Skip to main content

Security and Privacy Issues in Wireless Sensor and Body Area Networks

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

Advancements in wireless communication and availability of miniaturized, battery powered micro electronics devices have revolutionized the trend of computation and communication activities to the generation of smart computing where spatially distributed autonomous devices with sensors forming wireless sensor network (WSN) are utilized to measure physical or environmental conditions. WSNs have emerged as one of the most interesting areas of research due to its diverse application areas such as healthcare, utilities, remote monitoring, smart cities, and smart home which not only perform effective monitoring but also improve quality of living. Even the sensor nodes can be strategically placed in, on, or around human body to measure vital physiological parameters as well. Such sensor network which is formed over human body is termed as wireless body area network (WBAN) which could be beneficial for numerous applications such as eldercare, detection of chronic diseases, sports, and military. Hence, both network applications deal with sensitive data which requires utmost security and privacy. Thus, the security and privacy issues and challenges related to WSN and WBAN along with the defense measures in place should be studied in detail which not only is beneficial for effective application but also will motivate the researcher to find their own path for exercising better protection/defense. Accordingly, in this chapter a brief overview of both networks is presented along with their inherent characteristics, and the need for security and privacy in either networks is illustrated as well. Besides, study has been made regarding potential threats to security and privacy in both networks and existing measures to handle these issues. Finally the open research challenges are identified to draw the attention of the researcher to investigate further in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.

    Article  Google Scholar 

  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.

    Article  Google Scholar 

  3. Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.

    Article  Google Scholar 

  4. Ali, A., & Khan, F. A. (2013). Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, 2013(1), 216.

    Article  Google Scholar 

  5. Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2015). Collaborative lightweight trust management scheme for wireless sensor networks. Wireless Personal Communications, 80(1), 117–140.

    Article  Google Scholar 

  6. Arampatzis, T., Lygeros, J., & Manesis, S. (2005). A survey of applications of wireless sensors and wireless sensor networks. In Proceedings of the 2005 IEEE International Symposium on Mediterranean Conference on Control and Automation, Intelligent Control (pp. 719–724). Piscataway: IEEE.

    Google Scholar 

  7. Bicket, J., Rowson, J. M., & Phillips, C. (2018). Authentication of a gateway device in a sensor network. US Patent App. 10/085,149.

    Google Scholar 

  8. Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet of things. arXiv preprint arXiv:1501.02211.

    Google Scholar 

  9. Cavallari, R., Martelli, F., Rosini, R., Buratti, C., & Verdone, R. (2014). A survey on wireless body area networks: Technologies and design challenges. IEEE Communications Surveys & Tutorials, 16(3), 1635–1657.

    Article  Google Scholar 

  10. Chen, J. C., Jiang, M. C., & Liu, Y. W. (2005). Wireless lan security and IEEE 802.11 i. IEEE Wireless Communications, 12(1), 27–36.

    Article  Google Scholar 

  11. Chowdhury, C., Aslam, N., Ahmed, G., Chattapadhyay, S., Neogy, S., & Zhang, L. (2018). Novel algorithms for reliability evaluation of remotely deployed wireless sensor networks. Wireless Personal Communications, 98(1), 1331–1360.

    Article  Google Scholar 

  12. Chowdhury, C., & Roy, S. (2017). Mobile crowdsensing for smart cities. In Smart cities: Foundations, principles, and applications (pp. 125–154). Hoboken: Wiley.

    Chapter  Google Scholar 

  13. Corke, P., Wark, T., Jurdak, R., Hu, W., Valencia, P., & Moore, D. (2010). Environmental wireless sensor networks. Proceedings of the IEEE, 98(11), 1903–1917.

    Article  Google Scholar 

  14. Delgado-Mohatar, O., Fúster-Sabater, A., & Sierra, J. M. (2011). A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks, 9(5), 727–735.

    Article  Google Scholar 

  15. Elhoseny, M., Yuan, X., El-Minir, H., & Riad, A. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.

    Google Scholar 

  16. Fan, X., & Gong, G. (2012). LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. In International Conference on Ad Hoc Networks (pp. 180–195). Berlin: Springer.

    Google Scholar 

  17. Fu, Y., & Liu, J. (2013). Monitoring system for sports activities using body area networks. In Proceedings of the 8th International Conference on Body Area Networks (pp. 408–413).

    Google Scholar 

  18. Gungor, V. C., & Hancke, G. P. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258–4265.

    Article  Google Scholar 

  19. Gupta, B. B. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives. Boca Raton: CRC Press.

    Google Scholar 

  20. Halder, S., Ghosal, A., & Bit, S. D. (2011). A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network. Computer Communications, 34(11), 1294–1306.

    Article  Google Scholar 

  21. He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2017). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590–2601.

    Article  Google Scholar 

  22. Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596–606.

    Article  Google Scholar 

  23. Huang, K. L., Kanhere, S., & Hu, W. (2010). Are you contributing trustworthy data? The case for a reputation system in participatory sensing. In Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM’10) (pp. 14–22). New York: ACM.

    Google Scholar 

  24. Jan, M., Nanda, P., Usman, M., & He, X. (2017). PAWN: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17), e3986.

    Article  Google Scholar 

  25. Javadi, S. S., & Razzaque, M. (2013). Security and privacy in wireless body area networks for health care applications. In Wireless networks and security (pp. 165–187). Berlin: Springer.

    Chapter  Google Scholar 

  26. Kallio, J., & Koivusaari, J. (2016). WSN related requirement analysis towards sustainable building automation operations and maintenance. In Ubiquitous computing and ambient intelligence (pp. 212–217). Berlin: Springer.

    Chapter  Google Scholar 

  27. Khan, K., & Goodridge, W. (2014). Impact of multipath routing on WSN security attacks. International Journal of Intelligent Systems and Applications, 6(6), 72.

    Article  Google Scholar 

  28. Kompara, M., & Hölbl, M. (2018). Survey on security in intra-body area network communication. Ad Hoc Networks, 70, 23–43.

    Article  Google Scholar 

  29. Lee, T. H. (2008). Simple dynamic user authentication protocols for wireless sensor networks. In Second International Conference on Sensor Technologies and Applications, 2008. SENSORCOMM’08 (pp. 657–660). Piscataway: IEEE.

    Google Scholar 

  30. Liu, Q., & Wang, P. K. (2009). Secure and energy-efficient clustered routing protocol for wireless sensor networks [j]. Computer Simulation, 4, 041.

    Google Scholar 

  31. Liu, X., Cao, J., Lai, S., Yang, C., Wu, H., & Xu, Y. L. (2011). Energy efficient clustering for WSN-based structural health monitoring. In Proceedings IEEE INFOCOM, 2011 (pp. 2768–2776). Piscataway: IEEE.

    Chapter  Google Scholar 

  32. Mainanwal, V., Gupta, M., & Upadhayay, S. K. (2015) A survey on wireless body area network: Security technology and its design methodology issue. In 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) (pp. 1–5). Piscataway: IEEE.

    Google Scholar 

  33. Maitra, T., & Roy, S. (2018). Research challenges in ban due to the mixed WSN features: Some perspectives and future directions. IEEE Sensors Journal, 17(17), 5759–5766.

    Article  Google Scholar 

  34. Movassaghi, S., Abolhasan, M., & Lipman, J. (2013). A review of routing protocols in wireless body area networks. Journal of Networks, 8(3), 559–575.

    Article  Google Scholar 

  35. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658–1686.

    Article  Google Scholar 

  36. Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(2), 551–591.

    Article  Google Scholar 

  37. Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In The 8th International Conference on Advanced Communication Technology, ICACT 2006 (Vol. 2, 6 pp.). Piscataway: IEEE.

    Google Scholar 

  38. Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor big data collection–processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349–357.

    Article  Google Scholar 

  39. Ramli, S. N., Ahmad, R., Abdollah, M. F., & Dutkiewicz, E. (2013). A biometric-based security for data authentication in wireless body area network (WBAN). In 15th International Conference on Advanced Communication Technology (ICACT) (pp. 998–1001). Piscataway: IEEE.

    Google Scholar 

  40. Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: Recent developments and potential synergies. The Journal of Supercomputing, 68(1), 1–48.

    Article  Google Scholar 

  41. Romer, K., & Mattern, F. (2004). The design space of wireless sensor networks. IEEE Wireless Communications, 11(6), 54–61.

    Article  Google Scholar 

  42. Roy, M., Chowdhury, C., & Aslam, N. (2017). Designing 2-hop interference aware energy efficient routing (hier) protocol for wireless body area networks. In International Conference on Communication Systems and Networks (pp. 262–283). Berlin: Springer.

    Chapter  Google Scholar 

  43. Roy, M., Chowdhury, C., & Aslam, N. (2017). Designing an energy efficient WBAN routing protocol. In 9th International Conference on Communication Systems and Networks (COMSNETS) (pp. 298–305). Piscataway: IEEE.

    Google Scholar 

  44. Roy, M., Chowdhury, C., Kundu, A., & Aslam, N. (2017). Secure lightweight routing (SLR) strategy for wireless body area networks. In IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1–4). Piscataway: IEEE.

    Google Scholar 

  45. Roy, M., Chowdhury, C., & Neogy, S. (2014). Developing secured manet using trust. In Fourth International Conference on Advances in Computing and Communications (ICACC) (pp. 183–186). Piscataway: IEEE.

    Google Scholar 

  46. Saleem, S., Ullah, S., & Kwak, K. S. (2011). A study of IEEE 802.15. 4 security framework for wireless body area networks. Sensors, 11(2), 1383–1395.

    Article  Google Scholar 

  47. Saleem, S., Ullah, S., & Yoo, H. S. (2009). On the security issues in wireless body area networks. International Journal of Digital Content Technology and Its Applications, 3(3), 178–184.

    Article  Google Scholar 

  48. Seah, W. K., Eu, Z. A., & Tan, H. P. (2009). Wireless sensor networks powered by ambient energy harvesting (WSN-heap)-survey and challenges. In 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology. Wireless VITAE 2009 (pp. 1–5). Piscataway: IEEE.

    Google Scholar 

  49. Senouci, M. R., Mellouk, A., Senouci, M. A., & Oukhellou, L. (2014). Belief functions in telecommunications and network technologies: An overview. Annals of Telecommunications, 69(3–4), 135–145.

    Article  Google Scholar 

  50. Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956–963.

    Article  Google Scholar 

  51. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.

    Article  Google Scholar 

  52. Singh, S. K., Singh, M., & Singh, D. K. (2010). Routing protocols in wireless sensor networks–a survey. International Journal of Computer Science & Engineering Survey, 1(2), 63–83.

    Article  Google Scholar 

  53. Singla, A., & Sachdeva, R. (2013). Review on security issues and attacks in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(4), 529–534.

    Google Scholar 

  54. Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.

    Article  Google Scholar 

  55. Tewari, A., & Gupta, B. (2018, in press). Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.04.027

  56. Tiegang, F., Guifa, T., & Limin, H. (2014). Deployment strategy of wsn based on minimizing cost per unit area. Computer Communications, 38, 26–35.

    Article  Google Scholar 

  57. Toorani, M. (2016). Security analysis of the IEEE 802.15. 6 standard. International Journal of Communication Systems, 29(17), 2471–2489.

    Article  Google Scholar 

  58. Vullers, R. J., Van Schaijk, R., Visser, H. J., Penders, J., & Van Hoof, C. (2010). Energy harvesting for autonomous wireless sensor networks. IEEE Solid-State Circuits Magazine, 2(2), 29–38.

    Article  Google Scholar 

  59. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.

    Article  Google Scholar 

  60. Zhang, T., & Qu, H. (2010). A lightweight key management scheme for wireless sensor networks. In Second International Workshop on Education Technology and Computer Science (ETCS) (Vol. 1, pp. 272–275). Piscataway: IEEE.

    Google Scholar 

  61. Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. In Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006) (p. 40). Piscataway: IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Roy, M., Chowdhury, C., Aslam, N. (2020). Security and Privacy Issues in Wireless Sensor and Body Area Networks. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics