The WBANs: Steps towards a comprehensive analysis of wireless body area networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.61Keywords:
Wireless sensor network, Wireless body area network, Sensor, Security, Routing protocols, Energy efficiency.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The wireless sensor network (WSN) has been an active research topic for years, extensively used in the military, healthcare, automation and various other applications. Inspired by the WSN, the wireless body area network (WBAN) is a crucial infrastructure for remote health monitoring and treatment, with sensors installed in the human body to detect medical indicators and gather data. These sensor nodes function even in harsh conditions where human communication is difficult, all while operating on a minimal power budget. In this paper, we cover various aspects of wireless body area networks, such as on-body and in-body sensor communication, MEMS and NEMS technology, WBAN architecture, MAC protocols, security threats and applications.Abstract
How to Cite
Downloads
Similar Articles
- K. Sreenivasulu, Sampath S, Arepalli Gopi, Deepak Kartikey, S. Bharathidasan, Neelam Labhade Kumar, Advancing device and network security for enhanced privacy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Deena Merit C K , Haridass M, Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Lakshmi Priya, Anil Vasoya, C. Boopathi, Muthukumar Marappan, Evaluating dynamics, security, and performance metrics for smart manufacturing , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- M. Monika, J. Merline Vinotha, A resilient supply chain model integrating demand variability and carbon emissions in imperfect production systems , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- ABHAYA K. SINGH, IMPLICATIONS OF CLIMATE CHANGE IN THE HIMALAYAN REGION AND ITS IMPACT ON INDIAN SECURITY , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

