IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(24), P. 41207 - 41222
Published: Sept. 11, 2024
Language: Английский
IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(24), P. 41207 - 41222
Published: Sept. 11, 2024
Language: Английский
Electronics, Journal Year: 2025, Volume and Issue: 14(2), P. 339 - 339
Published: Jan. 16, 2025
Unmanned aerial vehicles (UAVs) are highly versatile and cost-effective, making them an attractive option for various applications. In UAV networks, it is essential to implement a digital signature scheme ensure the integrity authentication of commands sent UAVs. Moreover, this not only maintains real-time performance UAVs while executing but also protects identity privacy signer. To meet these needs, we propose efficient threshold attribute-based proxy (t-ABPS) that integrates predicate specifically designed networks. The formal security proof t-ABPS demonstrates its existential unforgeability under selective-attribute chosen-message attacks (EUF-sA-CMA) in random oracle model. This ensures Furthermore, evaluate computational costs communication associated with proposed scheme. Our analysis indicates more computationally than other existing schemes, has higher costs.
Language: Английский
Citations
0IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(18), P. 29941 - 29955
Published: June 3, 2024
With recent progress in Internet of Things technology, it is becoming more and commonplace to use unmanned aerial vehicles (UAVs) for inconsiderable purposes. On the other hand, traditional all these UAV networks adopt a susceptible open wireless communication, rendering systems vulnerable attacks like eavesdropping, tampering, interrupting, forging. The most effective way address security challenges through signcryption. However, current signcryption methods are computationally bandwidth-intensive, making them unsuitable UAVs with limited resources ground stations (GS) handling high volume messages. To challenges, we propose solution employing an identity-based online/offline scheme secure communication from GS, known as IOOSC-U2G. This leverages elliptic curve cryptography without need time-intensive operations bilinear pairing. During online phase, absence point multiplication operations, already executed offline significantly alleviates computational burdens. optimization reduces overhead throughout entire process Moreover, IOOSC-U2G ensures privacy identities during GS. Additionally, proposed empowers GS verify multiple inputs at once batch verification method. We demonstrate that within random oracle model, guarantees security, specifically confidentiality unforgeability, relying on hardness assumptions inverse Computational Diffie-Hellman problem Discrete Logarithm problem, respectively. our outperforms methods, particularly efficiency.
Language: Английский
Citations
2Applied Intelligence, Journal Year: 2023, Volume and Issue: 53(17), P. 20647 - 20659
Published: April 19, 2023
Language: Английский
Citations
5International Journal of Information Technology, Journal Year: 2022, Volume and Issue: 14(5), P. 2275 - 2283
Published: June 4, 2022
Language: Английский
Citations
8Drones, Journal Year: 2023, Volume and Issue: 7(5), P. 321 - 321
Published: May 16, 2023
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to lack security considerations in design drone, which includes unsecured wireless channels insufficient computing capability perform complex cryptographic algorithms. Owing extensive real-time applications ubiquitous connection beyond 5G (B5G) networks, efficient measures are required prevent unauthorized access sensitive data. In this article, we proposed resource-friendly proxy signcryption scheme certificateless settings. The was based on elliptic curve cryptography (ECC), has reduced key size, i.e., 80 bits, is, therefore, suitable for drones. Using random oracle model (ROM), analysis performed shown be secure against well-known attacks. performance also compared relevant existing schemes terms computation communication costs. findings validate practicability scheme.
Language: Английский
Citations
2Electronics, Journal Year: 2023, Volume and Issue: 12(23), P. 4854 - 4854
Published: Nov. 30, 2023
Unmanned aerial vehicle (UAV) is an attractive application because of its flexibility and economy. It may use a digital signature scheme to protect commands sent UAVs. Moreover, the should guarantee real-time performance UAVs executing signer’s privacy. Therefore, we proposed attribute-based proxy (ABPS) supporting flexible threshold predicate for UAV networks proved security. has existential unforgeability under selective-predicate chosen message attacks (EUF-sP-CMA) can We analyzed computation costs based on experimental data communication costs. The analysis results indicate that our ABPS less than other schemes at same level as
Language: Английский
Citations
1Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(5), P. 102044 - 102044
Published: May 4, 2024
The rapid growth of the Internet Things (IoT) has led to an increased deployment unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security issues are persistently among primary challenges in UAV networks. In addition, significant communication delays can occur when UAVs perform remote tasks far from a command center (CC); some cases, they may be unable communicate with CC. To address these challenges, this paper, efficient online/offline heterogeneous proxy signcryption scheme for secure networks (HOOPSC) is proposed. This enables CC certificateless cryptosystem (CLC) environment delegate nearby ground control station (GCS) act as agent, directly send commands within identity-based (IBC) undertakes then decrypts verifies authenticity confidentiality. proposed scheme, process split into offline online phases, most heavy computations conducted without availability messages during phase. Only light performed phase message available. Moreover, formal proof given random oracle model. Finally, performance analysis reveals that HOOPSC outperforms existing relevant schemes, making it ideal long-range operations
Language: Английский
Citations
0IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(24), P. 41207 - 41222
Published: Sept. 11, 2024
Language: Английский
Citations
0