Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-8kt4b Total loading time: 0 Render date: 2024-06-19T11:00:57.140Z Has data issue: false hasContentIssue false

5 - Security

Published online by Cambridge University Press:  05 April 2013

Sandeep K. S. Gupta
Affiliation:
Arizona State University
Tridib Mukherjee
Affiliation:
Xerox Research Centre, India
Krishna Kumar Venkatasubramanian
Affiliation:
Worcester Polytechnic Institute, Massachusetts
Get access

Summary

In this chapter, we focus on security for BANs. In particular, we present a new paradigm that uses environment coupling – a property inherent to BANs – for this purpose. However, before we delve into the details, we provide some general concepts and definitions pertaining to the notion of security, which we use throughout this chapter. Though the notion of security has many connotations, for the purposes of this book, we define it in the information-security context, as preventing unauthorized entities from viewing, accessing, or modifying data generated within a system. We use the term system in a generic sense to mean a computing system that takes an input, processes it, and provides an output.

In order to ensure information security within any system, five basic requirements need to be satisfied. (1) Data integrity ensures that all information generated and exchanged during the system's operation is accurate and complete without any alterations. (2) Data confidentiality ensures that all sensitive information generated within the system is disclosed only to those who are supposed to see it. (3) Authentication ensures that the system knows the identities of all the entities interacting with it, and vice versa. (4) Authorization ensures that any entity trying to access particular information from the system is able to access only that information to which it is entitled. (5) Availability ensures that any entity that uses the data and services and resources of the system is able to do so when required.

Type
Chapter
Information
Body Area Networks
Safety, Security, and Sustainability
, pp. 63 - 83
Publisher: Cambridge University Press
Print publication year: 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×