Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 3721234, 9 pages
https://doi.org/10.1155/2017/3721234
Review Article

A Survey on Secure Wireless Body Area Networks

1School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China
2Nanjing University of Information Science & Technology (NUIST), Nanjing, China
3Beijing University of Posts and Telecommunications, Beijing, China
4University of Massachusetts Dartmouth, Dartmouth, MA, USA
5State Key Laboratory of Wireless Mobile Communications, China Academy of Telecommunications Technology, Beijing, China
6State Key Laboratory of Networking and Switching, Beijing University of Posts and Telecommunications, Beijing, China

Correspondence should be addressed to Honggang Wang

Received 30 December 2016; Accepted 16 March 2017; Published 17 May 2017

Academic Editor: Rongxing Lu

Copyright © 2017 Shihong Zou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. M. Leung, “Body area networks: a survey,” Mobile Networks and Applications, vol. 16, no. 2, pp. 171–193, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. D. Arney, K. K. Venkatasubramanian, O. Sokolsky, and I. Lee, “Biomedical devices and systems security,” in Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'11, pp. 2376–2379, USA, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Gollakota, H. Hassanieh, B. Ransford et al., “They can hear your heartbeats: non-invasive security for implantable medical devices,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 2–13, 2011. View at Google Scholar
  4. N. Paul and T. Kohno, “Security risks, low-tech user interfaces, and implantable medical devices: a case study with insulin pump infusion systems,” in Proceedings of the 3rd USENIX conference on Health Security and Privacy, p. 8, USENIX Association, 2012.
  5. U.S. Food and Drug Administration, "Mobile Medical Applications Guidance for Industry and Food and Drug Administration Staff." September 25, 2013.
  6. R. Sun, Z. Shi, R. Lu, J. Qiao, and X. Shen, “A lightweight key management scheme for 60 GHz WPAN,” in Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP'12), pp. 1–6, 2012.
  7. M. Barua, X. Liang, R. Lu et al., “Peace: an efficient and secure patient-centric access control scheme for ehealth care system,” in Proceedings of the Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference, pp. 970–975, 2011.
  8. C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao, “Body area network security: a fuzzy attribute-based signcryption scheme,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 37–46, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, “OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks,” in Proceedings of the 32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013, pp. 2274–2282, Italy, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2015. View at Publisher · View at Google Scholar
  11. X. Chengsheng Yuan, Sun. X, and Lv. Rui, “Fingerprint liveness detection based on multi-scale LPQ and PCA,” China Communications, vol. 13, no. 7, pp. 60–65, 2016. View at Google Scholar
  12. Z. Zhang, H. Wang, A. V. Vasilakos, and H. Fang, “ECG-cryptography and authentication in body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 6, pp. 1070–1078, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Zhang, H. Wang, A. V. Vasilakos et al., “Channel information based cryptography and authentication in wireless body area networks,” in Proceedings of the 8th International Conference on Body Area Networks, pp. 132–135, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2013.
  14. Z. Li and H. Wang, “A key agreement method for wireless body area networks,” in Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 690–695, 2016.
  15. L. Shi, J. Yuan, S. Yu, and M. Li, “Mask-ban: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks,” IEEE Internet of Things Journal, vol. 2, no. 1, pp. 52–62, 2015. View at Google Scholar
  16. Z. Li, H. Wang, M. Daneshmand, and H. Fang, “Secure and efficient key generation and agreement methods for wireless body area networks,” in IEEE International Conference on Communications, (ICC'17), 2017.
  17. L. Ma, Y. Ge, and Y. Zhu, “TinyZKP: a lightweight authentication scheme based on zero-knowledge proof for wireless body area networks,” Wireless Personal Communications, vol. 77, no. 2, pp. 1077–1090, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Shi, M. Li, S. Yu, and J. Yuan, “BANA: body area network authentication exploiting channel characteristics,” in Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks (WiSec'12), pp. 27–38, 2012.
  19. X. Liang, X. Li, Q. Shen et al., “Exploiting prediction to enable secure and reliable routing in wireless body area networks,” IEEE Proc. INFOCOM, pp. 388–396, 2012. View at Google Scholar
  20. M. Li, W. J. Lou, and K. Ren, “Data security and privacy in wireless body area networks,” IEEE Wireless Communications, vol. 17, no. 1, pp. 51–58, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Banerjee, S. K. Gupta, and K. K. Venkatasubramanian, “PEES: physiology-based end-to-end security for mHealth,” in Wireless Health, p. 2, 2013. View at Google Scholar