“…To achieve the security requirements, various approaches can be deployed [ 18 , 19 ]. Many surveys have dealt with the security approaches to secure WBAN ([ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 ]). However, none of them has addressed the trust management for WBAN.…”