A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles

被引:3
|
作者
Ullah, Insaf [1 ]
Khan, Muhammad Asghar [1 ]
Abdullah, Ako Muhammad [2 ,3 ]
Mohsan, Syed Agha Hassnain [4 ]
Noor, Fazal [5 ]
Algarni, Fahad [6 ]
Innab, Nisreen [7 ]
机构
[1] Hamdard Univ, Hamdard Inst Engn & Technol, 440000, Islamabad, Pakistan
[2] Univ Sulaimani, Coll Basic Educ, Comp Sci Dept, Sulaimaniyah 00964, Kurdistan, Iraq
[3] Univ Coll Goizha, Dept Informat Technol, Sulaimaniyah 00964, Kurdistan, Iraq
[4] Zhejiang Univ, Ocean Coll, Zheda Rd 1, Zhoushan 316021, Peoples R China
[5] Islamic Univ Madinah, Fac Comp & Informat Syst, Madinah 400411, Saudi Arabia
[6] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[7] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, POB 71666, Riyadh 11597, Saudi Arabia
关键词
micro aerial vehicles; security; signcryption; elliptic curve cryptography; ring signcryption;
D O I
10.3390/mi13111926
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long distances, and send data to a portable base station. Despite their many benefits, MAVs often encounter obstacles due to limitations in the embedded system (such as memory, processing power, energy, etc.). Due to these obstacles and the use of open wireless communication channels, MAVs are vulnerable to a variety of cyber-physical attacks. Consequently, MAVs cannot execute complex cryptographic algorithms due to their limited computing power. In light of these considerations, this article proposes a conditional privacy-preserving generalized ring signcryption scheme for MAVs using an identity-based cryptosystem. Elliptic Curve Cryptography (ECC), with a key size of 160 bits, is used in the proposed scheme. The proposed scheme's security robustness has been analyzed using the Random Oracle Model (ROM), a formal security evaluation method. The proposed scheme is also compared in terms of computation cost, communication cost and memory overhead against relevant existing schemes. The total computation cost of the proposed scheme is 7.76 ms, which is 8.14%, 5.20%, and 11.40% schemes. The results show that the proposed scheme is both efficient and secure, proving its viability.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles
    Ullah, Insaf
    Khan, Muhammad Asghar
    Kumar, Neeraj
    Abdullah, Ako Muhammad
    AlSanad, Abeer Abdulaziz
    Noor, Fazal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (03) : 3989 - 3998
  • [2] An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones
    Khan, Muhammad Asghar
    Ullah, Insaf
    Abdullah, Ako Muhammad
    Mohsan, Syed Agha Hassnain
    Noor, Fazal
    SENSORS, 2023, 23 (03)
  • [3] Privacy Preserving Signcryption Scheme
    Chaudhari, Payal
    Das, Manik Lal
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, (ICDCIT 2017), 2017, 10109 : 196 - 209
  • [4] Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid
    Liu, Shuanggen
    Liu, Zhentao
    Liang, Jueqin
    Zhang, Wanju
    Heng, Zirong
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 189 - 204
  • [5] An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption for VANETs
    Du, Hongzhen
    Wen, Qiaoyan
    Zhang, Shanshan
    Gao, Mingchu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17881 - 17892
  • [6] A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks
    Cai, Ying
    Zhang, Hao
    Fang, Yuguang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) : 647 - 656
  • [7] A heterogeneous ring signcryption scheme with privacy protection and conditional tracing for smart grid
    Zhou, Xinhuang
    Luo, Ming
    Qiu, Minrong
    COMPUTER COMMUNICATIONS, 2024, 228
  • [8] An efficient signcryption scheme with key privacy and its extension to ring signcryption
    Li, Chung
    Yang, Guomin
    Wong, Duncan
    Deng, Xiaotie
    Chow, Sherman
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (03) : 451 - 473
  • [9] Certificate-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Gao, Guangyong
    Cui, Zongmin
    Zhao, Zhiqiang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2018, 29 (06) : 1063 - 1088
  • [10] Secure Pairing-Free Certificate-Based Online/Offline Signcryption Scheme With Conditional Privacy Preserving for VANETs
    Yang, Wenjie
    Cao, Peiwei
    Zhang, Futai
    Liu, Zhiquan
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (04): : 4435 - 4447