T. Vanitha, A. Chethana


The WBANs enhance the efficiency of healthcare since someone is not required to go to a hospital frequently. The clinical diagnosis plus a handful of emergency medical response may also be recognized using the WBANs. Therefore, you have to design a dependable access control plan that is capable of doing authorizing, authenticating and revoking a person to get involved with the WBANs. A user’s public secret's computed within the identity information, for example identification figures, e-mail addresses and IP addresses. The user’s private secret's created getting a dependable 3rd party named private key generator. We design an access control request that WBANs when using the CLSC with public verifiability and ciphertext authenticity. The SP is the reason the registration for your user along with the WBAN and creating a partial private key for the user along with the private keys for the WBAN. Authentication makes certain that just the approved user possess the WBAN. Integrity makes certain that a problem message inside the user is not altered with a few unauthorized entities. Our methodology uses CLSC with public verifiability and ciphertext authenticity. Such design will get the advantages below: i) it's neither key escrow problem nor public key certificates. ii) it enables the controller to discover the valid of query messages without understanding. Instead of the conventional public key infrastructure which relies on a digital certificate to bind a status along with an public key, the identity based cryptography doesn't need digital certificates.


Clinical Diagnosis; Wireless Body Area Networks; Security; Access Control; Signcryption; Certificate Less Ciphertext Authenticity


N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 3156. New York, NY, USA: Springer-Verlag, 2004, pp. 119–132.

P. S. L. M. Barreto, B. Libert, N. McCullagh, and J.-J. Quisquater, “Efficient and provably-secure identity-based signatures and signcryption from bilinear maps,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3788. New York, NY, USA: Springer-Verlag, 2005, pp. 515–532.

G. Cagalaban and S. Kim, “Towards a secure patient information access control in ubiquitous healthcare systems uses identity-based signcryption,” in Proc. 13th Int. Conf. Adv. Commun. Technol. (ICACT), Seoul, Korea, Feb. 2011, pp. 863–867.

C. Hu, F. Zhang, X. Cheng, X. Liao, and D. Chen, “Securing communications between external users and wireless body area networks,” in Proc. 2nd ACM Workshop Hot Topics Wireless Netw. Secure. Privacy (Hotwire), Budapest, Hungary, 2013, pp. 31–35.

Y. Zheng, “Digital signcryption or how to achieve cost(signature & encryption) cost(signature) + cost(encryption),” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 1294. New York, NY, USA: Springer-Verlag, 1997, pp. 165–179.

P. S. L. M. Barreto, A. M. Deusajute, E. de Souza Cruz, G. C. F. Pereira, and R. R. da Silva, “Toward efficient certificateless signcryption from (and without) bilinear pairings,” in Proc. Brazilian Symp. Inf. Comput. Syst. Secure., 2008, pp. 115–125.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at