An Intelligent and Secured Privacy Preserving Framework For Wireless Body Area Networks (WBANs)

In recent years, developments in information technology and emerging technologies have greatly benefited e-health. The adoption of Wireless Body Area Networks is a perfect example (WBAN). The WBAN is a popular device. Medical care can be delivered remotely to patients in their own homes via tele-homecare (also known as tele-diagnosis). Diabetes, dementia, falls, congestive heart failure, asthma, and infertility are among the conditions for which they are prescribed. An emergency response time could be sped up by using WBANs to monitor patients' health in real time. From a more traditional strategy to a more updated patient-centered one has been seen in recent years. Telemedicine and telemonitoring are two examples of current patient-centered practises that use technology to make it easier for patients to provide personal information. Telemonitoring has been discovered as a feasible research subject using the most up-to-date methods of turning raw data into meaningful information. WBAN stability is dependent on preventing node overheating and conserving energy. LB-EESAA routing mechanism for WBANs and the early warning system for attacks during Blockchain transactions are discussed in this study. Results show that LB-EESAA performs best in terms of both the number of live and dead nodes and the length of protocol stability. We were able to raise the level of security of the organisation after increasing the efficiency of WBANs. We examined the read throughput and basic transaction throughput of a blockchain-enabled system. After assuring and safeguarding the privacy of the system, we used the Logi-XGB prediction model machine learning to forecast assaults. Using the Logi-XGB model, 95.7 percent of the assault could be predicted in its early stages. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.


Introduction
E-health has benefited greatly from recent developments in new technologies and the information technology field. Wireless Body Area Networks (WBAN) adoption is a specific example of this. The WBAN is widely used in a variety of scenarios. A primary usage for these devices is in the field of tele-homecare (also known as tele-diagnosis), which is the practice of providing remote medical care to patients at home. Other medical situations where they are used include the treatment of diabetes and dementia, falls, congestive heart failure, asthma, and infertility. With WBAN, patients' health may be better tracked in real time, allowing for faster response in the event of an emergency. In the context of mobile healthcare, wireless body area networks (WBANs) might be viewed as a key enabler. Sending sensor readings to a hospital or medical center's computers allows medical personnel to assess the data. As monitoring may be done in real-time and over a longer length of time even at home, these devices cut the large expenditures associated with ambulant patients in hospitals. A WBAN's sensors and Internet servers must be encrypted to preserve the patient's privacy when transmitting healthrelated data to and from each other. This data must also be Muhammad Shoaib Akhtar, Tao Feng 2 collected by medical professionals who are certain that it has not been tampered with and indeed belongs to the patient. By integrating health-related things like sensors and remotely observed medical devices for the patient record, the internet of health things (IoHT) provides exceptional help in the field of healthcare, resulting in smarter and more efficient devices. In this study, we proposed an IoT with a cloud-based clinical decision support system for prediction and monitoring of illness severity levels using 5G services and block-chain technologies. [1]- [6]. Because of its transparency, a block-chain is a secure mechanism for storing and distributing information. In healthcare, blockchain has numerous uses. It has a number of useful functions, including secure patient medical data transmission, drug supply chain management, and genetic code unlocking assistance for healthcare researchers. Security, authentication, immutability, distributed ledger, and decentralized storage are just a few of the built-in properties of block chain. It has now moved from hype to reality by giving practical applications in industries such as healthcare. [7]- [9]. The security aspects of block chain, such as keeping a decentralized, incorruptible, and transparent log of all patient data, make it a particularly effective alternative for dealing with system security challenges. Furthermore, block chain maintains an individual's privacy using complicated and secure codes that give excellent protection for the sensitivity of medical data. Patients, healthcare providers, and doctors can communicate the same information remotely, swiftly, and securely thanks to the technology's decentralized structure. Blockchain technology has the potential to greatly improve the integration of currently dispersed healthcare data with a variety of service providers. A Blockchain-based solution can be useful for the integration of many intermediary channels in the medical care system because it is a distributed network. Interoperability between service providers and institutions is provided via Block Chain. Block-chain can be highly useful in achieving data integrity, decentralization, and precision medicine, as well as enhancing patient care and results and connecting medical records throughout the world. 5G is a fifth-generation technology that allows for extremely fast data transmission over cellular phones or other networks. For doctors, realtime patient information is vital so that they can make fast judgments in a variety of critical scenarios. Telemedicine, for example, necessitates an advanced network capable of enabling real-time connection with patients as well as highquality video transmission without slowing down the network. Powerful capabilities such as real-time data transfer of photographs, documents, and real-time films for video-based medical consultations can be enabled with the integration of a 5G network into current infrastructure to improve health services. The data transfer rate is high and response time is reduced when 5G technology is used, resulting in an efficient healthcare system. [10], [11].
Fifth-generation (5G) aims at utilizing many promising communication technologies such as software-defined network and cloud computing technologies. Therefore, main challenge which should be addressed is the provision of security measures which makes all the speedy operations transparent and secure for system reliability. Protocols are required as the basis for 5G networks to address these security challenges [12].
5G is a fifth-generation technology that allows for extremely fast data transmission over cellular phones or other networks. For doctors, real-time patient information is vital so that they can make fast judgments in a variety of critical scenarios. Telemedicine, for example, necessitates an advanced network capable of enabling real-time connection with patients as well as high-quality video transmission without slowing down the network. Powerful capabilities such as real-time data transfer of photographs, documents, and real-time films for video-based medical consultations can be enabled with the integration of a 5G network into current infrastructure to improve health services. The data transfer rate is high and response time is reduced when 5G technology is used, resulting in an efficient healthcare system.
Website developers and application developers are used to monitor patient health problems in remote places, and are presented for people with a sensing model for the elderly and those with disabilities. The main focus of this model is to provide the quickest response in the event of a patient's abnormal condition. Figure 3 depicts the general design of the suggested system. In the first step, the patient's data is collected using sensors and medical devices, as well as patient history and the UCI repository. The patient's information is saved in a database. The block-chain technology is used to data saved in a database, after which the data is kept in blocks and remains secure, allowing for maximum privacy and transparency. This safe data is then kept in cloud storage, and data in cloud storage is also stored in protected storage for the future, assisting in the patient's therapy by checking their past data. Using 5G services, the data in cloud storage is also forwarded to healthcare providers. Healthcare providers are end-users who make treatment recommendations for patients. Furthermore, the main purpose of the system is to provide the best time response to the patient for treatment with privacy and secrecy of data. Figure below shows the typical scenario of WBANs.

EAI Endorsed Transactions on
Creative Technologies 12 2021 -03 2022 | Volume 9 | Issue 30 | e5 Figure 1.the typical scenario of WBANs [13] In recent years, a number of WBAN authentication systems have evolved. Mutual authentication between the WBAN client and the application provider is possible with these technologies, while data privacy and integrity are protected. After careful consideration, some solutions employ time-consuming processes such as bilinear pairings and map to point hash operations. Experiments reveal that multiplication of elliptic curve points takes several times as long as pairing. As a result, these approaches are unsuited for WBANs. An ECC-based system provides the advantages of low arithmetic needs, small key size, and short operands. Most of these methods, including ECC-based authentication, have flaws that attackers can exploit, including tracking and impersonation attacks. Multi-server authentication without an online third party, on the other hand, is more practicable. WBANs clients can only receive medical services provided by application providers once enrolled. These application providers also do not need to store any user data for authentication. This research presents an efficient and secure authentication technique for WBANs using Blockchain technology in a multi-server architecture. The following are the two contributions we'd want to make: a) We can protect WBAN users' data from manipulation with the use of blockchain. b) Validating agents are recommended to use a sequential aggregate signature approach with a designated verification. Only administrators have access to users' private information, which can be compressed to match the capacity of the blockchain storage space, limiting unauthorized access. c) Development of an AI-based machine learning system for assault detection.

Related Work
Al-Janabi et al [14] examine the most recent standards and publications on WBAN communication architecture, as well as the security and privacy needs and security concerns that have arisen. Security measures and studies conducted by the WBAN are also covered in this document. Author concludes by considering future research and development avenues that could be pursued.
Wireless body area networks (WBANs) are employed to provide a safe cloud-based mobile healthcare system for the elderly (WBANs). Starting with the inter-sensor communication security, the multi-biometric based key generation approach in WBANs is being used to protect patient privacy by securely storing electronic medical records (EMRs) on a hospital cloud. Because of its very efficient key generation method, [15] proposed a multibiometric-based mechanism provides significant security protections.
Throughout this study, [16] explore the most significant obstacles and concerns in the field of WBAN data security and confidentiality. D-Sign, a data hybrid technique, is used for digital signature-based encryption and decryption, and is available from us. The present state-of-the-art security and privacy safeguards for WBANs are also compared to our proposed approach in this section.
An anonymous authentication approach, such as the one provided here by [17], can aid in the establishment of confidence by not disclosing the name of the patient or the identity of the doctor. AES and DES are just two examples of cryptographic encryption techniques that can help safeguard data. However, the size of the key and the sharing of the key are the two most significant challenges to establishing a high level of data security using these systems. Because of the use of a new, more efficient affine cypher, the key size required to offer the same level of confidentiality as earlier encryption methods can be decreased significantly. The ability of the proposed work to survive a wide range of destructive security attacks is demonstrated in the security analysis portion of the proposal. The storage, communication, and compute costs associated with the suggested approach may be observed in great detail in the performance analysis portion of this document as well. This results in a reduction of around 29% in the computational complexity of the suggested approach, according to the authors.
Significant technological developments have had a significant impact on the proliferation of wearable sensors in recent years, particularly in the field of biometrics. Data is exposed to numerous intermediate nodes when it is aggregated, making it more vulnerable to security and privacy risks, as a result. The scientific community has paid a significant lot of attention to the topic of security-assisted data aggregation in recent years. As part of this chapter, [18] explore an architectural framework referred as the Adaptable SDA, which is meant to give critical security characteristics to end network nodes that are linked together in a specific data aggregation architecture.
Li et al [19] provide an efficient certificate less signcryption technique, and then author develop an access control mechanism for wireless body area networks (WBANs) that makes use of the signcryption strategy author have developed. In addition to its confidentiality, integrity, authentication, non-repudiation, public verifiability, and validity of the cipher text, our technique has several other advantages. For example, if the computational cost and energy consumption of the controller for our system are compared to those of the other three known signcryptionbased access control methods, our scheme is the most efficient. Because it is based on certificate less cryptography, our system does not require either key escrow or public key certificates in order to function properly, which is a significant advantage.
Wireless healthcare networks provide novel applications to improve the quality of patients' lives, provide caregivers with helpful monitoring tools, and allow for rapid intervention in the era of communication technology. Insecure data compromises patient privacy and may lead to EAI Endorsed Transactions on Creative Technologies 12 2021 -03 2022 | Volume 9 | Issue 30 | e5 An Intelligent and Secured Privacy Preserving Framework For Wireless Body Area Networks (WBANs) 5 incorrect medical diagnosis and/or treatment because of the sensitive information contained in Wireless Body Area Networks (WBANs). Due to WBAN's resource constraints and important applications, achieving a high level of security and privacy is a difficulty. WBAN technology is examined in detail by [20], with an emphasis on security and privacy challenges and possible solutions. Finally, future research paths and outstanding topics are discussed.
Wang et al [21] proposes an integrated biometric-based security framework for wireless body area networks that leverages biometric features shared by body sensors deployed at various body locations. The suggested authentication and selective encryption techniques need modest processing power and resources (e.g., battery and bandwidth). Specifically, a wavelet-domain Hidden Markov Model (HMM) classification algorithm is used for accurate authentication of ECG signals. The system also uses biometric data like ECG signals as a biometric key for encryption. Our results show that the proposed approach can accomplish accurate authentication without additional key distribution or time synchronization requirements.
In order to address the issue of data privacy in WBANs, [22] suggests an innovative method of dealing with the problem. author improved the Kalman filter in order to reduce noise and acquire correct data; and, in order to provide a new secure privacy-preserving model based on homomorphic characteristics and chaotic cryptosystems, our main contribution is twofold: first, author developed a new secure privacy-preserving model that uses homomorphic characteristics and chaotic cryptosystems; and, second, author developed a new secure privacy-preserving model that uses homomorphic characteristics and chaotic cryptosystems .This new paradigm in healthcare monitoring safeguards real-time analytics while simultaneously protecting patient privacy and the integrity of their personal health information.
Author begin by examining the current authentication techniques' security flaws. When session ephemeral secrets are revealed to an adversary, most systems fail to provide privacy for user credentials. For wireless body area networks, [23] offer a privacy-preserving device authentication strategy to solve the shortcomings of the current schemes. Even if adversaries have access to transient secrets, the suggested system still guarantees strong security. Another benefit of using the suggested method is that it reduces the need for the client device to manage a large number of public-keys for application providers. author ran simulations with the Java Pairing-Based Cryptography Library (JPBC) to show that our proposed technique reduces computational overhead for both the client device and the application provider.
The most significant issue in cloud-assisted Wireless Body Area Networks is data secrecy, which is why author recommend that you use the Multi-valued and Ambiguous Scheme to protect your data. Using existing encryption algorithms in conjunction with the new system, it is possible to install applications. Following the findings of [24], it appears that it is possible to establish secure data exchanges between the cloud and Wireless Body Area Networks.
When patients move between blocks outside, cloudassisted WBANs are more vulnerable to sophisticated threats like node compromise. [25] Proposes a safe and privacy-preserving key management system that is impervious to mobile assaults based on time and location. Using blindness and Blom's symmetric key approach with modified proactive secret sharing; it protects patients' identities, sensor deployments, and sensor locations. Delegating the computationally demanding but privacypreserving key material update to the cloud server saves significant computing power for energy-constrained WBANs. Moreover, our system outperforms earlier schemes in terms of mobile assault resistance, storage, compute, and communication overhead.
The usage of elliptic curve cryptography has been employed in the development of a fast and secure authentication mechanism for WBANs (ECC). The use of identity-based encryption rather than certificate less authentication in multi-server systems makes this solution appropriate for online third-party involvement because it is designed to work with multiple servers according to [26]. The suggested privacy-preserving authentication technique has been shown to provide the necessary security properties while also reducing computation costs when compared to five comparable authentication systems, as evidenced by the security analysis and comparison.
[27] combines compressed sensing and wireless physical layer security to provide a lightweight encryption architecture.
As a result of using the measurement matrix as an encryption key, compressed sensing can be augmented to include security at the moment of sampling an analogue signal. The suggested approach saves sensor-node resources by eliminating the necessity for a separate encryption algorithm and the pre-deployment of a key. For testing, a wireless ECG setup with a sensor-node, access point, and an eavesdropper executing a proximity attack is used along with analysis, simulation, and experimentation. If the eavesdropper is placed at a suitable distance from the sensor-node and the access point, the results show that lawful communication is secure and reliable.
Wang et al [28] analyses how this conduit can be employed in the security mechanism to safeguard inter-BASN communications with the goal of protecting inter-BASN communications. This biometrics strategy takes use of an intrinsic trait of a person's body to validate their identity or to secure the distribution of a cypher key in order to protect sensitive information. 99 patients had their ECG and photoplethysmogram recorded at the same time, resulting in 838 simultaneous recordings. When signals were sampled at 1000 Hz and encoded into 128-bit binary sequences, an IPI-based biometric feature was shown to have a minimal half-total error rate of 2.58 percent when the interpulse interval was less than 1 millisecond (IPI). The result poses a number of crucial concerns for future research, such as how to correct for the asynchrony of numerous channels and coding schemes, which are discussed below.

EAI Endorsed Transactions on
Creative Technologies 12 2021 -03 2022 | Volume 9 | Issue 30 | e5 For WBANs, [29] developed a mutual authentication system that is both secure and anonymous, which author have discussed previously (SAMAKA). The conclusion is that SAMAKA provides protection against a broad spectrum of security dangers posed by an attacker. SAMAKA's formal security is demonstrated through the use of BAN Logic and AVISPA. In addition, it has been shown to be safe in the RoR simulation model. Furthermore, a detailed informal security examination demonstrates that SAMAKA is capable of withstanding well-known security risks. Finally, a performance comparison reveals that SAMAKA outperforms the competition and produces promising results while also providing more extensive security and privacy protections than the competition.
Recent years have seen a significant rise in the development of wireless sensor networks (WSN) that have evolved to body area networks (BAN). In the event of a medical emergency, BANs enable for remote patient monitoring. The low-power sensor nodes can be implanted into the human body or worn outside as a monitor. Electronic health record (EHCR) systems have been used to store a colossal amount of patient health data generated during treatment. EHCRs could be shared with a wide range of people in order to improve healthcare services. The usage of this procedure in daily life raises serious concerns about privacy and security. There is a lot of work being done to come up with standards and solutions to the difficulties listed above, but so far the results are disappointing. Security and privacy in EHCR systems are systematically reviewed by [30].
Before addressing security and privacy requirements and attacks at various network tiers in a WBAN, author will present a quick overview of WBANs and how they might be utilized in healthcare monitoring and surveillance applications. Finally, [31] explore several cryptographic algorithms and laws that can be used to provide a solution to the problems of security and privacy in wireless body area networks.
The Elliptic Curve Digital Signature Algorithm (ECDSA) has been described by [32] as a possible use for cross layer protocol design architecture. Unlike WBAN (IEEE 802.15.6), WMAN (IEEE 802.16) and 3G, WLAN (IEEE 802.11) or wired networks, it replaces the protocol architecture of WBAN. The ECDA-based proxy signature algorithm is used by the lightweight secure system to provide secure data transport and access control features. The simulation models generated with NS-2 are used to implement the system's efficiency, and the results reveal an optimal solution in terms of latency, PDR, throughput, jitter, packet transmission time, dropping ratio, and packet delivery. The simulation models used to achieve this efficiency. The response demonstrates the practicality of the proposed methodology.
The concept of Wireless Body Area Networks is explored by [33]. For the time being, author will focus on a few patient-monitoring applications. After that, author will talk about how a WBAN communicates and where it fits in the IT landscape. The physical layer, existing MACs, and contemporary network protocols are described in detail. Cross-layer and service quality are also discussed. Due to WBANs' location on the human body, security must be taken in to account. Present and historical projects are discussed. These concerns and obstacles are then outlined.
An authentication mechanism based on zero-knowledge proofs, TinyZKP, is presented and implemented on TinyOSbased sensor nodes by [34]. TinyZKP performs 1.9 and 1.4 times quicker, respectively, and consumes 48 percent less energy than TinyECC and WM-ECC, two ECDSA-based authentication methods, according to our experiments. TinyECC and WM-ECC also perform 1.9 and 1.4 times faster, respectively.
Ma et al [35] describe a technique for securely transferring patient data to medical authorities while utilizing the least amount of electricity possible. To improve the system's reliability, the RelAODV protocol, a modified adhoc on-demand distance vector (AODV) protocol, is being proposed (Reliable AODV). The proposed methodology has been shown to be energy efficient and to improve the overall quality of the overall system. Raja et al [36] compare the computational costs of two recent WBAN anonymous authentication systems. Authentication is anonymous and data is protected by encryption with these two methods. A new lightweight authentication strategy for wearable devices has recently been proposed that enables anonymity and privacy combined with security at a very low computational cost. Author then examine this new authentication scheme. Authentication and anonymity are achieved by the use of hash functions in this method, which does not use encryption. However, it is possible to apply this method to the WBAN environment with the necessary modifications. The most recent authentication strategy in the WBAN environment has a lower calculation cost when compared to the other options. In the WBAN environment, author propose a novel authentication strategy based on the lightweight authentication scheme proposed for wearable devices an in-depth evaluation reveals that our proposed technique minimizes computation costs while maintaining privacy and security, in addition to anonymous identification.
At the physical, medium access control (MAC), network, and transport layers, [37] firstly discuss the critical security requirements and Denial of Service (DoS) attacks that can occur in the WBAN environment. Then author explore the IEEE 802.15.4 security architecture and highlight the security weaknesses and key threats in the context of Wireless Body Area Network. It is examined and discussed several assaults on the super frame superframe's Contention Access Period (CAP) and Contention Free Period (CFP). It's been found that a clever attacker can corrupt an increasing number of GTS slots during the CFP period, which has the potential to significantly impact WBAN's Quality of Service (since most of the data is carried in CFP period). Increases in the number of malicious nodes corrupting GTS slots restrict the legitimate nodes from making optimum use of the bandwidth. This means that for some WBAN applications, the direct adaptation of the IEEE 802. 15 actuators are organized into nodes in medical sensor networks (MSNs). Sensors collect information about the human body, while actuators respond to medical commands. If these orders are changed in any manner, the system could be jeopardized. The recommended protocol can be employed with time-sensitive MSN applications since the Rabin authentication technique is improved in this research to improve the signature signing procedure. With the help of Tmote Sky motes and an FPGA, author implemented the Rabin algorithm in a variety of hardware configurations and evaluated its design and performance. It is also tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library, which implements the proposed protocol. MSN nodes are capable of receiving commands from medical staff in a secure, immediate, authorized manner. Figure 3 depicts the proposed architecture for the health care systems secure AI-based Block chain-assistance. There are six components: a user, a wireless network, a block chain, a trusted agent, a medical server, and an expert system. Users can be infected with different diseases or have already recovered from one. In order to acquire medical data, he implants or wears a collection of sensors. Wireless system i.e. Personal digital assistant (PDA) such as a smartphone also captures and retains medical data from each sensor for the user. The user is able to keep track of his or her health information on a PDA, which he or she can then encrypt and regularly upload to the blockchain as a block. The data, timestamp, and information of the previous block are included in each communication here.

Methodology
Validating and recording agents are two types of permissioned agents. The transaction is validated by a group of nodes known as validating agents, as you can see (VA). Only transactions that have been verified by the majority of validating agents can be stored on the blockchain. Recording agents save data in the form of a block and only those in the network with authorization can access it after it has been validated.
Each component of the network, including the medical staff, hospital, and diagnosing expert system, has their own ledger, which they control. A diagnosis expert system is similar to a human expert when it comes to making decisions. Before being processed to determine disease types, encrypted blockchain data is decoded using DES. It can also remotely instruct the sensors on the patient's body to deliver the recommended medication if the patient is in a serious condition. In this approach, the brief of our proposed model has been summarized.

Significance of System
There aren't enough hospitals, medical devices, and doctors to go around. Inability to diagnose every infected patient within their country has resulted in the deaths of a large number of people. Many patients can be monitored and diagnosed simultaneously in the suggested paradigm, which can help resolve a crisis of this magnitude. It is the job of this technology to collect data between hospitals and their patients. The patient's medical record is managed through Blockchain, which creates a distributed database. The integrity, secrecy, and validity of data are all ensured by the public key cryptosystem. Based on the patient's medical history, AI recommends a type of physician, a disease type, and a prescribed medication.

Secured and Privacy Preserving
To protect patient information, the suggested model makes use of a lightweight public-key cryptosystem, namely an identity-based cryptosystem based on the elliptic curve cryptosystem. The public key of the recipient is not required to be verified by the IBC. In terms of processing overhead, ECC-based arithmetic is roughly 20 times faster than modular exponentiation. In addition, the 128-bit ECC key is as secure as a 1024-bit RSA key in terms of bit length. IoT applications can benefit from the unique properties of IBC and ECC.

Proposed Blockchain Model
Since blockchain nodes might be located all over the world but have equal access to the application, it is up to P2P EAI Endorsed Transactions on Creative Technologies 12 2021 -03 2022 | Volume 9 | Issue 30 | e5 networks to make sure that communication between nodes is unrestricted. The P2P network does not have a central server, and each node is both an informed user and a provider of information. Every node is involved in the network's routing process, which includes establishing and maintaining connections with other nodes, propagating and validating transactions, and synchronizing data blocks. Each node (both transactions and blocks are data structures of the blockchain, as described below). This exemplifies decentralization and the flat topology of peer-to-peer networks. Blockchain apps provide APIs (application programming interfaces) in a number of situations. Users can interface directly with these APIs without having to worry about the underlying technology concerns.

Cloud Based Blockchain
Central databases are heavily used to store data safely. However, hackers are more focused. A script attack on a central database is one of the most popular ways hackers get access to large volumes of data. However, blockchain and distributed ledger technology make cracking much more difficult. Many blockchain projects aim to increase data storage security. This might be a game changer for users. While the blockchain initiative may lead to more secure data storage methods, it also gives people unfettered access to their data. Several blockchain projects use the original cryptocurrency as a markup. Apart from preventing identity theft and other issues raised by recent large-scale data breaches, this also allows users to monetize third-party data. Digital signatures ensure the message's integrity and nonrepudiation in blockchain transactions.

Results & Discussions
We were particularly concerned about the amount of power used in message calculation and transmission in Wireless Body area networks with the security preservation of patients data using secured transactions of Block chains. To ensure security and early detection of attacks we have used machine learning models.

Energy Consumption
We have used different models for energy efficiency of Wireless Body Area network to ensure efficiency in energy consumption for security purposes. We have proposed load balancing based EESAA protocol called LB-ESSA. In order to evaluate the novel LB-EESAA protocol's performance, five additional protocols are simulated and compared to it. Using MATLAB, we are able to simulate a real-world system in order to better understand how it works. The following metrics are used to compare the LB-EESAA protocol to the HLEACH, PEGASIS, MAMC, LEACH and SEP protocols.

Evaluation Parameters
Stability period: This will measure the duration of network operation from the beginning until the death of the first node. Network lifetime with 1st, 1st 10 and half nodes dead numbers: is between the beginning and end of the last node. Instability period: duration of network operation from the first node to the death of the node When it comes to optimizing resources, load balancing is all about maximizing efficiency. There are a variety of ways to make the most of sensor node energy. With the clustering approach, network energy costs are significantly reduced. For example, clustering reduces redundant data packets and energy usage, while also saving communication bandwidth and extending the useful life of networks.
The nodes in active mode choose themselves as CH in the first round based on the likelihood of picking CH using a distributed algorithm when all nodes have the same beginning energy Eo. A random integer between 0 and 1 is chosen by each node, and the comparison is made with a threshold Th determined for load balancing as follows: For the sake of performance evaluation, we have compared the proposed model with previous state of art models. Figure 5 shows the stability period of LB-EESAA, H-LEACH, LEACH and MAMC respectively. Highest stability period was attained by LB-EESAA protocol as 2300 seconds.

Communication vs Security Level in WBANs
Signcryption adds a significant amount of overhead to communications. The size of the signed message is the primary factor in determining the transmission overhead. Each user only needs two bytes in a conventional WBAN. On the other hand, communication overhead and security levels are shown in Figure 9. There is an increase in communication overhead as security levels rise.

Blockchain Performance
To validate its performance, the proposed blockchainenabled WBAN platform was tested in this section in terms of block size, read throughput, transaction throughput, read latency, and transaction latency. For the blockchain network's performance evaluation, one ordered node and four peer nodes were chosen as experimental parameters. By changing the TPS send rate in the proposed blockchainenabled WBAN network, we were able to compute throughput. Transactional throughput and read throughput are two examples of how throughput can be divided. The transaction throughput was defined as the number of transactions initiated on the blockchain network during the permitted time window. During the specified time window, read-through was employed to measure the reads operation on the blockchain network. Transaction read throughput was measured using variations in TPS transmit and random machine utilization setup.

Early Security Prediction
For the early prediction of attacks, we have collected the data of transactions and trained on machine learning model and evaluated to predict the attack on the WBANs based blockchain privacy preserving system for healthcare.

Logi-XGB
This model has been developed by ensembling the logistic regression model into XGBoost Classifier to improve both models' accuracy. Mathematical model of Logi-XGB Classification model is as follows: Here P is the probability function of Logistic Regression and Y is the output of XGBoost classification model.
Shows the boosting function of XGB Classifier. When XGB takes the output of y it will be sent to probability function of logistic regression for classification of any attack. Figure below shows the hybrid model of Logi-XGB Classification Model: These two models have been combined in order to simultaneously increase their accuracy by using the XGBoost Classifier. Logistic regression's probability function will be fed the data received from y by XGB. An independent Logistic Regression study found that 69.2 percent of the time, the hybrid classifier raised this accuracy to 95.7 percent. Figure 12 shows a hybrid model of Logi-XGB Classification Model Performance.

Conclusions
Humanity's most pressing need is access to quality healthcare, and the WHO has underlined this right as a fundamental human right. In recent years, the healthcare system has shifted from a traditional to a modernized patient-centered approach. In a modernized patient-oriented approach, tele monitoring and telemedicine systems are implemented to facilitate the sharing of personal data of patients. Tele monitoring has been acknowledged as a potential study subject by applying the latest methods to transform raw data into valuable data. WBAN stability requires minimizing node overheating and conserving energy. This paper presents a blockchain-enabled routing system LB-EESAA for the WBANs and implemented the early prediction system of attacks during Blockchain transactions. LB-EESAA has shown the best performance in terms of alive, dead nodes and highest stability period of the protocol. After increasing the efficiency of WBANs, we have secured the security level in terms of security level. For blockchain enabled system we have evaluated the system on read throughput and simple throughput transaction. After securing and making the system privacy preserved, we have used Logi-XGB prediction model machine learning for attacks prediction. Logi-XGB model has shown the accuracy of 95.7% in predicting the attack on early stages.