Security in Wireless Body Sensor Network: A Multivocal Literature Study
<p>MLR process.</p> "> Figure 2
<p>Excellency scores as a percent of articles that meet each of them (academic literature: EC1 through EC3; grey literature: EC4 through EC7).</p> "> Figure 3
<p>Relevant publications per year for academic (ALR) and grey (GLR) literature, from 2017 to 2021.</p> "> Figure 4
<p>Publication types for ALR.</p> "> Figure 5
<p>Publication types for GLR.</p> "> Figure 6
<p>Research type of the academic (ALR) and grey (GLR) literature.</p> "> Figure 7
<p>Summary of methodological approaches to ALR. At the Y-axis, abbreviations used for validation types are CS: Case study; S: Simulation; PA: Performance analysis; PC: Proof of concept; Nill: Not mentioned, and for research types abbreviations are EV: Evaluation; VA: Validation; NS: Novel solution; PE: Personal experience.</p> "> Figure 8
<p>Summary of methodological approaches to GLR. In Y-axis, abbreviations used for research types are EV: Evaluation; NS: Novel solution; OP: Opinion paper; PE: Personal experience, and for validation types abbreviations are EP: Example and NS: Not specified.</p> "> Figure 9
<p>Validation types of research in ALR.</p> "> Figure 10
<p>Summary of methodologies used for ALR. In the Y-axis, abbreviations of methodologies are BS: Block structure; L: Logic; SD: Sequence diagram; CD: Class diagram; FD: Formation diagram; UCM: Use case model; TO: Text only; C: Code; PA: Proper analysis.</p> "> Figure 11
<p>Summary of methodologies used for GLR. In the Y-axis, abbreviations of methodologies are BS: Block structure; SD: Sequence diagram; TO: Text only; C: Code.</p> "> Figure 12
<p>Methodologies used for the academic (ALR) and grey (GLR) literature studies. The abbreviations used are BS: Block structure; L: Logic; SD: Sequence diagram; CD: Class diagram; FD: Formation diagram; UCM: Use case model; TO: Text only; C: Code; PA: Proper analysis.</p> "> Figure 13
<p>Security mechanisms and security scope identified in studies of academic and GLR. The abbreviations used are At: Authorization; Au: Authentication; AC: Access control; ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; SDM: Security data management; IS: Implementation security; SE: Security evaluation; TM: Threat modeling; GSA: Generic security architecture; SA: Secure application.</p> "> Figure 14
<p>Security mechanisms and security scope identified in studies of academic and GLR throughout the years. The numbers inside are quantities of papers. The abbreviations used are At: Authorization; Au: Authentication; AC: Access control, ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; SDM: Security data management; IS: Implementation security; SE: Security evaluation; TM: Threat modeling; GSA: Generic security architecture; SA: Secure application.</p> "> Figure 15
<p>Security contexts addressed by the security solutions. ALR: Academic literature; GLR: Grey literature.</p> "> Figure 16
<p>Summary of the security scope and security mechanisms reported by each study in the ALR. The abbreviations are At: Authorization; Au: Authentication; AC: Access control; ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; SDM: Security data management; IS: Implementation security; SE: Security evaluation; TM: Threat modeling; GSA: Generic security architecture; SA: Secure application.</p> "> Figure 17
<p>Review of the security scope and security mechanisms reported by each study in the GLR. The abbreviations are At: Authorization; Au: Authentication; AC: Access control; ST: Secure transmission; F: Filtering; M: Monitoring; EC: Execution control; IS: Implementation security; GSA: Generic security architecture.</p> ">
Abstract
:1. Introduction
2. Security in Wireless Body Sensor Network
3. Related Work
4. Research Protocol
- Define the main study question, search process, and search query;
- Describe inclusion/exclusion standards;
- Search the relevant databases;
- Filtration techniques among the established publications;
- Review of articles that passed the filtration process;
- Summarize the results and conclusions.
4.1. Objective and Research Questions
- RQ1: How much has the number of security-related BSN articles changed over the period?
- RQ2: Which research approaches are used to investigate BSN safety?
- RQ3: In BSN, which security strategies and security scope have been introduced?
- RQ4: With what security domains have work been conducted?
4.2. Selection Process
4.3. Selection Process
4.3.1. Source Selection
Inclusion Factors
- Sources that are relevant to secure body sensor network;
- Sources that focus on secure body sensor network;
- Studies that find alternatives, approaches, prevention systems or other security-related activities;
- English-language studies;
- Journal and conference papers, standards and white papers, and reports published by reputable organizations.
Exclusion Factors
- Intermediate or tertiary research (literature reviews, surveys, and other types of research);
- Articles in which the entire text is not accessible;
- Tutorials, opinions, and different types of research (only for scholarly papers);
- Studies that do not provide detailed information about BSN security;
- Textbooks and duplicate sources.
4.3.2. Articles Selection
4.3.3. Acquisition and Compilation of Data
5. Findings
5.1. RQ1: Articles Frequency
5.2. RQ2: Methodological Approaches
5.2.1. Research Types
5.2.2. Validation Types
5.2.3. Methodologies
5.3. RQ3: Categories of Security Solutions
5.3.1. Security Mechanisms
5.3.2. Security Scope
5.4. RQ4: Security Contexts
6. Proposed Research Implications
6.1. Few Works on Attack Detection
6.2. Secure BSN Application Development
6.3. Lack of Attention on Attack Recovery
6.4. Adaptation of Reliable Technology
7. Potential Applications of Proposed MLR
7.1. To Publish New Security Mechanisms of BSN
7.2. To Solve BSN Security Design Problems
7.3. To Communicate and Search for New Ideas
8. Conclusions
9. Patents
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Oleiwi, S.S.; Mohammed, G.N.; Albarazanchi, I. Mitigation of packet loss with end-to-end delay in wireless body area network applications. Int. J. Electr. Comput. Eng. 2022, 12, 460. [Google Scholar] [CrossRef]
- Liu, Q.; Mkongwa, K.G.; Zhang, C. Performance issues in wireless body area networks for the healthcare application: A survey and future prospects. SN Appl. Sci. 2021, 3, 1–19. [Google Scholar] [CrossRef]
- Karchowdhury, S.; Sen, M. Survey on attacks on wireless body area network. In International Journal of Computational Intelligence & IoT, Forthcoming; SSRN: Rochester, NY, USA, 2019. [Google Scholar]
- Roy, M.; Chowdhury, C.; Aslam, N. Security and privacy issues in wireless sensor and body area networks. In Handbook of Computer Networks and Cyber Security; Springer: Berlin/Heidelberg, Germany, 2020; pp. 173–200. [Google Scholar]
- Asam, M.; Ajaz, A.; Jamal, T.; Adeel, M.; Hassan, A.; Butt, S.A.; Gulzar, M. Challenges in wireless body area network. Int. J. Adv. Comput. Sci. Appl. 2019, 10. [Google Scholar] [CrossRef]
- Narwal, B.; Mohapatra, A.K. A survey on security and authentication in wireless body area networks. J. Syst. Archit. 2021, 113, 101883. [Google Scholar] [CrossRef]
- Maheswar, R.; Kanagachidambaresan, G.; Jayaparvathy, R.; Thampi, S.M. Body Area Network Challenges and Solutions; Springer: Berlin/Heidelberg, Germany, 2019. [Google Scholar]
- Abdulhameed, I.S. The Security and Privacy of Electronic Health Records in Healthcare Systems: A Systematic Review. Turk. J. Comput. Math. Educ. 2021, 12, 1979–1992. [Google Scholar]
- Garousi, V.; Rainer, A.; Felderer, M.; Mäntylä, M.V. Introduction to the Special Issue on: Grey Literature and Multivocal Literature Reviews (MLRs) in Software Engineering. Inf. Softw. Technol. 2022, 141, 106697. [Google Scholar]
- Yoo, J.; Cho, N.; Yoo, H.-J. Analysis of body sensor network using human body as the channel. In Proceedings of the ICST 3rd International Conference on Body Area Networks, Princeton, NJ, USA, 13–15 March 2008; CiteseerX: Princeton, NJ, USA, 2008. [Google Scholar]
- Tan, C.C.; Wang, H.; Zhong, S.; Li, Q. Body sensor network security: An identity-based cryptography approach. In Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA, 31 March–2 April 2008. [Google Scholar]
- Pahuja, R.; Verma, H.; Uddin, M. A wireless sensor network for greenhouse climate control. IEEE Pervasive Comput. 2013, 12, 49–58. [Google Scholar] [CrossRef]
- Mansour, A.; Leblond, I. Ecosystem monitoring and port surveillance systems. AIAAS Adv. Appl. Acoust. 2013, 2, 91–111. [Google Scholar]
- Reyer, M.; Hurlebaus, S.; Mander, J.; Ozbulut, O.E. Design of a wireless sensor network for structural health monitoring of bridges. In Wireless Sensor Networks and Ecological Monitoring; Springer: Berlin/Heidelberg, Germany, 2013; pp. 195–216. [Google Scholar]
- Oh, S.-R.; Seo, Y.-D.; Lee, E.; Kim, Y.-G. A comprehensive survey on security and privacy for electronic health data. Int. J. Environ. Res. Public Health 2021, 18, 9668. [Google Scholar] [CrossRef]
- Pirbhulal, S.; Zhang, H.; Wu, W.; Mukhopadhyay, S.C.; Zhang, Y.-T. Heartbeats based biometric random binary sequences generation to secure wireless body sensor networks. IEEE Trans. Biomed. Eng. 2018, 65, 2751–2759. [Google Scholar] [CrossRef]
- Sivasangari, A.; Ajitha, P.; Gomathi, R. Light weight security scheme in wireless body area sensor network using logistic chaotic scheme. Int. J. Netw. Virtual Organ. 2020, 22, 433–444. [Google Scholar] [CrossRef]
- Sammoud, A.; Chalouf, M.A.; Hamdi, O.; Montavont, N.; Bouallegue, A. A new biometrics-based key establishment protocol in WBAN: Energy efficiency and security robustness analysis. Comput. Secur. 2020, 96, 101838. [Google Scholar] [CrossRef]
- Chaudhary, S.; Singh, A.; Chatterjee, K. Wireless body sensor network (WBSN) security and privacy issues: A survey. In International Journal of Computational Intelligence & IoT; SSRN: Rochester, NY, USA, 2019; Volume 2. [Google Scholar]
- Hajar, M.S.; Al-Kadri, M.O.; Kalutarage, H.K. A survey on wireless body area networks: Architecture, security challenges and research opportunities. Comput. Secur. 2021, 104, 102211. [Google Scholar] [CrossRef]
- Hussain, S.; Ullah, S.S.; Uddin, M.; Iqbal, J.; Chen, C.-L. A comprehensive survey on signcryption security mechanisms in wireless body area networks. Sensors 2022, 22, 1072. [Google Scholar] [CrossRef]
- Jijesh, J. A survey on Wireless Body Sensor Network routing protocol classification. In Proceedings of the 2017 11th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 5–6 January 2017. [Google Scholar]
- Hamza, M.; Khan, A.A.; Akbar, M.A. Toward a secure global contact tracing app for COVID-19. In Proceedings of the International Conference on Evaluation and Assessment in Software Engineering 2022, Gothenburg, Sweden, 12–15 June 2022. [Google Scholar]
- Zuhra, F.T.; Bakar, K.A.; Ahmed, A.; Tunio, A.M. Routing protocols in wireless body sensor networks: A comprehensive survey. J. Netw. Comput. Appl. 2017, 99, 73–97. [Google Scholar] [CrossRef]
- Garousi, V.; Felderer, M.; Mäntylä, M.V. Guidelines for including grey literature and conducting multivocal literature reviews in software engineering. Inf. Softw. Technol. 2019, 106, 101–121. [Google Scholar] [CrossRef]
- SunilKumar, K. A review on security and privacy issues in wireless sensor networks. In Proceedings of the 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, 19–20 May 2017. [Google Scholar]
- Mohsin, A.; Zaidan, A.; Zaidan, B.; Albahri, A.S.; Albahri, O.S.; Alsalem, M.; Mohammed, K. Real-time remote health monitoring systems using body sensor information and finger vein biometric verification: A multi-layer systematic review. J. Med. Syst. 2018, 42, 1–36. [Google Scholar] [CrossRef]
- Itani, W.; Kayssi, A.; Chehab, A. Wireless body sensor networks: Security, privacy, and energy efficiency in the era of cloud computing. In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PN, USA, 2019; pp. 731–763. [Google Scholar]
- Petersen, K.; Feldt, R.; Mujtaba, S.; Mattsson, M. Systematic mapping studies in software engineering. In Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE), Bari, Italy, 26–27 June 2008. [Google Scholar]
- Gebrie, M.T.; Abie, H. Risk-based adaptive authentication for internet of things in smart home eHealth. In Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings, Canterbury, UK, 11–15 September 2017; pp. 102–108. [Google Scholar]
- Hashemi, S.M. Secure Routing of WBAN with Monarchy Butterfly Optimization. In Proceedings of the 2017 2nd International Conference on Communication and Information Systems, Wuhan, China, 7–9 November 2017; pp. 155–158. [Google Scholar]
- Hassan, M.; Katangur, A.; Kar, D. A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control. In Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies, Paris, France, 13–14 November 2017. [Google Scholar]
- Altop, D.K.; Levi, A.; Tuzcu, V. SU-PhysioDB: A physiological signals database for body area network security. In Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Istanbul, Turkey, 5–8 June 2017. [Google Scholar]
- Gowtham, M.; Ahila, S.S. Privacy enhanced data communication protocol for wireless body area network. In Proceedings of the 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017. [Google Scholar]
- He, D.; Zeadally, S.; Kumar, N.; Lee, J.H. Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Syst. J. 2017, 11, 2590–2601. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Kumari, S.; Wu, F.; Karuppiah, M.; Choo, K.-K.R. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 2017, 61, 238–249. [Google Scholar] [CrossRef]
- Deng, Y.Y.; Chen, C.L.; Tsaur, W.J.; Tang, Y.W.; Chen, J.H. Internet of things (IoT) based design of a secure and lightweight body area network (BAN) healthcare system. Sensors 2017, 17, 2919. [Google Scholar] [CrossRef]
- AlHamouz, S.; Naimat, A.M.A.; Fraihat, A. An Energy Preserving Practical Security Assessment on Wireless Body Area Networks. In Proceedings of the 2018 11th International Conference on Developments in eSystems Engineering (DeSE), Cambridge, UK, 2–5 September 2018. [Google Scholar]
- Arfaoui, A.; Letaifa, A.b.; Kribeche, A.; Senouci, S.M.; Hamdi, M. A stochastic game for adaptive security in constrained wireless body area networks. In Proceedings of the 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018. [Google Scholar]
- Izza, S.; Benssalah, M.; Ouchikh, R. Security Improvement of the Enhanced 1-round Authentication Protocol for Wireless Body Area Networks. In Proceedings of the 2018 International Conference on Applied Smart Systems (ICASS), Medea, Algeria, 24–25 November 2018. [Google Scholar]
- Ji, S.; Gui, Z.; Zhou, T.; Yan, H.; Shen, J. An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services. IEEE Access 2018, 6, 69603–69611. [Google Scholar] [CrossRef]
- Mekki, N.; Hamdi, M.; Aguili, T. A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area Network. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018. [Google Scholar]
- Wang, J.; Han, K.; Alexandridis, A.; Zilic, Z.; Pang, Y.; Lin, J. An ASIC Implementation of Security Scheme for Body Area Networks. In Proceedings of the 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy, 27–30 May 2018. [Google Scholar]
- Koya, A.M.; Deepthi, P.P. Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Netw. 2018, 140, 138–151. [Google Scholar] [CrossRef]
- Shen, J.; Chang, S.; Shen, J.; Liu, Q.; Sun, X. A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. 2018, 78, 956–963. [Google Scholar] [CrossRef]
- Ahlawat, R.K.; Malik, A.; Sadhu, A. Sybil attack prevention algorithm for body area networks. In Nature Inspired Computing; Springer: Singapore, 2018; pp. 125–134. [Google Scholar]
- Anusya, G.; Sharmada, M.A.; Anitha, G.; Akilandeswari, G.; Azees, M. An Efficient and Secure Authentication Scheme for Wireless Body Area Networks. In Proceedings of the 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, 20–21 April 2018. [Google Scholar]
- Arfaoui, A.; Kribeche, A.; Boudia, O.R.M.; Letaifa, A.B.; Senouci, S.M.; Hamdi, M. Context-aware authorization and anonymous authentication in wireless body area networks. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018. [Google Scholar]
- He, D.; Zeadally, S.; Wu, L. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks. IEEE Syst. J. 2018, 12, 64–73. [Google Scholar] [CrossRef]
- Odesile, A.; Thamilarasu, G. Distributed intrusion detection using mobile agents in wireless body area networks. In Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK, 6–8 September 2017. [Google Scholar]
- Omala, A.A.; Mbandu, A.S.; Mutiria, K.D.; Jin, C.; Li, F. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. J. Med. Syst. 2018, 42, 108. [Google Scholar] [CrossRef]
- Omala, A.A.; Ali, I.; Li, F. Heterogeneous signcryption with keyword search for wireless body area network. Secur. Priv. 2018, 1, e25. [Google Scholar] [CrossRef]
- Parvez, K.; Zohra, F.T.; Jahan, M. A secure and lightweight user authentication mechanism for wireless body area network. In Proceedings of the 6th International Conference on Networking, Systems and Security, Dhaka, Bangladesh, 17–19 December 2019; pp. 139–143. [Google Scholar]
- Remu, S.R.H.; Faruque, M.O.; Ferdous, R.; Arifeen, M.M.; Sakib, S.; Reza, S.M.S. Naive Bayes based Trust Management Model for Wireless Body Area Networks. In Proceedings of the International Conference on Computing Advancements, Dhaka, Bangladesh, 10–12 January 2020. [Google Scholar]
- Razaque, A.; Amsaad, F.; Khan, M.J.; Toksanovna, A.S.; Oun, A.; Almiani, M. Privacy Preserving Medium Access Control Protocol for wireless Body Area Sensor Networks. In Proceedings of the 2019 IEEE National Aerospace and Electronics Conference (NAECON, Dayton, OH, USA, 15–19 July 2019. [Google Scholar]
- Hale, M.L.; Lotfy, K.; Gamble, R.F.; Walter, C.; Lin, J. Developing a platform to evaluate and assess the security of wearable devices. Digit. Commun. Netw. 2019, 5, 147–159. [Google Scholar] [CrossRef]
- Karaoğlan Altop, D.; Seymen, B.; Levi, A. SKA-PS: Secure key agreement protocol using physiological signals. Ad Hoc Netw. 2019, 83, 111–124. [Google Scholar] [CrossRef]
- Konan, M.; Wang, W. A secure mutual batch authentication scheme for patient data privacy preserving in WBAN. Sensors 2019, 19, 1608. [Google Scholar] [CrossRef]
- Yao, X.; Liao, W.; Du, X.; Cheng, X.; Guizani, M. Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks. IEEE Internet Things J. 2019, 6, 10396–10407. [Google Scholar] [CrossRef]
- Saif, S.; Biswas, S. Secure Data Transmission Beyond Tier 1 of Medical Body Sensor Network. In Proceedings of the International Ethical Hacking Conference 2018; Springer: Singapore, 2019; p. 811. [Google Scholar]
- Xu, Z.; Xu, C.; Chen, H.; Yang, F. A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurr. Comput. Pract. Exp. 2019, 31, e5295. [Google Scholar] [CrossRef]
- Choi, S.; Shin, S.; Jin, X.; Shin, S. Secure and low computation authentication protocol for Wireless Body Area Network with ECC and 2D hash chain. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Gwangju, Korea, 13–16 October 2020; pp. 130–135. [Google Scholar]
- Voigt, T.; Yan, W.; Joseph, L.; Hylamia, S.; Asan, N.B.; Mani, M.; Mandal, B.; Perez, M.; Augustine, R. Jamming to Support Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals. In Proceedings of the 1st International Workshop on Physical-Layer Augmented Security for Sensor Systems, Virtual Event, Japan, 16–19 November 2020; pp. 1–2. [Google Scholar]
- Jabeen, T.; Ashraf, H.; Khatoon, A.; Band, S.S.; Mosavi, A. A Lightweight Genetic Based Algorithm for Data Security in Wireless Body Area Networks. IEEE Access 2020, 8, 183460–183469. [Google Scholar] [CrossRef]
- Jegadeesan, S.; Azees, M.; Babu, N.R.; Subramaniam, U.; Almakhles, J.D. EPAW: Efficient Privacy Preserving Anonymous Mutual Authentication Scheme for Wireless Body Area Networks (WBANs). IEEE Access 2020, 8, 48576–48586. [Google Scholar] [CrossRef]
- Jouini, O.; Sethom, K. Physical Layer Security Proposal for Wireless Body Area Networks. In Proceedings of the 2020 IEEE 5th Middle East and Africa Conference on Biomedical Engineering (MECBME), Amman, Jordan, 27–29 October 2020. [Google Scholar]
- Zhao, K.; Sun, D.; Ren, G.; Zhang, Y. Public Auditing Scheme with Identity Privacy Preserving Based on Certificateless Ring Signature for Wireless Body Area Networks. IEEE Access 2020, 8, 41975–41984. [Google Scholar] [CrossRef]
- Hameed, M.E.; Ibrahim, M.M.; Manap, N.A.; Mohammed, A.A. A lossless compression and encryption mechanism for remote monitoring of ECG data using Huffman coding and CBC-AES. Future Gener. Comput. Syst. 2020, 111, 829–840. [Google Scholar] [CrossRef]
- Liu, X.; Wang, Z.; Ye, Y.; Li, F. An efficient and practical certificateless signcryption scheme for wireless body area networks. Comput. Commun. 2020, 162, 169–178. [Google Scholar] [CrossRef]
- Mahendran, R.K.; Velusamy, P. A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Comput. Commun. 2020, 153, 545–552. [Google Scholar] [CrossRef]
- Qiu, H.; Qiu, M.; Lu, Z. Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 2020, 55, 59–67. [Google Scholar] [CrossRef]
- Saba, T.; Haseeb, K.; Ahmed, I.; Rehman, A. Secure and energy-efficient framework using Internet of Medical Things for e-healthcare. J. Infect. Public Health 2020, 13, 1567–1575. [Google Scholar] [CrossRef]
- Shuai, M.; Liu, B.; Yu, N.; Xiong, L.; Wang, C. Efficient and privacy-preserving authentication scheme for wireless body area networks. J. Inf. Secur. Appl. 2020, 52, 102499. [Google Scholar] [CrossRef]
- Sowjanya, K.; Dasgupta, M. A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC. J. Inf. Secur. Appl. 2020, 54, 102559. [Google Scholar] [CrossRef]
- Wang, J.; Han, K.; Fan, S.; Zhang, Y.; Tan, H.; Jeon, G.; Pang, Y.; Lin, J. A logistic mapping-based encryption scheme for Wireless Body Area Networks. Future Gener. Comput. Syst. 2020, 110, 57–67. [Google Scholar] [CrossRef]
- Wang, W.; Qin, T.; Wang, Y. Encryption-free data transmission and hand-over in two-tier body area networks. Comput. Methods Programs Biomed. 2020, 192, 105411. [Google Scholar] [CrossRef]
- Chatterjee, K. An Improved Authentication Protocol for Wireless Body Sensor Networks Applied in Healthcare Applications. Wirel. Pers. Commun. 2020, 111, 2605–2623. [Google Scholar] [CrossRef]
- Dakhel, M.; Hassan, S. A Secure Wireless Body Area Network for E-Health Application Using Blockchain. In International Conference on Applied Computing to Support Industry: Innovation and Technology; Springer: Cham, Switzerland, 2020; pp. 395–408. [Google Scholar]
- Iqbal, J.; Waheed, A.; Zareei, M.; Umar, A.I.; Amin, N.U.; Aldosary, A.; Mohamed, E.M. A lightweight and secure attribute-based multi receiver generalized signcryption scheme for body sensor networks. IEEE Access 2020, 8, 200283–200304. [Google Scholar] [CrossRef]
- Xiao, L.; Han, D.; Meng, X.; Liang, W.; Li, K.C. A Secure Framework for Data Sharing in Private Blockchain-Based WBANs. IEEE Access 2020, 8, 153956–153968. [Google Scholar] [CrossRef]
- Ding, Y.; Xu, H.; Wang, Y. Group Authentication for Sensors in Wireless Body Area Network. Security, Privacy, and Anonymity in Computation, Communication, and Storage. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage; Springer: Cham, Switzerland, 2020; Volume 2021, p. 12383. [Google Scholar]
- Shuai, M.; Xiong, L.; Wang, C.; Yu, N. Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs. IET Inf. Secur. 2020, 14, 380–390. [Google Scholar] [CrossRef]
- Chen, G.; Liu, X.; Shorfuzzaman, M.; Karime, A.; Wang, Y.; Qi, Y. MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs. ACM Trans. Internet Technol. 2021, 22, 1–17. [Google Scholar] [CrossRef]
- Jiang, Z.; Liu, W.; Ma, R.; Shirazi, S.H.; Xie, Y. Lightweight Healthcare Wireless Body Area Network Scheme with Amplified Security. IEEE Access 2021, 9, 125739–125752. [Google Scholar] [CrossRef]
- Morales-Sandoval, M.; De-La-Parra-Aguirre, R.; Galeana-Zapién, H.; Galaviz-Mosqueda, A. A Three-Tier Approach for Lightweight Data Security of Body Area Networks in E-Health Applications. IEEE Access 2021, 9, 146350–146365. [Google Scholar] [CrossRef]
- Amudha, S.; Murali, M. DESD-CAT inspired algorithm for establishing trusted connection in energy efficient FoG-BAN networks. Mater. Today Proc. 2021. [Google Scholar] [CrossRef]
- Izza, S.; Benssalah, M.; Drouiche, K. An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J. Inf. Secur. Appl. 2021, 58, 102705. [Google Scholar] [CrossRef]
- Mohit, P. An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring. J. Inf. Secur. Appl. 2021, 63, 102992. [Google Scholar] [CrossRef]
- Sharmila, A.H.; Jaisankar, N. Edge Intelligent Agent Assisted Hybrid Hierarchical Blockchain for continuous healthcare monitoring & recommendation system in 5G WBAN-IoT. Comput. Netw. 2021, 200, 108508. [Google Scholar]
- Kumar, A.; Singh, K.; Khan, T. L-RTAM: Logarithm based reliable trust assessment model for WBSNs. J. Discrete Math. Sci. Cryptogr. 2021, 24, 1701–1716. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, F. An Efficient Certificate-based Data Integrity Auditing protocol for Cloud-Assisted WBANs. IEEE Internet Things J. 2021, 9, 11513–11523. [Google Scholar] [CrossRef]
- Liu, Q.; Mkongwa, K.G.; Zhang, C.; Wang, S. A simple cross-layer mechanism for congestion control and performance enhancement in a localized multiple wireless body area networks. J. Ambient. Intell. Humaniz. Comput. 2021, 1–18. [Google Scholar] [CrossRef]
- Noor, F.; Kordy, T.A.; Alkhodre, A.B.; Benrhouma, O.; Nadeem, A.; Alzahrani, A. Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption. Wirel. Commun. Mob. Comput. 2021, 2021, 5986469. [Google Scholar] [CrossRef]
- Zhang, X.; Zhao, J.; Xu, C.; Li, H.; Wang, H.; Zhang, Y. CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs against Malicious Auditors. IEEE Trans. Cloud Comput. 2021, 9, 1362–1375. [Google Scholar] [CrossRef]
- Nidhya, R.; Shanthi, S.; Kumar, M. A Novel Encryption Design for Wireless Body Area Network in Remote Healthcare System Using Enhanced RSA Algorithm. In Intelligent System Design; Springer: Singapore, 2021. [Google Scholar]
- Sudha, R. An Emerging Trust-Based Security on Wireless Body Area Network. In Sustainable Communication Networks and Application; Springer: Singapore, 2021. [Google Scholar]
- Shanmugavadivel, G.; Gomathy, B.; Ramesh, S.M. An Enhanced Data Security and Task Flow Scheduling in Cloud-enabled Wireless Body Area Network. Wirel. Pers. Commun. 2021, 120, 849–867. [Google Scholar] [CrossRef]
- Zhang, S.; Zhuang, Y.; Cao, Z. Intelligent Medical Security Framework of Body Area Network Based on Fog Computing. Security, Privacy, and Anonymity in Computation, Communication, and Storage. In International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage; Springer: Cham, Switzerland, 2020; Volume 2021, p. 12382. [Google Scholar]
- Chunka, C.; Banerjee, S. An Efficient Mutual Authentication and Symmetric Key Agreement Scheme for Wireless Body Area Network. Arab. J. Sci. Eng. 2021, 46, 8457–8473. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, Y.; Peng, Z. A novel and efficient anonymous authentication for WBANs. Internet Technol. Lett. 2021, e304. [Google Scholar] [CrossRef]
- Ramadoss, J. Body sensor network encryption and team user authentication scheme based on electrocardiogram detector. Int. J. Commun. Syst. 2021, 34, e5002. [Google Scholar] [CrossRef]
- Hussain, S.J.; Irfan, M.; Jhanjhi, Z.N.; Hussain, K.; Humayun, M. Performance enhancement in wireless body area networks with secure communication. Wirel. Pers. Commun. 2021, 116, 1–22. [Google Scholar] [CrossRef]
- Aadil, F.; Mehmood, B.; Ul Hasan, N.; Lim, S.; Ejaz, S.; Zaman, N. Remote health monitoring using IoT-based smart wireless body area network. CMC-Comput. Mater. Contin. 2021, 68, 2499–2513. [Google Scholar] [CrossRef]
- Hamid, B.; Jhanjhi, N.; Humayun, M.; Khan, A.; Alsayat, A. Cyber Security Issues and Challenges for Smart Cities: A survey. In Proceedings of the 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 14–15 December 2019; pp. 1–7. [Google Scholar] [CrossRef]
Database Resource | Initial Search | First Stage | Second Stage | Third Stage | Fourth Stage |
---|---|---|---|---|---|
Science Direct | 1662 | 57 | 57 | 49 | 18 |
IEEE Xplore | 717 | 62 | 58 | 58 | 16 |
Wiley | 488 | 39 | 14 | 8 | 5 |
Scopus | 4425 | 177 | 158 | 136 | 18 |
Springer | 3245 | 194 | 129 | 48 | 8 |
ACM Digital Library | 334 | 19 | 17 | 17 | 8 |
Total | 10,871 | 548 | 433 | 321 | 73 |
EC # | Criteria |
---|---|
For Academic Literature: conduct the research | |
EC1 | have well-defined research objectives? |
EC2 | describe the problem considered by the security solution? |
EC3 | illustrate the security solution? |
For Grey Literature: conduct the study | |
EC4 | obtained from a trustworthy publishing institution? |
EC5 | have a clearly stated date? |
EC6 | present the background where the security solution is used? |
EC7 | provide the problem addressed by the security solution? |
RQ | Data Field | Definition | Origin |
---|---|---|---|
ID | Code (“A” for academic literature and “G” for grey literature), along with serial numbers starting at 1 | ALR/GLR | |
Title | Title of study | ALR/GLR | |
Type | Publication type (journal, conference) | ALR | |
Date | Year of article publication | ALR/GLR | |
URL | URL of publication | GLR | |
Publisher | Source of publication (company, communication, community, blog, thesis/dissertation) | GLR | |
Contribution type | The report, blog post, presentation, white paper, video, audio | GLR | |
RQ1 | Articles frequency | number of publications per year | ALR/GLR |
RQ2 | Methodology | Literature type (evaluation, validation, novel solution, opinion paper, personal experience) Verification type (case study, simulation, performance analysis, descriptive examples, not mentioned) Methodological approach (block structure, logic, sequence diagram, class diagram, formation diagram, use case model, text only, code, proper analysis) | ALR/GLR |
RQ3 | Categories of Security solutions | Security mechanism reported in the studies analyzed Security scope: Focus of an analysis study | ALR/GLR |
RQ4 | Security domains | Prevention, mitigation, detection, recovery | ALR/GLR |
ID | Year | Title | Type | URL |
---|---|---|---|---|
G1 | 2017 | IoT Technology Innovations in Healthcare | Community | https://bit.ly/3srScKF |
G2 | 2017 | Addressing Security Issues in Connected Healthcare | Community | https://bit.ly/3GAtLQ7 |
G3 | 2018 | Telemedicine privacy risks and security considerations | Company | https://bit.ly/3ozCtIy |
G4 | 2018 | Telehealth Security: Protect Patient Information and Your Practice | Blog | https://bit.ly/3Ba0WJp |
G5 | 2018 | Securing Telehealth Remote Patient Monitoring Ecosystem | Community | https://bit.ly/3rAYOqK |
G6 | 2019 | Enabling covert body-area network using electro-quasistatic human body communication | Community | https://bit.ly/3BfRWCv |
G7 | 2019 | Scientists Design a Network That Lives Inside Your Body | Company | https://bit.ly/33difgc |
G8 | 2019 | Standardizing Smart Body Area Networks | Company | https://bit.ly/3LdK5tI |
G9 | 2019 | Making the ‘human-body Internet’ more effective | Blog | https://bit.ly/3379gNo |
G10 | 2019 | Low Power Network for Wireless Body Sensors | Community | https://bit.ly/3HKFugI |
G11 | 2019 | Securing Telehealth Remote Patient Monitoring Ecosystem | Company | https://bit.ly/3uJrD6i |
G12 | 2020 | Coronavirus challenges remote networking | Communication | https://bit.ly/3Bc0zOn |
G13 | 2020 | Turning the body into a wire | Blog | https://bit.ly/3uBZVII |
G14 | 2020 | Data Security: Telehealth’s Achilles Heel? | Company | https://bit.ly/3GAgJlN |
G15 | 2020 | The Privacy and security issues of expanding Telehealth | Blog | https://bit.ly/3sveriG |
G16 | 2020 | The Future of Care Is Telehealth, But Security Risks Could Slow Service Adoption | Blog | https://bit.ly/3rBdrdN |
G17 | 2020 | Monthly Healthcare News Roundup: The State of Healthcare Data Breaches in 2020 | Blog | https://bit.ly/3HFfmUn |
G18 | 2020 | Telehealth Privacy and Security | Community | https://bit.ly/3sl8QeM |
G19 | 2020 | Telehealth data breaches to worsen as adoption skyrockets | Communication | https://zd.net/3oCiLvs |
G20 | 2021 | Beyond Wearable Devices: Internet of Bodies (IoB) | Blog | https://bit.ly/3uxGPDH |
G21 | 2021 | Next-Generation Cardiac Wearables and Implantable Will Integrate into WBSN | Communication | https://bit.ly/3uCovtc |
G22 | 2021 | Wearable patch could predict the risk of stroke and heart attacks | Communication | https://bit.ly/3Je3skF |
G23 | 2021 | Apple watch series seven might come with body temperature monitor, Glicose sensors | Communication | https://bit.ly/35PimPM |
G24 | 2021 | Wearables, Body Sensor Networks, Smart Portable Devices | Blog | https://bit.ly/3LifECJ |
G25 | 2021 | Global Body Area Network Market (2021 to 2030) | Blog | https://bit.ly/361bPSk |
G26 | 2021 | Researchers discover how to stick sensors to skin without adhesive | Community | https://bit.ly/3JiM4LH |
G27 | 2021 | This Implant Could One Day Control Your Sleep and Wake Cycles | Communication | https://bit.ly/3JiM5iJ |
G28 | 2021 | Securing Telehealth Remote Patient Monitoring Ecosystem | Company | https://bit.ly/3GBLx5J |
G29 | 2021 | Blockchain in Telemedicine | Community | https://bit.ly/3gAn99T |
G30 | 2021 | Ensuring the cyber security of telehealth | Blog | https://bit.ly/3HCh7BK |
Year | ID | References |
---|---|---|
2017 | A1, A2, A3, A4, A5, A6, A7, A8 | [30,31,32,33,34,35,36,37] |
2018 | A9, A10, A11, A12, A13, A14, A15, A16, A17, A18, A19, A20, A21, A22, A23, A24 | [38,39,40,41,42,43,44,45,46,47,48,49,50,51,52] |
2019 | A25, A26, A27, A28, A29, A30, A31, A32 | [53,54,55,56,57,58,59,60,61] |
2020 | A33, A34, A35, A36, A37, A38, A39, A40, A41, A42, A43, A44, A45, A46, A47, A48, A49, A50, A51, A52, A53, A54 | [62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82] |
2021 | A55, A56, A57, A58, A59, A60, A61, A62, A63, A64, A65, A67, A68, A69, A70, A71, A72, A73 | [83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sama, N.U.; Zen, K.; Humayun, M.; Jhanjhi, N.Z.; Rahman, A.U. Security in Wireless Body Sensor Network: A Multivocal Literature Study. Appl. Syst. Innov. 2022, 5, 79. https://doi.org/10.3390/asi5040079
Sama NU, Zen K, Humayun M, Jhanjhi NZ, Rahman AU. Security in Wireless Body Sensor Network: A Multivocal Literature Study. Applied System Innovation. 2022; 5(4):79. https://doi.org/10.3390/asi5040079
Chicago/Turabian StyleSama, Najm Us, Kartinah Zen, Mamoona Humayun, Noor Zaman Jhanjhi, and Atiq Ur Rahman. 2022. "Security in Wireless Body Sensor Network: A Multivocal Literature Study" Applied System Innovation 5, no. 4: 79. https://doi.org/10.3390/asi5040079
APA StyleSama, N. U., Zen, K., Humayun, M., Jhanjhi, N. Z., & Rahman, A. U. (2022). Security in Wireless Body Sensor Network: A Multivocal Literature Study. Applied System Innovation, 5(4), 79. https://doi.org/10.3390/asi5040079