Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone

نویسندگان

چکیده

With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology catches much attention of researchers. It can be controlled remotely by a seated operator sitting to powerful intelligence computer system (PICS) or an airborne control command platform (AC2P). The two types drones (reconnaissance attacking) communicate with each other PICS AC2P through wireless network channels referred as Flying Ad Hoc Network Unmanned Aerial Vehicular (FANET UAVN). When line sight is broken, communication mainly carried out satellite using GPS (Global Positioning System) signals. Both UAVN/FANET use open for data broadcasting, exposed several threats, its security challenging Monitoring transmission traffic, espionage, troop movement, border surveillance, searching warfare battlefield phenomenon, etc., auspiciously achieved developing robust authentication scheme IoD deployment military drone. Therefore, this research illustrates designing separate protocols based on aggregate signature, identity, pairing cryptography, Computational Diffie-Hellman Problem (CDHP) guarantee integrity, authorization, confidentiality among AC2P/PICS. outdated flaw has also been tackled, which frequently noted prior protocols. these will formally verified random oracle model (ROM), real-or-random (ROR) model, informally pragmatic illustration mathematical lemmas. Nonetheless, performance analysis section executed algorithmic big-O notation. results show that are verifiably protected Random Oracle Model (ROM) Real-Or-Random CDHP.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Identity Based Aggregate Signature from Pairings

An aggregate signature is a useful digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, aggregate signature scheme is possible to aggregate all these signature into a single short signature. This single signature, along with the n original messages will convince any verifier that the n users did indeed sign the n original messages respect...

متن کامل

Efficient Unrestricted Identity-Based Aggregate Signature Scheme

An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or requi...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Identity-Based Aggregate and Multi-Signature Schemes Based on RSA

We propose new identity-based multi-signature (IBMS) and aggregate signature (IBAS) schemes, secure under RSA assumption. Our schemes reduce round complexity of previous RSA-based IBMS scheme of Bellare and Neven [BN07] from three to two rounds. Surprisingly, this improvement comes at virtually no cost, as the computational efficiency and exact security of the new scheme are almost identical to...

متن کامل

Identity-based Sequential Aggregate Signature Scheme Based on Rsa

Identity-based signature (IBS) schemes allow a signer to sign a message, in which the signature can be verified by his identity. Sequential aggregate signature (SAS) schemes allow multiple signers to sequentially produce a short signature of different messages and also allow signers to attest to these messages as well as the order in which they signed. At CCS 2007, Boldyreva et al. proposed the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3110804