8th International Conference on Body Area Networks

Research Article

Analysis of the applicability of Wireless Sensor Networks attacks to Body Area Networks

  • @INPROCEEDINGS{10.4108/icst.bodynets.2013.253720,
        author={Mariana Segovia and Eduardo Gramp\^{\i}n and Javier Baliosian},
        title={Analysis of the applicability of Wireless Sensor Networks attacks to Body Area Networks},
        proceedings={8th International Conference on Body Area Networks},
        publisher={ICST},
        proceedings_a={BODYNETS},
        year={2013},
        month={10},
        keywords={body area networks wireless sensor network security},
        doi={10.4108/icst.bodynets.2013.253720}
    }
    
  • Mariana Segovia
    Eduardo Grampín
    Javier Baliosian
    Year: 2013
    Analysis of the applicability of Wireless Sensor Networks attacks to Body Area Networks
    BODYNETS
    ACM
    DOI: 10.4108/icst.bodynets.2013.253720
Mariana Segovia1, Eduardo Grampín1,*, Javier Baliosian1
  • 1: Universidad de la República
*Contact email: grampin@fing.edu.uy

Abstract

A Body Area Network (BAN) is composed by several sensors that may be implanted or placed around the human body, usually deployed for health-care applications. The sensors monitor one or more vital signs and communicate through a wireless network, allowing the patient to lead a normal life. Innovative health-care applications may be deployed using BAN capabilities, and therefore, security issues in BAN shall be carefully considered, since they may have a great impact in the patient’s health. Adversaries might create fake emergency warnings, prevent legitimate warnings from being reported, exhaust battery power, produce excessive tissue heating, among other attacks. While efforts have been carried out in the industry and academia to define security requirements in Wireless Sensor Networks (WSN), more work is needed regarding BAN. In this paper, we consider the differences between BAN and WSN, and examine a selection of known WSN attacks that may be used to damage BAN. We also present a stack based classification of these attacks, and we analyse the security impact of single-hop and dynamic multi-hop topologies in possible routing attacks. Finally, we review some security solutions and their cost in resources utilization.