Table of Contents
ISRN Communications and Networking
Volume 2011, Article ID 692592, 8 pages
http://dx.doi.org/10.5402/2011/692592
Review Article

A Review on Body Area Networks Security for Healthcare

1Institute of Computing Technology, Chinese Academy of Sciences (CAS), Beijing 100190, China
2Graduate University of CAS, Beijing 100049, China
3CAS/CUHK Research Centre for Biosensors and Medical Instruments, Institute of Biomedical and Health Engineering (IBHE), Shenzhen Institute of Advanced Technology (SIAT), Shenzhen 518055, China
4The Key Laboratory of Health Informatics of CAS, Shenzhen 518055, China
5The Joint Research Centre for Biomedical Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong

Received 18 March 2011; Accepted 2 May 2011

Academic Editors: H. Abdel-Wahab, R. Montemanni, and H. M. Sun

Copyright © 2011 Guang He Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Bos, K. Wac, V. Jones et al., “Mobile patient monitoring: the MobiHealth system,” Journal on Information Technology in Healthcare, vol. 2, no. 5, pp. 365–373, 2004. View at Google Scholar · View at Scopus
  2. R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang, “Introduction to the special section on m-health: beyond seamless mobility and global wireless health-care connectivity,” IEEE Transactions on Information Technology in Biomedicine, vol. 8, no. 4, pp. 405–414, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. M. R. Yuce, S. W. Ng, N. L. Myo, J. Y. Khan, and W. Liu, “Wireless body sensor network using medical implant band,” Journal of Medical Systems, vol. 31, no. 6, pp. 467–474, 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. C. Poon and Y. T. Zhang, “Perspectives on high technologies for low-cost healthcare,” IEEE Engineering in Medicine and Biology Magazine, vol. 27, no. 5, pp. 42–47, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Hash, P. Bowen, A. Johnson, C. D. Smith, and D. I. Steinberg, “An introductory resource guide for implementing the health insurance portability and accountability act (HIPAA) security rule,” National Institute of Standards and Technology, pp. 800–866, 2005. View at Google Scholar
  6. Directive 2002/58/EC Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector, 2002.
  7. “Law of the people's Republic of China on medical practitioners,” 1996, http://www.moh.gov.cn/publicfiles/business/htmlfiles/mohzcfgs/s3576/200804/18250.htm.
  8. W. Yong, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2–23, 2006. View at Google Scholar
  9. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston, “Security for sensor networks,” in Proceedings of the CADIP Research Symposium, 2002.
  11. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162–175, Baltimore, Md, USA, November 2004. View at Scopus
  12. J. Hill, S. Hollar, K. S. J. Pister, D. Culler, R. Szewczyk, and A. Woo, “System architecture directions for networked sensors,” SIGPLAN Notices, vol. 35, no. 11, pp. 93–104, 2000. View at Google Scholar · View at Scopus
  13. M. Patel and J. Wang, “Applications, challenges, and prospective in emerging body area networking technologies,” IEEE Wireless Communications, vol. 17, no. 1, pp. 80–88, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. E. M. Staderini, “UWB radars in medicine,” IEEE Aerospace and Electronic Systems Magazine, vol. 17, no. 1, pp. 13–18, 2002. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Zhao, D. Y. Fei, C. R. Doarn, B. Harnett, and R. C. Merrell, “A Telemedicine System for Wireless Home Healthcare Based on Bluetooth (TM) and the Internet,” Telemedicine Journal and e-Health, vol. 10, no. 2, pp. S110–S116, 2004. View at Google Scholar · View at Scopus
  16. A. Wheeler, “Commercial applications of wireless sensor networks using ZigBee,” IEEE Communications Magazine, vol. 45, no. 4, pp. 70–77, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. “IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements part 15.1: wireless medium access control(MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs),” IEEE Std 802.15.1TM, 2005.
  18. “IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements part 15.3: wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPANs) amendment 1: MAC sublayer,” IEEE Std 802.15.3b, 2006.
  19. “IEEE Standard for Information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements part 15.4: wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs),” IEEE Std 802.15.4TM, 2006.
  20. IEEE-SA IEEE 802.15 WPAN Task Group 6 (TG6) Body Area Networkshttp://www.ieee802.org/15/pub/TG6.html.
  21. https://mentor.ieee.org/802.15/documents.
  22. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Scopus
  23. Koblitz N., “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Google Scholar
  24. V. S. Miller, “Use of elliptic curves in cryptography,” in Proceedings of the Advances in Cryptology (CRYPTO '86), pp. 417–426, 1986.
  25. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 925–943, Boston, Mass, USA, 2004.
  26. D. J. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,” in Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON '04), pp. 71–80, October 2004. View at Scopus
  27. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, “Energy analysis of public-key cryptography for wireless sensor networks,” in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05), pp. 324–328, Kauai, Hawaii, 2005.
  28. H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors,” in Proceedings of the International Conference on Information and Communication Security (ICICS '06), pp. 519–528, 2006.
  29. L. Uhsadel, A. Poschmann, and C. Paar, “An efficient general purpose elliptic curve cryptography module for ubiquitous sensor networks,” in Proceedings of the the Software Performance Enhancement for Encryption and Decryption (SPEED '07), 2007.
  30. A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks,” in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08), pp. 245–256, St. Louis, Mo, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  31. C. C. Tan, H. Wang, S. Zhong, and Q. Li, “Body sensor network security: an identity-based cryptography approach,” in Proceedings of the 1st ACM Conference on Wireless Network Security, pp. 148–153, Alexandria, Va, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. O. Elkeelany and A. Olabisi, “Case study: integrated design of RC5 encryption,” in Proceedings of the IEEE Southeast Conference (SoutheastCon '07), pp. 69–72, Richmond, Va, USA, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  33. B. Wang, S. J. Lin, Y. T. Zhang et al., “A body sensor networks development platform for pervasive healthcare,” in Proceedings of the 3rd International Conference on Bioinformatics and Biomedical Engineering, (ICBBE '09), pp. 1–4, Beijing, China, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  34. K. Woo Kwon, L. Hwaseong, K. Yong Ho, and L. Dong Hoon, “Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks,” in Proceedings of the 2nd International Conference on Information Security and Assurance (ISA '08), pp. 73–76, Busan, Korea, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  35. C. Clavier, K. Gaj, C. De Cannière, O. Dunkelman, and M. Knežević, “KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers,” in Proceedings of the Cryptographic Hardware and Embedded Systems (CHES '09), pp. 272–288, Springer, Berlin, Germany, 2009.
  36. P. Paillier et al., “PRESENT: an ultra-lightweight block cipher,” in Proceedings of the Cryptographic Hardware and Embedded Systems (CHES '07), pp. 450–466, Springer, Berlin, Germany, 2007.
  37. J. Song, T. Kwon, M. Yung, C. Lim, and T. Korkishko, “mCrypton—a lightweight block cipher for security of low-cost RFID tags and sensors,” in Information Security Applications, pp. 243–258, Springer, Berlin, Germany, 2006. View at Google Scholar
  38. K. J. Choi and J. I. Song, “Investigation of feasible cryptographic algorithms for wireless sensor network,” in Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT '06), pp. U1379–U1381, Seoul, Korea, 2006.
  39. C. N. Zhang, X. Huang, Q. S. Yu, and C. Yang, “An RC4-based lightweight security protocol for resource-constrained communications,” in Proceedings of the 11th IEEE International Conference on Computational Science and Engineering (CSE Workshops '08), pp. 133–140, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  40. A. Francillon and C. Castelluccia, “TinyRNG: a cryptographic random number generator for wireless sensors network nodes,” in Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops (WiOpt '07), pp. 1–7, Limassol, Cyprus, 2007.
  41. R. Latif and M. Hussain, “Hardware-based random number generation in Wireless Sensor Networks(WSNs),” in Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance (IAWSN '09), pp. 732–740, Seoul, Korea, 2009.
  42. J. Szczepanski, E. Wajnryb, J. M. Amigo, M. V. Sanchez-Vives, and M. Slater, “Biometric random number generators,” Computers and Security, vol. 23, no. 1, pp. 77–84, 2004. View at Publisher · View at Google Scholar
  43. K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, “EKG-based key agreement in body sensor networks,” in Proceedings of the 27th Conference on Computer Communications (IEEE INFOCOM Workshops '08), pp. 1–6, Phoenix, Ariz, USA, 2008.
  44. K. K. Venkatasubramanian, A. Banerjee, and S. Gupta, “Plethysmogram-based secure inter-sensor communication in body area networks,” in Proceedings of the IEEE Military Communications Conference (MILCOM '08), pp. 1–7, San Diego, Calif, USA, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  45. G. H. Zhang, C. C. Y. Poon, and Y. T. Zhang, “A biometrics based security solution for encryption and authentication in tele-healthcare systems,” in Proceedings of the 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL '09), pp. 1–4, Bratislava, Slovakia, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  46. O. G. Morchon, H. Baldus, and D. S. Sanchez, “Resource-efficient security for medical body sensor networks,” in Proceedings of the 3rd International Workshop on Wearable and Implantable Body Sensor Networks (BSN '06), pp. 80–83, Cambridge, Mass, USA, 2006.
  47. A. Boukerche and Ren Y., “The Design of a secure key management system for mobile Ad-hoc networks,” in Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN '08), pp. 320–327, Quebec, Canada, 2008.
  48. C. C. Y. Poon, Y. T. Zhang, and S. D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health,” IEEE Communications Magazine, vol. 44, no. 4, pp. 73–81, 2006. View at Publisher · View at Google Scholar · View at Scopus
  49. A. Juels and M. Wattenberg, “Fuzzy commitment scheme,” in Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36, Lion City, Singapore, November 1999. View at Scopus
  50. A. Juels and M. Sudan, “A fuzzy vault scheme,” Designs, Codes, and Cryptography, vol. 38, no. 2, pp. 237–257, 2006. View at Publisher · View at Google Scholar · View at Scopus