{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T08:31:08Z","timestamp":1778056268735,"version":"3.51.4"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_8","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"201-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Preventing Security and Privacy Attacks in WBANs"],"prefix":"10.1007","author":[{"given":"Avani","family":"Vyas","sequence":"first","affiliation":[]},{"given":"Sujata","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat, V., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423\u2013441.","journal-title":"Telecommunication Systems"},{"issue":"12","key":"8_CR2","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1109\/TIFS.2014.2357998","volume":"9","author":"S T Ali","year":"2014","unstructured":"Ali, S. T., Sivaraman, V., Ostry, D., Tsudik, G., & Jha, S. (2014). Securing first-hop data provenance for bodyworn devices using wireless link fingerprints. IEEE Transactions on Information Forensics and Security, 9(12), 2193\u20132204.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"S Al-Janabi","year":"2017","unstructured":"Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal, 18(2), 113\u2013122.","journal-title":"Egyptian Informatics Journal"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1109\/EMBC.2015.7318632","volume-title":"2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","author":"G Athanasiou","year":"2015","unstructured":"Athanasiou, G., Fengou, M. A., Beis, A., & Lymberopoulos, D. (2015). A trust assessment mechanism for ubiquitous healthcare environment employing cloud theory. In 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) (pp. 1405\u20131408). Piscataway: IEEE."},{"key":"8_CR5","volume-title":"Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography","author":"E Barker","year":"2006","unstructured":"Barker, E., Johnson, D., & Smid, M. (2006). Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. National Institute of Standards and Technology."},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/JSAC.2009.090504","volume":"27","author":"A Boukerche","year":"2009","unstructured":"Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387\u2013399.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"9","key":"8_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/s10916-014-0112-3","volume":"38","author":"C L Chen","year":"2014","unstructured":"Chen, C. L., Yang, T. T., & Shih, T. F. (2014). A secure medical data exchange protocol based on cloud environment. Journal of Medical Systems, 38(9), 112.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/JBHI.2014.2366125","volume":"20","author":"R Dautov","year":"2016","unstructured":"Dautov, R., & Tsouri, G. R. (2016). Securing while sampling in wireless body area networks with application to electrocardiography. IEEE Journal of Biomedical and Health Informatics, 20(1), 135\u2013142.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"4","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"D L Donoho","year":"2006","unstructured":"Donoho, D. L. (2006). Compressed sensing. IEEE Transactions on Information Theory, 52(4), 1289\u20131306.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"8_CR10","first-page":"137","volume":"21","author":"I Ekeland","year":"1998","unstructured":"Ekeland, I. (1998). What is chaos theory? Review (Fernand Braudel Center), 21(2), 137\u2013150. \nhttp:\/\/www.jstor.org\/stable\/40241422","journal-title":"Review (Fernand Braudel Center)"},{"key":"8_CR11","unstructured":"Finkle, J. (2016). J&J warns diabetic patients: Insulin pump vulnerable to hacking. Reuters Published October 4"},{"key":"8_CR12","first-page":"405","volume-title":"IEEE International Conference on Communication Software and Networks (ICCSN)","author":"Y Gao","year":"2015","unstructured":"Gao, Y., & Liu, W. (2015). A security routing model based on trust for medical sensor networks. In IEEE International Conference on Communication Software and Networks (ICCSN) (pp. 405\u2013408). Piscataway: IEEE."},{"key":"8_CR13","unstructured":"Goode, L. (2013). Comparing wearables: Fitbit flex vs. jawbone up and more. \nhttp:\/\/allthingsd.com\/20130715\/fitbit-flex-vs-jawbone-up-and-more-a-wearables-comparison\/"},{"key":"8_CR14","volume-title":"Apple watch\u2019s update adds heart-monitoring capabilities","author":"L Goode","year":"2018","unstructured":"Goode, L. (2018). Apple watch\u2019s update adds heart-monitoring capabilities. \nhttps:\/\/www.wired.com\/story\/apple-watch-series-4\/"},{"key":"8_CR15","volume-title":"Computer and cyber security: Principles, Algorithm, applications, and perspectives","author":"B B Gupta","year":"2018","unstructured":"Gupta, B. B. (2018). Computer and cyber security: Principles, Algorithm, applications, and perspectives. Boca Raton: CRC Press."},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/SP.2008.31","volume-title":"IEEE Symposium on Security and Privacy, SP 2008","author":"D Halperin","year":"2008","unstructured":"Halperin, D., Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., et al. (2008). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, SP 2008 (pp. 129\u2013142). Piscataway: IEEE."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"M S Hossain","year":"2018","unstructured":"Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596\u2013606.","journal-title":"Future Generation Computer Systems"},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/9780470545287","volume-title":"Microwave mobile communications","author":"W C Jakes","year":"1994","unstructured":"Jakes, W. C., & Cox, D. C. (1994). Microwave mobile communications. Piscataway: IEEE Press."},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-36169-2_6","volume-title":"Wireless networks and security","author":"S S Javadi","year":"2013","unstructured":"Javadi, S. S., & Razzaque, M. (2013). Security and privacy in wireless body area networks for health care applications. In Wireless networks and security (pp. 165\u2013187). Berlin: Springer."},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.tele.2017.09.008","volume":"35","author":"N Kaur","year":"2018","unstructured":"Kaur, N., & Sood S. K. (2018). A trustworthy system for secure access to patient centric sensitive information. Telematics and Informatics, 35(4), 790\u2013800.","journal-title":"Telematics and Informatics"},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1109\/JSYST.2014.2345912","volume":"9","author":"S Kraounakis","year":"2015","unstructured":"Kraounakis, S., Demetropoulos, I. N., Michalas, A., Obaidat, M. S., Sarigiannidis, P. G., & Louta, M. D. (2015). A robust reputation-based computational model for trust establishment in pervasive systems. IEEE Systems Journal, 9(3), 878\u2013891.","journal-title":"IEEE Systems Journal"},{"issue":"5","key":"8_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10916-016-0474-9","volume":"40","author":"C T Li","year":"2016","unstructured":"Li, C. T., Lee, C. C., & Weng, C. Y. (2016). A secure cloud-assisted wireless body area network in mobile emergency medical care system. Journal of Medical Systems, 40(5), 117.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communications, 17(1), 51\u201358.","journal-title":"IEEE Wireless Communications"},{"issue":"6","key":"8_CR24","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/JIOT.2017.2761700","volume":"4","author":"Z Li","year":"2017","unstructured":"Li, Z., Wang, H., & Fang, H. (2017). Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet of Things Journal, 4(6), 1955\u20131963.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"8_CR25","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., & Kwak, K. S. (2014). Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Transactions on Parallel and Distributed Systems, 25(2), 332\u2013342.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2017.04.039","volume":"83","author":"V A Memos","year":"2018","unstructured":"Memos, V. A., Psannis, K. E., Ishibashi, Y., Kim, B. G., & Gupta, B. B. (2018). An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Future Generation Computer Systems, 83, 619\u2013628.","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"8_CR27","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TIFS.2016.2566446","volume":"11","author":"H Moosavi","year":"2016","unstructured":"Moosavi, H., & Bui, F. M. (2016). Delay-aware optimization of physical layer security in multi-hop wireless body area networks. IEEE Transactions on Information Forensics and Security, 11(9), 1928\u20131939.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"8_CR28","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless body area networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1658\u20131686.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"8_CR29","first-page":"395","volume-title":"IEEE 3rd Global Conference on Consumer Electronics (GCCE)","author":"H Niu","year":"2014","unstructured":"Niu, H., Sun, L., Ito, M., & Sezaki, K. (2014). Secure transmission through multihop relaying in wireless body area networks. In IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 395\u2013396). Piscataway: IEEE."},{"issue":"3","key":"8_CR30","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/TBCAS.2017.2665659","volume":"11","author":"H Peng","year":"2017","unstructured":"Peng, H., Tian, Y., Kurths, J., Li, L., Yang, Y., & Wang, D. (2017). Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Transactions on Biomedical Circuits and Systems, 11(3), 558\u2013573.","journal-title":"IEEE Transactions on Biomedical Circuits and Systems"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"A P Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor big data collection\u2013processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349\u2013357.","journal-title":"Future Generation Computer Systems"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"4875","DOI":"10.1109\/ACCESS.2018.2793851","volume":"6","author":"M Rani","year":"2018","unstructured":"Rani, M., Dhok, S., & Deshmukh, R. (2018). A systematic review of compressive sensing: Concepts, implementations and applications. IEEE Access, 6, 4875\u20134894.","journal-title":"IEEE Access"},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"J Shen","year":"2018","unstructured":"Shen, J., Chang, S., Shen, J., Liu, Q., & Sun, X. (2018). A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems, 78, 956\u2013963.","journal-title":"Future Generation Computer Systems"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Shi, L., Li, M., & Yu, S. (2012). BANA: Body area network authentication exploiting channel characteristics. In 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec\u201912).","DOI":"10.1145\/2185448.2185454"},{"issue":"9","key":"8_CR35","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/JSAC.2013.130913","volume":"31","author":"L Shi","year":"2013","unstructured":"Shi, L., Li, M., Yu, S., & Yuan, J. (2013). BANA: Body area network authentication exploiting channel characteristics. IEEE Journal on Selected Areas in Communications, 31(9), 1803\u20131816.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"8_CR36","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1930","volume":"27","author":"C Stergiou","year":"2017","unstructured":"Stergiou, C., & Psannis, K. E. (2017). Recent advances delivered by mobile cloud computing and internet of things for big data applications: A survey. International Journal of Network Management, 27(3), e1930.","journal-title":"International Journal of Network Management"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"key":"8_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.027","volume-title":"Security, privacy and trust of different layers in internet-of-things (IoTs) framework","author":"A Tewari","year":"2018","unstructured":"Tewari, A., & Gupta, B. (2018). Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future Generation Computer Systems"},{"issue":"12","key":"8_CR39","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"J A Tropp","year":"2007","unstructured":"Tropp, J. A., & Gilbert, A. C. (2007). Signal recovery from random measurements via orthogonal matching pursuit. IEEE Transactions on Information Theory, 53(12), 4655\u20134666.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"8_CR40","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.2337\/dci18-0002","volume":"41","author":"G E Umpierrez","year":"2018","unstructured":"Umpierrez, G. E., & Klonoff, D. C. (2018). Diabetes technology update: Use of insulin pumps and continuous glucose monitoring in the hospital. Diabetes Care, 41(8), 1579\u20131589.","journal-title":"Diabetes Care"},{"issue":"1","key":"8_CR41","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/TITB.2009.2037617","volume":"14","author":"K K Venkatasubramanian","year":"2010","unstructured":"Venkatasubramanian, K. K., Banerjee, A., & Gupta, S. K. S. (2010). PSKA: Usable and secure key agreement scheme for body area networks. IEEE Transactions on Information Technology in Biomedicine, 14(1), 60\u201368.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"4","key":"8_CR42","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1777406.1777410","volume":"6","author":"K K Venkatasubramanian","year":"2010","unstructured":"Venkatasubramanian, K. K., & Gupta, S. K. (2010). Physiological value-based efficient usable security solutions for body sensor networks. ACM Transactions on Sensor Networks, 6(4), 31.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"8_CR43","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.comnet.2018.07.005","volume":"143","author":"J Wang","year":"2018","unstructured":"Wang, J., Han, K., Alexandridis, A., Zilic, Z., Pang, Y., Wu, W., et al. (2018). A novel security scheme for body area networks compatible with smart vehicles. Computer Networks, 143, 74\u201381.","journal-title":"Computer Networks"},{"issue":"11","key":"8_CR44","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/s10916-015-0331-2","volume":"39","author":"C Wang","year":"2015","unstructured":"Wang, C., & Zhang, Y. (2015). New authentication scheme for wireless body area networks using the bilinear pairing. Journal of Medical Systems, 39(11), 136.","journal-title":"Journal of Medical Systems"},{"key":"8_CR45","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JIOT.2018.2844727","volume":"6","author":"L Wang","year":"2018","unstructured":"Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet of Things Journal, 6, 1402\u20131409.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"8_CR46","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z. (2014). An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. Journal of Medical Systems, 38(2), 13.","journal-title":"Journal of Medical Systems"},{"key":"8_CR47","doi-asserted-by":"publisher","first-page":"4789","DOI":"10.1109\/ACCESS.2016.2602286","volume":"4","author":"N Zhao","year":"2016","unstructured":"Zhao, N., Ren, A., Rehman, M. U., Zhang, Z., Yang, X., & Hu, F. (2016). Biometric behavior authentication exploiting propagation characteristics of wireless channel. IEEE Access, 4, 4789\u20134796.","journal-title":"IEEE Access"},{"issue":"5","key":"8_CR48","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1049\/iet-ifs.2016.0261","volume":"11","author":"C Zhou","year":"2016","unstructured":"Zhou, C., & Cui, Z. (2016). Certificate-based signature scheme in the standard model. IET Information Security, 11(5), 256\u2013260.","journal-title":"IET Information Security"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:04:01Z","timestamp":1577793841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_8","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}