Skip to main content
. 2022 Jan 29;22(3):1072. doi: 10.3390/s22031072

Table 2.

Summary of the qualitative comparison of the existing surveys with the proposed survey.

Authors and Ref. No. One Two Three Four Five Six Seven Eight
Saleem et al. [32] × × × × × ×
Zhang et al. [33] × × × × × ×
Aqeel et al. [34] × × × × ×
Javadi and Razzaque [35] × × × ×
Saha and Anvekar [36] × × × × ×
Pathania and Bilandi [37] × × × × × ×
Kang and Adibi [38] × × × × × ×
Mainanwal et al. [39] × × × × × ×
Usha and Priya [40] × × × × × ×
Masdari and Ahmadzadeh [41] × × × ×
Naik and Samundiswary [42] × × × × ×
Al-Janabi et al. [43] × × × × ×
Sawaneh et al. [44] × × × × × × ×
Zou et al. [45] × × ×
Aman and Shah [46] × × × × ×
Narwal and Mohapatra [47] × × × × ×
Usman et al. [48] × × × × ×
Malik et al. [49] × × × × ×
Kompara and Holbl [50] × × ×
Morales et al. [51] × × × × ×
Bharathi and Venkateswari [52] × × × × × ×
Nidhya and Karthk [53] × × × × ×
Joshi and Mahopatra [54]. × × × ×
Chaudhary et al. [55] × × × × ×
Hussain et al. [56] × × ×
Asam et al. [57] × × × × ×
Karchowdhury and Sen [58] × × × × × ×
Roy et al. [59] × × × ×
Sharma and Kang [60] × × × × × ×
Hajar et al. [61] × ×
Vignesh and Sivakumar [62] × × × × × ×
Jabeen et al. [63] × × ×
Narwal and Mahopatra [64] × ×
Proposed

One: WBANs Architecture, Two: Signcryption schemes consideration, Three: Limitation and strength of WBANs security solutions, Four: Security Requirements, Five: Performance analysis, Six: Open Research Directions and future suggestion, Seven: Comparison with existing’s Surveys, Eight: WBANs applications, demonstrate a specific area covered, × demonstrate a survey lake a specific area.