (2010)Google Scholar
  29. 29.
    Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.M.: A systemic approach for IoT security. In: IEEE International Conference on Distributed Computing in Sensor Systems, (2013)Google Scholar
  30. 30.
    Yaseen, M., Saleem, K., Derhab, A., Abbas, H., Muhtadif, J.A.: Secure sensors data acquisition and communication protection ineHealthcare: review on the state of the art, Telemat. Inform. (2017)Google Scholar
  31. 31.
    Ibrahim, M.H., Kumari, S., Das, A.K., Wazid, M., Odelu, V.: Secure anonymous mutual authentication forstar two-tier wireless body area networks. J. Comput. Methods Progr. Bio Med. 135, 37–50 (2016)CrossRefGoogle Scholar
  32. 32.
    Zou, S., Xu, Y., Wang, H., Li, Z., Chen, S., Bo, H.: A Survey on Secure Wireless Body Area Networks Hindawi Security and Communication Networks (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of ECESri Krishna College of Engineering and TechnologyCoimbatoreIndia
  2. 2.Department of ECEPSG College of TechnologyCoimbatoreIndia

Personalised recommendations