Mohammad Masdari , Shahab S. Band , Sultan Noman Qasem , Biju Theruvil Sayed , Hao-Ting Pai
{"title":"基于心电信号的wban安全与隐写方法:综合调查与分类","authors":"Mohammad Masdari , Shahab S. Band , Sultan Noman Qasem , Biju Theruvil Sayed , Hao-Ting Pai","doi":"10.1016/j.suscom.2023.100937","DOIUrl":null,"url":null,"abstract":"<div><p>Wireless Body Area Networks<span><span><span> (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote </span>healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for </span>cryptographic operations<span>, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics<span>, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.</span></span></span></p></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"41 ","pages":"Article 100937"},"PeriodicalIF":3.8000,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECG signals-based security and steganography approaches in WBANs: A comprehensive survey and taxonomy\",\"authors\":\"Mohammad Masdari , Shahab S. Band , Sultan Noman Qasem , Biju Theruvil Sayed , Hao-Ting Pai\",\"doi\":\"10.1016/j.suscom.2023.100937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Wireless Body Area Networks<span><span><span> (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote </span>healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for </span>cryptographic operations<span>, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics<span>, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.</span></span></span></p></div>\",\"PeriodicalId\":48686,\"journal\":{\"name\":\"Sustainable Computing-Informatics & Systems\",\"volume\":\"41 \",\"pages\":\"Article 100937\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2023-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sustainable Computing-Informatics & Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2210537923000926\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210537923000926","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
ECG signals-based security and steganography approaches in WBANs: A comprehensive survey and taxonomy
Wireless Body Area Networks (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for cryptographic operations, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.
期刊介绍:
Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.