A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles

被引:3
|
作者
Ullah, Insaf [1 ]
Khan, Muhammad Asghar [1 ]
Abdullah, Ako Muhammad [2 ,3 ]
Mohsan, Syed Agha Hassnain [4 ]
Noor, Fazal [5 ]
Algarni, Fahad [6 ]
Innab, Nisreen [7 ]
机构
[1] Hamdard Univ, Hamdard Inst Engn & Technol, 440000, Islamabad, Pakistan
[2] Univ Sulaimani, Coll Basic Educ, Comp Sci Dept, Sulaimaniyah 00964, Kurdistan, Iraq
[3] Univ Coll Goizha, Dept Informat Technol, Sulaimaniyah 00964, Kurdistan, Iraq
[4] Zhejiang Univ, Ocean Coll, Zheda Rd 1, Zhoushan 316021, Peoples R China
[5] Islamic Univ Madinah, Fac Comp & Informat Syst, Madinah 400411, Saudi Arabia
[6] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[7] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, POB 71666, Riyadh 11597, Saudi Arabia
关键词
micro aerial vehicles; security; signcryption; elliptic curve cryptography; ring signcryption;
D O I
10.3390/mi13111926
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long distances, and send data to a portable base station. Despite their many benefits, MAVs often encounter obstacles due to limitations in the embedded system (such as memory, processing power, energy, etc.). Due to these obstacles and the use of open wireless communication channels, MAVs are vulnerable to a variety of cyber-physical attacks. Consequently, MAVs cannot execute complex cryptographic algorithms due to their limited computing power. In light of these considerations, this article proposes a conditional privacy-preserving generalized ring signcryption scheme for MAVs using an identity-based cryptosystem. Elliptic Curve Cryptography (ECC), with a key size of 160 bits, is used in the proposed scheme. The proposed scheme's security robustness has been analyzed using the Random Oracle Model (ROM), a formal security evaluation method. The proposed scheme is also compared in terms of computation cost, communication cost and memory overhead against relevant existing schemes. The total computation cost of the proposed scheme is 7.76 ms, which is 8.14%, 5.20%, and 11.40% schemes. The results show that the proposed scheme is both efficient and secure, proving its viability.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] A Blockchain-Based Efficient, Secure and Anonymous Conditional Privacy-Preserving and Authentication Scheme for the Internet of Vehicles
    Qureshi, Kashif Naseer
    Shahzad, Luqman
    Abdelmaboud, Abdelzahir
    Elfadil Eisa, Taiseer Abdalla
    Alamri, Bandar
    Javed, Ibrahim Tariq
    Al-Dhaqm, Arafat
    Crespi, Noel
    APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [22] Conditional Data-Sharing Privacy-Preserving Scheme in Blockchain-Based Social Internet of Vehicles
    Xia, Zhuoqun
    Man, Jiahuan
    Gu, Ke
    Li, Xiong
    Huang, Longfei
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2025, 10 (02): : 378 - 395
  • [23] A privacy-preserving route planning scheme for the Internet of Vehicles
    Atmaca, Ugur Ilker
    Maple, Carsten
    Epiphaniou, Gregory
    Dianati, Mehrdad
    AD HOC NETWORKS, 2021, 123
  • [24] Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs
    Xie Yong
    Wu Libing
    Zhang Yubo
    Shen Jian
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) : 950 - 956
  • [25] Secure Ring Signature Scheme for Privacy-Preserving Blockchain
    Wang, Lin
    Peng, Changgen
    Tan, Weijie
    ENTROPY, 2023, 25 (09)
  • [26] Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs
    XIE Yong
    WU Libing
    ZHANG Yubo
    SHEN Jian
    Chinese Journal of Electronics, 2016, 25 (05) : 950 - 956
  • [27] BCS-CPP: A Blockchain and Collaborative Service-Based Conditional Privacy-Preserving Scheme for Internet of Vehicles
    Zeng, Zhikang
    Zhou, Quan
    Wei, Kaijun
    Yang, Ningbin
    Tang, Chunming
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (02): : 4130 - 4144
  • [28] A Novel Pseudonym Assignment and Encryption Scheme for Preserving the Privacy of Military Vehicles
    Tandon, Righa
    Gupta, P. K.
    DEFENCE SCIENCE JOURNAL, 2021, 71 (02) : 192 - 199
  • [29] Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
    Pravin Mundhe
    Vijay Kumar Yadav
    Abhishek Singh
    Shekhar Verma
    S. Venkatesan
    Wireless Personal Communications, 2020, 114 : 853 - 881
  • [30] Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs
    Mundhe, Pravin
    Yadav, Vijay Kumar
    Singh, Abhishek
    Verma, Shekhar
    Venkatesan, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 853 - 881