Abstract

Emerging Unmanned Aerial Vehicles (UAVs) have applications for traffic monitoring, public safety, surveillance, agriculture, health services. Collaborative UAVs can form a flying ad hoc network having security vulnerabilities due to open access media and limited power. Very recently, Khan et al. presented an Identity-Based Generalized Signcryption for Multiaccess Edge Computing Empowered by Flying Ad Hoc Networks Secure Deployment. The paper presented the cryptanalysis of Khan et al. scheme shows that their scheme does not provide message confidentiality, Authenticity, and integrity. Also, presented an improved scheme, Identity-Based Generalized Signcryption. The proposed scheme is provably secure against the mentioned security attacks. The improved scheme is efficient and attractive for Multiaccess Edge Computing Empowered by Flying Ad Hoc Networks.

Highlights

  • U Nmanned aerial vehicles (UAVs) are emerging and have extensive and diverse applications in technologically enabled life

  • This paper presented an improved scheme that provides necessary security features for secure multiaccess edge computing-empowered flying ad hoc networks

  • IDENTITY-BASED GENERALIZED SIGNCRYPTION SCHEME Khan et al scheme consists of four phases: Setup, Key extraction, Generalized signcryption, and Generalized unsigncryption

Read more

Summary

INTRODUCTION

U Nmanned aerial vehicles (UAVs) are emerging and have extensive and diverse applications in technologically enabled life. Flying ad hoc networks (FANET) consist of multiple small UAVs collecting and exchanging data with one another and with the ground stations. He et al [11], proposed a hierarchal broadcast identity-based encryption to offload the need for certificate verification burden. Zhou et al [18] proposed an identity-based combined public key signcryption scheme for signature encryption and signature to provide sufficient security functionality. To cope with the efficient security requirements of FANET, Khan et al [19] proposed an identity-based generalized signcryption for secure multiaccess edge computing empowered flying ad hoc networks. This paper presented an improved scheme that provides necessary security features for secure multiaccess edge computing-empowered flying ad hoc networks

RELATED WORK
PRELIMINARY OF HYPERELLIPTIC CURVE
A Divisor D is a finite formal sum of points
ATTACK ON SIGNCRYPTION MODE
IMPROVED IDENTITY BASED GENERALIZED SIGNCRYPTION SCHEME
CORRECTNESS ANALYSIS
SYSTEM INITIALIZATION
DATA TRANSMISSION AND VERIFICATION PHASE
CONFIDENTIALITY
INTEGRITY
REPLAY ATTACK
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.