{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:36:54Z","timestamp":1770831414968,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network\u2019s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient\u2019s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet\u2019s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient\u2019s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.<\/jats:p>","DOI":"10.1186\/s13638-020-01759-5","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T13:38:34Z","timestamp":1594733914000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Securing communication by attribute-based authentication in HetNet used for medical applications"],"prefix":"10.1186","volume":"2020","author":[{"given":"Tufail A.","family":"Lone","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aabid","family":"Rashid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sumeet","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8270-5853","authenticated-orcid":false,"given":"Sachin Kumar","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Duggirala Srinivasa","family":"Rao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohd","family":"Najim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ashutosh","family":"Srivastava","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lokendra Singh","family":"Umrao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Achintya","family":"Singhal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,7,14]]},"reference":[{"key":"1759_CR1","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1016\/j.compeleceng.2017.12.015","volume":"72","author":"KN Qureshi","year":"2018","unstructured":"K.N. Qureshi, A.H. Abdullah, O. Kaiwartya, S. Iqbal, R.A. Butt, F. Bashir, A dynamic congestion control scheme for safety applications in vehicular ad hoc networks. J. Comput. Electr. Eng. 72, 774\u2013788 (2018)","journal-title":"J. Comput. Electr. Eng."},{"key":"1759_CR2","doi-asserted-by":"publisher","first-page":"20609","DOI":"10.1109\/ACCESS.2018.2825387","volume":"6","author":"X Hu","year":"2018","unstructured":"X. Hu, B. Li, K. Huang, Z. Fei, K.K. Wong, Secrecy energy efficiency in wireless powered heterogeneous networks: a distributed ADMM approach. IEEE Access 6, 20609\u201320624 (2018)","journal-title":"IEEE Access"},{"key":"1759_CR3","doi-asserted-by":"publisher","first-page":"107879","DOI":"10.1109\/ACCESS.2019.2932805","volume":"7","author":"M Forouzesh","year":"2019","unstructured":"M. Forouzesh, P. Azmi, N. Mokari, K.K. Wong, H.P. Nik, Robust physical layer security for power domain non-orthogonal multiple access-based HetNets and HUDNs: SIC avoidance at eavesdroppers. IEEE Access 7, 107879\u2013107896 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2932805","journal-title":"IEEE Access"},{"key":"1759_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2019.2916593","volume-title":"IEEE transactions on dependable and secure computing","author":"J Cao","year":"2019","unstructured":"J. Cao, M. Ma, Y. Fu, H. Li, Y. Zhang, in IEEE transactions on dependable and secure computing. CPPHA: capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets (2019), pp. 1\u201313. https:\/\/doi.org\/10.1109\/TDSC.2019.2916593"},{"issue":"4","key":"1759_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"X. Duan, X. Wang, Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28\u201335 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"18","key":"1759_CR6","doi-asserted-by":"publisher","first-page":"4798","DOI":"10.1109\/TSP.2014.2340817","volume":"62","author":"J Xu","year":"2014","unstructured":"J. Xu, L. Liu, R. Zhang, Multiuser MISO beam forming for simultaneous wireless information and power transfer. IEEE Trans. Signal Process. 62(18), 4798\u20134810 (2014)","journal-title":"IEEE Trans. Signal Process."},{"issue":"5","key":"1759_CR7","doi-asserted-by":"publisher","first-page":"e3492","DOI":"10.1002\/dac.3492","volume":"31","author":"YC Wang","year":"2018","unstructured":"Y.C. Wang, S. Lee, Small-cell planning in LTE HetNet to improve energy efficiency. Int. J. Commun. Syst. 31(5), e3492 (2018). https:\/\/doi.org\/10.1002\/dac.3492 Wiley","journal-title":"Int. J. Commun. Syst."},{"key":"1759_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WCSP.2015.7341120","volume-title":"International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing","author":"Y Deng","year":"2015","unstructured":"Y. Deng, L. Wang, K.K. Wong, A. Nallanathan, M. Elkashlanz, S. Lambotharan, in International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing. Safeguarding massive MIMO aided HetNets using physical layer security (2015), pp. 1\u20135. https:\/\/doi.org\/10.1109\/WCSP.2015.7341120"},{"key":"1759_CR9","doi-asserted-by":"publisher","first-page":"68920","DOI":"10.1109\/ACCESS.2018.2880339","volume":"6","author":"W Zhao","year":"2018","unstructured":"W. Zhao, Z. Chen, K. Li, N. Liu, B. Xia, L. Luo, Caching-aided physical layer security in wireless cache-enabled heterogeneous networks. IEEE Access 6, 68920\u201368931 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2880339","journal-title":"IEEE Access"},{"issue":"3","key":"1759_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/CC.2016.7445504","volume":"13","author":"G Shiqi","year":"2016","unstructured":"G. Shiqi, X. Chengwen, F. Zesong, K. Jingming, Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper. China Commun. 13(3), 82\u201395 (2016)","journal-title":"China Commun."},{"key":"1759_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICC.2016.7510994","volume-title":"IEEE International Conference on Communication (ICC), Kuala Lumpur","author":"X Duan","year":"2016","unstructured":"X. Duan, X. Wang, in IEEE International Conference on Communication (ICC), Kuala Lumpur. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer (2016), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICC.2016.7510994"},{"key":"1759_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/CAMAD.2013.6708110","volume-title":"IEEE 18th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), Berlin","author":"J Richter","year":"2013","unstructured":"J. Richter, E. Franzy, S. Engelmann, S. Pfennigy, E.A. Jorswieck, in IEEE 18th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), Berlin. Physical layer security vs. network layer secrecy: who wins on the untrusted two-way relay channel? (2013), pp. 164\u2013168. https:\/\/doi.org\/10.1109\/CAMAD.2013.6708110"},{"key":"1759_CR13","doi-asserted-by":"publisher","unstructured":"Sudarsono, A., Yuliana, M., Darwito, H. A.: A secure data sharing using identity-based encryption scheme for e-healthcare system. 3rd International Conference on Science in Information Technology, (ICSITech), IEEE, Bandung, 429-434, 2017, doi: https:\/\/doi.org\/10.1109\/ICSITech.2017.8257151","DOI":"10.1109\/ICSITech.2017.8257151"},{"issue":"6","key":"1759_CR14","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","volume":"13","author":"CC Tan","year":"2009","unstructured":"C.C. Tan, H. Wang, S. Zhong, Q. Li, IBE-Lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Biomed. 13(6), 926\u2013932 (2009). https:\/\/doi.org\/10.1109\/TITB.2009.2033055","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"1759_CR15","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/SP.2007","volume-title":"IEEE Symposium on Security and Privacy, Berkeley, CA","author":"J Bethencourt","year":"2007","unstructured":"J. Bethencourt, A. Sahai, B. Waters, in IEEE Symposium on Security and Privacy, Berkeley, CA. Ciphertext-policy attribute-based encryption (2007), pp. 321\u2013334. https:\/\/doi.org\/10.1109\/SP.2007"},{"key":"1759_CR16","first-page":"61","volume-title":"A Handbook of Internet of Things in Biomedical and Cyber Physical System, Chapter 3","author":"MH Raju","year":"2019","unstructured":"M.H. Raju, M.U. Ahmed, M.A.R. Ahad, in A Handbook of Internet of Things in Biomedical and Cyber Physical System, Chapter 3. Security analysis and a potential layer to layer security solution of medical cyber-physical systems (2019), pp. 61\u201386"},{"issue":"1","key":"1759_CR17","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parall. Distr. Syst. 24(1), 131\u2013143 (2012)","journal-title":"IEEE Trans. Parall. Distr. Syst."},{"key":"1759_CR18","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","volume":"14","author":"H Qian","year":"2015","unstructured":"H. Qian, J. Li, Y. Zhang, J. Han, Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14, 487\u2013497 (2015). https:\/\/doi.org\/10.1007\/s10207-014-0270-9","journal-title":"Int. J. Inf. Secur."},{"key":"1759_CR19","doi-asserted-by":"publisher","unstructured":"A. Sahai, B. Waters, in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Fuzzy identity-based encryption, vol 3494 (Springer, 2005), pp. 457\u2013473. https:\/\/doi.org\/10.1007\/11426639_27","DOI":"10.1007\/11426639_27"},{"issue":"5","key":"1759_CR20","first-page":"877","volume":"4","author":"A Monika","year":"2012","unstructured":"A. Monika, M. Pradeep, A comparative survey on symmetric key encryption techniques. Int. J. Comp. Sci. Eng. 4(5), 877 (2012)","journal-title":"Int. J. Comp. Sci. Eng."},{"issue":"3","key":"1759_CR21","first-page":"269","volume":"29","author":"MN Ahmed","year":"2017","unstructured":"M.N. Ahmed, A.H. Abdullah, H. Chizari, O. Kaiwartya, F3TM: flooding factor based trust management framework for secure data transmission in MANETs. J. King Saud Univ. Comp. Inf. Sci. 29(3), 269\u2013280 (2017)","journal-title":"J. King Saud Univ. Comp. Inf. Sci."},{"key":"1759_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOBECOM38437.2019.9013138","volume-title":"IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA","author":"AU Makarfi","year":"2019","unstructured":"A.U. Makarfi, R. Kharel, K.M. Rabie, O. Kaiwartya, G. Nauryzbayev, in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA. Physical layer security in vehicular communication networks in the presence of interference (2019), pp. 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013138"},{"key":"1759_CR23","doi-asserted-by":"crossref","unstructured":"Fang, D., Qian, Y., Hu, R. Q.: Interference management for physical layer security in heterogeneous networks. 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), Orlando, FL, 133-138, 2017.","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.36"},{"issue":"12","key":"1759_CR24","doi-asserted-by":"publisher","first-page":"6437","DOI":"10.1109\/TCOMM.2018.2859954","volume":"66","author":"W Wang","year":"2018","unstructured":"W. Wang, K.C. Teh, S. Luo, K.H. Li, Physical layer security in heterogeneous networks with pilot attack: a stochastic geometry approach. IEEE Trans. Commun. 66(12), 6437\u20136449 (2018)","journal-title":"IEEE Trans. Commun."},{"key":"1759_CR25","volume-title":"Physical layer security in vehicular networks with reconfigurable intelligent surfaces","author":"AU Makarfi","year":"2019","unstructured":"Makarfi, A. U., Rabie, K. M., Kaiwartya, O., Li, X., Kharel, R.: Physical layer security in vehicular networks with reconfigurable intelligent surfaces. arXiv preprint arXiv:1912.12183, 2019."},{"issue":"3","key":"1759_CR26","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/JSAC.2011.110312","volume":"29","author":"LY Yeh","year":"2011","unstructured":"L.Y. Yeh, Y.C. Chen, J.L. Huang, ABACS: an attribute-based access control system for emergency services over vehicular ad hoc networks. IEEE J. Sel. Area Commun. 29(3), 630\u2013642 (2011). https:\/\/doi.org\/10.1109\/JSAC.2011.110312","journal-title":"IEEE J. Sel. Area Commun."},{"key":"1759_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACOSIS.2016.7843940","volume-title":"International Conference on Advanced Communication Systems and Information Security (ACOSIS), Marrakesh","author":"M Bouabdellah","year":"2016","unstructured":"M. Bouabdellah, F. Bouanani, H. Benazza, in International Conference on Advanced Communication Systems and Information Security (ACOSIS), Marrakesh. A secure cooperative transmission model in VANET using attribute based encryption (2016), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ACOSIS.2016.7843940"},{"key":"1759_CR28","doi-asserted-by":"publisher","unstructured":"L. Nkenyereye, Y. Park, K.H. Rhee, A secure billing protocol over attribute-based encryption in vehicular cloud computing. EURASIP J. Wirel. Commun. Netw., 196 (2016). https:\/\/doi.org\/10.1186\/s13638-016-0687-0","DOI":"10.1186\/s13638-016-0687-0"},{"key":"1759_CR29","doi-asserted-by":"publisher","unstructured":"M.N. Ahmed, A.H. Abdullah, O. Kaiwartya, FSM-F: finite state machine based framework for denial of service and intrusion detection in MANET. PLoS One 11(6) (2016). https:\/\/doi.org\/10.1371\/journal.pone.0156885","DOI":"10.1371\/journal.pone.0156885"},{"key":"1759_CR30","doi-asserted-by":"publisher","unstructured":"Y.L. Tan, B.M. Goi, R. Komiya, S.Y. Tan, in International Conference on Informatics Engineering and Information Science, Communications in Computer and Information Science. A study of attribute-based encryption for body sensor networks, vol 251 (Springer, 2011), pp. 238\u2013247. https:\/\/doi.org\/10.1007\/978-3-642-25327-0_21","DOI":"10.1007\/978-3-642-25327-0_21"},{"key":"1759_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCCN.2016.7568538","volume-title":"25th International Conference on Computer Communication and Networks, (ICCCN), Waikoloa, HI","author":"N Oualha","year":"2016","unstructured":"N. Oualha, K.T. Nguyen, in 25th International Conference on Computer Communication and Networks, (ICCCN), Waikoloa, HI. Lightweight attribute-based encryption for the internet of things (2016), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCN.2016.7568538"},{"issue":"6","key":"1759_CR32","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1007\/s11276-017-1461-x","volume":"24","author":"A Khasawneh","year":"2018","unstructured":"A. Khasawneh, M.S.B.A. Latiff, O. Kaiwartya, H. Chizari, A reliable energy-efficient pressure-based routing protocol for underwater wireless sensor network. Wirel. Netw. 24(6), 2061\u20132075 (2018). https:\/\/doi.org\/10.1007\/s11276-017-1461-x","journal-title":"Wirel. Netw."},{"issue":"1-2","key":"1759_CR33","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s12553-017-0180-8","volume":"8","author":"H Javdani","year":"2018","unstructured":"H. Javdani, H. Kashanian, Internet of things in medical applications with a service-oriented and security approach: a survey. Health Technol. 8(1-2), 39\u201350 (2018). https:\/\/doi.org\/10.1007\/s12553-017-0180-8 IUPESM and Springer-Verlag Berlin Heidelberg","journal-title":"Health Technol."},{"key":"1759_CR34","doi-asserted-by":"publisher","unstructured":"K. Abouelmehdi, A.B. Hessane, H. Khaloufi, Big healthcare data: preserving security and privacy. J. Big Data 5(6) (2018). https:\/\/doi.org\/10.1186\/s40537-017-0110-7","DOI":"10.1186\/s40537-017-0110-7"},{"issue":"5","key":"1759_CR35","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TCOMM.2014.032914.120921","volume":"62","author":"W Hou","year":"2014","unstructured":"W. Hou, X. Wang, J.Y. Chouinard, A. Refaey, Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Trans. Commun. 62(5), 1658\u20131667 (2014)","journal-title":"IEEE Trans. Commun."},{"key":"1759_CR36","unstructured":"AVISPA. Automated validation of internet security protocols and applications. < http:\/\/www.avispa-project.org\/. Accessed Nov 2015."},{"key":"1759_CR37","unstructured":"AVISPA. AVISPA web tool. http:\/\/www.avispa-project.org\/webinterface\/expert.php\/. Accessed Nov 2015."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01759-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01759-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01759-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T23:08:53Z","timestamp":1626217733000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01759-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,14]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1759"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01759-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,14]]},"assertion":[{"value":"15 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"146"}}