2021
DOI: 10.1109/access.2021.3089009
|View full text |Cite
|
Sign up to set email alerts
|

Securing Internet of Drones With Identity-Based Proxy Signcryption

Abstract: Internet of Drones (IoD) is a decentralized networking architecture that makes use of the internet for uniting drones to enter controlled airspace in a coordinated manner. On the one hand, this new clan of interconnected drones has ushered in a new era of real-world applications; Small drones, on the other hand, are generally not designed with security in mind, making them exposed to fundamental security and privacy concerns. Limited computing capabilities, along with communication over an open wireless channe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 30 publications
(29 reference statements)
0
18
0
Order By: Relevance
“…The authors formulated the issue to be a nonlinear programming problem and obtained an optimized solution without a high degree of computational intensity. Khan et al [82] proposed an identity-based proxy signature encryption method to address security and privacy risks during data transmission from drones to cloud servers. The proposed method provides support to outsourced decryption and member revocation.…”
Section: E Other Schemesmentioning
confidence: 99%
“…The authors formulated the issue to be a nonlinear programming problem and obtained an optimized solution without a high degree of computational intensity. Khan et al [82] proposed an identity-based proxy signature encryption method to address security and privacy risks during data transmission from drones to cloud servers. The proposed method provides support to outsourced decryption and member revocation.…”
Section: E Other Schemesmentioning
confidence: 99%
“…Theorem 3. If an adversary A 1 can win the Game 1 in PPT with a non-negligible advantage ε 1 after q h i ði ¼ 1; 2; 3; 4Þ H i queries, q d partial private key queries, q sc signcryption queries and q usc unsigncryption queries, the challenger C can solve the CDH problem with the nonnegligible advantage ε 0 1 as show in Eq (11).…”
Section: Confidentialitymentioning
confidence: 99%
“…Hussain et al [ 10 ] proposed an authentication scheme based on elliptic curve cryptography to secure the communication between a data user and a drone. Khan et al [ 11 ] proposed an identity-based proxy signcryption scheme based on hyperelliptic curves. The scheme allows for outsourced decryption to reduce the computational cost.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The time required for processing a single Elliptic Curve Point Multiplication (ECPM) is 0.97 ms; bilinear pairing is 14.90 ms; pairing-based point multiplications is 4.31 ms; modular exponentiation is 1.25 ms [33]. The Hyperelliptic Curve Divisor Multiplication (HCDM) is assumed to be 0.48 milliseconds [34][35][36][37][38]. Multi-precision Integer and Rational Arithmetic C Library (MIRACL) [39] is used to measure the computational performance.…”
Section: Computational Costmentioning
confidence: 99%