Abstract
In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. The health record information is then transmitted toward the medical server via a base station for analysis, diagnosis, and treatment by medical experts. Advancement in wireless technology although improves the patient health–monitoring mechanism, but still there are some limitations regarding security, privacy, and efficiency due to open wireless channel and limited resources of body sensor networks. To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. Furthermore, we design an online/offline signcryption method to overcome the burden on biosensor nodes. We split the signcryption process into two phases: offline phase and online phase. In the offline phase, the major operations are computed without prior knowledge of patient data. While in online phase, the minor operations are computed when patient data are known. Besides, we have used a new hybrid blockchain technology approach for the secure transmission of patient information along with attributes stored in the medical server toward the cloud that provides ease of patient data access remotely from anywhere by the authorized users and data backup in case of medical server failure. Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. As compared to other existing schemes, our proposed scheme consumes fewer resources and efficient in terms of processing cost, transmission overhead, and energy consumption.
Keywords
Introduction
Body sensor networks (BSNs) are a special type of wireless sensor networks (WSNs) composed of tiny biosensor nodes deployed inside or outside a patient’s body to sense their physiological vital signs, that is, electrocardiogram (ECG), electroencephalogram (EEG), blood pressure (BP), electromyography (EMG), respiratory rate, temperature, and oxygen level in a blood, and then securely transmitted these vital signs to a medical server (MS) through a base station (BS) for further data analysis and treatment. Moreover, a patient can be monitored in real-time or non-real-time basis remotely from the hospital. In signcryption, the function of encryption and signature are performed in one single logical step. It provides 50% processing efficiency and 76.8%–96.0% less transmission efficiency as compared to EI-Gamal encryption and digital signature standard (DSS).
1
Due to cost efficiency, it is suitable in resource-constrained environments, that is, BSNs, electronic and mobile commerce, satellite communication, and mobile ad hoc network (MANET). The concept of blockchain was introduced for bitcoin in 2009 by Satoshi Nakamoto; with high security, the blockchain is spread rapidly in different areas like medical, Internet of Things (IoT), smart grid, electronic voting, and WSNs. Blockchain is a peer-to-peer decentralized distributed network and a secure technology system which protects patient data from the alteration of adversaries.
2
In a blockchain, multiple blocks of data are connected to make a chain of blocks and create encoded digital ledger for each transaction to store patient complete data and related information in a well-organized and a systematic way for future reference and analysis. Patient data stored on a server can be compromised, so the blockchain provides you the rights to control the access to the digital ledger and only the legitimate users can access the patient information, and no one can change the data of a block easily because the hash value of each block is stored in the next block along with the current block hash value and time stamp
Literature review
Security and privacy of patient-related data are two indispensable components in BSNs. Security means that data are securely stored and transferred, and privacy means that the people who have authorization can access, view, and use the data. 6 Generally, attributes are used for identity purposes. In a BSN environment, attributes mean vital signs of human body such as BP, temperature, respiration rate, pulse, and oxygen saturation. Each attribute is associated with a private and a public key component such that, only the user holding those attributes will be able to decrypt the data encrypted under those attributes. Sahai and Waters 7 introduced the concept of attribute-based encryption (ABE) for the first time. In which encryption and decryption of data are performed using a set of attributes for secure communication among different parties. Only that users can access the data which attribute of the public key is corresponding with master key. No need to obtain the certificate for authenticity of public keys.
Limitation:
High computational cost (encryption and key generation).
Scalability.
Goyal et al. 8 proposed and used a novel concept called the key policy attribute-based encryption (KP-ABE). In this study, the encrypted data are related to a set of predefined attributes. Access tree is used here to define the user access strategy and is also responsible for generating private keys to decrypt the encrypted data; however, only users with attributes satisfy the key’s access tree can decrypt the encrypted data. This proposed scheme consists of four ciphers: setup, encryption, key generation, and decryption.
Limitation:
Less control over the encryption policy.
Ramya et al. 9 proposed a novel and efficient framework (secure and privacy-preserving opportunistic computing (SPOC)) along with centric user privacy that enhanced the security and privacy of patient-sensitive information using attribute-based technique and overcame the challenges that occur especially in patient emergency situation. Moreover, using the privacy-preserving scalar product computation (PPSPC) method, the patient can decide who can get access to the patient-sensitive information and protect the stored patient data from adversary’s attacks. Bianchi et al. 10 proposed a novel Access control for GREEn wireless sensor network (AGREE) base-distributed data approach is developed for assigning different data-access rights to multiple users based on ciphertext-policy attribute-based encryption (CP-ABE). The proposed access policy in this study is dynamic, which overcomes the problems of single authority failure.
Limitation:
Security weakness due to data sharing.
Bethencourt et al. 11 used the CP-ABE approach for data authorization, where data-access rights are hidden in the encoded message itself.
Limitation:
Computationally inefficient on resource-constrained environment.
High-energy-consuming technique.
Hur 12 only concentrates how to protect illegal access to the nodes and they do not think about the privacy of critical data-access process. If we apply the attribute base heterogeneous signcryption primitives to Hur, 12 it will achieve efficient access control over the data. Ren et al. 13 emphasized two major security challenges of wireless body area network (WBAN): unauthorized access and tempering of patient’s vital signs. To overcome these issues, the concept of blockchain is used to protect patient data from alteration in this study, while sequential aggregate signature scheme with a designated verifier (DVSSA) method can be used to avoid the illegal access of patient’s vital signs. Moreover, compression of data resolved the small storage problem of blockchain. Tian et al. 14 designed a novel scheme based on ABE for BSNs security, in which each user decrypts the encoded message if and only if its secrete key is matched with the predefined attribute access design. The users can be revoked if necessary.
Limitation:
Maximum communication overhead.
High memory usage.
Han et al. 15 proposed a new method to improve the security and privacy of data based on (privacy-preserving decentralized ciphertext-policy attribute-based encryption (PPDCP-ABE)). Each authority can work independently and provide keys to each user for confidential forwarding of data to a sink node. It provides a stronger privacy protection and avoids the flaws of centralized approach, such as, performance bottleneck and security vulnerabilities.
Limitation:
Complex and difficult key management.
Zavattoni et al. 16 introduced a new protocol for securing of data based on ABE bilinear pairings. In this study, a set of users attributes is specified in advance to protect patient data from illegal usage.
Limitation:
More energy consumption.
Tan et al. 17 used a secure data-transmission method based on KP-ABE for forwarding confidential information from biosensor nodes to a sink node.
Limitation:
Scheme cannot provide authenticity of the users.
Hohenberger and Waters 18 proposed new approach online/offline ABE, which overcomes high computational costs problem (encryption and key generation) of ABE. The proposed scheme comprises two phases: online phase and offline phase. Costly operations are computed in the offline phase, and other minor operations are computed in the online phase. It is suitable in BSNs environments. Liu et al. 19 proposed a new protocol for authentication based on a certificate-less signature scheme. The scheme provides anonymous communication among source and destination.
Limitation:
High processing cost.
Key revocation problem.
Tan et al. 20 proposed the identity-based encryption (IBE) for secure communication of patient medical data to destination in the BSNs environments.
Limitation:
Cannot provide non-repudiation property.
High processing cost.
Key escrow problem.
In Yu et al.’s 21 study, the sensor nodes encrypt the data using the identity attributes which are not owned by the revoked users. Therefore, only the non-revoked users can decrypt the data, this enhanced the security.
Limitation:
Required high memory for storage of encoded data
In ABE, 16 all those attributes which are used for creating a secret key generation are managed by a central authority (CA), in case the patient shifts from one hospital to another hospital for special tests like electronic medical record (EMR) to diagnose patient data. So the doctor of the other hospital cannot read all secret data of that patient but only read some of them. Jin et al. 22 highlighted various blockchain-based security and privacy approaches, for example, public and consortium blockchains, for secure sharing of patient medical record using a public network. Furthermore, the advantages and disadvantages of each blockchain-based approach are also presented. Li et al. 23 proposed a novel technique for data-access control. In this study, personal data of human are stored in the cloud in an encoded format using ABE.
Limitation:
Key-management problem.
Hu et al. 24 used a novel concept for securing the patient data in BSNs based on fuzzy attribute-based signcryption (FABSC). This scheme is suffering with security weakness.
Limitation:
Insecure in their defined security model.
Indistinguishability chosen ciphertext attack (IND-CCA).
Chatterjee and Das 25 developed a new security technique based on elliptic-curve cryptography (ECC) for authentication and access control under WBAN environments. After completion of a successful authentication, a unique secret session key is developed for communication between a particular sensor node and a user. In this study, the user can easily change the password without interacting to BS, and the scheme provides scalability property. Here, the AVISPA tool is used for proving security against various attacks. Li et al. 26 proposed the concept of secure storage and data-access control in WBANs and summarized the methods of secure and privacy protection, but this article did not analyze and compare the energy consumption. Garg et al. 27 proposed the construction of ABE for general circuits based on existence multilinear maps. This study used the bilinear decisional Diffie–Hellman (BDDH) assumption to prove its security. Both variants (KP-ABE and CP-ABE) of the ABE are used here.
Limitation:
Platform dependency.
High computation cost and communication overhead.
The rapid growth of technologies, especially in the field of cloud computing and IoT, enhanced the quality of patient healthcare. But still, smart health suffers due to data security and privacy problems. To improve the patient data security and privacy, Zhang et al. 28 proposed the CP-ABE method. In this study, the authors claimed that privacy aware smart health (PASH) is a secure standard model and provides efficient results than previous techniques. Due to fast development of ABE, the identity-based signature (IBS) notation was also extended and the concept of ABS is introduced. In an ABS concept, the private key of signer, along with a special signing predicate, is used to compute the signature of any data, and after that, the verifier can only verify that the signer’s attributes fulfill the signing predicate and cannot get any information related to the signer attributes. The concept of ABS was first introduced by Maji et al. 29 Subsequently, numerous ABS studies30–32 were developed in the literature for secure communication. To enhance the security of WBANs, various studies33–37 based on CLC were proposed in the literature but still require improvements to reduce the processing cost and transmission overhead and increase the security of overall networks. Zhang et al. 38 proposed a novel, efficient, and secure revocable certificate-less signature (RCLS) for the cloud-based industrial Internet of Things (IIoT). In this study, the authors also address the current issues of IIoT and claimed that Karati et al.’s 39 study does not satisfy the basic security properties of data authenticity and untrustworthiness of third parties. The method proposed by Zheng 1 needs public channel and security against attacks in the standard model. Liu et al. 40 proposed a novel concept which securely stored the patient health record (PHR) in cloud environments based on ciphertext-policy attribute-based signcryption (CP-ABSC). This study fulfills the basic security parameter of cryptography and reduces cost. It still has a chance to improve it in BSNs environments. Han et al. 41 proposed the attribute-based signcryption (ABSC) with non-monotonic access structures and fixed length encoded message, in which AND and OR logic gates with extra parameters are used for defining the access tree. The scheme reduces the cost with respect to pervious schemes presented in the literature. Rajput et al. 42 proposed a novel and efficient framework called the emergency access-control management system (EACMS) based on consortium blockchain to overcome the problems of traditional emergency system, that is, in emergency case, consent from medical officers to access his or her sensitive medical information. Moreover, it also describes the rules based on smart contract to efficiently control the situation in case of medical emergency and set the duration of time to protect the patient’s personal information from adversary’s attacks. The research on ABSC is still a new area, so we propose new ABSC scheme along with blockchain technology with fixed-size encoded text that consumes less resources and provides higher degree of security and privacy. Furthermore, we improve the overall efficiency of the BSNs to prolong the patient life. To secure the BSNs environment, various techniques are presented in the literature based on IBE, CLC, ABE, ABS, and ABSC. However, all these approaches are insecure in their security as well as inefficient in processing cost and transmission overhead. Our proposed scheme is suitable for resource-constrained environment of BSNs. There are three types of signcryption according to the public key cryptosystem: PKI signcryption, iD-based signcryption, and certificate-less signcryption. PKI is mostly used for the security of a large network, that is, the Internet. Numerous effective PKI-based signcryption schemes are available in the literature.43,44 In PKI base scheme, several entities are involved, such as, registration authority, certificate authority, verification authority, and certificate revocation list. PKI basically used for authenticity of public keys among sender and receiving nodes. Therefore, the PKI approach is not suitable for resource-constrained environment, that is, BSNs, because certificate distribution and revocation are heavy processes which consume a lot of system resources. To overcome the certificate-management problem of PKI, several iD-based signcryption schemes were proposed.45–49 In these schemes, users send request for obtaining private keys to third-party called private key generator (PKG). The sender request contains ID, phone number, and email when it reaches the PKG, after which the PKG generates private keys for a secure communication using a master secret key and other system parameters which are already stored in the PKG. ID-based signcryption provides authenticity of public keys without using certificates, but these schemes still suffered from key escrow problem because all private keys are generated by PKG; therefore, if someone compromises the PKG, the overall security of the system will be compromised. Researchers have now overcome the key escrow and certificate-management problems using certificate-less signcryption. Oliveira et al. 50 proposed a secure technique using blockchain technology to enhance the security and privacy of the patient’s EMRs and made sure of the availability of sensitive vital signs. Moreover, the patient’s encoded EMRs can be transmitted in the blockchain. In this study, the patient only distributed the secret keys for data decryption among trustable professional medical staff to avoid the any illegal activities and improve the overall performance of the networks. Using simulation results proved that the proposed scheme satisfied the scalability property. Some schemes based on certificate-less signcryption were proposed in previous studies.51–55 In these schemes, the user’s full private key will be generated from two parts: one part generated by a third-party called key generator center (KGC) and the second part generated by the user itself. As a result, certificate-less signcryption is the optimal solution for resource-constrained environment of BSNs. The idea of online/offline scheme was first introduced by Even et al. 56 In this study, any signature is transformed into two sub-phases called online and offline phases. Mostly complex and heavy operations are done in offline phase before a data or message is known. In an online phase, all minor operation is performed using pre-computation of offline phase and the data to generate signature. An et al. 57 proposed the concept of online/offline signcryption in this study to combine the concept of encryption and signature for data confidentiality and data integrity. As a result, online/offline signcryption is a very optimal solution for resource-constrained environment of BSNs, cell phone, smart card, and radio-frequency identification (RFID). Powerful devices can compute the complex and heavy operation in offline phase and minimize load on resource-constrained devices. As a result, signcryption can process data in minimum time using pre-computation. A lot of schemes published in the literature based on online/offline signcryption mostly involve PKI online/offline signcryption schemes.58–60 Thwin and Vasupongayya 61 used the concept of blockchain along with proxy re-encryption method for secure transmission of personal health information (vital signs) and to overcome the issues of network performance, privacy and security, sensor-storage limitation, revocation of consent, and scalability. It is secure against adversary’s attacks. Kuo et al. 62 highlighted the blockchain applications as well as advantages in the field of biomedical and patient healthcare system. It compared the traditional distributed system with blockchain concept and claim that blockchain is a suitable choice to improve the security and privacy of patient’s medical records. We also found the certificate-less online/offline signcryption schemes used by Li et al. 63 and Luo et al. 64 All these schemes are homogeneous (same environment), which mean that the sensitive data of sender and receiver belong to same environment. Li et al. 54 and Lai et al. 65 published few studies on online/offline signcryption methods. In this study, all the complex operation is removed in the online part. Lai and colleagues65,66 proposed the iD-based signcryption which suffers from key escrow problem as well as a lack of scalability on the server side. Sun and Li 67 published two different domains based on heterogeneous signcryption. In the first domain, the sender belongs to a PKI-based signcryption and the receiver belongs to an iD-based signcryption, while in the second domain, the sender belongs to the iD-based signcryption and the receiver belongs to the PKI-based signcryption and exchange data with each other. However, both aforementioned domains are not feasible for resource-constrained environments. In addition, both domains only protect the insider attacks and not the outsider attacks. 57 Huang et al. 68 proposed a heterogeneous signcryption, in which the sender belongs to an iD-based signcryption that sends data to the receiver of a PKI-based signcryption. In this study, the sender side suffers from key escrow problem. Li et al. 69 proposed a heterogeneous signcryption which overcomes the problems of methods proposed by Sun and Li 67 and Huang et al. 68 In this study, data are sent though certificate-less signcryption which is used in WSNs to PKI-based signcryption. All three studies67–69 are not recommended for tiny devices which have less computational power memory and less energy. They have more computational cost for signcrypting a message. We proposed a novel efficient and secure attribute-based heterogeneous online/offline signcryption scheme for BSNs using hybrid blockchain technology which is suitable for resource-constrained environments. In our proposed scheme, certificate-less signcryption is used in the biosensor side to remove the certificate-management and key escrow problems. In addition, our scheme uses the concept of online/offline method to overcome the computational burden on tiny biosensor nodes. Moreover, in our proposed scheme, we implement the PKI-based signcryption in the MS to improve the performance of scalability. PKI-based signcryption is a suitable choice for maintaining a large network, that is, the Internet. To improve the security and privacy of patient’s vital signs, we use the concept of hybrid blockchain. One of the best features of blockchain is to remove the centralized management. Blockchain used peer-to-peer network, which means the user of blockchain (users in network) have a copy of entire blocks, and if a new block is created, the block is distributed through the entire network, and each node receives the copy of a new created block. Moreover, each node verifies whether the block is a legitimate block or not. If the block is fake, it is marked as invalid. Blockchain is a distributed database which stores the records and these records are called blocks. Every block of blockchain contains data, hash of the block, and previous block hash. If data are stored in blocks, then a one-way hash function is performed on these blocks, through the hash these blocks are interconnected with each other. If someone wants to introduce a fake block into the blockchain, then they need to change every node of the blockchain, recalculate the PoW for every block in a node and take minimum 50% of control of the whole blockchain network, which is impossible. If a hacker wants to tamper with block, then the blockchain network easily detects the invalid block.
Preliminaries
In the section “Preliminaries,” we discuss the basic cryptographic primitives and mathematical hard problems which are used in our proposed scheme.
1. Bilinear pairings:
Let there be two groups of prime order p in which
Bilinearity: for all
Non-degeneracy: for all
Computability: for all
In our proposed scheme, the security of patient’s vital signs relies on the following computational hard problems. According to the given additive group
2. Computational Diffie–Hellman problem (CDHP):
Let G be a group of prime order p and P is the generator ∈ G, such that (x, y, z) are three random numbers
3. Bilinear Diffie–Hellman problem (BDHP):
In BDHP
4. Decisional bilinear Diffie–Hellman problem (DBDHP):
Let G be a group of prime order p and P is the generator ∈ G, such that (x, y, z) are three random numbers
5. Gap bilinear Diffie–Hellman problem (GBDHP):
In the GBDH problem, let
6. Gap Diffie–Hellman problem (GDHP):
In the GDHP, the
Applications of blockchain
In this era, many researchers have used the concept of blockchain technology for security purposes to enhance the integrity and traceability of sensitive data in different domains like healthcare, 71 cloud computing, 72 IoT, 73 and electronic voting.74,75
Advantages of blockchain technology in BSNs
There are some advantages of blockchain in the medical field which are discussed as follows:
Public health
In our proposed scheme using blockchain technology, dictatorial bodies can generate a common flow of de-identified medical patient information. This flow will help to the system to distinguish the pandemics and threats and perform essential action to manage the issue in timely bases.
Patient data security
We proposed a smarter and optimal technology called blockchain to preserve the medical information of a particular patient in a block and protect the medical data from illegal accessing.
Managed consent
Admitted authentic patient in ward of hospital can specifically permit any external users to access their history, that is, medical information, medicine, age, admitted date, and gender.
Flexibility in patient data updating
Authorized patients in ward of hospital can easily store and upload their medical data without modification in previous stored information.
Easy claim processing
Using blockchain technology, the (medical billing) complex process can be constructed easily by removing the third-party validation process.
Threat model
In our proposed scheme, we have used the most popular Dolev–Yao (DY) threat model. 76 According to this model, the communication among any two nodes is performed on the open channel. Moreover, the endpoint of a communication is also not reliable. In BSNs, due to the susceptible nature of public networks, the adversary can easily alter or delete the patient-sensitive information for misuse while transmitting it from biosensor nodes to an MS. Besides, an attacker can easily imprison some biosensor nodes as well as an MS for illegal activities. Moreover, the smartphones of medical experts can be lost or stolen. In this case, the attacker can easily extract the patient’s secret information stored in that smartphone and use it for specious activities, such as man-in-the-middle attack, offline password guessing attack, replay attack, insider attack, biosensor node or MS impersonation attacks, and computation of secret key. To maintain the security and privacy of patient data, it is important to secure the BSNs against all estimated threats. In our proposed scheme, the KGC is considered as the full trusted server of the entire BSNs. Furthermore, the computed partial private key is encrypted by the server using advanced encryption standard (AES) algorithm and then transmitted toward the biosensor nodes for the generation of the full private key. In case of MS failure, the sensitive patient data backup is available in the cloud and hybrid blockchain technology is used to protect these data from possible adversaries’ attacks. Our scheme fulfills the basic security properties of confidentiality, integrity, authenticity, non-repudiation, scalability, and traceability with minimal cost.
Proposed scheme
In our proposed scheme, we used the attribute-based heterogeneous online/offline scheme that securely transmitted patient information from the biosensor nodes to an MS using online/offline heterogeneous signcryption, while hybrid blockchain technology is used to enhance the overall security and privacy of BSNs along with the performance of medical data sharing among various entities and users. The transmission of physiological sensitive data of patient in a wireless channel may cause serious threats to the patient medical records privacy, and illegal users may perform malicious activities on sensitive patient data to disclose the privacy and security of patient for misuses. In our proposed scheme, we design a novel heterogeneous model that highlighted the issue of patient data sharing among various departments, that is, healthcare staff in hospital, researchers, government agencies, and insurance companies in trust-fewer environments. Using hybrid blockchain, our system provides data auditing, data provenance, scalability, and control for patient medical record shared in cloud repositories among large data objects. In our proposed cloud-based environment, we share patient information among various entities with minimal risk to patient data privacy. In our proposed heterogeneous model, biosensor nodes belong to a certificate-less environment that allows the biosensor nodes to sense patient’s vital signs, such as BP, ECG, EMG, and peripheral capillary oxygen saturation (SpO2), and then transmitted to the MS via a BS in the PKI-based domain. Moreover, in the biosensor side, online/offline techniques are used. The biosensor nodes performed all the heavy cryptographic computation in the offline phase, while the receiver credential and patient information are unknown. The online phase is used for minor operations in biosensor side to increase the performance of the networks. Our proposed heterogeneous online/offline signcryption scheme comprises the following phases: setup phase, MS key-generation phase, biosensor node key-generation phase, offline signcryption phase, online signcryption phase, and un-signcryption phase. The following notations are used in our proposed scheme (Table 1).
Scheme notation.
Setup phase
In this phase, we take initial security parameter K as an input. Moreover, KGC selects
where n represents patient-sensitive information in bits. KGC chooses randomly its master secret key
MS key-generation phase
Our proposed heterogeneous online/offline scheme comprises two different domains. In the biosensor side, we used certificate-less domain, while in the MS side, we used PKI-based domain suitable for large-scale networks, that is, the Internet. In this phase, the MS chooses a random secret value
Key generation on biosensor using certificate-less domain
In our proposed system, all biosensor nodes belong to the CLC-based domain. The biosensor nodes generated keys are as follows:
Generation of public key
The biosensor nodes which are deployed on a patient body to sense vital signs can randomly choose a value
Extraction of partial private key
In this phase, biosensor nodes send its identity
Secure distribution of partial private key using AES algorithm
In this phase, we securely transmitted partial private key
Generation of full private key
In this phase, the cipher input

Generation process of full private key.
Offline signcryption phase
This cipher is computed using a powerful machine, that is, medical server, and after computation, the output of the algorithm is stored in the biosensor node before deployment on a patient body. In the offline phase, we reduced the computational burden of the biosensor nodes.
Offline signcryption
Choose randomly
Computes
Computes
Computes
Computes
Computes
Offline signcryption output
Release
Online signcryption phase
In this phase, the patient data (M) and the output of previous offline phase is taken as the input and computes the encoded text as follows:
Online signcryption
Computes
Computes
Computes
Computes
Output encoded text
Biosensor node sends
Un-signcryption phase
In this phase, the cipher takes an encoded text
Un-signcryption
Computes
Recover the patient data
Computes h = H4 (M, L, Z)
Computes
Check the correctness of data
If
Otherwise data are modified and rejected ⊥.
Proposed scheme correctness
To validate the correctness of our proposed scheme, there are two steps. In the first step, we check the correctness of the decryption, while in the second step, we check the correctness of verification.
Proposed formal heterogeneousmodel for BSN
We proposed secure and efficient attribute-based online/offline heterogeneous signcryption scheme for BSNs using hybrid blockchain technology, in which we improve the overall security performance of the BSNs with lower transmission overhead along with processing cost. In our proposed scheme, KGC is a third-party or a server between certificate-less domain and PKI-based domain that is working in a secret key–generation process. In the key-generation process, we compute cryptographic keys for secure transmission of patient’s vital sign from source to destination node. KGC contain its own master public key, master secret key and other public parameters for the generation of partial private key. Now with the help of partial private key and random number, each biosensor nodes can be able to compute their full private keys for secure communication of patient data from source node to destination node. The biosensor nodes that are deployed on a patient body admitted in a hospital ward can continuously sense patient’s vital signs and then securely transmit these patient’s vital signs to a BS using the IEEE.802.15.6 standards. After receiving the patient’s encoded information, the BS used 3G/4G Internet services for transmission of patient information in a signcrypted format to the MS. Authentic medical doctors can access the patient information stored in the MS directly and also remotely from the cloud. Medical doctors analyze patient information and provide treatments based on an analysis of medical data. Using hybrid blockchain technology, we securely stored patient-sensitive information on a cloud and multiple types of external users can access the patient information after verification. Furthermore, in our proposed heterogeneous scheme, biosensor nodes deployed on a patient body can work in CLC domain while for enhancement of scalability on MS side PKI-based environment is used. To maintain data security and privacy of sensitive medical information, the concept of blockchain technology is used in our proposed scheme. Figure 2 shows our proposed formal heterogeneous model for BSNs.

Proposed formal heterogeneous model for BSNs.
Secure transmission among MS and external users
In our proposed scheme for accessing patient’s vital signs, all the external users must be register to the MS for verification or authentication process using their credentials, that is, ID, email address, location, and also transmitted the time stamp (TS). Each authentic user can access the patient-sensitive information after verification according to security policies which are predefine by system administrator in access control list (ACL).
KGC runs the key-generation algorithms to generate secret keys and securely distribute these secret keys among data producers and data consumers for secure communication.
Data producers, that is, hospitals, encode patient’s medical sensitive data using secret keys and send secret data with related description to a data pool of blockchain.
Data consumers, that is, medical research institutes, insurance companies, doctors, and government agencies, first login, and after verification, if it is declared legal or authentic, only then can access the patient data according to predefine attribute-based access structure or policies.
Data producers send signcrypted authorized letter to the data pool of a blockchain system to authorize their data-sharing policies.
Attribute-based security policies are used to provide fine grain access control to all external users, and patients can manage easily their own sensitive medical information and securely disseminate without violating patient data privacy and also enhanced the network life while keeping patient medical records private.
Data pool securely transfer data to blockchain for further processing and then patient secret data stored on medical cloud.
In a blockchain, we apply one-way hash function (MD-512) to maintain the integrity and traceability of medical records and improve the security to prevent the patient data from tempering, while the descriptions of patient medical information along with data address are stored in the blockchain in a decentralized manner.
Now data consumers can access that patient’s data and description of data from the cloud and blockchain using Internet technology. Figure 3 shows the secure transmission between the MS and external users.

Secure cloud-based patient electronic record system.
Proposed network model for BSN
In BSNs, the patient should have full authority of his or her attributes (vital signs) such that only those legitimate users he wants to share with can access the patient attributes. The attributes may contain physiological sensitive information of patient such as full information of disease, family relationship history, medication, and dosing, as well as some insensitive information like healthy diet, physical exercise, and secrets of longevity. Therefore, for security efficiency, we want to create an ACL in the MS, which classifies the patient attributes into different categories according to their criticalness, due to which security and privacy of patients’ information can be protected. External users (healthcare staff, researchers, insurance companies, and government agencies) can only access those attributes which are predefined in the ACL. Healthcare staff need to analyze an individual health profile and identify health threats and then suggest improvements in treatments based on an analysis of drug interaction, current medical practices, gaps in medical care plans, and identification of medical errors. They must have the right to access the patients’ full attributes. On the other side, researchers, insurance companies, and government agencies cannot use these full rights. The security and privacy of patients’ information are the essential components of secure BSN environments. In case the medical doctors obtain modified data of the patients, it may lead to a misdiagnosis of the patient and may have a serious consequence. Malicious users also try to get patient attributes for illegal purposes. In our proposed network model, we maintain the privacy of patients’ data with low processing cost and transmission overhead and provide a higher degree of security. Our proposed scheme achieves confidentiality against CCAs and unforgeability against chosen message attacks in the selective attribute model. Attribute-based keys of patients can be revoked if necessary for privacy efficiency. Using attribute-based security, only legitimate users can only access the information for which he or she is authorized. Our proposed network model is presented in Figure 4.

Proposed network model for BSNs.
Secure distribution of access policies for data privacy
All entities which are participating in the networks for transmission of information can register their secret keys from KGC.
All admitted patients in a hospital wards can transmit patient’s medical information in a secure format toward the MS.
The system administrator can set the data-access policies and structures using AND, OR logic gates and transmitted these access policies toward the patient to authorizes theses polices along with doctor policy for data accessing (Figure 5).
The biosensor node deployed on a particular patient body can sense the vital signs and then securely communicate these vital signs to BS using IEEE 802.15.6 standard. BS further transmitted the received patient information toward the MS in a secure manner using 3G/4G Internet technology.
Now MS used the predefine data-access policies to encrypt the patient information and transmitted to the data pool of blockchain.
The relevant detail about patient information is also written in the blockchain.
Now blockchain verify the transmission source of data pool and also stored the received encrypted data of patient in medical cloud. Moreover, all the external users can access the patient data from cloud using their valid user ID and assigned password using Internet technology.

Distribution of access policies/structure for secure data privacy.
Smart contract
Our proposed heterogeneous scheme can also provide the support of smart contract for automatic claims of settlement. 77 The smart contract is just like a reality contract, but the reality contract is in written format and the blockchain smart contract is a small program or protocol inside a blockchain. The process of smart contract can be run between patient, MS, and all external parties. Through the smart contract, any two users can communicate securely without a trusted third-party, meaning it removes the trusted third-party. Smart contracts are open-distributed ledgers that are impossible to hack. The smart contracts are distributed and immutable: immutable, meaning that once a smart contract is created, it certainly cannot be changed and distributed, meaning that the smart contract is validated by each node of the network (Figure 6).

Secure patient medical information using blockchain.
Cryptographic keys
The cryptographic keys are used to succeed confidentiality for exchange of information between requester and server. Through these cryptographic keys, a high-level security for our scheme is achieved.
Requester privet key: the private key is generated by the requester, and it is used to sign the data digitally for access.
Requester public key: the public key is also generated by the requester and is sent to the authenticator to verify the requester identity for the access of data.
Authenticator contract key: the authenticator also generates the couple of keys and attached with smart contract in a suite used to encrypt the reports from requester system in our network.
Security model
In this section, we demonstrate the formal security model of our proposed heterogeneous online/offline method. In our proposed scheme, biosensor nodes belong to CLC environment and we consider two kinds of adversaries Type-I and Type-II for (EUF-CMA). In Type-I adversary model, common users of the system cannot access the master secret key
First, we proved the game for confidentiality
Initial CH executes the setup algorithm on input data, that is, initial security parameters K, and assigns master secret key
Phase-I
Public key queries
Adversary (AD) can add the identification number
Private key queries
Adversary (AD) can add the identification number
Public key–replacement queries
In such types of queries, adversary (AD) can alter the biosensor nodes public key by its own choice.
Signcryption queries
In such type of queries, adversary (AD) executes a signcryption algorithm. It submits a biosensor node identity
Un-signcryption queries
An adversary (AD) can execute the queries of un-signcryption and submits the encoded data. The challenger (CH) executes the un-signcryption algorithm and transmits the obtained result to the adversary (AD). In a PKI environment, the adversary (AD) knows the public key of the server.
Challenge phase
An adversary (AD) defines when Phase-1 is completed. The adversary (AD) produces challenge for two same size plain texts
Phase-II
Adversary (AD) can execute polynomial-bounded numbers of queries for Phase-II with some constraints on un-signcryption phase to get the related data after the challenge phase.
Adversary (AD) finally guesses the output
Definition 1
However, insider security is achieved in the form of confidentiality (IND-CCA2) against the attacker in the aforementioned (IND-CCA2) game.
Second, we proved game for Existential Unforgeability (EUF-CMA) here we used two types of adversaries: Type-I and Type-II. Furthermore, Type-II includes (EUF-CMA-I) game and (EUF-CMA-II) game.
EUF-CMA-I: In our proposed scheme (EUF-CMA-I game), the challenger (CH) directly communicates with the adversary of Type-I denoted as ADTI.
Initial: The challenger (CH) executes the setup algorithm on input data, that is, initial security parameters
Attack:
Forgery:
Un-signcryption
Adversary
Adversary
Adversary
Definition 2
Our proposed heterogeneous scheme (EUF-CMA-I) is secure if it satisfied the benefits of probabilistic algorithm in the standard model, and adversary
EUF-CMA-II: the challenger (CH) communicates in this game with a Type-II adversary
Initial: The challenger (CH) executes the setup algorithm on input data, that is, initial security parameters
Attack:
Forgery:
Un-signcryption
Adversary
Adversary
Definition 3
Our proposed heterogeneous scheme
Definition 4
We obtain the security property of unforgeability
Definition 5
However, insider security is achieved in both unforgeability (EUF-CMA-I) and
Proposed scheme informal security analysis
In a security model, using a formal security analysis, we have proved that our proposed heterogeneous scheme is secure against Type-I and Type-II adversaries. Moreover, we show that our scheme satisfies the security properties of data confidentiality
Proposed scheme resistance against replay attack
Proof. In our proposed heterogeneous scheme, we used the concept of time stamp
Proposed scheme resistance against man-in-the-middle attack
Proof. In our proposed scheme for secure distribution of partial private key, we used the concept of AES algorithm. We securely transmitted a partial private key
Proposed scheme resistance against offline password guessing attack
Proof. The patient-sensitive medical information is stored in a MS for future reference and treatment. Each external user, that is, a doctor, who wants to access patient information must be registered with the MS to maintain the real-time patient data privacy. Only registered doctors can access patient-sensitive medical information stored in an MS using their smartphones according to predefine attribute-based access structure or policies. Therefore, in case the doctor’s smartphone is lost or stolen, an adversary cannot access or guess the password of the server because we used the hybrid blockchain technology in our proposed scheme, and due to one-way collision-resistance function, it is difficult for the attacker to guess the password of the MS. Moreover, illegal users are blacklisted to protect the BSNs networks from Type-I and Type-II adversaries and maintain fine-grained access control for patient data privacy.
Proposed scheme resistance against privileged insider attack
Proof. In our proposed scheme, we used attribute-based access structure or policies to protect privilege abuse or overcome the damage it can cause. If the doctor’s policy matched with the predefine policy stored in the MS, permission is granted to the doctor for accessing the concerned patient’s medical sensitive information otherwise discard the policy. Therefore, for security efficiency, we want to create ACL on
Performance analysis
Performance analysis consists of two main sub parts. In the first part, we compare the computation cost of our proposed heterogeneous scheme with other related schemes67–69 shown in the below table, while in the second part, we discuss the energy consumption of our proposed scheme with other heterogeneous schemes.67–69
Computation cost
In this sub-section, we compared the processing time of existing schemes discussed in the literature67–69 with our proposed scheme. Our proposed secure attribute-based online/offline heterogeneous signcryption scheme provides efficient results in terms of processing cost than other schemes. We assumed that
Computation cost comparisons in terms of expensive or major operations.
Table 3 shows that the sender private key size of our proposed heterogeneous scheme and that of Sun and Li 67 and Li et al. 69 are same and less then Huang et al. 68 schemes, while the encoded text size of Li et al. 69 is lower than other heterogeneous schemes. Sun and Li 67 scheme does not provide the non-repudiation security property, and the recipient can create the same encoded text as the sender does. Moreover, in the studies of Huang et al.(I) and (II) 68 and Sun and Li, 67 the sender belongs to identity-based cryptosystem (IBCS) domain and suffers from the key escrow problem.
Comparison of private key size and transmitted encoded text size in (bits).
Table 4 shows the security properties fulfilled by our proposed scheme and other four homogeneous and five heterogeneous schemes. Only the scheme by Sun and Li 67 does not fulfill the EUF-CMA security property, and all other heterogeneous schemes in the table achieve this property. All four homogeneous schemes in Table 4 are not suitable for large networks in the sever side since CLC and IBCS are used.
Comparison of security properties of proposed scheme and existing schemes.
CCA: chosen ciphertext attack; CLCS: certificate-less cryptosystem; IBCS: identity-based cryptosystem; PKI: public key infrastructure.
Energy consumption
According to the Shim et al.’s model, 82 assume that in transmitting mode, current is drawn 27 mA, while in receiving mode current drawn ratio is 10 mA. Moreover, in the active mode, current drawn is 8.0 mA and the speed of the data is 12.4 Kbps, and using previous methods,83,84 the microcontroller needs 3 × 27 × 8/12,400 = 0.052 mJ and 3 × 10 × 8/12,400 = 0.019 mJ to transfer and receive 1 byte of data through the MICA2 sensor node, respectively. Now we find the energy consumption during the transmission process.
Transmission cost
The data size in previous works,67,68(I) and (II),69 and the proposed scheme is as follows:
In a study by Sun and Li,
67
the microcontroller transfers (||Encoded text||/8) = 640/8 = 80 byte. In a study by Huang et al. (I),
68
microcontroller transfers (||Encoded text||/8) = 960/8 = 120 byte. In a study by Huang et al. (II),
68
microcontroller transfers (||Encoded text||/8) = 960/8 = 120 byte. In a study by Li et al.,
69
microcontroller transfers: (||Encoded text||/8) + (
Now we calculate the data-transmission energy consumption using the following procedure shown in Tables 5–7.
Energy consumption in transmission.
Energy consumption in processing.
Total energy consumption.
Table 8 shows that the energy-consumption ratio increased when the number of transmitted messages increased in the heterogeneous domain. Our proposed scheme consumes less energy as compared to other heterogeneous schemes shown in the Table 8.
Energy consumption versus number of transmitted messages in a heterogeneous domain.
Figure 7 shows the comparison of total energy consumed at the sender side in various schemes. The graph shows that our proposed heterogeneous online/offline signcryption scheme consumed less energy during data transmission and data processing at biosensor side as compared to other schemes.67–69 Data transmissions consume more energy than data processing.

Total consumption of energy in biosensor node.
Figures 8 and 9 show the processing cost comparison of one message in the online signcryption phase of various heterogeneous schemes as discussed in the literature. The graph shows that our proposed online signcryption phase has no major operation and needs only the one-way hash function and arithmetic operations that are negligible; therefore, the processing cost of our proposed online phase is the smallest when compared with other existing schemes.67–69

Processing cost of online signcryption phase.

Energy consumption versus number of transmitted messages in the heterogeneous domain.
Conclusion
Due to extensive use of BSNs, designing a secure and efficient heterogeneous scheme is an important requirement for the resource-constrained environment. BSNs face three major challenges which are security, privacy, and efficiency. To cope with these problems, in our proposed scheme, we have used a heterogeneous online/offline signcryption and CLC environment to overcome the computational burden on biosensor nodes, while PKI environment at the MS side to enhance the scalability of the networks. Besides, we achieved the advantages of interoperability, transparency, traceability, and privacy using hybrid blockchain technology. We thoroughly examined our proposed scheme for its security analysis with the help of formal security under the standard model along with informal security. Using informal security analysis, we proved that our scheme provides resistance against possible attacks. The detailed results of performance analysis show that our proposed heterogeneous scheme provides better security and privacy while consuming less energy during patient data computation and transmission than other heterogeneous schemes discussed in the literature and enhance the overall performance of the networks. Therefore, this study is preferable for practical applications of BSNs, where two different parties can securely communicate even if their architecture and domain are different.
Footnotes
Handling Editor: Benny Lo
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
