A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles

被引:3
|
作者
Ullah, Insaf [1 ]
Khan, Muhammad Asghar [1 ]
Abdullah, Ako Muhammad [2 ,3 ]
Mohsan, Syed Agha Hassnain [4 ]
Noor, Fazal [5 ]
Algarni, Fahad [6 ]
Innab, Nisreen [7 ]
机构
[1] Hamdard Univ, Hamdard Inst Engn & Technol, 440000, Islamabad, Pakistan
[2] Univ Sulaimani, Coll Basic Educ, Comp Sci Dept, Sulaimaniyah 00964, Kurdistan, Iraq
[3] Univ Coll Goizha, Dept Informat Technol, Sulaimaniyah 00964, Kurdistan, Iraq
[4] Zhejiang Univ, Ocean Coll, Zheda Rd 1, Zhoushan 316021, Peoples R China
[5] Islamic Univ Madinah, Fac Comp & Informat Syst, Madinah 400411, Saudi Arabia
[6] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[7] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, POB 71666, Riyadh 11597, Saudi Arabia
关键词
micro aerial vehicles; security; signcryption; elliptic curve cryptography; ring signcryption;
D O I
10.3390/mi13111926
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long distances, and send data to a portable base station. Despite their many benefits, MAVs often encounter obstacles due to limitations in the embedded system (such as memory, processing power, energy, etc.). Due to these obstacles and the use of open wireless communication channels, MAVs are vulnerable to a variety of cyber-physical attacks. Consequently, MAVs cannot execute complex cryptographic algorithms due to their limited computing power. In light of these considerations, this article proposes a conditional privacy-preserving generalized ring signcryption scheme for MAVs using an identity-based cryptosystem. Elliptic Curve Cryptography (ECC), with a key size of 160 bits, is used in the proposed scheme. The proposed scheme's security robustness has been analyzed using the Random Oracle Model (ROM), a formal security evaluation method. The proposed scheme is also compared in terms of computation cost, communication cost and memory overhead against relevant existing schemes. The total computation cost of the proposed scheme is 7.76 ms, which is 8.14%, 5.20%, and 11.40% schemes. The results show that the proposed scheme is both efficient and secure, proving its viability.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] A Realistic Distributed Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Liu, Zhi-Cai
    Xiong, Ling
    Peng, Tu
    Peng, Dai-Yuan
    Liang, Hong-Bin
    IEEE ACCESS, 2018, 6 : 26307 - 26317
  • [42] PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks
    Ming, Yang
    Shen, Xiaoqin
    SENSORS, 2018, 18 (05)
  • [43] Analysis and Improvement of a Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs
    Wen, Jiaming
    Bai, Lu
    Wang, Houzhen
    Liu, Jinhui
    Wang, Yahui
    Zhang, Huanguo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (11) : 17602 - 17612
  • [44] An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings
    Lo, Nai-Wei
    Tsai, Jia-Lun
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (05) : 1319 - 1328
  • [45] A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs
    Liu, Xingchen
    Huang, Haiping
    Xiao, Fu
    Ma, Ziyang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4101 - 4112
  • [46] An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice
    Mukherjee, Sankar
    Gupta, Daya Sagar
    Biswas, G. P.
    COMPUTING, 2019, 101 (12) : 1763 - 1788
  • [47] Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids
    Li, Kunchang
    Yang, Yifan
    Wang, Shuhao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (04) : 2101 - 2115
  • [48] A Binary Tree Based Coordination Scheme for Target Enclosing With Micro Aerial Vehicles
    Duan, Haibin
    Zhang, Daifeng
    IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2021, 26 (01) : 458 - 468
  • [49] Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC)
    Alshudukhi, Jalawi Sulaiman
    Mohammed, Badiea Abdulkarem
    Al-Mekhlafi, Zeyad Ghaleb
    IEEE ACCESS, 2020, 8 : 222032 - 222040
  • [50] On the security of an Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Kazemi, Mitra
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 510 - 514