Abstract
The wireless body area networks (WBANs) have emerged as a new method for e-healthcare. Without being measured face-to-face, the medical workers can give guidance to patients in a real-time way. WBANs can greatly improve the healthcare quality. The personal information and medical data are stored and processed in sensors. The security and privacy are two vital issues. In this paper, we design an attribute-based encryption scheme for fine-grained access control in WBANs. In our scheme, a user can decrypt a ciphertext if the attributes related with a ciphertext satisfy the user's access structure. The users can be revoked if necessary. Therefore, the security and privacy of patients can be protected. Our scheme provides confidentiality, security, and resistance to collusion attack. We analyze the correctness, security, and energy consumption of the scheme.
1. Introduction
Wireless body area networks (WBANs) are gaining popularity rapidly in recent years, especially in the area of medical use, such as healthcare monitoring, medical treatment, and emergency medical response systems (EMRS) which greatly increase the efficiency of healthcare. A typical WBAN consists of a controller and a number of sensors, which are wearable or can be implanted into human body to monitor the body parameters (e.g., electrocardiogram (ECG), heart rate, blood pressure, and blood glucose), the surrounding environments parameters (e.g., temperature, humidity, and location), and the movements of body. WBANs can be used in pervasive and real-time monitoring of the status of patients in the form of text, visual, or audio, and so forth. Home monitoring is a good choice for chronic patients and old people, as it frees patients from visiting the hospital frequently. Sensor nodes and users are mobile in the sense that they can move, be relocated to another position, or be associated with other nodes or users [1]. Figure 1 shows the general healthcare system of a WBAN. The sensors are used to measure certain parameters of human body and send these signals to a controller, which may be a mobile phone or a PDA [2]. These medical data will be processed in the controller, and the controller can give guidance to other devices. For example, in the diabetes monitoring, the glucose sensors monitor and transmit blood glucose levels to the controller for insulin release. The medical data can be stored locally in WBANs or be transferred remotely to the doctors, emergency medical response, or database of patients through internet using WiFi, Bluetooth, or Zigbee, and so forth. The remoter can give guidance to the patients or healthcare staff.

A general healthcare system of WBAN.
Security and privacy are two major concerns in WBANs. Since the medical data stored in WBANs are sensitive, it is essential to ensure the security of these data. Obtaining inaccurate and wrong medical data will possibly make the therapy ineffective or even lead to wrong treatments [3]. We summarize two threats and possible consequences in WBANs.
Eavesdropping Threats. The attackers may eavesdrop on the information of patients; thus, this may cause the privacy issues. For example, a patient has an embarrassing disease or a patient may want to keep medical information out from insurance. For another example, the location of patients can be found by a criminal minded person, so this threat is of vital importance. Data confidentiality is an important requirement in healthcare applications using WBANs. Modification Threats. The data transferred is vital for patients as the modified information may lead to wrong diagnosis. The nature of wireless makes the data prone to being lost. Thus, in order to ensure that the received data has not been modified by an adversary, there should be proper data integrity mechanisms.
So, the users who want to access the patient-related data must be strictly limited; otherwise, the privilege of patients could not be protected. In order to enforce the access control, data encryption is needed to protect the patient-related data. The traditional methods are symmetric key cryptography (SKC) and public key cryptography (PKC) systems. In SKC scheme, the sender and receiver use the same key. If an attacker compromises a node, he can get all the data stored in the node. A solution to this problem is dividing the lifetime of sensors into series of periods. During different periods different keys are used, but this needs updating the keys timely and increasing the load of sensors. In PCK scheme, any patient-related data is encrypted by a public key and only the users who have the corresponding master key can decrypt the data. This general scheme is simple to implement but inefficient as the number of encryption operations and the size of ciphertexts both of which are linear with the number of users. So when the number of users increases, the cost of key distribution will be high. A better way to solve the problem is broadcast encryption. The sender specifies the receivers and broadcasts the keys to the revoked users. Although the broadcast encryption is efficient, the sender needs to store the list of receivers, and this will increase the storage space.
We design a security mechanism for access control, data encryption, and user revocation in WBANs. The major users in a typical WBAN are different doctors, nurses, healthcare staff, and medical insurance response systems. The patient may not know the exact users who are able to access the data but rather has a way to describe them in terms of descriptive attributes or credentials [4]. Attribute-based encryption (ABE) is suitable to encrypt messages without exact knowledge of the receivers.
Besides security and privacy, another issue which should be considered in WBANs is resource constraints. The sensors are limited in energy, storage space, and computational capability, and the lifetime of a battery is restricted. In order to reduce the energy consumption, it is necessary to build limited size of security mechanism. The energy consumption of sensing and computation are usually so small that they are almost negligible compared to the expensive cost of communication in WBANs; for example, according to the report of NAI Labs [5], the energy consumption of sending data is 0.0.2 mJ/bit and receiving data is 0.014 mJ/bit; however, the energy consumption used in accomplishing SHA-1 is 0.0000072 mJ/bit on the same MIPS processer. So, there should be as less transmitting as possible.
This paper makes contributions as follows. Firstly, we design the access tree structures of users. Secondly, we develop the encryption algorithms for fine-grained access control in WBANs. Thirdly, we introduce the user revocation algorithm. Fourthly, we evaluate the performance of our scheme.
2. Related Work
Security and privacy of patient-related data are two indispensable components in WBANs. Security means that data is securely stored and transferred, and privacy means that the people who have authorization can access, view, and use the data [2]. There are two main methods about the security and privacy protection in WBANs.
(1) Key Distribution in WBANs. The researches in [6–9] use the biometric signal (such as electrocardiograph) as the key to encrypt the medical data which is to be transferred, and the receiver has the same key to decrypt the data. For the advantage of biometric signal, this method ensures the security of transferred data, and testability makes the method applicable widely, but this method also has drawbacks. When the attackers get the biometric signal of patient, they can decrypt all the data which is encrypted by the signal, and this will leak the privacy of patients. In order to capture the biometric signal, there is a need to attach the biometric sensor to a body sensor node, but this will increase the cost.
(2) Data Storage and Access Control. The authors in [3] proposed the concept of secure storage and data access control in WBANs and summarized the methods of secure and privacy protection, but this paper did not analyze and compare the energy consumption. The research in [10] develops a distributed data access control scheme, in which the ciphertext is associated with attributes and the key is associated with access structure. The access structure identifies the ciphertext which can be decrypted by the key. In that paper, the users access data in a fine-grained way, but it lacks the timeliness of access control. In [11], the important multisender broadcast authentication problem is solved in WSNs. In [12], the authors proposed a fuzzy attribute-based signcryption scheme. Their scheme leverages fuzzy attribute-based encryption to enable data encryption, access control, and digital signature for a patient's medical information in a WBAN. For using the signature, it is complicated in the message transmission, and the energy consumption should be considered. In [13], the authors proposed an identity-based encryption scheme for WBANs; however, their scheme lacked the access control feature.
ABE is considered suitable for access control in WBANs, because it reduces the cost between the sensors and users. In [14] the authors first introduced the idea of ABE based on fuzzy identity-based encryption (FIBE) which was built on the idea of identity-based encryption (IBE). The identity of users can be described by strings, such as email address: alice@yahoo.com. In FIBE, the senders can encrypt the ciphertext by a public key,
In ABE, identity consists of attributes; for example, the attributes set of a doctor is {hospital, department, on duty}. Both the ciphertext and keys are associated with attributes. The ABE has two variants, key policy ABE (KP-ABE) [15] and ciphertext policy ABE (CP-ABE) [16]. In KP-ABE, the ciphertext is associated with the attributes and the key is associated with an access structure. Decryption is enabled if and only if the attributes associated with a ciphertext satisfy the key's access structure. However, in CP-ABE, the situation is reversed: the ciphertext is associated with access structure and the key is associated with attributes.
In this paper, we consider the security and privacy of WBANs by designing a fine-grained access control scheme. The medical data is encrypted by attributes and only when these attributes satisfy the key's access structure, the users can decrypt it. The patients may not know the doctors or nurses, but they can explicit the attributes which should be satisfied for the users. A user will be able to decrypt the medical data if the attributes satisfy the access structure.
User management is an important issue since malicious users are dangerous to WBANs. If some users need to be revoked, such as changing the medical workers and finding some malicious users, they will lose their capability of decryption, while the capability of nonrevoked users remains valid. Some researches propose different methods to solve the problem. The authors in [17] proposed to renew the user's master key periodically, but the users' privilege of accessing the data would expire after a time. This method will fail when the malicious users access the data before the expired time. In [18], the sensor nodes encrypt the data using the identity attributes which are not owned by the revoked users; therefore, only the nonrevoked users can decrypt the data. However, all the revoked users in the history are recorded in the ciphertext, so the ciphertext size will be very large.
The rest of this paper is organized as follows. Section 3 introduces the preliminaries of the scheme. Section 4 presents the system model. Section 5 analyzes the scheme, including the correctness, security, and energy consumption. Section 6 overviews the conclusion and future work.
3. Preliminaries
3.1. Bilinear Maps
Let Bilinearity: Nondegeneracy: Computability: there is an efficient algorithm to compute
3.2. Bilinear Diffie-Hellman Problem (BDHP)
Given two groups
3.3. Decisional Bilinear Diffie-Hellman Problem (DBDHP)
Given
3.4. Key Policy Scheme
Usually, the key policy scheme consists of 4 steps.
Setup. According to the random numbers produced by the system, the scheme generates the public parameters PK and a master key MK. PK is used to encrypt message by senders. MK is used to generate decryption keys. Encryption. The plaintext M is encrypted using the attributes and PK. It outputs the ciphertext E. Key Generation. It takes the access structure, master key MK, and the public parameters PK as input. It outputs the decryption key DK. Decryption. The ciphertext E is decrypted by the decryption key DK for access control structure and outputs the plaintext M.
3.5. Security Game for ABE
We define the security game for our scheme. The game can be described as follows.
Init: the adversary commits the attributes set γ to the challenger. Setup: the challenger runs the Setup algorithm and gives the public parameters (PK) to the adversary. Phase 1: the adversary submits queries for master keys for access structures Challenge: the adversary submits two equal length messages Phase 2: phase 1 is repeated. Guess: the adversary outputs a guess
The advantage of an adversary A in this game is defined as
This game can be extended to handle chosen-ciphertext attacks by allowing for decryption queries in phases 1 and 2.
3.6. Access Tree
Access tree expresses the structure of access control. Ciphertext is associated with attributes. Decryption key is labeled with an access tree structure, in which each nonleaf node is the threshold gate described by a threshold value and its children and each leaf node is labeled with attributes. A user can decrypt a ciphertext with a given key if and only if there is an assignment of attributes from the ciphertext to nodes of the tree such that the tree is satisfied.
Let
When the attributes associated with the ciphertext satisfy the users' access structures, the users can get the medical data. Figure 2 shows an example of the access tree structure. Every no-leaf node is assigned with a threshold. The ciphertext which has at least k attributes can be decrypted by the users. For example, a ciphertext has the following attributes {hospital m, physician, on duty}. Hospital m refers to which hospital the doctor belonged to. On duty indicates whether the doctor is on duty that time. If the attributes related with ciphertext satisfies the access tree, the doctor can get the patient's medical data and give treatments to the patient. The same is true for a nurse, healthcare staff, and medical insurance company agents or emergency room.

An example of access structure.
4. System Model
4.1. Definition
We consider a typical WBAN consisting of a number of sensors denoted by
4.2. Communication Procedure
Suppose a doctor will get the patient's medical data stored in sensors. The communication procedure can be sketched as follows.
The sensors execute Algorithms 1 and 2 to produce the public keys and master keys. The sensors encrypt the medical data M using public key and send the ciphertext to the doctor. Once the doctor needs to be revoked, the controller updates the keys of all the users except the doctor. We adopt the method in [19]. The controller broadcasts any The nonrevoked users check the time, produce the decryption key, and decrypt the ciphertext when the attributes satisfy the access structure of the users.
(1) Choose y randomly in (2) Define the universe of attributes set a number (3) Define a function (4) The public key (5) The maximum number of users is
(1) Choose a polynomial Set the degree points of the polynomial choose (2) For each leaf node x, give the decryption key to the users: The decryption key
We design a scheme for fine-grained access control in WBANs. Our scheme consists of five algorithms: (1) system initialization; (2) key generation; (3) encryption; (4) user revocation; (5) decryption.
5. System Analysis
5.1. Correctness Analysis
Now that we have defined the function decryptnode, the decryption algorithm simply calls the function on the root of the tree. We observe that decryptnode
5.2. Security Analysis
(1) Collusion Attack Resistance. In this scheme, different users have different access structures. The master key is generated randomly and independently from
(2) Confidentiality
Theorem 1.
If an attacker
Proof.
The security of the game is based on the hardness of the DBDH assumption. We prove it as the approach proposed in [15]. The simulation proceeds as follows.
Let Init: the simulator Setup: Phase 1:
We define recursive function polynode (x) to assign the polynomial
For each node x in T, we use If x is the root node r, Select the satisfied children For each child
When polynode (x) terminates,
Therefore,
Challenge. Phase 2: the simulator acts exactly the same as in phase 1. Guess: A will submit a guess
If
(3) Unforgeability. The adversary cannot forge the ciphertext because he cannot guess the attributes which are used to encrypt the ciphertext. Even if the adversary gets other user's ciphertext, he cannot create a new, valid ciphertext as the attributes which are used to encrypt a ciphertext are different from others, and the number y is chosen randomly. Therefore, we claim that our scheme is unforgeable under chosen-ciphertext attacks.
5.3. Performance Analysis
In this part, we present the performance analysis results about our scheme in terms of transmission and computation. We also compare the performance results with previous best known ones. In this paper, we mainly consider the energy consumption about message transmission and computation in WBANs. The energy consumption on transmission is much more than computing, so improving the performance of transmission will increase the overall performance greatly.
5.3.1. Energy Consumption on Transmission
According to Algorithms 3 and 4 (if there are some users to be revoked), the total message size is
To encrypt a message a random value (1) (2) (3) (4) Current time (5) Ciphertext
In order to revoke a user, the controller updates decryption key for the non-revoked users. (1) Choose another random number (2) Choose an exponents users:
We use Tate pairing [20] to evaluate the bilinear map e. The parameters in (*) are variable. Assuming
The energy consumption on transmission in our scheme and other schemes.
Table 1 shows the comparison energy consumption on transmission of our scheme and other schemes. It can be seen that, even though we set
Figure 3 presents the relationship between the number of attributes (indicated by n) and the energy consumption on transmission. The curves in Figure 3 indicate that, with the increase of attribute numbers, the energy consumption increases.

Energy consumption on transmission with regard to the number of attributes.
5.3.2. Energy Consumption on Computation
In this part, we evaluate the energy consumption on computation in our scheme. n is the number of attributes. Firstly, we show the operations of initialization (Algorithm 1), key generation (Algorithm 2), encryption (Algorithm 3), user revocation (Algorithm 4), and decryption (Algorithm 5) in Table 2.
The operations in our scheme.
If (1) On receiving the ciphertext E, the receiver checks the current time (2) If (3)
It x is a leaf node, we can compute:
If x is a non-leaf node, then:
We consider the sensor CPU is a 32-bit Inter PXA-255 processor at 400 MHz. It is reported in [22] that the typical power consumption of PXA-255 in active and idle modes is 411 mW and 121 mW, respectively. We adopt Tate pairing to compute the Bilinear Maps. According to [23], it takes 752 ms to compute Tate pairing on a 32-bit ST22 smartcard microprocessor at 33 MHZ. As a result, the computation of Tate pairing on PXA-255 roughly needs 33/
The energy consumption on computation of our scheme and other schemes.
Figure 4 presents the energy consumption on computation with regard to the number of users. From Figure 4 we can observe that the computation cost of our scheme is lower than FABSC and higher than others. Nevertheless, when we take the transmission and computation into account, our scheme is energy-efficient when the number of users is large.

Computation cost with regard to the number of users.
6. Conclusion and Future Work
In this paper, we design a key policy attribute-based scheme for access control in WBANs. When the attributes related to the ciphertext satisfy the users' access structures, the ciphertext can be decrypted. User revocation is introduced to the scheme. In the future, we can classify the medical data according to the hierarchy, for example, the sensitive data and the no-sensitive data. Sensitive data includes the data which is of vital importance and embarrassed data. No-sensitive data is the ordinary medical data such as temperature, pulse, and blood pressure. Anyone who wants to get the sensitive data must have high level privilege, and the no-sensitive data can be accessed by low level privilege.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This research is part of Projects 2009011022-2 supported by Natural Science Foundation of Shanxi Province.
