基于心电信号的wban安全与隐写方法:综合调查与分类

IF 3.8 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Sustainable Computing-Informatics & Systems Pub Date : 2023-11-20 DOI:10.1016/j.suscom.2023.100937
Mohammad Masdari , Shahab S. Band , Sultan Noman Qasem , Biju Theruvil Sayed , Hao-Ting Pai
{"title":"基于心电信号的wban安全与隐写方法:综合调查与分类","authors":"Mohammad Masdari ,&nbsp;Shahab S. Band ,&nbsp;Sultan Noman Qasem ,&nbsp;Biju Theruvil Sayed ,&nbsp;Hao-Ting Pai","doi":"10.1016/j.suscom.2023.100937","DOIUrl":null,"url":null,"abstract":"<div><p>Wireless Body Area Networks<span><span><span> (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote </span>healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for </span>cryptographic operations<span>, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics<span>, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.</span></span></span></p></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"41 ","pages":"Article 100937"},"PeriodicalIF":3.8000,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECG signals-based security and steganography approaches in WBANs: A comprehensive survey and taxonomy\",\"authors\":\"Mohammad Masdari ,&nbsp;Shahab S. Band ,&nbsp;Sultan Noman Qasem ,&nbsp;Biju Theruvil Sayed ,&nbsp;Hao-Ting Pai\",\"doi\":\"10.1016/j.suscom.2023.100937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Wireless Body Area Networks<span><span><span> (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote </span>healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for </span>cryptographic operations<span>, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics<span>, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.</span></span></span></p></div>\",\"PeriodicalId\":48686,\"journal\":{\"name\":\"Sustainable Computing-Informatics & Systems\",\"volume\":\"41 \",\"pages\":\"Article 100937\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2023-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sustainable Computing-Informatics & Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2210537923000926\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210537923000926","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

无线体域网络(wban)是电子医疗系统不可或缺的组成部分,负责通过智能植入式或可穿戴传感器节点监测患者的生理状态。这些节点收集医疗数据,然后将这些数据传输到远程医疗机构进行全面评估。保护wban内的医疗数据至关重要,因为它在保护患者隐私和保密性方面发挥着核心作用。值得注意的是,心电图(ECG)信号最近在各种安全框架中作为关键元素而受到重视。结合ECG信号战略性地增强了wban和更广泛的电子医疗系统的安全性和可靠性,从而增强了可信度。这篇调查文章提供了一个深入的探索当代基于心电图的安全方案,增加了学术论述。对这些安全范例进行分类的必要性围绕着它们对心电信号的使用展开。这种分类确定了三个关键领域:第一个涉及利用心电信号进行加密操作的方案,包括密钥生成、协议、管理和身份验证。第二类采用基于隐写术的技术,利用心电信号隐藏患者的敏感医疗数据。第三类是加强心电信号在数据传输过程中的安全性。每个类别都经过精心阐述,详细介绍了体系结构基础、值得注意的贡献和固有的安全服务。此外,每个部分都全面概述了表征基于ecg的安全框架的属性。这包括对所使用的数据集、模拟环境、评估指标以及固有优势和局限性的见解。在此基础上,对支撑这些安全框架的独特属性进行了深入分析,从而揭示了未来研究的潜在方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ECG signals-based security and steganography approaches in WBANs: A comprehensive survey and taxonomy

Wireless Body Area Networks (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for cryptographic operations, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Sustainable Computing-Informatics & Systems
Sustainable Computing-Informatics & Systems COMPUTER SCIENCE, HARDWARE & ARCHITECTUREC-COMPUTER SCIENCE, INFORMATION SYSTEMS
CiteScore
10.70
自引率
4.40%
发文量
142
期刊介绍: Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.
期刊最新文献
Analysing the radiation reliability, performance and energy consumption of low-power SoC through heterogeneous parallelism Nearest data processing in GPU An optimized deep learning model for estimating load variation type in power quality disturbances An one-time pad cryptographic algorithm with Huffman Source Coding based energy aware sensor node design A mMSA-FOFPID controller for AGC of multi-area power system with multi-type generations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1