Table 2.
Summary of the qualitative comparison of the existing surveys with the proposed survey.
Authors and Ref. No. | One | Two | Three | Four | Five | Six | Seven | Eight |
---|---|---|---|---|---|---|---|---|
Saleem et al. [32] | ||||||||
Zhang et al. [33] | ||||||||
Aqeel et al. [34] | ||||||||
Javadi and Razzaque [35] | ||||||||
Saha and Anvekar [36] | ||||||||
Pathania and Bilandi [37] | ||||||||
Kang and Adibi [38] | ||||||||
Mainanwal et al. [39] | ||||||||
Usha and Priya [40] | ||||||||
Masdari and Ahmadzadeh [41] | ||||||||
Naik and Samundiswary [42] | ||||||||
Al-Janabi et al. [43] | ||||||||
Sawaneh et al. [44] | ||||||||
Zou et al. [45] | ||||||||
Aman and Shah [46] | ||||||||
Narwal and Mohapatra [47] | ||||||||
Usman et al. [48] | ||||||||
Malik et al. [49] | ||||||||
Kompara and Holbl [50] | ||||||||
Morales et al. [51] | ||||||||
Bharathi and Venkateswari [52] | ||||||||
Nidhya and Karthk [53] | ||||||||
Joshi and Mahopatra [54]. | ||||||||
Chaudhary et al. [55] | ||||||||
Hussain et al. [56] | ||||||||
Asam et al. [57] | ||||||||
Karchowdhury and Sen [58] | ||||||||
Roy et al. [59] | ||||||||
Sharma and Kang [60] | ||||||||
Hajar et al. [61] | ||||||||
Vignesh and Sivakumar [62] | ||||||||
Jabeen et al. [63] | ||||||||
Narwal and Mahopatra [64] | ||||||||
Proposed |
One: WBANs Architecture, Two: Signcryption schemes consideration, Three: Limitation and strength of WBANs security solutions, Four: Security Requirements, Five: Performance analysis, Six: Open Research Directions and future suggestion, Seven: Comparison with existing’s Surveys, Eight: WBANs applications, demonstrate a specific area covered, demonstrate a survey lake a specific area.