Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz
{"title":"Mitigation of Wireless Body Area Networks Challenges using Cooperation","authors":"Zeeshan Haider, Tauseef Jamal, M. Asam, S. A. Butt, A. Ajaz","doi":"10.33832/ijsia.2020.14.1.02","DOIUrl":null,"url":null,"abstract":"— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33832/ijsia.2020.14.1.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
— The degradation of an adequate medical facilities for safety and healthy human atmosphere motivated researchers to think more generously to provide a smart solution in medical applications. Wireless body area network (WBAN) is one of the potential platform to cope up to the needs of prevailing medical demands and challenges. In the literature, WBAN is a femto-network (ranges up to few meters) formation around a human body for sensing, transmission and reception functionality. These functionalities are executed using various modes by placement of sensors node on human posture or by injecting inside of the human body. This mode of communication have various challenges when deployed in medical applications. Due to the critical nature of human physiological sensed data which demands a reliable and secure transmission, reception between sensors, intermediate and master node. This article outcomes are two fold, first is the state of art challenges of WBAN and the need of the ultimate smart solution for safe and reliable communication in Wireless body area Networks. Secondly, using Cooperation techniques for mitigation of WBAN issues, proposed cooperative model is presented for reliable data transmission using an efficient network resource utilization mechanism.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security