<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A security framework for wireless body area network based smart healthcare system</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Mobeen</forename><surname>Khan</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Graduate School of Science &amp; Engineering</orgName>
								<orgName type="institution">PAF-Karachi Institute of Economics and Technology</orgName>
								<address>
									<settlement>Karachi</settlement>
									<country key="PK">Pakistan</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Muhammad</forename><forename type="middle">Taha</forename><surname>Jilani</surname></persName>
							<email>mtaha.jilani@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Graduate School of Science &amp; Engineering</orgName>
								<orgName type="institution">PAF-Karachi Institute of Economics and Technology</orgName>
								<address>
									<settlement>Karachi</settlement>
									<country key="PK">Pakistan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Muhammad</forename><forename type="middle">Khalid</forename><surname>Khan</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Graduate School of Science &amp; Engineering</orgName>
								<orgName type="institution">PAF-Karachi Institute of Economics and Technology</orgName>
								<address>
									<settlement>Karachi</settlement>
									<country key="PK">Pakistan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maaz</forename><surname>Bin</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Graduate School of Science &amp; Engineering</orgName>
								<orgName type="institution">PAF-Karachi Institute of Economics and Technology</orgName>
								<address>
									<settlement>Karachi</settlement>
									<country key="PK">Pakistan</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A security framework for wireless body area network based smart healthcare system</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">EA1794374846320DDC3EF587828FB0AE</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T17:16+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Wireless body area network (WBAN) security</term>
					<term>Internet-of-Things</term>
					<term>smart healthcare</term>
					<term>e-Health systems</term>
					<term>ZigBee security framework</term>
					<term>IoT architecture</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In recent years, there is enormous growth of smart systems that have been developed for range of applications. This development is focused on Internet-of-Things (IoT), which will eventually, transform IoT into system of systems. Such smart systems are widely utilized in healthcare; however, the wide scope of such systems is also vulnerable to security and privacy issues. This paper proposes a security framework for wireless body area network (WBAN) based smart healthcare system. The proposed framework implies the security mechanism by considering low power and low resources devices within the WBAN. This is not just reduces the complexity for resource constrained devices, but ensures the availability and data integrity in simple, yet effective manner.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>INTRODUCTION</head><p>The recent advancements in the information and communication technologies enable the researchers and engineers to realize the smart systems for various applications. The realization of such systems will lead to develop the system of system, or also known as Internet-of-Things (IoT). The IoT is defined as various tiny physical objects, that are capable to sense from their surroundings, connected with each other by different networks and share their collected data to convey information <ref type="bibr" target="#b0">[1]</ref>. These IoT based systems can be employed in industrial applications such as remote-sensing, manufacturing, transportation, smart-homes, smart-communities and healthcare. With the help of these small interconnected sensors or objects the automation of certain system can be achieved <ref type="bibr" target="#b1">[2]</ref>. An important application is the smart healthcare system, where the doctors can monitor the symptoms of a patient remotely by Wireless Body Area Network in IoT environment <ref type="bibr" target="#b2">[3]</ref>. However, for an IoT environment one of the most important aspect is the security and privacy, which is still questionable in many proposed IoT architectures. The architectures are not well defined, as they have not provided the information, like how data can be restricted and preserve its integrity. In conventional networks AES encryption technique can be used for information security <ref type="bibr" target="#b3">[4]</ref>. But it cannot be applied to IoT based devices, that are small and limited resources, such as power and processing capabilities <ref type="bibr" target="#b5">[5]</ref>. Therefore, an efficient security mechanism for these resource constrained devices is currently an important research area.</p><p>These days, multiple wireless networks are available around us, these wireless devices are interconnected over a traditional network like internet which can be used to connect the remoteusers in a fast, reliable and cost effective manner. Nevertheless, the connected devices over conventional network then there will be need for a security mechanism that can restrict attacker access and control. However, conventional network has limited protection that is not suitable for an IoT network <ref type="bibr" target="#b5">[5]</ref>. For instance, an endeavor can access and manipulate the IoT devices which may have an anonymous result. Therefore, there is a need for security framework that can be implemented to protect the IoT system that cannot be accessed from inside and outside of network, except authorized entities.</p><p>The wireless body area networks (WBANs), are one of the low power sensor network <ref type="bibr" target="#b6">[6]</ref>, which provides efficient and reliable infrastructure for healthcare system including implanted, non-implanted and wearable sensor devices for human body. These sensor devices are used to capture various symptoms of a patient like heartbeat, body temperature, blood pressure, respiration and ECG etc. and send these symptoms to a Body Network Controller (BNC). BNC is an essential part of a WBAN which is capable to capture sensor data and after processing forwards to the centralized e-Health server. The e-Health server in turn saves this real time data from various patients that can be monitored by his clinician.</p><p>As shown in Figure <ref type="figure">1</ref>, a BNC collects and processes data from the devices and forward it to a server using a wireless access network. The Wireless access network which is used in this scenario is IEEE 802.11ah. This standard is especially designed for IoT devices. There can be use of WLAN 802.11a/b/n standards but IEEE 802.11ah has some additional feature (like long range with low power consumption). Figure <ref type="figure">1</ref>. A typical WBAN in a smart healthcare system within the IoT network with its: things, network, and applications <ref type="bibr" target="#b7">[7]</ref>.</p><p>The comparison of various IEEE 802.11 standards is presented in Figure <ref type="figure" target="#fig_0">2</ref>. In hospital vicinity, numerous 802.11ah WLAN access points are configured and installed. The e-Health server is connected via IEEE 802.3 Ethernet with these access points.</p><p>As explained before, an e-Health server that stores real time data is connected to internet that enables doctors to access this information from remote-end. Likewise, conventional network here a vulnerability rises since the connection between BNCs and e-Health server may have insider threats and similarly, it may face outside attacks. Therefore, it is essential to implement a mechanism that ensure the security for a smart Hospital <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b8">8]</ref>. This research study focuses the three major goals, these are: (i) Access security of BNC and e-Health server (ii) Data confidentiality, and (iii) Availability of system. As mentioned earlier, traditional networks utilizes the state of the art encryption algorithm, such as 3DES, AES, IDEA etc. However, these algorithms cannot be implemented in small devices with limited resources (in term of power consumption and processing capabilities). This work implements the AES with CTR (Counter) mode in BNC for encryption <ref type="bibr" target="#b8">[8]</ref>. The AES CTR keys are generated at server side and then sent to BNC via a shared (private) key. The generated key is shared and then configured at BNC while patient register themselves. The encryption that is performed by XOR operation with CTR keys, will exchange periodically while BNC is said to be in ideal mode. The logical operation of XOR, can be implemented easily and efficiently even for a small resource devices <ref type="bibr" target="#b9">[9]</ref>. Thus, demonstrates that AES-CTR mode may have same security level as other modes.</p><p>At other side e-Health server also use the public key algorithm for secure communication with remote users (sucah as, Doctors). Each user has its own private key and they will communicate with server by using a session key (session key is exchanged with the help of public key). By implementing this method confidentiality and security access of BNC and e-Health server can be achieved. The availability of system can be ensured by tracking the heartbeat of a patient, whereas the unavailability activates the emergency.</p><p>The remaining paper is organized as, Section II overviews the different existing communication protocol and their vulnerabilities in terms of security, while the Section III represents our proposed framework and at last, Section IV concludes this study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. RELATED WORK</head><p>Wireless Personal Area Network (WPAN) falls in low power wireless technology category. WPAN is specified in IEEE 802.15 standard and released in 2005. For wireless connectivity IEEE defines PHY and MAC layer specifications for fixed, portable, and moving devices within a POS (personal operating space) <ref type="bibr" target="#b10">[10]</ref>. POS is typically extends up to 10 m in all directions of an object, whether it is stationary or in motion. As shown in the Figure <ref type="figure" target="#fig_1">3</ref>  The IEEE 802.11ah standard for the WLAN is developed in 2014, that operates in 900 MHz in contrast with other wireless LAN standards <ref type="bibr" target="#b11">[11]</ref>. The main aim behind the development of this standard was to extend the range of IEEE 802.11ac standard, particularly for low power devices <ref type="bibr" target="#b13">[12]</ref>. Utilization of lower frequencies is not only helpful to extend the range but it has also lower consumption of power.</p><p>One of cheap technology that is also useful for a short distance is the Bluetooth. It is widely used, in various devices such as mouse, keyboard, headset and most popular for personal devices communication, for both data and voice <ref type="bibr" target="#b14">[13]</ref>. The typical range is about 10m however it can be extend up to 100m (using amplifiers) <ref type="bibr" target="#b14">[13]</ref>. The cipher algorithm used by Bluetooth uses stream cipher named E0, which required re-synchronization for every payload. The main parts of E0 stream cipher are (i) stream key-generator (ii) payload key-generator and the (iii) encrypt/decrypt parts <ref type="bibr" target="#b15">[14]</ref>. There is variation in key size, that is 8 bits to 128 bits but it depends on both communicating devices. In spite of these security mechanisms, it is still vulnerable to different attacks, including Man in the middle, Blue-snarfing and Viruses <ref type="bibr" target="#b16">[15]</ref>.</p><p>The ZigBee is an extension of IEEE 802.15.4 WPAN standard developed by ZigBee Alliance. The protocol stack of ZigBee is built on the top of IEEE 802.15.4 <ref type="bibr" target="#b17">[16]</ref>, as shown in Figure <ref type="figure" target="#fig_2">4</ref>, which only define physical and MAC layer for low power personal area network <ref type="bibr" target="#b18">[17]</ref>. In contrast with IEEE 802.11 WLAN it is much simpler protocol and supports multiple topologies. The main characteristic are low power, low throughput, and long battery life with secure networking (128 bit AES encryption) <ref type="bibr" target="#b19">[18]</ref>. Its typical range is 10 to 100 meter LOS (Line Of Sight) normally depends on output power and environmental conditions. However data can be transmitted to longer distances with a mesh network. Similarly, there will be another full function device called Router, and the major responsibility is to extend the network coverage by providing routing function. Unlike, Coordinator it is unable to establish a network by itself. The end devices, that are reduced function devices are neither similar to coordinator nor router, but they just sent their sensing data to network using Coordinator and Routers. Again, they are unable to establish ZigBee network and cannot serve or even assist in routing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 5. Topology of a ZigBee network</head><p>The Advance Encryption Standard algorithm is used in ZigBee that is based on AES-128 bit key and it provide security features on application and network layers <ref type="bibr" target="#b19">[18]</ref>. Three different kinds of keys are used for this purpose, namely, link key, network key and Master key. The link key is utilized for data confidentiality between nodes, while, to exchange all information securely, each pair of node has a unique link key managed at application layer. The network key (which is 128 bit key) is generated by trust center that is shared among all the devices. The coordinator may become trust center or even any dedicated device. At last, the master key has prime function to secure the process of exchange the link keys between two nodes and it supposed to be preconfigured before deployment In order to join ZigBee network each node must request current network key with the help of preconfigured master key (to avoid stealing of current network key). Network key is updated time to time by trust center and shared to all nodes by using current network key <ref type="bibr" target="#b20">[19]</ref>. This whole security scenario works very well but it is inefficient for WBAN in term of resources (processing and power consumption). AES is a very complex encryption algorithm which requires high amount of processing and battery power (implementation of AES in small battery powered device) to encrypt the data. As mentioned in Abstract that it is infeasible to implement the conventional security mechanisms in very small resource constraint devices.</p><p>In various implementations of WBAN, AES is not used yet for security to the best of my knowledge. Because end devices of WBAN have very limited resources so it is infeasible to implement complete AES algorithm even the CTR mode of block cipher. CTR mode is easiest to implement in contrast with other modes, but still not efficient for WBAN devices because to operate the CTR mode, still it have to perform whole AES process with certain values called Counter. Therefore, in this work, an implementation of AES counter (CTR) mode is proposed, which is feasible for resource constraint devices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. PROPOSED FRAMEWORK</head><p>In order to define my purposed idea it is important to get deep understanding of AES-CTR mode <ref type="bibr" target="#b21">[20]</ref>. All modern block cipher operates in one of the five standard modes which are ECB, CBC, CFB, OFB and CTR. In CTR mode a variable called counter is initialized to IV (Initial Vector "some specified value") which is incremented linearly or randomly (with the help of some pseudo random sequence). This value is wrap around to initial value upon reaching to its maximum allowable limit. The size of the counter depends upon variant of encryption algorithm being used, like for AES-128 the size of counter is 128 bit.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 6. Basic building-block for counter mode encryption and decryption</head><p>The Figure <ref type="figure">6</ref> illustrates the counter mode, where the key that execute the AES process, must be shared with receiver. Initially, by using shared key it will encrypt the counter value with AES-128 encryption and produced the intermediate cipher text (this term will be used in remaining part of this article). For real time applications, if gateway router encrypts use other modes, such as CBC, so due to longer delays that will be not suitable. Additionally, the intermediate cipher texts can be computed prior to operation, or even along this process, since it depend upon counter values that can be determine earlier. The simplicity of XOR operation, provide fast logical operations that increase the efficiency of a hardware while comparing with other complex arithmetic operation <ref type="bibr" target="#b9">[9]</ref>. Even, the proposed CTR mode uses XOR operation for real-time encryption, but it is able to achieved the security of well-established AES <ref type="bibr" target="#b21">[20]</ref>.</p><p>The thorough understanding of AES-CTR mode <ref type="bibr" target="#b21">[20]</ref>, help us to implement it. As shown in Figure <ref type="figure">7</ref>, e-Health server will registered a patient with a unique patient ID (PID), when he is being admitted in hospital. This information will store against that patient along with 128 bit intermediate cipher texts. Using this information, the BNC will be configured with PID and the previously generated cipher texts will now store at BNC. The additional protection through user login and password BNC will restrict any information modification or retrieval by an adversary that might reside in hospital vicinity. There will be a single BNC in WBAN for all sensors connected to a patient. It should be highlighted that noticeable that permanent memory of BNC can store up to 128 bit intermediate cipher texts. These texts will be used by BNC for data encryption thru XOR function with plain text data block. At this moment the whole BAN (comprising BNC and all sensors) will be ready for deployment.</p><p>Figure <ref type="figure">7</ref>. Flow-chart for the proposed security mechanism of a WBAN network</p><p>The symptoms of a patient will be sent by body sensors to the BNC, which in turn, aggregate the data and forwarded to the e-Health server. The BNC that is connected to e-Health server through IEEE 802.11ah access, can received data from various sensors that may capture different symptoms. Although, there will be range of sensors, but most common are the body temperature, heartbeat, respiration, blood pH and pressure etc.</p><p>The Figure <ref type="figure">8</ref> depicts various characteristics of a patient's symptoms.</p><p>Figure <ref type="figure">8</ref>. Various characteristics of a typical patient <ref type="bibr" target="#b22">[21]</ref> As mentioned earlier, the implementation of proposed security framework will provide confidentiality and data integrity to the communication between BNC and e-Health server. For encryption of data BNC will select an intermediate cipher text from its memory and will perform XOR operation with data as shown in Figure <ref type="figure" target="#fig_3">9</ref>. To provide confidentiality whole 128 bit block (10 bits for PID and remaining bits are symptoms) is encrypted with one of selected Intermediate cipher text from memory and its reference is also attached with payload. Now data block is ready to be transmitted towards server.</p><p>At this point it is briefly defined how data will be encrypted. A field named encryption ID will be attached with each PDU (Protocol Data Unit) to indicate particular intermediate cipher text which will be used to encrypt this PDU as shown in Figure <ref type="figure" target="#fig_4">10</ref>. It can be seen that for selection of particular intermediate cipher text (to decrypt the PDU) the receiver will use this field. Once it will decrypted, PID at the start of payload will be checked by receiver and validate with stored PID for a corresponding BNC. This decryption will depend on successful validation otherwise it will be rejected. The receiver will be avoided from replay attack by enabling the timestamp within a PDU. Whereas, based on predefined time limit the received PDU is also validated on timestamp. It is worth to mention that before sending a packet to BNC, the server will carry-out the same procedure. To ensure availability, continuous monitoring for the arrival rate of packets of certain BNC can performed. If it does not receive packets of certain BNC within predefined limit, it will declare the emergency. The emergency indicates failure of one or more component within the network, which may include LAN switches, Access Points and BNC etc. Another important aspect is determining the failure of the sensors, it can be achieved by monitoring the status in each arriving payload. If the system do not receive any status in the payload in predefined limit (as defined in Figure <ref type="figure">8</ref>) it can assumed that the sensor is failed. Because when a sensor is failed it will not send data to BNC, and in turn, BNC will send all zero's bits in its associated payload slot in the subsequent packets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. CONCLUSION</head><p>In this paper, different communication technologies for a smart hospital using IoT system are extensively reviewed, while the vulnerabilities for security and privacy are highlighted. The paper proposed a security framework for smart healthcare system based on wireless body area network (WBAN). It is found to be simple, more effective and low-cost implementation for the resource constrained devices, particularly in smart healthcare environment. The proposed work utilizes the wellestablished AES encryption algorithm in a decentralized manner, even for the resource-constraint devices. This implementation not only fulfills the limitations of the resource constraint devices which includes less processing capability, limited battery, limited memory and hardware simplicity but also provides a well-defined security mechanism which is the prime requirement of today's networks. The proposed framework not just reduces the complexity for resource constrained devices, but ensures the availability and data integrity in simple, yet effective manner.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Comparison of variants of IEEE 802.11 WiFi standard</figDesc><graphic coords="2,63.33,371.72,213.50,95.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. Various technologies defined for wireless personal or body area networks (WPAN/WBAN)</figDesc><graphic coords="2,312.10,467.32,241.91,117.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. Layered architecture of ZigBee The ZigBee network devices are included Coordinator, Router and End devices as shown in Figure 5. The core component of a ZigBee network is based on Coordinator, which installed initially and work as full-function device which establish and manages the whole ZigBee network. With a network there will only one Coordinator. Similarly, there will be</figDesc><graphic coords="3,61.83,451.12,216.49,158.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 9 .</head><label>9</label><figDesc>Figure 9. Data encryption through XOR operation</figDesc><graphic coords="5,85.28,320.60,169.60,152.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 10 .</head><label>10</label><figDesc>Figure 10. PDU Format (a) without ID Encryption (b) withEncrypt ID<ref type="bibr" target="#b22">[21]</ref> </figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The internet of things: A survey</title>
		<author>
			<persName><forename type="first">L</forename><surname>Atzori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Iera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Morabito</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer networks</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="page" from="2787" to="2805" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Iot gateway: Bridging wireless sensor networks into internet of things</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Qin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/IFIP 8th International Conference on</title>
				<imprint>
			<date type="published" when="2010">2010. 2010</date>
			<biblScope unit="page" from="347" to="352" />
		</imprint>
	</monogr>
	<note>Embedded and Ubiquitous Computing (EUC)</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Communication and Security in Health Monitoring Systems--A Review</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fotouhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cauevic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lundqvist</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Software and Applications Conference (COMPSAC)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="545" to="554" />
		</imprint>
	</monogr>
	<note>IEEE 40th Annual</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">P</forename><surname>Hamalainen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Alho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hannikainen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">D</forename></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Design and implementation of low-area and low-power AES encryption hardware core</title>
		<author>
			<persName><surname>Hamalainen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th EUROMICRO Conference on Digital System Design (DSD&apos;06)</title>
				<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="577" to="583" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Security protocols for use with wireless sensor networks: A survey of security architectures</title>
		<author>
			<persName><forename type="first">D</forename><surname>Boyle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Newe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICWMC&apos;07. Third International Conference on</title>
				<imprint>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="54" to="54" />
		</imprint>
	</monogr>
	<note>Wireless and Mobile Communications</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A WBAN system for ambulatory monitoring of physical activity and health status: applications and challenges</title>
		<author>
			<persName><forename type="first">E</forename><surname>Jovanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Milenkovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Otto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>De Groen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Warren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Taibi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Engineering in Medicine and Biology 27th Annual Conference</title>
				<imprint>
			<date type="published" when="2005">2005. 2006</date>
			<biblScope unit="page" from="3810" to="3813" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A survey on wireless body area networks for ehealthcare systems in residential environments</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ghamari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Janko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Sherratt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Harwin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Piechockic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Soltanpur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page">831</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">On the Security Issues in Wireless Body Area Networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Saleem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">S</forename><surname>Yoo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JDCTA</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="178" to="184" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation</title>
		<author>
			<persName><forename type="first">K</forename><surname>Tiri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Verbauwhede</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the conference on Design, automation and test in Europe</title>
				<meeting>the conference on Design, automation and test in Europe</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">10246</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Usage of mobile agent in configuring WPANs</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Sze-Toh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Yow</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICARCV 2002. 7th International Conference on</title>
				<imprint>
			<date type="published" when="2002">2002. 2002</date>
			<biblScope unit="page" from="938" to="943" />
		</imprint>
	</monogr>
	<note>Control, Automation, Robotics and Vision</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<author>
			<persName><forename type="first">S</forename><surname>Aust</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Prasad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">G</forename><surname>Niemegeers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advantages in standards and further challenges for sub 1</title>
				<imprint>
			<biblScope unit="volume">802</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">Ghz</forename><surname>Wi-Fi</surname></persName>
		</author>
		<title level="m">IEEE International Conference on Communications (ICC)</title>
				<imprint>
			<date type="published" when="2012">2012. 2012</date>
			<biblScope unit="page" from="6885" to="6889" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">IEEE 802.11 ah: A long range 802.11 WLAN at sub 1 GHz</title>
		<author>
			<persName><forename type="first">W</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Choi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of ICT Standardization</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="83" to="108" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">What is bluetooth?</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mcdermott-Wells</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE potentials</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="33" to="35" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">An analysis of Bluetooth security vulnerabilities</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">T</forename><surname>Hager</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">F</forename><surname>Midkiff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Wireless Communications and Networking</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2003">2003. 2003. 2003. 2003</date>
			<biblScope unit="page" from="1825" to="1831" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A review on security mechanism of Bluetooth communication</title>
		<author>
			<persName><forename type="first">T</forename><surname>Panse</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kapoor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="3419" to="3422" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi</title>
		<author>
			<persName><forename type="first">J.-S</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-W</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-C</forename><surname>Shen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IECON 2007. 33rd Annual Conference of the IEEE</title>
				<imprint>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="46" to="51" />
		</imprint>
	</monogr>
	<note>Industrial Electronics Society</note>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The 6LoWPAN architecture</title>
		<author>
			<persName><forename type="first">G</forename><surname>Mulligan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th workshop on Embedded networked sensors</title>
				<meeting>the 4th workshop on Embedded networked sensors</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="78" to="82" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards</title>
		<author>
			<persName><forename type="first">P</forename><surname>Baronti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Pillai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">W</forename><surname>Chook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chessa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gotta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">F</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer communications</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="1655" to="1695" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Security threats in ZigBeeenabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned</title>
		<author>
			<persName><forename type="first">N</forename><surname>Vidgren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Haataja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Patino-Andres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Ramirez-Sanchis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Toivanen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">System Sciences (HICSS), 2013 46th Hawaii International Conference on</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="5132" to="5138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">CTR-mode encryption</title>
		<author>
			<persName><forename type="first">H</forename><surname>Lipmaa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Rogaway</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wagner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">First NIST Workshop on Modes of Operation</title>
				<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Wireless body area network (WBAN) for medical applications</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Y</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Yuce</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">New Developments in Biomedical Engineering</title>
				<imprint>
			<publisher>INTECH</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
