{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T10:43:53Z","timestamp":1773744233703,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2025,7,31]]},"abstract":"<jats:p>For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the efficacy of signature aggregation in a scenario involving doctors and patients while mitigating concerns about location privacy. Though there have been prior proposals for signature aggregation schemes, the proposed approach seeks to optimize the aggregation process within the considered scenario, thereby improving performance and reducing computational and communication burden. In addition, the proposed scheme integrates a resilient mechanism that safeguards the doctor\u2019s location privacy by utilizing the Chinese Remainder Theorem (CRT). Advanced cryptographic algorithms and location-anonymization techniques are employed in the proposed method to safeguard the confidentiality of the doctors\u2019 location. The security of the proposed scheme is formally analyzed using the Burrows-Abadi-Needham (BAN) logic and formally verified using the automated software validation tool, known as the Scyther tool, and an informal analysis of various security attributes confirms the security robustness of the proposed scheme. The efficacy is evaluated in comparison to analogous works utilizing the Cygwin software. The performance evaluation shows that the proposed scheme has lower communication costs as compared to existing competing schemes. Moreover, the serving ratio in the proposed scheme is high even if the number of patients is low for doctors.<\/jats:p>","DOI":"10.1145\/3737460","type":"journal-article","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:21:39Z","timestamp":1748071299000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ESALP2: Efficient Signature Aggregation with Location Privacy Preservation in Wireless Body Area Networks"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3531-1904","authenticated-orcid":false,"given":"Arun Sekar","family":"Rajasekaran","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, SR University","place":["Hanamakonda, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5297-1269","authenticated-orcid":false,"given":"Azees","family":"Maria","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, VIT-AP University","place":["Amaravati, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3661-6048","authenticated-orcid":false,"given":"Basker","family":"Palaniswamy","sequence":"additional","affiliation":[{"name":"Insight Centre for Data Analytics, School of Computer Science and Information Technology, University College Cork","place":["Cork, Ireland"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad","place":["Hyderabad, India"]},{"name":"Department of Computer Science and Engineering, College of Informatics, Korea University","place":["Hyderabad, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6593-112X","authenticated-orcid":false,"given":"Mohammed J.F.","family":"Alenazi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computer and Information Sciences (CCIS), King Saud University","place":["Riyadh, Saudi Arabia"]}]}],"member":"320","published-online":{"date-parts":[[2025,7,22]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00973-8"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00717-8"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3097759"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23010240"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3400400"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3402691"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.12.042"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.008"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.081011.111214"},{"key":"e_1_3_2_13_2","first-page":"225","article-title":"An efficient certificateless aggregate signature with constant pairing computations","volume":"219","author":"Xiong H.","year":"2013","unstructured":"H. Xiong, Z. Guan, Z. Chen, and F. Li. 2013. An efficient certificateless aggregate signature with constant pairing computations. Inf 219 (Jan.2013), 225\u2013235.","journal-title":"Inf"},{"key":"e_1_3_2_14_2","first-page":"48","article-title":"An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks","volume":"317","author":"Horng S. J.","year":"2015","unstructured":"S. J. Horng, S. F. Tzeng, P. H. Huang, X. Wang, T. Li, and M. K. Khan. 2015. An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf 317 (Oct.2015), 48\u201366.","journal-title":"Inf"},{"issue":"11","key":"e_1_3_2_15_2","first-page":"1","article-title":"A provably secure aggregate signature scheme for healthcare wireless sensor networks","volume":"40","author":"Shen L.","year":"2016","unstructured":"L. Shen, J. Ma, X. Liu, and M. Miao. 2016. A provably secure aggregate signature scheme for healthcare wireless sensor networks. Syst.J 40, 11 (2016), 1\u201310.","journal-title":"Syst.J"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1528"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2557487"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Libing Wu Zhiyan Xu Debiao He and Xianmin Wang. 2018. New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Security and Communication Networks 2018 2595273 (2018) 13 pages. 10.1155\/2018\/2595273","DOI":"10.1155\/2018\/2595273"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"e_1_3_2_20_2","first-page":"80","article-title":"A certificateless aggregate signature scheme for healthcare wireless sensor network","volume":"18","author":"Kumar P.","year":"2018","unstructured":"P. Kumar, S. Kumari, V. Sharma, A. K. Sangaiah, J. Wei, and X. Li. 2018. A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput 18 (2018), 80\u201389.","journal-title":"Sustain. Comput"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894895"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907298"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2927089"},{"key":"e_1_3_2_24_2","first-page":"209","article-title":"A lightweight CLAS scheme with complete aggregation for healthcare mobile crowdsensing","volume":"147","author":"Kamil I. A.","year":"2019","unstructured":"I. A. Kamil and S. O. Ogundoyin. 2019. A lightweight CLAS scheme with complete aggregation for healthcare mobile crowdsensing. Comput 147 (Nov.2019), 209\u2013224.","journal-title":"Comput"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2921788"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874473"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3240426"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Alfred Menezes. 2005. An introduction to pairing-based cryptography. 47\u201365. DOI:10.1090\/conm\/477\/09303","DOI":"10.1090\/conm\/477\/09303"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_1"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","unstructured":"J. Zhou and Y. Ou. 2009. Key tree and Chinese remainder theorem based group key distrubution scheme. Journal of the Chinese Institute of Engineers 32 7 (2009) 967\u2013974. 10.1080\/02533839.2009.9671584","DOI":"10.1080\/02533839.2009.9671584"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2658996"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.034"},{"key":"e_1_3_2_38_2","first-page":"171","volume-title":"Proceedings of the International Workshop on System Analysis and Modeling","author":"Cremers Cas J. F.","year":"2004","unstructured":"Cas J. F. Cremers and Sjouke Mauw. 2004. Checking secrecy by means of partial order reduction. In Proceedings of the International Workshop on System Analysis and Modeling. Springer, 171\u2013188."},{"key":"e_1_3_2_39_2","unstructured":"Cygwin: Linux Environment Emulator for Windows. 2012. [Online]. Retrieved June 21 2024 from http:\/\/www.cygwin.com\/. (2012)."},{"key":"e_1_3_2_40_2","first-page":"337","article-title":"Cryptanalysis and improvement of a certificateless aggregate signature scheme","volume":"295","author":"Cheng L.","year":"2015","unstructured":"L. Cheng, Q. Wen, Z. Jin, H. Zhang, and L. Zhou. 2015. Cryptanalysis and improvement of a certificateless aggregate signature scheme. Inf 295 (2015), 337\u2013346.","journal-title":"Inf"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2666783"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056477"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3134693"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3188012"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3737460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T13:35:47Z","timestamp":1753191347000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3737460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,22]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7,31]]}},"alternative-id":["10.1145\/3737460"],"URL":"https:\/\/doi.org\/10.1145\/3737460","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,22]]},"assertion":[{"value":"2024-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}