Next Article in Journal
Surface Passivation by Quantum Exclusion: On the Quantum Efficiency and Stability of Delta-Doped CCDs and CMOS Image Sensors in Space
Next Article in Special Issue
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
Previous Article in Journal
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression
Previous Article in Special Issue
Predicting Injuries in Football Based on Data Collected from GPS-Based Wearable Sensors
 
 
Review
Peer-Review Record

Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks

Sensors 2023, 23(24), 9856; https://doi.org/10.3390/s23249856
by Ahmad Salehi Shahraki 1,*, Hagen Lauer 2, Marthie Grobler 3, Amin Sakzad 4 and Carsten Rudolph 4
Reviewer 1:
Reviewer 2:
Reviewer 3: Anonymous
Sensors 2023, 23(24), 9856; https://doi.org/10.3390/s23249856
Submission received: 16 October 2023 / Revised: 22 November 2023 / Accepted: 5 December 2023 / Published: 15 December 2023
(This article belongs to the Special Issue Wireless Body Area Networks (WBAN))

Round 1

Reviewer 1 Report

Comments and Suggestions for Authors

The papers offers the review of Wireless Body Area Networks. 

1. The literature sources in the papers are not in the sequence order in the text. Please correct the order.

2. Please compare the survey with the other related ones, why your survey is better? (There are many similar ones)

3. The survey lacks technical details, for example encryption schemes lack technical details, please provide them.

4. Artificial Intelligence Driven Wireless Body Area Networks are not mentioned in the text, it is recommended to add the corresponding section and describe advantages and disadvantages of them

5. Authors write a lot about cryptography, but nothing is mentioned about post-quantum cryptography. There are many works of post-quantum encryption schemes in Wireless Body Area Networks. Please add the corresponding section.

6. The authors say: “Denial-of-Service (DoS) is another harmful attack in the healthcare environment because different applications in the BAN system monitor the state of patients in real-time”. There is not future analysis of DOS/DDOS attack on Wireless Body Area Networks. Please add the mentioned analysis.

7. Please talk about MITM attacks on Wireless Body Area Networks.

8. Conclusion is very poor, please extend it.

Author Response

Dear Reviewer, 

I have attached the response to the comment file for your review. 

Regards,
Ahmad

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

The paper is will written and have a positive impact to researchers in field of security, privacy and access control. 
However, the access control mechanism needs to explain with different types point of you like Attributes Based Access Control, Role based Access Control and some others. 
The research directions also needs to be updated and add some additional and important field like blockchain. The I am recommending some articles that will help and suggest to cite.

https://www.sciencedirect.com/science/article/pii/S1389128623004395?via%3Dihub

 

Author Response

Dear Reviewer, 

I have attached the response to the comment file for your review. 

Regards,
Ahmad

Author Response File: Author Response.pdf

Reviewer 3 Report

Comments and Suggestions for Authors

The authors have done a great job of reviewing and presenting a ton of data about Wireless Body Area Networks. At the same time, the specific goal and results of the work are somewhat dissolved in this volume. The most unclear part is the part about trust. It is very strange to consider trust without involving the opinions of patients, without surveys and other sociological studies, it is simply speculative - what it might be like before the Jews. At a minimum, it is necessary to find existing studies of the level of trust and refer to them, since there are no results.

In general, the overwhelming number of described problems with privacy and security are widely known and discussed. Although the authors are indeed very meticulous and provide more detailed data, it is still unclear what the importance of this particular work is. I would like to see some kind of generalization, a diagram that would present all the key parameters, which would allow further researchers to use it to evaluate these technologies.

Author Response

Dear Reviewer, 

I have attached the response to the comment file for your review. 

Regards,
Ahmad

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

Comments and Suggestions for Authors

The paper is improved.

Back to TopTop