Review Article

A Survey on Secure Wireless Body Area Networks

Table 1

Major security requirements for securing internal communication in WBAN.

Security requirements Description

Data authenticity Attackers may place malicious nodes in non-line-of-sight (NLOS) places and inject bogus data into the WBAN; thus the communication entities must verify who they claim to be.

Data confidentiality Due to the openness of WBAN wireless channel, passive attackers can eavesdrop on radio communication between the nodes freely and easily, leading to information disclosure to unauthorized individuals. Therefore data must be encrypted during communication.

Data integrity Attackers are able to tamper the eavesdropped information and send it back to original receiver to achieve some illegal purpose, which may result in system failure and cause disaster to the patient. Therefore, data must be verified for its integrity.

Data availability Attackers may launch denial-of-service (Dos) attacks to the medical cloud or BCU, leading to the medical services inaccessible. Therefore, the WBAN must detect and survive from DOS attacks.