Security analysis and trends in signcryption for WBAN: A research study

Divya Keerthana K,Sree Nidhi S,Aarthi A,Sridharan D
DOI: https://doi.org/10.1007/s12083-024-01745-4
IF: 3.488
2024-09-04
Peer-to-Peer Networking and Applications
Abstract:The necessity for an advanced health monitoring system within healthcare systems has instigated the evolution of Wireless Body Area Networks (WBANs). It serves as a tool predominantly employed in diagnosing and addressing patient's health concerns through treatments. Securing highly confidential and sensitive patient data collected through sensors within WBANs is crucial, necessitating robust measures to prevent various forms of adversarial attacks and unauthorized access, mainly due to its critical role in healthcare applications. Hence, signcryption security is essential for ensuring the protection of medical information within WBANs. This research presents a novel perspective apart from existing investigations on signcryption, addressing a gap in the literature. The study thoroughly analyzes signcryption-based WBAN protocols to contribute valuable insights to the field. Recent signcryption literature has been assessedorganization, equipped with the master key to analyze WBAN architecture, security requirements, and critical challenges within WBANs to fulfill the outlined objectives. This review aims to perform a comparative analysis of existing signcryption security solutions and analyze the existing proposed security solutions for WBANs. The techniques were compared with the existing signcryption methods, aiming to comprehend the security issues and their underlying motives. Furthermore, it highlights the research challenges encountered in the security dimensions of signcryption in WBAN, establishing the foundation for future avenues of investigation in this rapidly developing sector of health monitoring technology. The survey aims to serve as a benchmark for researchers and application developers, offering reference points for further exploration in the field.
computer science, information systems,telecommunications
What problem does this paper attempt to address?