1. Introduction
Wireless communications, distributed processing, micro-electro-mechanical systems, wireless sensor applications, and embedded systems have all contributed to a significant revolution in Wireless Sensor Networks (WSNs). A WSN is a collection of distributed sensors that monitor and record the physical conditions of the environment, then organize and transmit the data to a base station [
1]. WSNs have been employed in a variety of applications, including medical surveillance and monitoring. Medical monitoring has grown in importance as a control system that provides real-time data and communication. The term “WBANs” refers to the use of WSN in medical applications. A WBAN is a special type of sensor network that uses the internet to connect patients with medical service providers to communicate vital health information [
2]. WBANs is a critical wearable and implant network for health diagnostics, monitoring, and regulating actuators by sensing various important data from various wireless sensors (deployed in/over the body). It has several advantages, including location-independent monitoring, no effect on patients’ mobility, early disease identification and prevention, and remote patient help, among others. As a result, it’s ideal for continuous monitoring, providing for precise diagnosis and real-time feedback to medical experts [
3].
WBANs are an Internet of Things (IoT) application that aims to improve the quality of patient services [
4]. The IoT market is estimated to exceed 19 trillion USD in the next several years [
5]. By 2025, it is estimated that about 100 billion IoT devices will be in use around the world, with an estimated economic worth of more than USD 11 trillion [
6]. WBANs are one of the most capable wireless sensor technologies for health care, allowing users of healthcare systems to communicate real-time data for essential applications such as remote health monitoring, sports, home/patient care, emergency response, and early intrusion detection [
7,
8,
9,
10]. However, the lack of adequate data sharing protection in such a networking paradigm allows rogue users to execute illicit acts on sensitive medical data. As a result, there is a significant loss of sensitive data and user privacy, which has a significant impact on patients. For example, if a patient has a heart attack, a wearable gadget, or wireless sensors (deployed over or in his/her body) can detect it. Thus, in a public network, user and data protection is essential, allowing a doctor to begin therapy immediately [
11,
12].
An effective security framework is necessary to secure the security of the WBANs system. Authentication and confidentiality are two of the most important security concerns in WBANs that must be addressed. Security and authentication are generally addressed through the use of encryption and digital signatures [
13]. It is common to use the sign-then-encrypt method when both encryption and signing are required at the same time. Complicated cryptographic procedures, on the other hand, are not possible due to the strict limitations associated with low-end WBANs sensing devices, including limited onboard energy and CPU capabilities. Due to the use of an amalgamated approach known as ‘signcryption’, it is possible to overcome such a stumbling block [
14]. Moreover, because of its lower cost, it is far more appropriate for resource-constrained scenarios such as WBANs than the alternative of using signatures followed by encryption.
1.1. Communication Architecture of WBANs
Data communication could be separated into multiple layers of communication when considering the entire WBANs ecosystem. It should be emphasized that when a person in this scenario moves, his or her body may also be moving. As a result, the placement of the sensors involved in this scenario may fluctuate, implying that WBANs are not considered static. In general, the WBANs standard [
15,
16,
17] recognizes three levels of communication:
1.1.1. Tier-1: Intra-BAN Communications
The communication at this tier can be wired/wireless. Zimmerman [
18] suggests this method of communication. Only the sensors and the sink are connected in intra-BAN communication [
19]. This tier’s communication range is about 2 m in and around the human body. As the sensors are essentially positioned within this connection range, this tier is vital. This is why the manner of communication is limited in range. In this layer, ZigBee [
20] and Bluetooth [
21] are employed as communication technologies. Sensors monitor physiological attributes and send the data to a sink, which is positioned within this tier’s borders. The sink’s function is to process and transfer the data to Tier 2 [
17,
22,
23].
1.1.2. Tier-2: Inter-BAN Communications
In this layer, communication occurs between the sink and one or more Access Points. In another possibility, there could be infrastructure that installs Access Points, or the Access Points could be purposefully placed in a dynamic environment to properly manage emergency occurrences. The purpose of this tier is to provide interconnection between various forms of easily available networks, such as cell phone networks (or the Internet) and WBANs. This tier can leverage wireless technologies such as 3G/4G, cellular, ZigBee, Wireless Local Area Networks (WLANs), and Bluetooth [
17,
22,
23].
1.1.3. Tier-3: Beyond-BASN Communications
Metropolitan Area Networks (MANs) were the inspiration for this layer. The medical sensor is linked to the Internet or any other network that transports data to the recipients, allowing medical and health professionals to view the data. The individual who receives the gift could be a doctor or a nurse [
23]. The information could potentially be saved in the patient’s database. As a result, the database plays a crucial role in Tier-3. The patient’s/profile, users as well as his/her medical history, is maintained in the database. When this happens, the doctor will receive a notice indicating that the patient’s condition is deteriorating, and the needed action can be taken using the database record before the patient arrives at the hospital [
17,
22].
The most essential components of Tier-3’s are the medical environment and database, which contain the user’s medical history and profile. As a result, doctors/patients can be notified of a medical emergency via the Internet or text messaging. Tier-3 additionally ensures that any important patient data that can be used for therapy is restored [
23]. Depending on the application, the sink-in in Tier-1 can communicate with an AP through 3G/4G/GPRS instead.
The necessary WBANs communication layers are depicted in
Figure 1. In Tier-1 communication, two BANs are illustrated in the illustration, with on-body nodes and implanted nodes spread throughout the body. All nodes are either directly connected to the hub or through a relay node.
1.2. WBANs Applications
WBANs are being used in a variety of fields, including medical, entertainment, military, and sports [
23]. WBANs have an important role in the medical industry, both in terms of saving lives and transferring patient information in an emergency [
24]. WBANs entail the implantation of sensors on the human body that will monitor the patient’s health state in real-time. Any abnormal changes in the patient’s health, such as high fever, a low heart rate, or other symptoms, will be communicated to the doctor via the internet for prompt action [
25]. An implantable sensor and a wearable sensor are the two types of WBANs applications that have been classified [
26]. A sensor that is implanted into the human body with the use of surgery and is not meant to be removed from the patient’s body is known as an implantable sensor. When patients need to be monitored, a wearable sensor is used, which is worn by the patient and provides the necessary information. The Wearable Sensor node, on the other hand, assists in the identification of patient movement and abnormal positions. It is possible to remove wearable sensors from a patient’s body at any time. As an example, a wearable personal digital assistant can assist in the monitoring of blood glucose, body temperature, SpO2, the functioning of the heart, and blood pressure [
27].
WBANs are being used to develop a wide range of applications, including remote healthcare, ambient assisted living, and even user-centric applications like gaming and smart homes, as illustrated in
Figure 2. In recent years, there has been a great deal of interest in the field of human activity recognition [
28]. But there is a rapid expansion of the use of WBANs in healthcare applications, where, among other things, remote medical supervision could be advantageous for eldercare, early detection, and treatment of conditions including chronic diseases. The elderly might feel more independent in their daily routines with the support of ambient assisted living applications. Similarly, WBANs is useful in the entertainment industry because it aids in the transfer of data streaming operations.
In addition, WBANs are used to monitor a player’s practice as well as his or her physical fitness in sports such as hammer throwing, swimming, water volleyball, cricket, football, and other similar activities. By analyzing sensing data, it is possible to develop specialized measures to improve their performance while also maintaining their health [
29]. Wearable sensors respond to body movement during water sports like swimming and water volleyball by switching communication media from air to water or vice versa. For such applications, a water-resistant sensor enclosure is required, as well as clever MAC protocols that can switch communication media on demand. In addition, WBANs are extremely important in the military since they allow medical personnel to monitor a soldier’s health and locate him in the event of an emergency.
Disaster relief and emergency response scenarios such as fire and flood rescue are expected to utilize WBANs in the future [
30]. When body sensors are used in disaster relief, distress signals are sent that can be picked up by rescue equipment or relayed or supplied by neighbouring BANs [
31]. As a result, WBANs applications now have an important new dimension that requires not only intra-BAN but also inter-BAN communication capabilities in a cross-medium environment. Different types of sensors, such as temperature sensors, multimedia sensors, and so on, are used in conjunction with GPS in these applications. As a result, the data size varies depending on the type of sensor used. The fact that flood rescue sensors can transmit data across water and air necessitates the adoption of smart MAC protocols.
Sensors are used in, on, or around the human body in all of these applications, and they also collect information about the user’s behaviour. Therefore, humans are inextricably linked to the system, raising concerns about its overall security and reliability. For example, data integrity is a critical requirement for WBANs applications because incorrect information about a person’s body vitals could result in incorrect treatment and, as a result, fatal consequences. It is also critical for these applications to protect user data confidentiality because sensitive information about user behaviour and their daily lives could be revealed, which could pose a threat to their social well-being. Even the slightest bit of information or misinformation about a player’s fitness has the potential to harm their reputation. Consequently, WBANs applications should be made more secure overtime to assure the precision and long-term durability of the monitoring applications for which they are designed. It is becoming increasingly vital to set rigorous security requirements as more and more parties become involved with such applications.
1.3. Authors Motivation and Contributions
Recently, there has been a lot of interest in authentication research in the WBAN’s security field. To improve the security of WBANs, plenty of comprehensive survey and analysis of the existing state-of-the-art authentication approaches has been proposed in the literature. However, authentication, as well as confidentiality, are important aspects of WBANs security. Unfortunately, none of the existing surveys cover signcryption (authentication, confidentiality) solutions.
Table 1 presents a summary of qualitative comparisons between previous surveys and the proposed survey. Following are some of the major contributions.
A quick overview of WBANs technology, applications security requirements, and architecture that provides readers with a basic understanding of the research domain.
To the best of our knowledge, the current study surveys all signcryption approaches proposed for securing WBANs infrastructure. Additionally, the schemes have been thoroughly examined, analyzed, and compared.
Based on the methods utilized, this survey classifies existing signcryption schemes into six categories: Attribute-based signcryption schemes, Identity-based signcryption schemes, PKI-based signcryption schemes, Certificateless signcryption schemes, Certificate-based signcryption schemes Heterogeneous signcryption schemes. Additionally, each scheme’s strengths and flaws are assessed and compared to the others.
This survey not only gives a thorough examination of the existing signcryption schemes for WBANs security and privacy criteria but also detailed explanations of the attacks that target these schemes.
Qualitative analysis of related surveys is carried out to show the novelty of the proposed survey.
Future research directions, opportunities, and open issues have been offered.
1.4. Paper Organization
The rest of this survey is divided into seven sections, which are listed below.
Section 2 provides the summary of WBANs security surveys. In
Section 3, security requirements and taxonomy of WBANs signcryption schemes based on the type of cryptography were discussed. In
Section 4, the efficiency of the signcryption schemes is compared based on computation time, communication overhead, security hardness, and security strength.
Section 5 outlines WBAN’s future research possibilities and directions with a conclusion as shown in
Figure 3.
2. Related Security Survey Presented for WBANs
The primary goal of this review study is to provide an overview of the most recent signcryption security research papers as well as upcoming trends in WBANs security. Through
Figure 4, the authors’ process for selecting appropriate research papers relevant to the survey is depicted in diagrammatic form. The research keywords that were used in the search selection: “WBANs security, WBANs security survey, WBANs security requirements, and WBANs application”. The relevant information about our research is dispersed across the various conferences, chapters, and journals that have been published in the past. To extract relevant materials, the most widely used online repositories, such as IEEE Explore, Springer, Science Direct, etc. A manual search in the relevant area was also carried out as a second step. Besides, we reviewed all the security surveys (to the best of our knowledge) in the domain of WBANs as shown in
Figure 5.
In 2009, Saleem et al. [
32] highlighted the main security requirements and Denial of Service (DDoS) concerns in WBANs. In addition, the authors provide a broad overview of security essentials and highlight existing WBANs threats at several layers. Finally, the authors give a thorough assessment of existing security protocols for WBANs.
In 2011, Zhang et al. [
33] attempted to investigate the probable resource-constrained WBANs attacks and present a review of communication protocols, cryptographic algorithms, and key management procedures pertinent to the security of WBANs. The authors also examine existing solutions’ flaws and probable future research areas in WBANs security.
In 2013, Aqeel et al. [
34] attempted to offer a critical analysis of potential WBANs authentication techniques. The IEEE 802.15.6 standard is used to guide the discussion and reviews. In WBANs, Javadi, and Razzaque [
35] examine major security and privacy issues as well as potential threats. The authors also discuss an unsolved Quality of Service (QoS) problem in WBANs that has the potential to cause major security difficulties. Finally, the authors outline future directions that could be pursued.
In 2014, Saha and Anvekar [
36] presented a state-of-the-art in existing WBANs security aspects. Additionally, the authors also highlight several significant security challenges. Pathania and Bilandi [
37] give an outline of WBANs and related challenges, with a focus on the security issue. The authors also discuss security attacks in WBANs and security necessities in WBANs, as well as a vulnerability assessment.
In 2015, Kang and Adibi [
38] investigated the security features of application and communication protocols. The authors also discuss the architecture, vulnerabilities, and attacks, as well as future opportunities. Mainanwal et al. [
39] summarized the benefits and drawbacks of different security and privacy solutions used in WBANs. The threats and constraints that WBANs face is also discussed. Finally, a discussion on possible future research directions is held. Usha and Priya [
40] address various types of attacks, prevention strategies, and simulation tools for WBANs.
In 2016, Masdari and Ahmadzadeh [
41] conducted a comprehensive review and analysis of the numerous authentication schemes offered in the literature to increase the security of WBANs. Furthermore, the authors discuss the benefits and drawbacks of various authentication techniques, as well as a full comparison of their features and capabilities. Finally, the authors outline future directions that could be pursued. A broad overview of WBANs and WSNs is presented by Naik and Samundiswary [
42]. In addition, the authors discuss WBAN security protocols, including their advantages and disadvantages.
In 2017, based on recent publications and standards, Al-Janabi et al. [
43] examined the communication architecture of WBANs, as well as the security and privacy needs, security threats, and the major issues that these systems face. The survey also includes information on the most up-to-date security measures and studies in WBANs. Finally, potential topics for future research and development are investigated. A survey report by Sawaneh et al. [
44] focuses on building and implementing WBANs in healthcare systems. In addition, the authors provide a brief overview of WBAN security and privacy requirements. Zou et al. [
45] examine the applicability of a variety of secure communication technologies within WBANs and between external organizations and WBANs. Furthermore, their research emphasizes the importance of primary security requirements for secure transmission at both levels. Aman and Shah [
46] conduct a thorough review of significant studies on mobile, ubiquitous, and WBANs, focusing on routing and security challenges.
In 2018, Narwal and Mohapatra [
47] attempted to provide a comprehensive analysis of several authentication approaches. The authors also provide a complete analysis of the schemes based on security attacks, security features, and a variety of other factors. Usman et al. [
48] provide a succinct overview of WBAN security. The authors suggest a taxonomy that provides a simple manner of classifying entities involved in healthcare systems. Security issues have been investigated at all WBANs layers. The authors have done an excellent job of identifying outstanding topics and potential research directions. Malik et al. [
49] present a broad overview of major security requirements and potential attacks in WBANs at various layers of the OSI model. After providing an overview of WBANs for healthcare monitoring, the survey addresses cryptographic solutions for addressing security and privacy issues. Kompara and Holbl [
50] focus on the security and key agreement of intra-BAN communication. It gives a thorough analysis of existing key agreement methods and categorizes them into four groups: classic, physiological value-based, secret key-based, and hybrid key-based schemes. In addition, each class is described, and the security of WBANs against threats is assessed.
In 2019, Morales et al. [
51] proposed several WBANs design solutions as well as a detailed assessment of security services. Overall, the survey aims to provide a holistic security picture of the entire WBANs system. Bharathi and Venkateswari [
52] give a general overview of WBANs, their applications, and security concerns. Based on the most recent evaluations and publications, many security issues, and responses in WBANs are discussed. A systematic literature evaluation on the security and privacy issues of electronic healthcare record systems in WBANs is presented by Nidhya and Karthk [
53]. WBANs Authentication protocols have design issues, according to Joshi and Mahopatra [
54]. In addition, the authors suggest important prospects for research communities. Chaudhary et al. [
55] explore the security and privacy difficulties with WBANs, provide remedies, and describe the type of authentication technique employed. Hussain et al. [
56] provide an overview of WBANs and their properties, as well as numerous authentication types and schemes classification. It also compares and contrasts various authentication techniques, highlighting their advantages, disadvantages, performance evaluation, and robustness against various security attacks. Finally, the authors outline future directions that could be pursued. Asam et al. [
57] present a thorough assessment of the issues in WBANs from the perspectives of communication and security. Regrettably, the authors provide only a cursory review while ignoring major security concerns. In a WBANs study, Karchowdhury and Sen [
58] look at major security requirements and Denial of Service concerns.
In 2020, Roy et al. [
59] presented a comprehensive analysis of WSNs and WBAN’s security and privacy challenges. The authors examine the characteristics, architecture, performance measures, and applications of both in-depth, and then conduct a comparative analysis. Finally, researchers are offered open research challenges. Sharma and Kang [
60] examine and evaluate WBAN’s routing, security, energy, and cost-cutting problems.
In 2021, Hajar et al. [
61] give a complete overview of WBANs technology with a special focus on security and privacy concerns and countermeasures, as well as proposed research directions and open issues. The authors, on the other hand, were only interested in authenticating schemes. Vignesh and Sivakumar [
62] cover numerous security procedures and routing issues that WBANs face, as well as attacks that could occur through the network and a review of some of the mechanisms that are in place to prevent them. The authors also look into the security of various attack scenarios. Finally, the study summarizes the primary challenges the users encounter while creating a network in WBANs, which is a new branch of science in the face of the pandemic. A systematic literature review of the different security approaches for WBANs is presented by Jabeen et al. [
63]. The authors identify research topics to investigate the feasibility of multiple attacks while keeping memory restrictions in mind. To guarantee that the schemes are relevant to the research subject, a quality assessment is undertaken. Furthermore, the schemes are considering from 2016 to 2020 to focus on recent work. Several existing techniques are investigated in the literature to see how the security of transmitting patients’ healthcare data might be improved. Based on relevant qualities, data security techniques using AES, ECC, SHA-1, and hybrid encryption are evaluated. Finally, the authors assess security in the context of several attack scenarios. Narwal and Mahopatra [
64] outline and discuss various security and authentication schemes and solutions. Unlike earlier surveys that have looked at security and authentication in WBANs in a piecemeal fashion to cover main research topics, this study has taken a holistic approach to security and authentication in WBANs. A detailed assessment of security essentials, security risks, attackers and their attack techniques, and presently available countermeasures have been provided, as well as a complete description of security mechanisms in WBANs. The authors also examine the uses of WBANs, open research challenges, recommendations, and future developments. Overall, the study delves into WBANs functionality, technology, building blocks, and a much broader picture of WBAN’s security and authentication.
WBANs are a well-established research topic that has been around for a while. As a result, numerous overview and survey papers have been published in the field, compiling research on various aspects of the field. The surveys mentioned above are primarily aimed at authentication, architecture, security, and challenges, among other things. Security requirements, applications, signcryption schemes, the classification of existing signcryption schemes based on the type of cryptography and algorithm, an overview of newly introduced schemes, a compiled list of schemes’ security properties, and an overview of methods for security and performance evaluations are all included in this paper’s contributions.
The fundamental purpose of this study is to create a clear and thorough classification, analysis, and comparison of the WBAN signcryption schemes. As compared to the previously mentioned studies, this survey includes (i) an in-depth analysis of how well each signcryption scheme fulfills the security requirements of a WBANs; (ii) detailed information about which specific security requirements are addressed by signcryption schemes; and (iii) an in-depth analysis of how well each signcryption scheme performs in terms of computational time, communicational overheads, and security strength.
Table 2 summarizes the qualitative comparison of previous surveys with the proposed.
6. Conclusions, Discussion, and Future Work
Signcryption is a critical factor of secure communication; it is the first step toward secure communication and assists networks in decreasing unwanted users and avoiding deceptions. Until now, no survey has conducted an in-depth examination of secure signcryption procedures in WBANs; the proposed study is the only one that does so, and it may be of interest to readers and new researchers in this specialized field. In the table forms, we have displayed useful information or features of several signcryption techniques. In addition to the tables, we have developed numerous diagrams to show the architecture, taxonomy, and efficiency analysis of all (to the best of our knowledge) signcryption schemes covered in this survey, in addition to the tables. The survey starts with some basic information about WBANs, such as architecture, applications and security requirements. These details are crucial for new readers to gain a better understanding of WBANs architecture, while also assisting different designers in the development of various signcryption schemes. According to our survey, WBANs signcryption schemes are classified as Attribute-based signcryption, Identity-based signcryption, PKI-based signcryption, Certificateless signcryption, Certificate-based signcryption, and Heterogeneous signcryption techniques. This survey also explains all the secure signcryption schemes in WBANs, divides them into categories depending on the hardness algorithm utilized, and describes each hardness methodology in depth. A full explanation is drawn at the end of the section, which illustrates various aspects of each scheme based on the hardness algorithm, security properties, and strength of the schemes.
Finally, the survey completes with a conclusion and future directions section, which not only draws a few findings but also identifies several important research areas that should be investigated shortly. As WBANs are one of the most promising developing technologies in the field of E-health, and shortly, they will fundamentally revolutionize people’s healthcare systems by providing a plethora of services and freeing them from the need to attend traditional hospitals. Apart from its importance in the realm of E-health, WBANs face numerous security risks as a result of wireless communication. Signcryption is an increasingly essential problem about secure communication in WBANs, thus it is critical to have safe signcryption solutions; these help the network reduce unwanted users and protect them from illegal activities.
Notably, the solutions offered in the literature for securing the WBANs environment are not efficient in some aspects, they fall short of meeting the necessary requirements for security. As the solutions based on certificateless cryptography that have been adopted for WBANs are generally hampered by the distribution of partial keys. In contrast to the solutions based on Identity-Based Cryptography, which can be affected from key escrow while Certificate-Based Cryptography are not suitable for large numbers of users.
WBAN solutions are frequently utilised in data-intensive applications where patients generate large volumes of data. The data is saved on a cloud server where machine learning tools extract, prepare, and analyse it. The algorithm takes a few days to several months to process. Important issues to consider when using this method include security issues.
The majority of the devices that are used in the WBANs domain are limited in terms of resources. These devices are limited in terms of computational power and storage capacity. As obvious from our survey, the signcryption solutions that have been implemented for WBANs are time-consuming. The solutions that are currently available were constructed using asymmetric algorithms such as bilinear pairing and ECC. According to Hussain et al. [
94], ECC and Bilinear Pairing are unsuitable for resource-limited technologies due to their high energy consumption. An alternative cryptographic algorithm such as the HCC or the Chebyshev chaotic map should be implemented to achieve a better balance between energy consumption and security strength. Ideally, the signcryption solution should be able to provide appropriate security while consuming minimum energy on the resource-constrained devices of WBANs.
In this survey, we discussed analysed all the existing signcryption schemes proposed for WBANs. However, there is no signcryption method or scheme that can guarantee perfect communication security. Designing a secure WBANs signcryption system necessitates an appropriate mapping of signcryption methods or schemes with various signcryption parameters. We analyzed numerous signcryption methods in this survey study, divided them based on the security hardness algorithm utilized, and highlighted their benefits, drawbacks, limitations, and resilience against various security threats; these may be useful for enhancing the signcryption process in WBANs. However, additional effort is required to design a novel signcryption scheme that meets the stringent secure communication requirements of WBANs applications. The multi-criteria decision-making approach is used for a comparative examination of the existing signcryption schemes. Since WBANs are still in their infancy, they face several challenges. As a result, it is critical to implement effective solutions to address these difficulties. Secure signcryption has recently emerged as one of the major issues in this sector, and more effort will be necessary in the future to address this issue. As technology improves, it is becoming more challenging to construct lightweight secure signcryption mechanisms for devices with constrained resources.
The challenges of security for WBANs are discussed in this study. Due to the sensitivity of the sensor messages being transferred to and from the human body, the WBANs technology places a premium on security. We identify many key security requirements for Signcryption, which are essential for assuring security in WBANs. It is important to analyse the strengths and weaknesses of all signcryption schemes, as well as their compliance with security standards, attack resistance, and overall performance. To aid researchers and developers in identifying and distinguishing essential aspects of WBAN security, the security and efficiency of existing WBANs Signcryption methods are reviewed. For those working on unique security solutions for WBANs, we hope that this work will serve as a guide and a reference in the future.
Future research will need to improve existing signcryption approaches, as well as propose a new WBANs scheme based on maintaining a trade-off between efficiency and security. There may be a need for increased adaptability and interoperability with sensing equipment from different vendors when developing a secure WBAN signcryption solution.
Due to intensive pairing processes, most of the authors’ use pairing-based cryptography, which is inefficient notably in the implementation of WBANs. Hence, developing an effective WBAN signcryption technique is a task that remains unsolved.
It is necessary to investigate the security proofs of existing solutions in order to demonstrate the security of WBANs not only in the ROM but also in the standard computational model. Unfortunately, none of the existing’s solutions are proven under the standard computational model.
To improve the approach taken by Noor et al. [
85], which does not involve the use of a secure channel for the distribution of partial keys among the entities, additional work must be done. Even though the authors did not give any formal or informal evidence. The solution of Noor et al. [
85] needs to be further polished with the assumption of HCDLP under the standard computational model. Because of its minimal key size and compact security, the HCDLP should be properly considered when constructing secure WBANs-based signcryption solutions using a standard computational model.
Lightweight secured schemes that are easy to manage will be required in the future for intelligent environments like smart homes, particularly in the field of WBANs, to manage security and provide quick responses to users. Another requirement is to develop signcryption methods that provide a better trade-off between energy consumption and security strength, which can be accomplished by reducing the complexity of the schemes used in the signcryption process. To sum it up, there are still many challenges to overcome on the road to developing an unobtrusive, user-friendly, and secure WBANs system. Additionally, there are numerous new research directions in WBANs that must be investigated as soon as possible.