Browse Definitions :
Definition

medical body area network (MBAN)

An MBAN (pronounced M-ban) is a medical body area network (BAN) composed of low-power wearable or implanted wireless medical devices. 

Wearable devices are typically low-cost, disposable sensors that stick to the body and free the patient from being being physically tethered to monitoring devices. Embedded devices may be sensors that are swallowed for short-term monitoring or placed in the body during surgery to monitor physical parameters during and after the healing process.

The sensors transmit patient data wirelessly to a control device located either on the patient’s body or in close proximity to it. The control device, which functions as a message broker, forwards data from the sensors to a workstation in real time over a wireless local area network (WLAN).  

In 2012, the Federal Communications Commission (FCC) set aside 40 MHz of protected spectrum in the 2360-2400 MHz band specifically for wireless medical devices. The dedicated spectrum for medical data has made medical data transmission both more reliable and faster and prevented interference from Wi-Fi devices.  

MBAN devices using the protected spectrum operate under a license-by-rule basis; devices must have Food and Drug Administration (FDA) approval before they can be used in hospitals, but individuals do not need to apply for transmitter licenses.

See also: Internet of Medical Things (IoMT)

 

This was last updated in January 2016

Continue Reading About medical body area network (MBAN)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close