Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme

被引:0
作者
Abouelkheir, Eman [1 ,2 ]
机构
[1] Qassim Univ, Coll Comp, Dept Comp Engn, Buraydah 52571, Saudi Arabia
[2] Kafrelsheikh Univ, Coll Engn, Dept Elect Engn, Kafrelsheikh 33516, Egypt
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Security; Autonomous aerial vehicles; Aggregates; Encryption; Edge computing; Cloud computing; Protocols; Elliptic curve cryptography; Servers; Public key; Aggregate signcryption; network security; security systems; Internet of Things (IoT); security; chosen-plaintext attack; chosen ciphertext attack; unmanned aerial vehicles (UAVs); EDGE; AUTHENTICATION; COMMUNICATION; INTERNET;
D O I
10.1109/OJCOMS.2024.3504353
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned aerial vehicles (UAVs) have gained significant attention in robotics research during the past decade, despite their presence dating back to 1915. Unmanned Aerial Vehicles (UAVs) are capable of efficiently and successfully carrying out a range of tasks. As a result, the use of many UAVs to fulfill a specific mission has grown into a popular area of research. Researchers have conducted investigations on the use of numerous UAVs in various fields such as remote sensing, disaster relief, force protection, military warfare, and surveillance. Efficiency and robustness are crucial factors for carrying out key operations. Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. Consequently, secret UAV networks that utilize edge computing necessitate supplementary precautions to safeguard their networks. This research paper talks about a simple, lightweight, certificate-free, heterogeneous online/offline aggregate signing scheme called CL-PFASC. It comes from the discrete logarithm problem. The concert scheme enables UAVs to communicate with a GS without the need for a bilinear coupling operation. We classify the UAVs as identity-based cryptography (IBC) and the ground station GS as public-key infrastructure (PKI). We verify the security features of the suggested scheme using a formal security evaluation method, the random oracle model, under confidentiality and unforgeability. We also evaluate its communication and computation costs and compare them to those of similar existing schemes. The performance and security study indicate that the suggested approach improves both efficiency and security.
引用
收藏
页码:7552 / 7566
页数:15
相关论文
共 45 条
  • [1] Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
  • [2] A secure and efficient heterogeneous ID-based signcryption for unmanned aerial vehicular networking system
    Aithekar, Ashutosh
    Gupta, Pratik
    Chaudhary, Dharminder
    [J]. SECURITY AND PRIVACY, 2024, 7 (05)
  • [3] A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV
    Alam, Iqbal
    Sharif, Kashif
    Li, Fan
    Latif, Zohaib
    Karim, M. M.
    Biswas, Sujit
    Nour, Boubakr
    Wang, Yu
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (02)
  • [4] Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    [J]. IEEE ACCESS, 2021, 9 (09): : 18706 - 18721
  • [5] IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication
    Ali, Ikram
    Li, Jianqiang
    Chen, Jie
    Chen, Yong
    Ullah, Shamsher
    Khan, Salabat
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 29941 - 29955
  • [6] [Anonymous], 2018, The History of Drones (Drone History Timeline From 1849 To 2019)
  • [7] A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems
    Asghar Khan, Muhammad
    Ullah, Insaf
    Kumar, Neeraj
    Afghah, Fatemeh
    Barb, Gordana
    Noor, Fazal
    Alqahtany, Saad
    [J]. IEEE ACCESS, 2024, 12 : 83466 - 83479
  • [8] Berger C, 2016, IEEE INT SYMP SAFE, P342, DOI 10.1109/SSRR.2016.7784325
  • [9] Canetti R., 2005, Encyclopedia of Cryptography and Security, DOI [10.1007/0-387-23483-7_99, DOI 10.1007/0-387-23483-7_99]
  • [10] Cao Z., 2015, Rep. 2015/084