{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:03:42Z","timestamp":1775667822321,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T00:00:00Z","timestamp":1581897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1804263"],"award-info":[{"award-number":["U1804263"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702105"],"award-info":[{"award-number":["61702105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection","award":["2017B030301004-12"],"award-info":[{"award-number":["2017B030301004-12"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless Body Area Network (WBAN) is a highly promising technology enabling health providers to remotely monitor vital parameters of patients via tiny wearable and implantable sensors. In a WBAN, medical data is collected by several tiny sensors and usually transmitted to a server-side (e.g., a cloud service provider) for long-term storage and online\/offline processing. However, as the health data includes several sensitive information, providing confidentiality and fine-grained access control is necessary to preserve the privacy of patients. In this paper, we design an attribute-based encryption (ABE) scheme with lightweight encryption and decryption mechanisms. Our scheme enables tiny sensors to encrypt the collected data under an access control policy by performing very few computational operations. Also, the computational overhead on the users in the decryption phase is lightweight, and most of the operations are performed by the cloud server. In comparison with some excellent ABE schemes, our encryption mechanism is more than 100 times faster, and the communication overhead in our scheme decreases significantly. We provide the security definition for the new primitive and prove its security in the standard model and under the hardness assumption of the decisional bilinear Diffie-Hellman (DBDH) problem.<\/jats:p>","DOI":"10.3390\/s20041088","type":"journal-article","created":{"date-parts":[[2020,2,20]],"date-time":"2020-02-20T03:20:03Z","timestamp":1582168803000},"page":"1088","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight Fine-Grained Access Control for Wireless Body Area Networks"],"prefix":"10.3390","volume":"20","author":[{"given":"Mohammad","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran 159163-4311, Iran"}]},{"given":"Mohammad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran 159163-4311, Iran"}]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China"},{"name":"Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou 510632, China"},{"name":"Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,17]]},"reference":[{"key":"ref_1","unstructured":"Kevin, K., and Wan, H. (2020, February 15). Unprecedented Global Aging Examined in New Census Bureau Report Commissioned by the National Institute on Aging, Available online: https:\/\/www.nih.gov\/news-events\/news-releases\/unprecedented-global-aging-examined-new-ensus-bureau-report-commissioned-national-institute-aging."},{"key":"ref_2","unstructured":"Chen, W., and Liu, J.J. (2009). Future Population Trends in China: 2005-2050, Centre of Policy Studies (CoPS), Victoria University."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1377\/hlthaff.28.1.64","article-title":"Confronting the growing burden of chronic disease: Can the US health care workforce do the job?","volume":"28","author":"Bodenheimer","year":"2009","journal-title":"Health Aff."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.phr.2004.04.005","article-title":"The growing burden of chronic disease in America","volume":"119","author":"Anderson","year":"2004","journal-title":"Publ. Health Rep."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1177\/1077558711399580","article-title":"Health care utilization and costs of elderly persons with multiple chronic conditions","volume":"68","author":"Lehnert","year":"2011","journal-title":"Med. Care Res. Rev."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2616","DOI":"10.1001\/jama.291.21.2616","article-title":"The global burden of chronic diseases: overcoming impediments to prevention and control","volume":"291","author":"Yach","year":"2004","journal-title":"JAMA"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","article-title":"Wireless body area networks: A survey","volume":"16","author":"Movassaghi","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sahai, A., and Waters, B. (2005). Fuzzy identity-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/11426639_27"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lewko, A., and Waters, B. (2011). Decentralizing attribute-based encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.ins.2018.07.077","article-title":"Key-policy attribute-based encryption against continual auxiliary input leakage","volume":"470","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1093\/comjnl\/bxz036","article-title":"Ciphertext-policy attribute-based encrypted data equality test and classification","volume":"62","author":"Cui","year":"2019","journal-title":"Comput. J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., and Imai, H. (2009). Dual-policy attribute based encryption. International Conference on Applied Cryptography and Network Security, Springer.","DOI":"10.1007\/978-3-642-01957-9_11"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2009.5350373","article-title":"Enabling technologies for wireless body area networks: A survey and outlook","volume":"47","author":"Cao","year":"2009","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","article-title":"Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks","volume":"129","author":"Li","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-010-0260-8","article-title":"Body area networks: A survey","volume":"16","author":"Chen","year":"2011","journal-title":"Mob. Netw. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","article-title":"ECG-cryptography and authentication in body area networks","volume":"16","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","article-title":"ReTrust: Attack-resistant and lightweight trust management for medical sensor networks","volume":"16","author":"He","year":"2012","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2013.6590046","article-title":"Securing m-healthcare social networks: challenges, countermeasures and future directions","volume":"20","author":"Zhou","year":"2013","journal-title":"IEEE Wirel. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ghamari, M., Janko, B., Sherratt, R.S., Harwin, W., Piechockic, R., and Soltanpur, C. (2016). A survey on wireless body area networks for ehealthcare systems in residential environments. Sensors, 16.","DOI":"10.3390\/s16060831"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.ins.2014.09.003","article-title":"4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks","volume":"314","author":"Zhou","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1109\/TMC.2016.2549008","article-title":"Medium access control for wireless body area networks with QoS provisioning and energy efficient design","volume":"16","author":"Liu","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","article-title":"A lightweight multi-layer authentication protocol for wireless body area networks","volume":"78","author":"Shen","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","article-title":"Data security and privacy in wireless body area networks","volume":"17","author":"Li","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"ref_24","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (November, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zhou, Z., and Huang, D. (2010, January 4\u20138). On efficient ciphertext-policy attribute based encryption and broadcast encryption. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866420"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","article-title":"CP-ABE with constant-size keys for lightweight devices","volume":"9","author":"Guo","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Chen, C., Chen, J., Lim, H.W., Zhang, Z., Feng, D., Ling, S., and Wang, H. (2013). Fully secure attribute-based systems with short ciphertexts\/signatures and threshold access structures. Cryptographers\u2019 Track at the RSA Conference, Springer.","DOI":"10.1007\/978-3-642-36095-4_4"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B. (2010). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","article-title":"A lightweight attribute-based encryption scheme for the Internet of Things","volume":"49","author":"Yao","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.comnet.2018.01.038","article-title":"Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems","volume":"140","author":"He","year":"2018","journal-title":"Comput. Net."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3610","DOI":"10.1109\/TII.2017.2751640","article-title":"Lightweight break-glass access control system for healthcare internet-of-things","volume":"14","author":"Yang","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","article-title":"Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system","volume":"479","author":"Yang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_34","unstructured":"Xu, S., Li, Y., Deng, R., Zhang, Y., Luo, X., and Liu, X. (2019). Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","article-title":"Revisiting attribute-based encryption with verifiable outsourced decryption","volume":"10","author":"Lin","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"Lai","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3236","DOI":"10.1109\/TPDS.2014.2386343","article-title":"A PSO-optimized real-time fault-tolerant task allocation algorithm in wireless sensor networks","volume":"26","author":"Guo","year":"2014","journal-title":"IEEE Trans. Parallel. Distrib. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11227-008-0244-7","article-title":"Distributed scheduling algorithms for channel access in TDMA wireless mesh networks","volume":"63","author":"Cheng","year":"2013","journal-title":"J. Supercomput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.ins.2016.07.067","article-title":"Multi-attribute search framework for optimizing extended belief rule-based systems","volume":"370","author":"Yang","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2015.09.001","article-title":"A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues","volume":"58","author":"Mohd","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/j.ins.2015.09.039","article-title":"Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model","volume":"329","author":"Cheng","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1002\/sec.1026","article-title":"Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network","volume":"8","author":"Guo","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"23951","DOI":"10.1109\/ACCESS.2020.2969957","article-title":"Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TDSC.2017.2729556","article-title":"Lightweight sharable and traceable secure mobile health system","volume":"17","author":"Yang","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_45","unstructured":"(2019, December 10). The python pairing based cryptography library. Available online: https:\/\/github.com\/debatem1\/pypbc."},{"key":"ref_46","unstructured":"(2019, December 10). The hashlib python library. [online]. Available online: https:\/\/docs.python.org\/3\/library\/hashlib.html#module-hashlib."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/4\/1088\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:58:30Z","timestamp":1760173110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/4\/1088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,17]]},"references-count":46,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["s20041088"],"URL":"https:\/\/doi.org\/10.3390\/s20041088","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,17]]}}}