Skip to main content

Quality of Service Regulation in Secure Body Area Networks: System Modeling and Adaptation Methods


Body area network (BAN) has recently emerged as a promising platform for future research and development. The applications are myriad and encompass a wide range of scenarios, including those in not only medicine but also in everyday activities. However, while the applicability and necessity of BAN have been firmly assured, the underlying technological platforms to practically realize these networks are still in the developmental stages, with many outstanding key problems to be addressed. Due to their envisioned domains of applicability, an important problem in BANs is security and user privacy. Providing security in a practical BAN configuration is challenging due to various conflicting resource constraints. In this paper, the focus is to study signal processing methods for delivering secure communications in BANs, particularly when using biometrics. An optimization framework is presented to aggregate various methods, enabling overall quality of service (QoS) regulation in an integrated and flexible manner. In particular, this resource allocation approach is shown to be effective in managing security solutions for BANs.

Publisher note

To access the full article, please see PDF.

Author information

Authors and Affiliations


Corresponding author

Correspondence to FrancisMinhthang Bui.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and Permissions

About this article

Cite this article

Bui, F., Hatzinakos, D. Quality of Service Regulation in Secure Body Area Networks: System Modeling and Adaptation Methods. J Wireless Com Network 2011, 641867 (2011).

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI:


  • Resource Allocation
  • Resource Constraint
  • Secure Communication
  • Everyday Activity
  • Full Article