A survey on the development of security mechanisms for body area networks

Karaoğlan Altop, Duygu and Levi, Albert (2014) A survey on the development of security mechanisms for body area networks. Computer Journal, 57 (10). pp. 1484-1512. ISSN 0010-4620 (Print) 1460-2067 (Online)

[thumbnail of The_Computer_Journal-2013-Karao_lan-comjnl_bxt077.pdf] PDF
Restricted to Repository staff only

Download (1MB) | Request a copy


Advances in lightweight, small-sized and low-power sensors led to the development of wearable biosensors, and thus, to the accurate monitoring of human periphery. On top of this, pervasive computing has been improved and technologies have been matured enough to build plug-and-play body area networks (BANs). In a BAN, the main functionality of a node is to effectively and efficiently collect data from vital body parts, share it with the neighbors and make decisions accordingly. Because of the fact that the captured phenomenon is highly sensitive to privacy breaches in addition to being transmitted using the wireless communication medium, BANs require a security infrastructure. However, due to the extreme energy scarcity, bandwidth and storage constraints of the nodes, conventional solutions are inapplicable. In this survey, we present an overview of BANs and provide a detailed investigation into the developed security infrastructures. We examined the literature and combined the corresponding proposals under two major classes: (i) pure-cryptographic security mechanisms and (ii) bio-cryptographic security mechanisms. Pure-cryptographic methods include constructions based on the well-known symmetric or asymmetric cryptography primitives and they are suitable for securing the communication between any two network entities. On the other hand, bio-cryptographic methods benefit from the network's context-awareness and to the best of our knowledge, they have been utilized only for the communication among the biosensors.
Item Type: Article
Uncontrolled Keywords: body area networks, security mechanisms, elliptic curve cryptography, bio-cryptography, fuzzy commitment, fuzzy vault
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Albert Levi
Date Deposited: 21 Jan 2014 21:53
Last Modified: 07 May 2021 13:37
URI: https://research.sabanciuniv.edu/id/eprint/22805

Actions (login required)

View Item
View Item