Wireless Body Area Network Essay

Improved Essays
WBAN or Wireless Body Area Network is a new technology that has been invented for monitoring health condition of an individual. This is fitted in the body of a person Wire Sensor Network or WSN is possible due improvement of sensor technology as well as computer miniaturization. As the data related to patients are stored in a WBAN it is imperative that security of the data must be maintained. Body Area Network is a system comprising of wireless network of sensors to monitor health designed for delivering personalized health-care. Acquiring communications inside BANs is necessary for maintaining not only health data’s privacy but also for guaranteeing security of healthcare-delivery [9]. It is a system consisting of wireless network sensors, …show more content…
Certainly, protecting health data is a legal need according to health Insurance Portability and Accountability Act that dictates that every personally recognizable information in electronic form be sheltered [10].
Contrasting to traditional sensor networks, BANs manage medical information with rigorous security and privacy need. The deficiency of sufficient security protections can not only result in a breach of privacy of patient, but also provide a chance for opponents to threat safety of the patients by adapting the data from BAN, that can lead to wrong diagnosis and treatments. As wireless communication forms one of the most susceptible aspects of a BAN, acquiring inter-sensor communications plays a significant role in securing the BAN
…show more content…
In BANs, usually sensors depend on the cryptographic keys for securing multimedia data communications. Various distribution and key management schemes are developed for providing security in usual wireless sensor networks. Conversely, they may not be applied directly for the BANs because of the scales of biomedical sensors. Conversely designing a proficient key agreement and management scheme is still challenging in BANs [8]. The key distribution techniques, like probabilistic key distribution, asymmetric cryptosystems, SPINS and LEAP were developed for distributing security keys in BANs. However such methods are not implemented easily in the body sensors because of restricted sensor resources or needing pre-deployment of secret keys that are difficult to be substituted and are susceptible to offline crack. Moreover, key management’s overheads and distributions in such methods are enormous whenever numerous sensor nodes are

Related Documents

  • Improved Essays

    Health Systems Privacy As health information is transferring from paper to electronic records, so is the need for protecting this highly sensitive information. Unauthorized access can create fear and distrust, which is very damaging to health care organization. The laws and regulations set forth to protect privacy are in place, but require enforcement and adaption as technology changes. The technological trends for protecting the storage and transference of health information are changing to meet the requirements of the system. New ethical issues arise as we try to balance the best interests of the individual versus the public good.…

    • 1245 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Technical safeguards must be implemented in order for electronic health information to be properly and safely transmitted. These safeguards include access control, audit controls, integrity controls, and transmission security (HSS.org). Access control requires a covered entity to implement policies and procedures to restrict a certain level of individuals from obtaining technical access to the electronic information. Audit controls must be implemented including but limited to hardware, software, and procedures to examine the access of electronic information and ensure the information is…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks.…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It makes the prevention and regulation of using new devices to cheat on test and standardized exams more difficult. As wearable devices become more advanced, being able to do complicated calculations and communicate amongst each other. The current rules and regulations do not compensate for this. Even if they decide to ban all watches, there are many methods of using electrical devices to cheat. Such as scanners and smartpens used to copy the test or exam itself to make a profit for it.…

    • 1245 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Patients trust health care professionals and providers protect their medical information. Developments in technology allow for easier utilization and access to health records through electronic portals for patients and physicians. Laws such as the Health Information Accountability Act sets standards that health care providers must follow to ensure patient privacy. The purpose of this paper is to describe the Electronic Health Record (EHR) mandate and discuss how the Cleveland Clinic has implemented the EHR. In addition to explaining how meaningful use and what the Health Information Accountability Act (HIPAA) is and how violating the law can threatens patient confidentiality.…

    • 977 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In order to improve quality of care in patient safety, the technological aspects should be used accordingly. For example, frequent alerts will cause end users to disregard alerts and might results with clinical errors. Also unofficial user access to EHR data can create high risks for liability in accordance to violation of patient…

    • 866 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The solution for introducing technology will be to increase patient care and safety, lower costs, increase efficiency, reduce error and improve patient satisfaction. In addition, one of the main problems with the introduction of technology, such as Electronic Healthcare Record (EHR), Medical imaging devices needs guidelines and regulation for professionals to follow. This means that patients will receive the intended care and information in such a way that they would benefit from these new technologies. However, when introducing new technology in health care staff must be trained and qualified to use the system effectively. For example, new technologies that are perceived as easy to use or compatible with the current working system are more likely to be used by staff and medical teams.…

    • 1112 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Today many healthcare organizations face challenges regarding the maintenance of documentation integrity in their electronic healthcare records (EHR). Accuracy in documentation is critical for a healthcare organization as it seeks to provide high-quality care for its patients. An electronic health record (EHR), as well as current health information technology (HIT) is important to a healthcare organization in order to provide care that is efficient and safer for its patients. Through accurately completing health records, implementing policies and procedures, and putting safeguards into place within the healthcare organization can improve data integrity in the electronic health records (EHR) system while helping the healthcare organization achieve…

    • 984 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    ROI based Secured and Robust medical image watermarking in Transform domain. ABSTRACT: In medical field, It’s common to transmit medical image and medical reports from one hospital to other hospital for diagnosis of the diseases. In that case the patient personal information and medical image plays a vital role while transferring over network. Because if a third party got those information and he intentionally cross change the information of multiple patients with wrong medical images, It’s causes wrong treatment for all patients. So it’s necessary to prevent information and medical image from third person i.e attacker.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Also, aggregation of data in cloud to reduce system admin or other infrastructure may poses additional security challenges. Expectations to have better cyberspace which is secure, resilient and enables innovation ensuring public health and safety. Conclusion In the end, Fast evolving technology keeps challenging to cybersecurity solutions , while vulnerabilities are vast and laws created for them is unclear. According to center for law and security single actor can’t make any changes without collaborative effort. Cooperation among government and private sector to balance the effectiveness with efficiency and security with privacy and innovation in a practical…

    • 1171 Words
    • 5 Pages
    Improved Essays