The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
The Need for Cooperation and Relaying in Short-Range High Path Loss Sensor Networks
SENSORCOMM '07 Proceedings of the 2007 International Conference on Sensor Technologies and Applications
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Handbook of Information and Communication Security
Handbook of Information and Communication Security
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
A Body Area Network (BAN) is composed by several sensors that may be implanted or placed around the human body, usually deployed for health-care applications. The sensors monitor one or more vital signs and communicate through a wireless network, allowing the patient to lead a normal life. Innovative health-care applications may be deployed using BAN capabilities, and therefore, security issues in BAN shall be carefully considered, since they may have a great impact in the patient's health. Adversaries might create fake emergency warnings, prevent legitimate warnings from being reported, exhaust battery power, produce excessive tissue heating, among other attacks. While efforts have been carried out in the industry and academia to define security requirements in Wireless Sensor Networks (WSN), more work is needed regarding BAN. In this paper, we consider the differences between BAN and WSN, and examine a selection of known WSN attacks that may be used to damage BAN. We also present a stack based classification of these attacks, and we analyse the security impact of single-hop and dynamic multi-hop topologies in possible routing attacks. Finally, we review some security solutions and their cost in resources utilization.