“…Step 3: Decrypt the data block ffH.Data 1 1 /, Data 1 1 g K 1 CfH.Data 2 1 /, Data 2 1 g K 1 CfH.Data 3 1 /, Data 3 1 g K 1 g with the symmetric key K 1 , then the private key data of the node are obtained as follows: fH.Data 1 1 /, Data 1 1 0 g, fH.Data 2 1 /, Data 2 1 00 g, fH.Data 3 1 /, Data 3 1 000 g Step 4: In order to verify the integrity of the data received, it is necessary to calculate the hash value of the private data fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g, and the result is fH.Data 1 1 0 /, H.Data 2 1 00 /, H.Data 3 1 000 /g, then it is needed to judge whether it is equal to fH.Data 1 1 /, H.Data 2 1 /, H.Data 3 1 /g. If they are equal, then it can be said that the data received have integrity, that is to say, fData 1 1 0 , Data 2 1 00 , Data 3 1 000 g is the raw data for WBAN; otherwise, it illustrates that the collected data may have been tampered by an attacker, and the data should be discarded.…”