IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Review of Different Techniques for Biomedical Data Security

A Review of Different Techniques for Biomedical Data Security
View Sample PDF
Author(s): Harminder Kaur (Dr. B. R. Ambedkar National Institute of Technology, India)and Sharvan Kumar Pahuja (Dr. B. R. Ambedkar National Institute of Technology, India)
Copyright: 2019
Pages: 24
Source title: Medical Data Security for Bioengineers
Source Author(s)/Editor(s): Butta Singh (Guru Nanak Dev University, India), Barjinder Singh Saini (Dr. B. R. Ambedkar National Institute of Technology, India), Dilbag Singh (Dr. B. R. Ambedkar National Institute of Technology, India)and Anukul Pandey (Dumka Engineering College, India)
DOI: 10.4018/978-1-5225-7952-6.ch005

Purchase

View A Review of Different Techniques for Biomedical Data Security on the publisher's website for pricing and purchasing information.

Abstract

The aging population is vulnerable to various illnesses and health conditions because with increase in age the people suffer from chronic disease. Quite often, they are partially handicapped due to their restricted mobility and their reduced mental abilities. To resolve these problems, health monitoring systems are designed for real-time monitoring of patients. WBAN use medical sensors for acquiring patient physiological data with wireless technologies to send data to healthcare providers. Due to wireless transmission, the chances of attacking and occurring security issues in the data are more. So, the security of the system is the main concern because the system consists of patient privacy concerns. Due to these reasons there is need of designing security algorithms to prevent data from being stolen by attackers. The aim of this chapter is to present a review of different attacks that occurred during transmission of data and security issues related to data. The chapter also describes different algorithms to prevent data from being stolen through various attacks and security issues.

Related Content

Shweta Arun Avhad. © 2023. 21 pages.
Majorie Moraa Nyasani, Victor Odhiambo Shikuku. © 2023. 10 pages.
Prashant Kumar, Sunil Kumar Verma. © 2023. 12 pages.
Sunil Kumar Verma, Prashant Kumar. © 2023. 21 pages.
Kannadhasan S., Nagarajan R.. © 2023. 10 pages.
Kondapalli Vamsi Krishna, Sompalli Bhavana, Koushik Koujalagi, Alok Malaviya. © 2023. 44 pages.
Bela Khiratkar, Shankar Mukundrao Khade, Abhishek Dutt Tripathi. © 2023. 10 pages.
Body Bottom