Skip to main content

Security Challenges and Solutions for Wireless Body Area Networks

  • Conference paper
  • First Online:
Computing, Communication and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 810))

Abstract

Wireless Body Area Networks (WBANs) are special purpose Wireless Sensor Networks, which is used to provide competent communication solutions for health care and medicinal applications. The rapid technological advancements in the field of sensors, MEMS, and the wireless communication enable the design and implementation of Wireless Body Area Networks. The most prominent application of WBANs is in healthcare but it also finds its applications in consumer electronics, sports safety, lifestyle, defense, and much more. WBANs are usually smaller networks when compared to WSNs but still, they are vulnerable to a massive number of security attacks. In this paper, we provide an overview of the Wireless Body Area Networks (WBANs), its applications, and security aspects. Various security threats and their countermeasures in WBANs are discussed based on the latest reviews and publications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Samaher, A.J., Ibrahim, A.S., Shojafar, M., Shahaboddin, S.: Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 18, 113–122 (2017)

    Article  Google Scholar 

  2. Jamil, Y.K., Mehmet, R.Y.: New developments n Bio-medical Engineering, 2nd edn. InTech, Croatia (2010)

    Google Scholar 

  3. Kennelly, R.J.: The IEEE 1073 for medical device communications. In: IEEE Systems Readiness Technology Conference AUTOTESTCON ‘98. IEEE (2002)

    Google Scholar 

  4. Toorani, M.: On vulnerabilities of the security association in the IEEE 802.15.6 Standard. In: International Conference on Financial Cryptography and Data Security, vol. 8926, pp. 245–260 (2015)

    Google Scholar 

  5. Donoghue, J., Herbert, J., Sammon, D.: Patient sensors: a data quality perspective. In: International Conference on Smart Homes and Health Telematics, pp. 54–61. Springer (2008)

    Google Scholar 

  6. Donoghue, J., Herbert, J.: Data management within mHealth environments: patient sensors, mobile devices, and databases. J. Data Inf. Qual. 4(1), 5:1–5:20 (2012)

    Google Scholar 

  7. Lai, D., Begg, R.K., Palaniswami, M.: Healthcare Sensor Networks: Challenges Towards Practical Implementation. CRC Press (2011)

    Google Scholar 

  8. Donoghue, J., Herbert, J., Fensli, R., Dineen, S.: Sensor validation within a pervasive medical environment. In: 5th IEEE Conference on Sensors, pp. 972–975 (2006)

    Google Scholar 

  9. Ajmal, S., Djahel, S., Zhang, Z.: Toward energy-efficient and trustworthy eHealth monitoring system. In: Wireless Communication over Zigbee for Automotive Inclination Measurement-China Communications (2015)

    Google Scholar 

  10. Toorani, M.: Security analysis of the IEEE 802.15.6 standard. Int. J. Commun Syst 29, 2471–2489 (2016)

    Article  Google Scholar 

  11. Pejman, N.: Wireless body area networks: attacks and countermeasures. Int. J. Sci. Eng. Res. 6(9) (2015)

    Google Scholar 

  12. Balamurugan, G., Bhagyaveni, M.A.: Random Codekey Selection Using Codebook without Pre-Shared Keys for Anti-jamming in WBAN, vol. 51. Elsevier (2016)

    Google Scholar 

  13. Mishra, S., Dhurandher, S., Rayankula, A., Agrawal, D.: Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Comput. Electr. Eng. 36(2), 367–382 (2010)

    Google Scholar 

  14. Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digit. Content Technol. Appl. 3(3) (2009)

    Google Scholar 

  15. Deng, H., Sun, X., Wang, B., Cao, Y.: Selective forwarding attack detection using watermark in WSNs. In: International Colloquium on Computing, Communication, Control and Management. IEEE (2009)

    Google Scholar 

  16. Hae, Y.L., Tae, H.C.: Fuzzy-based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. Springer, pp. 535–544(2007)

    Google Scholar 

  17. Tumrong, W.C., Varakulsiripunth, R.: Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. In: International Conference on Information Communication and Signal Processing. IEEE (2009)

    Google Scholar 

  18. Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks, In: Proceedings of the 20th International Parallel and Distributed Processing Symposium (2006)

    Google Scholar 

  19. Hu, Y.C., Perrig, A., Johnson, D.B.: A defence against wormhole attacks in wireless networks. In: Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications, vol. 3 (2003)

    Google Scholar 

  20. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybilattack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (2004)

    Google Scholar 

  21. UdayaSuriya, R.D., Rajamani, V.: Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci. World J. 2015 (2015)

    Google Scholar 

  22. Hamid, M.A., Mamun, O., Rashid, M., Hong, C.S.: Routing security in sensor network: Hello flood attack and defense. In: IEEE ICNEWS, pp. 2–4 (2006)

    Google Scholar 

  23. Kaur, P., Gurm, J.S.: Detect and prevent HELLO FLOOD attack using centralized technique in WSN. Int. J. Comput. Sci. Eng. Technol. 7 (2016)

    Google Scholar 

  24. Deng, J., Han, R., Meshra, S.: Defending against Path-based DoS attacks in wireless sensor networks. In: Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)

    Google Scholar 

  25. Anass, R., Fatiha, E., Bouhorma, M.: The internet of things for healthcare monitoring: security review and proposed solution. In: Third International IEEE Colloquium on Information Science and Technology (2015)

    Google Scholar 

  26. Zhang, J., Xue, N.: A Secure System for Pervasive Social NetworkbasedHealthcare, Article in IEEE Access (2016)

    Google Scholar 

  27. Sotiriadis, S., Petrakis, E.: Future Internet Systems Design and Implementation: Cloud and IoT Services Based on IoT-A and FIWARE. Springer (2017)

    Google Scholar 

  28. Li, M., Lou, W.: Data security and privacy in wireless body area networks. IEEE Wirel Commun. 1536–1284 (2010)

    Google Scholar 

  29. Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.M.: A systemic approach for IoT security. In: IEEE International Conference on Distributed Computing in Sensor Systems, (2013)

    Google Scholar 

  30. Yaseen, M., Saleem, K., Derhab, A., Abbas, H., Muhtadif, J.A.: Secure sensors data acquisition and communication protection ineHealthcare: review on the state of the art, Telemat. Inform. (2017)

    Google Scholar 

  31. Ibrahim, M.H., Kumari, S., Das, A.K., Wazid, M., Odelu, V.: Secure anonymous mutual authentication forstar two-tier wireless body area networks. J. Comput. Methods Progr. Bio Med. 135, 37–50 (2016)

    Article  Google Scholar 

  32. Zou, S., Xu, Y., Wang, H., Li, Z., Chen, S., Bo, H.: A Survey on Secure Wireless Body Area Networks Hindawi Security and Communication Networks (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Venkateswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Siva Bharathi, K.R., Venkateswari, R. (2019). Security Challenges and Solutions for Wireless Body Area Networks. In: Iyer, B., Nalbalwar, S., Pathak, N. (eds) Computing, Communication and Signal Processing . Advances in Intelligent Systems and Computing, vol 810. Springer, Singapore. https://doi.org/10.1007/978-981-13-1513-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1513-8_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1512-1

  • Online ISBN: 978-981-13-1513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics