Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme

被引:0
作者
Abouelkheir, Eman [1 ,2 ]
机构
[1] Qassim Univ, Coll Comp, Dept Comp Engn, Buraydah 52571, Saudi Arabia
[2] Kafrelsheikh Univ, Coll Engn, Dept Elect Engn, Kafrelsheikh 33516, Egypt
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2024年 / 5卷
关键词
Security; Autonomous aerial vehicles; Aggregates; Encryption; Edge computing; Cloud computing; Protocols; Elliptic curve cryptography; Servers; Public key; Aggregate signcryption; network security; security systems; Internet of Things (IoT); security; chosen-plaintext attack; chosen ciphertext attack; unmanned aerial vehicles (UAVs); EDGE; AUTHENTICATION; COMMUNICATION; INTERNET;
D O I
10.1109/OJCOMS.2024.3504353
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Unmanned aerial vehicles (UAVs) have gained significant attention in robotics research during the past decade, despite their presence dating back to 1915. Unmanned Aerial Vehicles (UAVs) are capable of efficiently and successfully carrying out a range of tasks. As a result, the use of many UAVs to fulfill a specific mission has grown into a popular area of research. Researchers have conducted investigations on the use of numerous UAVs in various fields such as remote sensing, disaster relief, force protection, military warfare, and surveillance. Efficiency and robustness are crucial factors for carrying out key operations. Multiple groups of UAVs, through appropriate interaction and concerted procedures, can achieve these objectives. The unpredictable features of UAVs and their reliance on unprotected and widely available wireless networks create challenges in establishing secure communication between a private edge cloud and a UAV. Consequently, secret UAV networks that utilize edge computing necessitate supplementary precautions to safeguard their networks. This research paper talks about a simple, lightweight, certificate-free, heterogeneous online/offline aggregate signing scheme called CL-PFASC. It comes from the discrete logarithm problem. The concert scheme enables UAVs to communicate with a GS without the need for a bilinear coupling operation. We classify the UAVs as identity-based cryptography (IBC) and the ground station GS as public-key infrastructure (PKI). We verify the security features of the suggested scheme using a formal security evaluation method, the random oracle model, under confidentiality and unforgeability. We also evaluate its communication and computation costs and compare them to those of similar existing schemes. The performance and security study indicate that the suggested approach improves both efficiency and security.
引用
收藏
页码:7552 / 7566
页数:15
相关论文
共 45 条
  • [21] Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage
    Luo, Wei
    Ma, Wenping
    [J]. ELECTRONICS, 2019, 8 (05):
  • [22] Report on Pairing-based Cryptography
    Moody, Dustin
    Peralta, Rene
    Perlner, Ray
    Regenscheid, Andrew
    Roginsky, Allen
    Chen, Lily
    [J]. JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2015, 120 : 11 - 27
  • [23] Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things
    Niu, Shufen
    Shao, Honglin
    Su, Yun
    Wang, Caifen
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136
  • [24] Ollero A, 2007, SPRINGER TRAC ADV RO, V37, P1, DOI 10.1007/978-3-540-73958-6
  • [25] A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles
    Pan, Xiangyu
    Jin, Yuqiao
    Wang, Ziqing
    Li, Fagen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 19426 - 19437
  • [26] A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art
    Quoc-Viet Pham
    Fang, Fang
    Vu Nguyen Ha
    Piran, Md Jalil
    Le, Mai
    Le, Long Bao
    Hwang, Won-Joo
    Ding, Zhiguo
    [J]. IEEE ACCESS, 2020, 8 (08): : 116974 - 117017
  • [27] Sadeghi AR, 2001, LECT NOTES COMPUT SC, V2045, P244
  • [28] Sahu U., 2016, INT J ADV RES COMPUT, V5, P429
  • [29] Salin H., 2021, Pairing-based cryptography in theory and practice
  • [30] Scheutz M, 2005, 2005 IEEE SWARM INTELLIGENCE SYMPOSIUM, P257