ECG Signals-Based Security and Steganography Approaches in WBANs: A Comprehensive Survey and Taxonomy
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS(2024)
Islamic Azad Univ
Abstract
Wireless Body Area Networks (WBANs) are integral components of e-healthcare systems, responsible for monitoring patients' physiological states through intelligent implantable or wearable sensor nodes. These nodes collect medical data, which is then transmitted to remote healthcare facilities for thorough evaluation. Securing medical data within WBANs is paramount due to its central role in preserving patient privacy and confidentiality. Notably, Electrocardiogram (ECG) signals have recently gained prominence as pivotal elements within diverse security frameworks. Incorporating ECG signals strategically enhances the security and reliability of WBANs and broader e-healthcare systems, instilling greater trustworthiness. This survey article provides an in-depth exploration of contemporary ECG-based security schemes, adding to the scholarly discourse. The imperative to categorize these security paradigms revolves around their use of ECG signals. This categorization identifies three key domains: the first involves schemes that utilize ECG signals for cryptographic operations, encompassing key generation, agreement, management, and authentication. The second category employs steganography-based techniques, using ECG signals to conceal patients' sensitive medical data. The third category focuses on enhancing ECG signal security during data transmission. Each category is meticulously elaborated, detailing architectural foundations, notable contributions, and intrinsic security services. Furthermore, each section presents a comprehensive overview of the attributes characterizing ECG-based security frameworks. This includes insights into employed datasets, simulation environments, evaluation metrics, and inherent advantages and limitations. Expanding on this, a thorough analysis of distinctive attributes underpinning these security frameworks concludes by shedding light on potential directions for future research.
MoreTranslated text
Key words
WBAN,Cyber Security,Biometric,Healthcare,Authentication,Electrocardiography
求助PDF
上传PDF
View via Publisher
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
- Pretraining has recently greatly promoted the development of natural language processing (NLP)
- We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
- We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
- The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
- Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
Summary is being generated by the instructions you defined