SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Certificateless Remote Anonymous Authentication Schemes 
for Wireless Body Area Networks 
ABSTRACT: 
Wireless body area network (WBAN) has been recognized as one of the promising 
wireless sensor technologies for improving healthcare service, thanks to its 
capability of seamlessly and continuously exchanging medical information in real 
time. However, the lack of a clear in-depth defense line in such a new networking 
paradigm would make its potential users worry about the leakage of their private 
information, especially to those unauthenticated or even malicious adversaries. In 
this paper, we present a pair of efficient and light-weight authentication protocols 
to enable remote WBAN users to anonymously enjoy healthcare service. In 
particular, our authentication protocols are rooted with a novel certificateless 
signature (CLS) scheme, which is computational, efficient, and provably secure 
against existential forgery on adaptively chosen message attack in the random 
oracle model. Also, our designs ensure that application or service providers have 
no privilege to disclose the real identities of users. Even the network manager, 
which serves as private key generator in the authentication protocols, is prevented 
from impersonating legitimate users. The performance of our designs is evaluated 
through both theoretic analysis and experimental simulations, and the comparative
studies demonstrate that they outperform the existing schemes in terms of better 
trade-off betweendesirable security properties and computational overhead, nicely 
meeting the needs of WBANs. 
EXISTING SYSTEM: 
In WBAN, where biological information of concerns like heartbeat rate and blood 
pressure are gathered by the sensors around the body (in-body networks) and 
transmitted to body area network (BAN) controller nodes (out-body networks), 
such as PDA and smart phones, which serve as a gateway for anonymously 
accessing the services provided by external networks and servers. 
DISADVANTAGES OF EXISTING SYSTEM: 
1. leakage of privacy information due to WBAN's unique characteristics, such 
as open medium channel, signal noise, mobile terminals, flexible 
infrastructure, and so on. 
PROPOSED SYSTEM: 
1. We develop a new CLS scheme as the cryptographic primitive, which is 
cost-effective, efficient, and provably secure against existential forgery on 
adaptively chosen message attack in the random oracle model by assuming 
that CDHP is intractable. 
2. The proposed CLS scheme then serves as a design basis for two remote 
anonymous authentication protocols, which are particularly suitable for 
resource-constrained mobile clients. In particular, the protocols use an 
anonymous account index instead of a WBAN c lient’s real identity to access
WBAN service, thereby preventing the potential privacy leakage to 
application providers (APs) and network managers (NMs). 
3. A formal security analysis on our proposed protocols is conducted, laying a 
theoretic foundation for examining the soundness and performance of the 
similar designs. 
ADVANTAGES OF PROPOSED SYSTEM: 
Cost-effective, efficient, and provably secure against existential forgery. 
The protocols use an anonymous account index instead of a WBAN client’s 
real identity to access WBAN service. 
Examining the soundness and performance of the similar designs. 
SYSTEM ARCHITECTURE:
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

More Related Content

What's hot (17)

PDF
2013 14-ns2-project-titles-me-mtech
Pantech ProEd Pvt Ltd
 
PDF
2013 14-dotnet-titles-pantech-proed-for-me-mtech
Pantech ProEd Pvt Ltd
 
PDF
2013 14-embedded-project-titles-pantech-me-m tech-project-titles
Pantech ProEd Pvt Ltd
 
DOCX
The three tier security scheme in wireless
IMPULSE_TECHNOLOGY
 
PDF
2013 14-java-project-titles-me-tech-pantech
Pantech ProEd Pvt Ltd
 
PDF
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
Brain IoT Project
 
DOC
Code modulation based encryption & decryption technique for secure communicat...
Ecwayt
 
DOC
Code modulation based encryption & decryption technique for secure communicat...
Ecwayt
 
DOCX
message passing interface
ZTech Proje
 
PPTX
Network Security Thesis Topics
Phdtopiccom
 
DOCX
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
LogicMindtech Nologies
 
PDF
SAM-IoT: Securing low power device communication in critical infrastructure m...
Brain IoT Project
 
PDF
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
PPT
569
Akhil Kumar
 
PPTX
Wisenet - Complete ppt about the topic wisenet
Aboo Thahir
 
PDF
Solution note-cryptoflow-lan
cnnetwork
 
PPTX
Veena kakati
veena kakati
 
2013 14-ns2-project-titles-me-mtech
Pantech ProEd Pvt Ltd
 
2013 14-dotnet-titles-pantech-proed-for-me-mtech
Pantech ProEd Pvt Ltd
 
2013 14-embedded-project-titles-pantech-me-m tech-project-titles
Pantech ProEd Pvt Ltd
 
The three tier security scheme in wireless
IMPULSE_TECHNOLOGY
 
2013 14-java-project-titles-me-tech-pantech
Pantech ProEd Pvt Ltd
 
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...
Brain IoT Project
 
Code modulation based encryption & decryption technique for secure communicat...
Ecwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Ecwayt
 
message passing interface
ZTech Proje
 
Network Security Thesis Topics
Phdtopiccom
 
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
LogicMindtech Nologies
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
Brain IoT Project
 
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
Wisenet - Complete ppt about the topic wisenet
Aboo Thahir
 
Solution note-cryptoflow-lan
cnnetwork
 
Veena kakati
veena kakati
 

Viewers also liked (7)

PPT
Telehealth & Smart Home Applicaitons
zyxelamerica
 
PDF
Comp survey wireless_body_networks
Tracey Mc
 
PPTX
Mobile Transitions in Healthcare
Tracey Mc
 
PPTX
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
Maharishi markandeshwar University
 
PDF
Cloud computing in healthcare
Mohammad Al-Ubaydli
 
PDF
Cloud Computing in Healthcare IT
Mahindra Satyam
 
PPTX
wireless body area networks(WBAN)
kramsheeda
 
Telehealth & Smart Home Applicaitons
zyxelamerica
 
Comp survey wireless_body_networks
Tracey Mc
 
Mobile Transitions in Healthcare
Tracey Mc
 
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
Maharishi markandeshwar University
 
Cloud computing in healthcare
Mohammad Al-Ubaydli
 
Cloud Computing in Healthcare IT
Mahindra Satyam
 
wireless body area networks(WBAN)
kramsheeda
 
Ad

Similar to IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentication schemes for wireless body area networks (20)

DOCX
Certificateless remote anonymous authentication
Shakas Technologies
 
PDF
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
IJNSA Journal
 
PDF
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Karthikeyan Ece venkatesan
 
PDF
A lightweight and secure multilayer authentication scheme for wireless body a...
IJECEIAES
 
PDF
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
Karthikeyan Ece venkatesan
 
PPTX
a three tier approach for body area networks.pptx
RAJTANDON10
 
DOCX
Wireless body area network
subhradeep mitra
 
PDF
046209
Bala Murugan
 
PDF
Pre cardiac arrest detection
Karthikeyan Ece venkatesan
 
PPTX
Seminar on Body Area Networks
Vinayak Narayanan
 
PDF
Security Requirements, Counterattacks and Projects in Healthcare Applications...
arpublication
 
PDF
An Examination of Wireless Body Area Networks' Temperature and Reliability-Aw...
IRJET Journal
 
PPTX
Wban
pintu987
 
PDF
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
IJNSA Journal
 
PPTX
Wireless Body Area network
Rajeev N
 
PDF
Mitigation of packet loss with end-to-end delay in wireless body area network...
IJECEIAES
 
PPTX
Wireless Body Area Networks for healthcare (Wban)
no0orcom
 
PDF
IRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET Journal
 
PPTX
Wireless body area networks (RF based wireless networking technology)
smthanggam
 
Certificateless remote anonymous authentication
Shakas Technologies
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
IJNSA Journal
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Karthikeyan Ece venkatesan
 
A lightweight and secure multilayer authentication scheme for wireless body a...
IJECEIAES
 
A 128 bit secret key generation using unique ecg bio-signal for medical data ...
Karthikeyan Ece venkatesan
 
a three tier approach for body area networks.pptx
RAJTANDON10
 
Wireless body area network
subhradeep mitra
 
046209
Bala Murugan
 
Pre cardiac arrest detection
Karthikeyan Ece venkatesan
 
Seminar on Body Area Networks
Vinayak Narayanan
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
arpublication
 
An Examination of Wireless Body Area Networks' Temperature and Reliability-Aw...
IRJET Journal
 
Wban
pintu987
 
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
IJNSA Journal
 
Wireless Body Area network
Rajeev N
 
Mitigation of packet loss with end-to-end delay in wireless body area network...
IJECEIAES
 
Wireless Body Area Networks for healthcare (Wban)
no0orcom
 
IRJET- Survey on Wireless Body Area Network Security Algorithms
IRJET Journal
 
Wireless body area networks (RF based wireless networking technology)
smthanggam
 
Ad

More from IEEEBEBTECHSTUDENTPROJECTS (20)

DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEEBEBTECHSTUDENTPROJECTS
 
DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Temporal traffic dynamics improve the conn...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Proportional fair coding for wireless mesh...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Distributed detection in mobile access wir...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Discount counting for fast flow statistics...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Cloudy computing leveraging weather foreca...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS Algorithms for enhanced inter cell interfe...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 NS2 NETWORKING PROJECTS A hybrid hardware architecture for high sp...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Phase based-binarization-of-ancie...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Digital image-sharing-by-diverse-...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS An efficient-parallel-approach-fo...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Tension in active shapes
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Seamless view synthesis through te...
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Scale adaptive dictionary learning
IEEEBEBTECHSTUDENTPROJECTS
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Saliency aware video compression
IEEEBEBTECHSTUDENTPROJECTS
 

Recently uploaded (20)

PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PPTX
cybersecurityandthe importance of the that
JayachanduHNJc
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
PPTX
Ground improvement techniques-DEWATERING
DivakarSai4
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
cybersecurityandthe importance of the that
JayachanduHNJc
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Information Retrieval and Extraction - Module 7
premSankar19
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
Ground improvement techniques-DEWATERING
DivakarSai4
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Zero Carbon Building Performance standard
BassemOsman1
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 

IEEE 2014 NS2 NETWORKING PROJECTS Certificateless remote anonymous authentication schemes for wireless body area networks

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected] Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks ABSTRACT: Wireless body area network (WBAN) has been recognized as one of the promising wireless sensor technologies for improving healthcare service, thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make its potential users worry about the leakage of their private information, especially to those unauthenticated or even malicious adversaries. In this paper, we present a pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service. In particular, our authentication protocols are rooted with a novel certificateless signature (CLS) scheme, which is computational, efficient, and provably secure against existential forgery on adaptively chosen message attack in the random oracle model. Also, our designs ensure that application or service providers have no privilege to disclose the real identities of users. Even the network manager, which serves as private key generator in the authentication protocols, is prevented from impersonating legitimate users. The performance of our designs is evaluated through both theoretic analysis and experimental simulations, and the comparative
  • 2. studies demonstrate that they outperform the existing schemes in terms of better trade-off betweendesirable security properties and computational overhead, nicely meeting the needs of WBANs. EXISTING SYSTEM: In WBAN, where biological information of concerns like heartbeat rate and blood pressure are gathered by the sensors around the body (in-body networks) and transmitted to body area network (BAN) controller nodes (out-body networks), such as PDA and smart phones, which serve as a gateway for anonymously accessing the services provided by external networks and servers. DISADVANTAGES OF EXISTING SYSTEM: 1. leakage of privacy information due to WBAN's unique characteristics, such as open medium channel, signal noise, mobile terminals, flexible infrastructure, and so on. PROPOSED SYSTEM: 1. We develop a new CLS scheme as the cryptographic primitive, which is cost-effective, efficient, and provably secure against existential forgery on adaptively chosen message attack in the random oracle model by assuming that CDHP is intractable. 2. The proposed CLS scheme then serves as a design basis for two remote anonymous authentication protocols, which are particularly suitable for resource-constrained mobile clients. In particular, the protocols use an anonymous account index instead of a WBAN c lient’s real identity to access
  • 3. WBAN service, thereby preventing the potential privacy leakage to application providers (APs) and network managers (NMs). 3. A formal security analysis on our proposed protocols is conducted, laying a theoretic foundation for examining the soundness and performance of the similar designs. ADVANTAGES OF PROPOSED SYSTEM: Cost-effective, efficient, and provably secure against existential forgery. The protocols use an anonymous account index instead of a WBAN client’s real identity to access WBAN service. Examining the soundness and performance of the similar designs. SYSTEM ARCHITECTURE:
  • 4. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.