{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:43:07Z","timestamp":1770349387108,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s12652-020-02728-y","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T14:02:38Z","timestamp":1609596158000},"page":"9841-9854","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["A survey on healthcare data security in wireless body area networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Tallat","family":"Jabeen","sequence":"first","affiliation":[]},{"given":"Humaira","family":"Ashraf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3603-1709","authenticated-orcid":false,"given":"Ata","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"issue":"2","key":"2728_CR1","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"S Al-Janabi","year":"2016","unstructured":"Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S (2016) Survey of main challenges (security and privacy) in wireless body area network for Healthcare Application. Egypt Inform J 18(2):113\u2013122","journal-title":"Egypt Inform J"},{"issue":"4","key":"2728_CR2","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1108\/09685220510614443","volume":"13","author":"A Alsaid","year":"2005","unstructured":"Alsaid A, Mitchell CJ (2005) Dynamic content attacks on digital signatures. Inform Manag Comput Secur 13(4):328\u2013336","journal-title":"Inform Manag Comput Secur"},{"key":"2728_CR3","doi-asserted-by":"crossref","unstructured":"Alshamsi AZ, Barka E (2017) Implementation of energy efficient\/lightweight encryption algorithm for wireless body area networks. In: International Conference on Informatics, Health & Technology (ICIHT), p 7","DOI":"10.1109\/ICIHT.2017.7899139"},{"issue":"2","key":"2728_CR5","first-page":"1","volume":"23","author":"M Anwar","year":"2018","unstructured":"Anwar M, Abdullah AH, Butt RA, Ashraf MW, Qureshi KN, Ullah F (2018) Securing data communication in wireless body area networks using digital signatures. Tech J Univ Eng Technol (UET) Taxila Pak 23(2):1\u20136","journal-title":"Tech J Univ Eng Technol (UET) Taxila Pak"},{"key":"2728_CR6","first-page":"1","volume":"14","author":"P Bhattacharya","year":"2019","unstructured":"Bhattacharya P, Tanwar S, Bodkhe U, Tyagi S, Kumar N (2019) BinDaaS: blockchain-based deep-learning as-a-service in healthcare 4.0 applications. IEEE Trans 14:1","journal-title":"IEEE Trans"},{"key":"2728_CR7","doi-asserted-by":"crossref","unstructured":"Chowdhury FS (2018) An implementation of a lightweight end-to-end secured communication system for patient monitoring system 5","DOI":"10.1109\/EDCT.2018.8405076"},{"key":"2728_CR8","unstructured":"Econsultancy (2019). The next decade may well see a revolution in the treatment and diagnosis of disease. Xeim, United Kingdom"},{"key":"2728_CR9","first-page":"10","volume-title":"Intelligent communication control and devices","author":"S Farooq","year":"2018","unstructured":"Farooq S, Prashar D, Jyoti K (2018) Hybrid encryption algorithm in wireless body area network (WBAN). In: Rajesh S, Sushabhan C, Anita G (eds) Intelligent communication control and devices. Springer Nature, Singapore, p 10"},{"key":"2728_CR10","doi-asserted-by":"crossref","unstructured":"Gowtham M (2017) Privacy enhanced data communication protocol for wireless body area network. In: International Conference on Advanced Computing and Communication Systems (ICACCS -2017), Coimbatore, India, p. 5","DOI":"10.1109\/ICACCS.2017.8014671"},{"key":"2728_CR11","doi-asserted-by":"crossref","unstructured":"Gupta R, Tanwar S, Tyagi S, Kumar N, Obaidat MS, Sadoun B (2019). HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0. In: 2019 International Conference on Computer, Information and Telecommunication Systems (CITS). Beijing, China, 28\u201331 Aug 2019","DOI":"10.1109\/CITS.2019.8862127"},{"issue":"3","key":"2728_CR12","first-page":"16","volume":"11","author":"P Haipeng","year":"2017","unstructured":"Haipeng P, Ye T, Jurgen K, Lixiang L, Yixian Y, Daoshun W (2017) Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Trans Biomed Circuits Syst 11(3):16","journal-title":"IEEE Trans Biomed Circuits Syst"},{"key":"2728_CR13","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.future.2020.01.052","volume":"107","author":"K Hasan","year":"2020","unstructured":"Hasan K, Ahmed K, Biswas K, Islam MS, Sianaki OA (2020) Software-defined application-specific traffic management for wireless body area networks. Future Gener Comput Syst 107:274\u2013285","journal-title":"Future Gener Comput Syst"},{"key":"2728_CR14","doi-asserted-by":"crossref","unstructured":"Hathaliya J, Sharma P, Tanwar S, Gupta R (2019) Blockchain-based remote patient monitoring in healthcare 4.0. In: 2019 IEEE 9th International Conference on Advanced Computing (IACC). Tiruchirappalli, India, 13\u201314 Dec, 2019","DOI":"10.1109\/IACC48062.2019.8971593"},{"key":"2728_CR15","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.comcom.2020.02.018","volume":"153","author":"JJ Hathaliya","year":"2020","unstructured":"Hathaliya JJ, Tanwar S (2020) An exhaustive survey on security and privacy issues in Healthcare 4.0. Comput Commun 153:311\u2013335","journal-title":"Comput Commun"},{"issue":"4","key":"2728_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2017","unstructured":"He D, Zeadally S, Kumar N, Lee J-H (2017) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 11(4):1\u201312","journal-title":"IEEE Syst J"},{"issue":"4","key":"2728_CR17","first-page":"13","volume":"9","author":"M Hussein","year":"2016","unstructured":"Hussein M, Bui FM (2016) Delay-aware optimization of physical layer security in multi-hop wireless body area networks. IEEE Trans Inf Forensics Secur 9(4):13","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2728_CR18","unstructured":"Khan M, Jilani MT, Khan MK, Ahmed MB (2017) A security framework for wireless body area network based smart healthcare system. In: Conference: International Conference for Young Researchers in Informatics, Mathematics and Engineering, ICYRIME 2017, (p 6). 80\u201387"},{"issue":"1","key":"2728_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2008","unstructured":"Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2008) Systematic literature reviews in software engineering\u2014a systematic literature review. Inf Softw Technol 51(1):7\u201315","journal-title":"Inf Softw Technol"},{"key":"2728_CR20","doi-asserted-by":"crossref","unstructured":"Li W, Zhu X (2016). BAN-Trust: an attack-resilient malicious node detection scheme for WBAN. In: International Conference on Computing, Networking and Communications (ICNC), (p. 5)","DOI":"10.1109\/ICCNC.2016.7440651"},{"issue":"6","key":"2728_CR21","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/JIOT.2017.2761700","volume":"4","author":"Z Li","year":"2017","unstructured":"Li Z, Wang H, Fang H (2017) Group-based cooperation on symmetric key generation for wireless body area networks. IEEE Internet Things J 4(6):1955\u20131963","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2728_CR23","first-page":"209","volume":"9","author":"MS Malik","year":"2018","unstructured":"Malik MS, Ahmed M, Abdullah T, Kousar N, Shumaila MN (2018a) Wireless body area network security and privacy issue in e-healthcare. Int J Adv Comput Sci Appl 9(4):209\u2013215","journal-title":"Int J Adv Comput Sci Appl"},{"key":"2728_CR24","unstructured":"Menezes J, Gusm\u00e3o C, Moura H (2018) Risk factors in software development projects: a systematic litrature review. Softw Qual J 1\u201326"},{"issue":"9","key":"2728_CR25","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TIFS.2016.2566446","volume":"11","author":"H Moosavi","year":"2016","unstructured":"Moosavi H, Bui FM (2016) Delay-aware optimization of physical layer security in multi-hop wireless body area networks. IEEE Trans Inf Forensics Secur 11(9):1928\u20131939","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2728_CR26","doi-asserted-by":"crossref","unstructured":"Mukhtar T, Chaudhary S (2016) Energy efficient cluster formation and secure data outsourcing using TEOSCC and ECDH-IBT technique in WBAN. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), (p. 17). Chennai, India","DOI":"10.1109\/WiSPNET.2016.7566204"},{"key":"2728_CR27","doi-asserted-by":"crossref","unstructured":"Narmadha T, Kalaiarasi M, Meenakshi M (2017) Lightweight secure ECG transmission in wireless body area networks\u2014PRESENT cipher based implementation. In: International Conference on Communication and Signal Processing,, (p. 5). India","DOI":"10.1109\/ICCSP.2017.8286538"},{"issue":"9","key":"2728_CR28","first-page":"1","volume":"6","author":"P Niksaz","year":"2015","unstructured":"Niksaz P (2015) Wireless body area networks: attacks and countermeasures. Int J Sci Eng Res 6(9):1\u201313","journal-title":"Int J Sci Eng Res"},{"issue":"43","key":"2728_CR29","first-page":"879","volume":"10","author":"C Okoli","year":"2010","unstructured":"Okoli C, Schabram K (2010) A guide to conducting a systematic literature review of information system research. SSRN Electron J 10(43):879\u2013210","journal-title":"SSRN Electron J"},{"key":"2728_CR30","doi-asserted-by":"crossref","unstructured":"Paul PC, Loane J, Regan G, McCaffery F (2019) Analysis of attacks and security requirements for wireless body area networks\u2014a systematic literature review. In: Walker A., O'Connor R., Messnarz R. (eds) Systems, Software and Services Process Improvement. EuroSPI 2019. Communications in Computer and Information Science. Springer, Cham, pp 439\u2013452","DOI":"10.1007\/978-3-030-28005-5_34"},{"key":"2728_CR31","unstructured":"Prameela S, Ponmuthuramalingam P (2016) A robust energy efficient and secure data dissemination protocol for wireless body area networks. In: International Conference on Advances in Computer Applications (ICACA), 978-1-5090-3770-4\/16\/$31.00\u00a92016 IEEE, p. 14. Coimbatore, India"},{"issue":"8","key":"2728_CR33","first-page":"2156","volume":"8","author":"ES Rana","year":"2019","unstructured":"Rana ES, Kang SS (2019) Implementation of biological key based security technique in wireless body area networks. Int J Innov Technol Explor Eng (IJITEE) 8(8):2156\u20132163","journal-title":"Int J Innov Technol Explor Eng (IJITEE)"},{"issue":"2","key":"2728_CR34","doi-asserted-by":"publisher","first-page":"64","DOI":"10.14419\/ijet.v7i2.20.11754","volume":"7","author":"C Rani","year":"2018","unstructured":"Rani C, Jagan L, Ch Harika L, Amara VD (2018) Light weight encryption algorithms for wireless body area network. Int J Eng Technol 7(2):64\u201366","journal-title":"Int J Eng Technol"},{"issue":"10","key":"2728_CR35","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.3390\/s19102395","volume":"19","author":"Y Ren","year":"2019","unstructured":"Ren Y, Leng Y, Zhu F, Wang J, Kim H-J (2019) Data storage mechanism based on blockchain with privacy protection in wireless body area network. Sensors 19(10):2395","journal-title":"Sensors"},{"key":"2728_CR36","doi-asserted-by":"crossref","unstructured":"Roy M, Chowdhury C, Kundu A (2017) Secure lightweight routing (SLR) strategy for wireless body area networks. In: IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), (p. 4). Bhubaneswar, India","DOI":"10.1109\/ANTS.2017.8384119"},{"key":"2728_CR37","doi-asserted-by":"crossref","unstructured":"Salehi SA, Razzaque M, Tomeo-Reyes I, Hussain N, Kaviani V (2016) Efficient high-rate key management technique for wireless body area networks. In: 22nd Asia-Pacific Conference on Communications (APCC). Yogyakarta, Indonesia","DOI":"10.1109\/APCC.2016.7581513"},{"issue":"5","key":"2728_CR38","doi-asserted-by":"crossref","first-page":"7","DOI":"10.46564\/ijraet.2020.v08i05.003","volume":"8","author":"A Sandhu","year":"2020","unstructured":"Sandhu A, Malik A (2020) PAP: priority aware protocol for healthcare application in wireless body area network. Int J Recent Technol Eng (IJRTE) 8(5):7","journal-title":"Int J Recent Technol Eng (IJRTE)"},{"key":"2728_CR39","doi-asserted-by":"crossref","unstructured":"Sawaneh IA, Sankoh I, Koroma DK (2017) A survey on security issues and wearable sensors in wireless body area network for healthcare system. In: 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), (p. 6). Chengdu, China","DOI":"10.1109\/ICCWAMTIP.2017.8301502"},{"key":"2728_CR40","doi-asserted-by":"crossref","unstructured":"Shayokh MA, Abeshu A, Satrya G, Nugroho MA (2016) Efficient and secure data delivery in software defined WBAN for virtual hospital. In: International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), (p. 5). Bandung, Indonesia","DOI":"10.1109\/ICCEREC.2016.7814973"},{"key":"2728_CR41","doi-asserted-by":"crossref","unstructured":"Shokeen S, Parkash D (2019) A systematic review of wireless body area network. In: International Conference on Automation, Computational and Technology Management (ICACTM), (p. 5). London, United Kingdom","DOI":"10.1109\/ICACTM.2019.8776847"},{"issue":"3","key":"2728_CR42","first-page":"431","volume":"5","author":"A Subbarayadu","year":"2016","unstructured":"Subbarayadu A, Radhika G, Vedhavathi R (2016) Survey secured data transmission from WBAN to sink. Int J Comput Sci Mob Comput 5(3):431\u2013444","journal-title":"Int J Comput Sci Mob Comput"},{"key":"2728_CR43","first-page":"474","volume":"4","author":"S Tanwar","year":"2019","unstructured":"Tanwar S, Bhatia Q, Patel P, Kumari A, Singh PK, Hong WC (2019) Machine Learning Adoption In blockchain-Based Smart Applications: the challenges and a way forward. IEEE Access 4:474\u2013488","journal-title":"IEEE Access"},{"issue":"5","key":"2728_CR44","first-page":"878","volume":"8","author":"MB Tariq","year":"2017","unstructured":"Tariq MB, Abbas K (2017) Threats, challenges, security of wireless body area network (WBAN) using IEEE 802154\/ZIGBEE. Int J Sci Eng 8(5):878\u2013884","journal-title":"Int J Sci Eng"},{"key":"2728_CR45","doi-asserted-by":"crossref","unstructured":"Vishwakarma R, Mohapatra RK (2017) A secure three-party authentication protocol for wireless body area networks. In: Third International Conference on Sensing, Signal Processing and Security (ICSSS), (p. 5). Chennai, India","DOI":"10.1109\/SSPS.2017.8071573"},{"key":"2728_CR47","doi-asserted-by":"crossref","unstructured":"Vora J, Nayyar A, Tanwar S, Tyagi S, Kumar N, Obaidat MS (2018) BHEEM: A blockchain-based framework for securing electronic health records. In: 2018 IEEE Globecom Workshops (GC Wkshps). Abu Dhabi, United Arab Emirates, 9\u201313 Dec. 2018","DOI":"10.1109\/GLOCOMW.2018.8644088"},{"key":"2728_CR48","unstructured":"Wenjia, L., & Xianshu, Z. (2016). BAN-Trust: An Attack-Resilient Malicious Node. 2016 International Conference on Computing, Networking and Communications, Communications and Information Security, (p. 5). Kauai, HI, USA ."},{"key":"2728_CR49","doi-asserted-by":"crossref","unstructured":"Wohlin, C. (may 2014). Guidelines for Snowballing in Systematic Literature Studies and a Replication in Software Engineering. EASE '14: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, (pp. 1\u201310). Sweden.","DOI":"10.1145\/2601248.2601268"},{"issue":"8","key":"2728_CR50","doi-asserted-by":"publisher","first-page":"2403","DOI":"10.3390\/s18082403","volume":"18","author":"P Zhang","year":"2018","unstructured":"Zhang P, Ma J (2018) Channel characteristic aware privacy protection mechanism in WBAN. Sensors 18(8):2403","journal-title":"Sensors"},{"key":"2728_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3721234","volume":"2017","author":"S Zou","year":"2017","unstructured":"Zou S (2017) A survey on secure wireless body area networks. Secur Communi Net 2017:1\u20139","journal-title":"Secur Communi Net"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02728-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02728-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02728-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:16:52Z","timestamp":1744183012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02728-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":47,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["2728"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02728-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"7 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}