Abstract
Emerging Unmanned Aerial Vehicles (UAVs) have applications for traffic monitoring, public safety, surveillance, agriculture, health services. Collaborative UAVs can form a flying ad hoc network having security vulnerabilities due to open access media and limited power. Very recently, Khan et al. presented an Identity-Based Generalized Signcryption for Multiaccess Edge Computing Empowered by Flying Ad Hoc Networks Secure Deployment. The paper presented the cryptanalysis of Khan et al. scheme shows that their scheme does not provide message confidentiality, Authenticity, and integrity. Also, presented an improved scheme, Identity-Based Generalized Signcryption. The proposed scheme is provably secure against the mentioned security attacks. The improved scheme is efficient and attractive for Multiaccess Edge Computing Empowered by Flying Ad Hoc Networks.
Highlights
U Nmanned aerial vehicles (UAVs) are emerging and have extensive and diverse applications in technologically enabled life
This paper presented an improved scheme that provides necessary security features for secure multiaccess edge computing-empowered flying ad hoc networks
IDENTITY-BASED GENERALIZED SIGNCRYPTION SCHEME Khan et al scheme consists of four phases: Setup, Key extraction, Generalized signcryption, and Generalized unsigncryption
Summary
U Nmanned aerial vehicles (UAVs) are emerging and have extensive and diverse applications in technologically enabled life. Flying ad hoc networks (FANET) consist of multiple small UAVs collecting and exchanging data with one another and with the ground stations. He et al [11], proposed a hierarchal broadcast identity-based encryption to offload the need for certificate verification burden. Zhou et al [18] proposed an identity-based combined public key signcryption scheme for signature encryption and signature to provide sufficient security functionality. To cope with the efficient security requirements of FANET, Khan et al [19] proposed an identity-based generalized signcryption for secure multiaccess edge computing empowered flying ad hoc networks. This paper presented an improved scheme that provides necessary security features for secure multiaccess edge computing-empowered flying ad hoc networks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.