Table 2.
Summary of the qualitative comparison of the existing surveys with the proposed survey.
| Authors and Ref. No. | One | Two | Three | Four | Five | Six | Seven | Eight |
|---|---|---|---|---|---|---|---|---|
| Saleem et al. [32] | ||||||||
| Zhang et al. [33] | ||||||||
| Aqeel et al. [34] | ||||||||
| Javadi and Razzaque [35] | ||||||||
| Saha and Anvekar [36] | ||||||||
| Pathania and Bilandi [37] | ||||||||
| Kang and Adibi [38] | ||||||||
| Mainanwal et al. [39] | ||||||||
| Usha and Priya [40] | ||||||||
| Masdari and Ahmadzadeh [41] | ||||||||
| Naik and Samundiswary [42] | ||||||||
| Al-Janabi et al. [43] | ||||||||
| Sawaneh et al. [44] | ||||||||
| Zou et al. [45] | ||||||||
| Aman and Shah [46] | ||||||||
| Narwal and Mohapatra [47] | ||||||||
| Usman et al. [48] | ||||||||
| Malik et al. [49] | ||||||||
| Kompara and Holbl [50] | ||||||||
| Morales et al. [51] | ||||||||
| Bharathi and Venkateswari [52] | ||||||||
| Nidhya and Karthk [53] | ||||||||
| Joshi and Mahopatra [54]. | ||||||||
| Chaudhary et al. [55] | ||||||||
| Hussain et al. [56] | ||||||||
| Asam et al. [57] | ||||||||
| Karchowdhury and Sen [58] | ||||||||
| Roy et al. [59] | ||||||||
| Sharma and Kang [60] | ||||||||
| Hajar et al. [61] | ||||||||
| Vignesh and Sivakumar [62] | ||||||||
| Jabeen et al. [63] | ||||||||
| Narwal and Mahopatra [64] | ||||||||
| Proposed |
One: WBANs Architecture, Two: Signcryption schemes consideration, Three: Limitation and strength of WBANs security solutions, Four: Security Requirements, Five: Performance analysis, Six: Open Research Directions and future suggestion, Seven: Comparison with existing’s Surveys, Eight: WBANs applications, demonstrate a specific area covered, demonstrate a survey lake a specific area.