Security in Wireless Body Sensor Network : A Multivocal Literature Study
: The wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging than designing conventional solutions, and the...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI
2022
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/40394/1/Security%20in%20Wireless%20-%20Copy.pdf http://ir.unimas.my/id/eprint/40394/ https://www.mdpi.com/2571-5577/5/4/79 https://doi.org/10.3390/asi5040079 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sarawak |
Language: | English |
Summary: | : The wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging than designing conventional solutions, and the recent study provides little guidance to designers and developers. The proposed study summarizes the multivocal literature study of security mechanisms for BSN. The
investigation found 10,871 academic publications and 697 grey content; duplicates were removed, and selection criteria were employed, resulting in 73 academic papers and 30 grey publications. Various conventional security techniques, scope, and security contexts were used to classify the stated security solutions within each publication. It was crucial to inquire about the frequency of publications, research methods, security mechanisms, and contexts to answer the proposed questions. Our survey concludes that security methods and assessments are categorized into 15 categories, with the most frequently referenced being authentication and authorization; the majority of strategies concentrate on preventing and mitigating security breaches, with a limited number of works focusing on detection and recovery; and the techniques used to conduct the survey vary between the two types of publications. This evaluation might be the first step toward making the BSN platform more consistent by giving professionals and researchers a complete set of security strategies and methods. Experts will apply these solutions to fix security issues while establishing a trustworthy BSN after they have been identified through the process of discovering the most commonly utilized security solutions. |
---|