{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:58:07Z","timestamp":1771520287109,"version":"3.50.1"},"reference-count":81,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,9]]},"abstract":"<jats:p>In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. The health record information is then transmitted toward the medical server via a base station for analysis, diagnosis, and treatment by medical experts. Advancement in wireless technology although improves the patient health\u2013monitoring mechanism, but still there are some limitations regarding security, privacy, and efficiency due to open wireless channel and limited resources of body sensor networks. To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. Furthermore, we design an online\/offline signcryption method to overcome the burden on biosensor nodes. We split the signcryption process into two phases: offline phase and online phase. In the offline phase, the major operations are computed without prior knowledge of patient data. While in online phase, the minor operations are computed when patient data are known. Besides, we have used a new hybrid blockchain technology approach for the secure transmission of patient information along with attributes stored in the medical server toward the cloud that provides ease of patient data access remotely from anywhere by the authorized users and data backup in case of medical server failure. Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. As compared to other existing schemes, our proposed scheme consumes fewer resources and efficient in terms of processing cost, transmission overhead, and energy consumption.<\/jats:p>","DOI":"10.1177\/1550147719875654","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T06:15:51Z","timestamp":1569305751000},"page":"155014771987565","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":41,"title":["Efficient and secure attribute-based heterogeneous online\/offline signcryption for body sensor networks based on blockchain"],"prefix":"10.1177","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5045-7485","authenticated-orcid":false,"given":"Jawaid","family":"Iqbal","sequence":"first","affiliation":[{"name":"Department of Information Technology, Hazara University Mansehra, Mansehra, Pakistan"}]},{"given":"Arif Iqbal","family":"Umar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Hazara University Mansehra, Mansehra, Pakistan"}]},{"given":"Noorul","family":"Amin","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Hazara University Mansehra, Mansehra, Pakistan"}]},{"given":"Abdul","family":"Waheed","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Hazara University Mansehra, Mansehra, Pakistan"},{"name":"Department of Electrical and Computer Engineering, Seoul National University, Seoul, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2019,9,23]]},"reference":[{"key":"bibr1-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052234"},{"issue":"2","key":"bibr2-1550147719875654","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1049\/trit.2018.0014","volume":"3","author":"Zhao H","year":"2018","journal-title":"CAAI T Intell Technol"},{"key":"bibr3-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2864191"},{"key":"bibr4-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844400"},{"key":"bibr5-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.018"},{"key":"bibr6-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0252-4"},{"key":"bibr7-1550147719875654","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in cryptology\u2014EUROCRYPT 2005: Lecture notes in computer science","volume":"3494","author":"Sahai A","year":"2010"},{"key":"bibr8-1550147719875654","first-page":"89","volume-title":"Proceedings of the 13th ACM conference on computer and communications security (CCS 2006)","author":"Goyal V"},{"key":"bibr9-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7082-3_45"},{"key":"bibr10-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.013"},{"key":"bibr11-1550147719875654","first-page":"321","volume-title":"Proceedings of the 2017 IEEE symposium on security and privacy","author":"Bethencourt J"},{"key":"bibr12-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-011-0345-8"},{"key":"bibr13-1550147719875654","doi-asserted-by":"publisher","DOI":"10.3390\/s19102395"},{"key":"bibr14-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/259798"},{"key":"bibr15-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2382297"},{"key":"bibr16-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2329681"},{"issue":"1","key":"bibr17-1550147719875654","first-page":"84","volume":"4","author":"Tan Y-L","year":"2013","journal-title":"Int J Cryptol Res"},{"key":"bibr18-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"bibr19-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.145"},{"key":"bibr20-1550147719875654","first-page":"148","volume-title":"Proceedings of the 1st ACM conference on wireless network security (WISEC\u201908)","author":"Tan C"},{"key":"bibr21-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.09.009"},{"key":"bibr22-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916503"},{"key":"bibr23-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"bibr24-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513004"},{"issue":"2","key":"bibr25-1550147719875654","first-page":"181","volume":"26","author":"Chatterjee S","year":"2014","journal-title":"J King Saud Univ Inf Sci"},{"key":"bibr26-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"bibr27-1550147719875654","first-page":"479","volume-title":"Advances in cryptology","volume":"8043","author":"Garg S","year":"2013"},{"key":"bibr28-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"bibr30-1550147719875654","first-page":"60","volume-title":"Proceedings of the 5th ACM symposium on information, computer and communications security","author":"Li J"},{"key":"bibr31-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.008"},{"key":"bibr32-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0094"},{"key":"bibr33-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2414399"},{"issue":"3","key":"bibr34-1550147719875654","first-page":"1981","volume":"2","author":"Basavashri B","year":"2015","journal-title":"Int Res J Eng Technol"},{"key":"bibr35-1550147719875654","first-page":"637","volume-title":"Proceedings of the 2013 5th international conference on intelligent networking and collaborative systems","author":"Zhang L"},{"issue":"7","key":"bibr36-1550147719875654","first-page":"40","volume":"3","author":"Madhusudhan RU","year":"2015","journal-title":"Int J Res Comput Appl Robot"},{"key":"bibr37-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"bibr38-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"bibr39-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"bibr40-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.014"},{"key":"bibr41-1550147719875654","first-page":"796","volume-title":"Proceedings of the 2013 5th international conference on intelligent networking and collaborative systems","author":"Han Y"},{"key":"bibr42-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917976"},{"key":"bibr43-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44456-4_23"},{"key":"bibr44-1550147719875654","first-page":"305","volume-title":"Proceedings of the 4th international conference Seoul on information security and cryptology","author":"Yum DH"},{"key":"bibr45-1550147719875654","first-page":"383","volume-title":"Proceedings of the annual international cryptology conference","author":"Boyen X"},{"key":"bibr46-1550147719875654","doi-asserted-by":"publisher","DOI":"10.3390\/info8020058"},{"key":"bibr48-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.06.030"},{"key":"bibr49-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.041"},{"key":"bibr50-1550147719875654","first-page":"1","volume-title":"Proceedings of the 2019 IEEE international conference on communications","author":"Oliveira M"},{"key":"bibr51-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.037"},{"key":"bibr52-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.045"},{"key":"bibr53-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4995-4"},{"key":"bibr54-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1145-3"},{"issue":"6","key":"bibr55-1550147719875654","first-page":"966","volume":"19","author":"Luo M","year":"2017","journal-title":"Int J Netw Sec"},{"key":"bibr56-1550147719875654","first-page":"263","volume-title":"Proceedings of the international conference on the theory and application of cryptology","author":"Even S"},{"key":"bibr57-1550147719875654","first-page":"83","volume-title":"Proceedings of the international conference on the theory and applications of cryptographic techniques: advances in cryptology","author":"An JH"},{"key":"bibr58-1550147719875654","first-page":"3","volume-title":"Proceedings of the 21st international conference on advanced information networking and applications workshops (AINAW\u201907)","author":"Xu Z"},{"key":"bibr59-1550147719875654","first-page":"398","volume-title":"Proceedings of the 19th IEEE international conference on advanced information networking and applications (AINA\u201905)","author":"Mu Y"},{"key":"bibr60-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2013.054492"},{"key":"bibr61-1550147719875654","first-page":"196","volume-title":"Proceedings of the 2018 5th IEEE international conference on advanced informatics: concept theory and applications (ICAICTA)","author":"Thwin T"},{"key":"bibr62-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx068"},{"key":"bibr63-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1146"},{"issue":"10","key":"bibr64-1550147719875654","doi-asserted-by":"crossref","first-page":"1560","DOI":"10.1002\/sec.836","volume":"7","author":"Luo M","year":"2014","journal-title":"Sec Comm Netw"},{"key":"bibr65-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0320-6"},{"key":"bibr66-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2741580"},{"key":"bibr67-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0061-5"},{"key":"bibr68-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq095"},{"key":"bibr69-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3327-4"},{"key":"bibr70-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"bibr71-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0574-6"},{"key":"bibr72-1550147719875654","first-page":"211","volume-title":"Proceedings of the ACM SIGSAC conference on computer and communications security","author":"Dong C"},{"key":"bibr73-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.016"},{"key":"bibr75-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-015-0446-8"},{"key":"bibr76-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"bibr77-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"issue":"1","key":"bibr78-1550147719875654","first-page":"89","volume":"5","author":"Cui S","year":"2007","journal-title":"IJ Netw Secur"},{"key":"bibr79-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0249-3"},{"key":"bibr80-1550147719875654","first-page":"119","volume-title":"Proceedings of the international workshop on cryptographic hardware and embedded systems","author":"Gura N"},{"key":"bibr81-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.013"},{"key":"bibr82-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.04.015"},{"key":"bibr83-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.017"},{"key":"bibr84-1550147719875654","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.01.011"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719875654","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719875654","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719875654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T11:48:13Z","timestamp":1664452093000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719875654"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":81,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,9,23]]},"published-print":{"date-parts":[[2019,9]]}},"alternative-id":["10.1177\/1550147719875654"],"URL":"https:\/\/doi.org\/10.1177\/1550147719875654","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]}}}