{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:03:50Z","timestamp":1775667830467,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"AlMaarefa University","award":["TUMA-2021-57"],"award-info":[{"award-number":["TUMA-2021-57"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wireless Body Area Networks (WBANs) have emerged as a new study of research in the field of healthcare in recent years. WBANs, on the one hand, intend to gather and monitor data from the human body and its surroundings; on the other hand, biomedical devices and sensors interact through an open wireless channel, making them exposed to a range of cyber threats. However, WBANs are a heterogeneous-based system; heterogeneous cryptography is necessary, in which the transmitter and receiver can employ different types of public key cryptography. This article proposes an improved and efficient heterogeneous authentication scheme with a conditional privacy-preserving strategy that provides secure communication in WBANs. In the proposed scheme, we employed certificateless cryptography on the client side and Identity-Based Cryptography on the receiver side. The proposed scheme employs Hyperelliptic Curve Cryptography (HECC), a more advanced variation of Elliptic Curve Cryptography (ECC). HECC achieves the same level of security with a smaller key size and a more efficient approach than its counterpart methods. The proposed scheme not only meets the security and privacy standards of WBANs but also enhances efficiency in terms of computation and communication costs, according to the findings of the security and performance analysis.<\/jats:p>","DOI":"10.3390\/s23031121","type":"journal-article","created":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T01:33:51Z","timestamp":1674092031000},"page":"1121","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme"],"prefix":"10.3390","volume":"23","author":[{"given":"Insaf","family":"Ullah","sequence":"first","affiliation":[{"name":"Hamdard Institute of Engineering & Technology, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1351-898X","authenticated-orcid":false,"given":"Muhammad Asghar","family":"Khan","sequence":"additional","affiliation":[{"name":"Hamdard Institute of Engineering & Technology, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4576-5715","authenticated-orcid":false,"given":"Ako Muhammad","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Basic Education, University of Sulaimani, Sulaimaniyah 00964, Kurdistan Region, Iraq"},{"name":"Department of Information Technology, University College of Goizha, Sulaimaniyah 00964, Kurdistan Region, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0096-3435","authenticated-orcid":false,"given":"Fazal","family":"Noor","sequence":"additional","affiliation":[{"name":"Faculty of Computer and Information Systems, Islamic University of Madinah, Madinah 400411, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4412-7727","authenticated-orcid":false,"given":"Nisreen","family":"Innab","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, P.O. Box 71666, Riyadh 11597, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6502-472X","authenticated-orcid":false,"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Shandong University of Science and Technology, Qingdao 266590, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Comert, C., Kulhandjian, M., Gul, O.M., Touazi, A., Ellement, C., Kantarci, B., and D\u2019Amours, C. (2022, January 19). Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels. Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning (WiseML \u201822), San Antonio, TX, USA.","DOI":"10.1145\/3522783.3529518"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"101207","DOI":"10.1109\/ACCESS.2021.3097403","article-title":"An Anonymous Certificateless Signcryption Scheme for Internet of Health Things","volume":"9","author":"Ullah","year":"2021","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Reus-Muns, G., Jaisinghani, D., Sankhe, K., and Chowdhury, K.R. (2020, January 7\u201311). Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR Platform. Proceedings of the GLOBECOM 2020\u20132020 IEEE Global Communications Conference, Taipei, Taiwan.","DOI":"10.1109\/GLOBECOM42002.2020.9348261"},{"key":"ref_4","first-page":"3","article-title":"The internet of things in healthcare: An overview","volume":"1","author":"Yin","year":"2016","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6654063","DOI":"10.1155\/2020\/6654063","article-title":"An Online-Offline Certificateless Signature Scheme for Internet of Health Things","volume":"2020","author":"Khan","year":"2020","journal-title":"J. Health Eng."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Chen, C.M., Chen, Z., Kumari, S., and Lin, M.C. (2022). LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things. Sensors, 22.","DOI":"10.3390\/s22145401"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5986469","DOI":"10.1155\/2021\/5986469","article-title":"Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption","volume":"2021","author":"Noor","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","article-title":"Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems","volume":"27","author":"Lin","year":"2009","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3116593","DOI":"10.1155\/2021\/3116593","article-title":"Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks","volume":"2021","author":"Chen","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"103477","DOI":"10.1016\/j.micpro.2020.103477","article-title":"Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN)","volume":"81","author":"Ullah","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/3425707","article-title":"Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment","volume":"21","author":"Chaudhry","year":"2021","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_12","first-page":"102502","article-title":"A robust authentication and access control protocol for securing wireless healthcare sensor networks","volume":"52","author":"Ali","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","unstructured":"Shamir, A. (1985). Advances in Cryptology, Springer."},{"key":"ref_14","first-page":"80","article-title":"A certificateless aggregate signature scheme for healthcare wireless sensor network","volume":"18","author":"Kumar","year":"2018","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3076","DOI":"10.1007\/s11227-018-2312-y","article-title":"Secure CLS and CL-AS schemes designed for VANETs","volume":"75","author":"Kumar","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10916-014-0143-9","article-title":"A Privacy Authentication Scheme Based on Cloud for Medical Environment","volume":"38","author":"Chen","year":"2014","journal-title":"J. Med. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s10916-016-0453-1","article-title":"Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment","volume":"40","author":"Chiou","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/s10916-016-0629-8","article-title":"Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications","volume":"40","author":"Li","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","article-title":"A More Secure Authentication Scheme for Telecare Medicine Information Systems","volume":"36","author":"Debiao","year":"2011","journal-title":"J. Med. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","article-title":"An Improved Authentication Scheme for Telecare Medicine Information Systems","volume":"36","author":"Wei","year":"2012","journal-title":"J. Med. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","article-title":"A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks","volume":"82","author":"Wu","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/s10916-016-0491-8","article-title":"Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks","volume":"40","author":"Wu","year":"2016","journal-title":"J. Med. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","article-title":"Anonymous Authentication for Wireless Body Area Networks with Provable Security","volume":"11","author":"He","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"69603","DOI":"10.1109\/ACCESS.2018.2880898","article-title":"An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services","volume":"6","author":"Ji","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"5860286","DOI":"10.1155\/2019\/5860286","article-title":"CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving","volume":"2019","author":"Xie","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2160","DOI":"10.1109\/JIOT.2019.2959602","article-title":"Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks","volume":"7","author":"Liao","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"80015","DOI":"10.1109\/ACCESS.2022.3180165","article-title":"Efficient Anonymous Authentication for Wireless Body Area Networks","volume":"10","author":"Li","year":"2022","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2708","DOI":"10.1109\/JIOT.2020.3049003","article-title":"Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment","volume":"9","author":"Bera","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_29","unstructured":"Shamus Sofware Ltd. (2021, August 21). Miracl Library. Available online: http:\/\/github.com\/miracl\/MIRACL."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"8405879","DOI":"10.1155\/2017\/8405879","article-title":"Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings","volume":"2017","author":"Zhou","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"89133","DOI":"10.1109\/ACCESS.2021.3089009","article-title":"Securing Internet of Drones With Identity-Based Proxy Signcryption","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"9718580","DOI":"10.1155\/2022\/9718580","article-title":"An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones","volume":"2022","author":"Khan","year":"2022","journal-title":"Secur. Commun. Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1121\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:09:20Z","timestamp":1760119760000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,18]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23031121"],"URL":"https:\/\/doi.org\/10.3390\/s23031121","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,18]]}}}