Abstract
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computing capability to perform complex cryptographic algorithms. Owing to the extensive real-time applications of drones and the ubiquitous wireless connection of beyond 5G (B5G) networks, efficient security measures are required to prevent unauthorized access to sensitive data. In this article, we proposed a resource-friendly proxy signcryption scheme in certificateless settings. The proposed scheme was based on elliptic curve cryptography (ECC), which has a reduced key size, i.e., 160 bits, and is, therefore, suitable for drones. Using the random oracle model (ROM), the security analysis of the proposed scheme was performed and shown to be secure against well-known attacks. The performance analysis of the proposed scheme was also compared to relevant existing schemes in terms of computation and communication costs. The findings validate the practicability of the proposed scheme.
1. Introduction
Drones were considered for several applications and case studies because of their flexible flight capabilities, which include flying at low altitudes, at high elevation angles, and over urban, suburban, and rural areas [1]. The typical drone is outfitted with all of the electronic components required to carry out its mission in an efficient manner. These components include a communication module for transmitting data to the ground station (GS), sensors for gathering data, memory for storing the information collected by the sensors, as well as computational and power resources to process information and maintain flight for a predetermined amount of time, respectively [2,3,4,5]. In addition, recent advancements in fifth-generation (5G) wireless communications made possible the concept of cellular networks beyond 5G (B5G), which may fully unlock the promise of autonomous services and provide wide coverage for drones. Drones outfitted with AI systems in flight would be possible with the faster data transfer rates made possible by a B5G network. The most important development in B5G is satellite integration, which allows drones to deliver centimeter-level precise positioning, global coverage, and heterogeneous QoS provisioning [6,7]. If legal provisions permit drone integration with B5G and autonomous flying, the sky will be filled with drones performing activities such as mail and package delivery, traffic monitoring, event filming, surveillance, search and rescue, and marine monitoring [8].
Drones are typically not designed with security and privacy concerns in mind, leaving them vulnerable to both cyber and physical attacks [9,10,11]. Intruders who wish to compromise the security and privacy of a drone have a variety of options. They could, for instance, send out numerous reservation requests, eavesdrop on control communications, and/or forge data exchange [12]. Due to unreliable connections and insufficient security protocols, anyone with the proper transmitter can attach to a drone and embed commands into an ongoing session, making them readily interceptable [13]. If drones fly over a hostile environment, they could become an enticing target for physical attacks. This is another security and privacy concern. In these situations, an intruder can deceive captured drones to gain access to their internal data via standard interfaces or terminals.
Many drone systems depend on the GNSS (global navigation satellite system) for precise location, navigation, and timing for safe and efficient operation. GLONASS, Galileo, BeiDou, and NavIC are also used in drones, although global positioning system (GPS) is the most common. All GNSS systems are subject to cyber-physical attacks [14,15]. For example, GPS spoofing [16] is another significant security threat that occurs when an adversary manipulates the drone’s GPS signals. In this attack, an adversary transmits fake GPS signals to an intended drone at a slightly higher frequency than the real GPS signals, so that the drone believes it is located elsewhere. In B5G networks, however, drones can be linked to new wireless technologies such as visible light communications and quantum communications, which could introduce new security threats [1]. The best GNSS system for a drone application depends on the use case, precision, and dependability needed, and system risks and vulnerabilities. Drone operators should be aware of GNSS attack threats and take precautions such as employing backup navigation systems or secure communication methods. Additional security mechanisms and countermeasures will be necessary to combat such security hazards.
The deployment of non-terrestrial infrastructures as part of the B5G network, also known as the integrated space and terrestrial drone networks, is regarded as a topic of the long term with the aim of improving coverage rates [17]. Figure 1 depicts a typical drone architecture for B5G networks, which may include drones, a command center (CC), ground control stations (GCS), and satellites. The stations that can command drones are the CCs, GCSs, and satellites. When a CC intends to issue direct mission commands to drones, digital signcryption ensures the commands’ authenticity, integrity, and confidentiality. However, a drone occasionally performs remote tasks beyond the CC’s range, preventing the CC from communicating directly with the drones. In this scenario, the CC designates a GCS in the drone’s proximity as an agent, and the GCS transmits commands directly to the drone. A proxy signcryption scheme can be used to achieve confidentiality and authentication of the transmitted commands and ensure the drone executes commands in a timely manner.
Figure 1.
A typical drone architecture.
Using either the public key infrastructure (PKI), a certificateless cryptosystem (CLC), or an identity-based cryptosystem (IBC), the proxy signcryption scheme can be developed. PKI’s primary shortcoming is that its standard application cannot be used with drones. Certificate management overhead, such as certificate storage, distribution, and revocation, is the crucial factor that renders them unsuitable for drone systems [18]. IBC [19] is implemented to alleviate the burden on conventional PKI, which uses a publicly recognized string as a public key to reduce the cost of PKI certificate renewal. Being identity-based, the IBC appears to be more vulnerable to external infiltration (key escrow problem). CLC [20] was developed to address these problems. Key generation center (KGC) generates and distributes partial private keys to network participants. The user will then generate his or her own private and public keys by combining a private key fragment with some arbitrarily generated integers. Therefore, certificateless proxy signcryption scheme is the optimal solution for drones’ system requirements. As a result, we strengthened the proxy signcryption scheme with the following new features, which represent our most significant contributions:
- We propose a resource-friendly certificateless proxy signcryption scheme for drones in B5G networks. The proposed scheme is based on the elliptic curve cryptography (ECC) algorithm and enjoys some of its favorable features, such as no key escrow and no secure channel.
- The proposed scheme has a clear distribution of roles: the control center acts as the original signer, the network provider serves as the key generation center (KGC), the ground control station acts as a proxy, and the drones perform the task of un-signcryption.
- The proposed protocol guarantees anonymity for both senders and receivers by employing a mechanism wherein participants (), where , send their identities in an encrypted form while requesting a partial private key.
- The proposed scheme is capable of withstanding a wide variety of commonly known attacks under ROM. Additionally, it was found that this scheme is efficient in terms of both computation and communication costs when compared to other existing schemes.
The remainder of this article is structured as follows. The literature review is covered in Section 2. Section 3 explains the network model and construction of the proposed scheme. The security analysis is discussed in Section 4. Section 5 discusses performance analysis. The conclusion of the proposed work is discussed in Section 6.
2. Literature Review
In 1996, Mambo et al. [21] were the first to introduce the concept of a proxy signature scheme. The proxy signature scheme was founded on the concept that the original signer delegates signing authority to the proxy signer, who then issues a legitimate signature on behalf of the original signer. Proxy signcryption is a combination of the proxy signature concept and the signcryption algorithm. In this technique, an original signcrypter is responsible for delegating the rights of his signcryption to a proxy signcrypter, who then signcrypts the message on behalf of the original signcrypter. The receiver is responsible for decrypting the signcrypted message in order to retrieve its contents and determining whether or not the signcrypted message is legitimate after receiving it. Gamage et al. [22] first presented the idea of proxy signcryption. Using an effective proxy signcryption scheme can provide a strong protection against attacks.
Yu and Wang [23] designed a certificateless proxy signcryption (CLPSC) scheme from CMGs. In the random oracle model (ROM), the authors demonstrated that their scheme [23] had indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2 security) and existential unforgeability under adaptive chosen-message attacks (UF-CMA security). Abdelfatah [24] introduced a novel proxy signcryption scheme that utilized the ECC algorithm. However, the author of this novel proxy signcryption scheme did not provide a formal security analysis and lacked an anti-replay attack security property. Yanfeng et al. [25] developed a certificateless proxy identity-based signcryption scheme without bilinear pairings by combining the certificateless signcryption and proxy signcryption. This scheme had a strong foundation in the elliptic curve discrete logarithm problem, which provides a high level of security. This scheme was efficient and secure as it only required some operations on elliptic curves, without the need for pairing computation.
Bhatia and Verma [26] performed a cryptanalysis on the scheme devised by Yanfeng et al. [25] and demonstrated that it was vulnerable to a forgery attack. In addition, they offered a protected proxy signcryption scheme. In contrast, the scheme did not guarantee security services such as forward security and anti-replay attack. The public key replacement attack was also susceptible to exploiting this vulnerability. However, Li et al. [27] first demonstrated that Bhatia and Verma’s [26] scheme was vulnerable to a public key replacement attack, and then presented a new certificateless proxy signcryption scheme. However, the scheme was hindered by the requirement of a secure link for the distribution of the participants’ partial private keys. It also lacked forward security and protection against replay attacks. Finally, Y. Qu and J. Zeng [28] proposed a certificateless proxy signcryption for the DRONE network under standard model. This scheme accomplished public verifiability and was EUF-CMA-CLPSC secure and IND-CCA-CLPSC-secure against adversaries of types I and II. However, the proposed scheme incurred substantial computation and communication costs.
This work proposes a certificateless proxy signcryption scheme that is specifically designed for drones, offering a promising solution to address the shortcomings of previous schemes. The proposed scheme has a great advantage in that the partial private key can be distributed through an open network without any risk of being disclosed to an outsider adversary. Additionally, the proposed scheme is highly efficient in terms of computation and communication costs.
3. Preliminaries
This section explains the random oracle model (ROM), adversarial or threat model, syntax, and network model of the proposed certificateless proxy signcryption scheme.
3.1. Random Oracle Model
In 1993, Bellare and Rogaway created the random oracle model (ROM). By considering hash functions as random oracles, this model makes it simple to verify the security of cryptographic algorithms that use hash functions. In this paradigm, any input will result in an output of a predetermined length. If the input was requested previously, the oracle returns the same value as it did previously. If the input is not one that the oracle previously received, the oracle returns a randomly chosen output. You can substitute a hash function with an accessible random function (the “random oracle”). Therefore, an adversary must consult the random number generator to determine what the hash function will do.
3.2. Adversarial or Threat Model
This section will outline potential security vulnerabilities that could compromise the confidentiality of the security parameter utilized in the generation of ciphertext and signatures. Two types of adversaries, namely Type 1 Type 1 () and Type 2 (), are defined. The first type of attacker, denoted as Type 1 (), is an external threat actor who aims to compromise the confidentiality of the proposed scheme and engage in signature forgery. It should be noted that the entity denoted as () lacks the capability to access the private keys of the user, yet possesses the ability to replace the public key of said user.
Type 2 () is the insider attacker (malicious ) who desires to violate confidentiality and falsify the signature of the proposed scheme. It should be noted that the entity denoted as possesses the capability to access the private key of , yet lacks the ability to substitute the public key of the user. The primary objective for both adversaries is to reveal the parameters utilized in the creation of the secret key and ciphertext. The subsequent objective entails the construction or retrieval of parameters utilized in the computation of a signature, followed by the generation of a forge signature.
3.3. Syntax of Certificateless Proxy Signcryption
The syntax of the proposed scheme contains the following steps.
Setup: Here, the network provider () assumes the role of KGC; when it receives the security parameter , generates his private key (), his public key (), and public parameters set
Partial Key Generation (PCGU): The participant () desires a partial private key () from , first, it sends through insecure network to . Alternatively, when receives , it generates and sends as an encrypted partial private and public key to over an insecure network.
Public and Private Key Generation (PBCGU): When receives , it sets () to his public key and sets ( to his private key.
Delegation Generation (DG): This phase is run by the CC and when it receives (), where and are the identities of CC and GCS, respectively, is CC’s private key pair, and () is GCS’s public key pair. After that, CC generates and sends the triple as a delegation to the GCS through an open network.
Delegation Verification (DV): When is received by the GCS, then it can perform verification procedures, to check whether the signature is valid or not.
CL-Proxy Signcryption Generation (CL-PSG): This phase is executed by the GCS, which generates and sends the triple ( as a proxy signcryption to drone via an open network.
CL-Proxy Un-Signcryption (CL-PU-S): When is received by the drone, it performs the verifications steps, to check whether the signature is valid or not, if the signature is valid, it performs decryption process to recover plaintext from ciphertext.
3.4. Network Model
The command center (CC), ground control stations (GCS), high altitude platform system (HAPS), drones, and satellites comprise the network architecture for the proposed scheme. Each drone is equipped with a variety of useful components, including cameras, a global positioning system (GPS), an inertial measurement unit (IMU), and sensors, which can be utilized in a variety of application scenarios. In contrast to terrestrial communication systems, satellite services depend on geostationary satellites to transmit and receive signals in out-of-range regions. Additionally, HAPS provides greater coverage/relay and interacts with satellites, enabling more reliable drone communication networks, particularly when satellite communications are disrupted by inclement weather. HAPS may utilize B5G, and the drones require no additional equipment.
The networks depicted in Figure 1 comprise of several stations, namely the CCs, GCSs, HAPs, and satellites, which possess the capability to command drones. Digital signcryption ensures the authenticity, confidentiality, and integrity of direct mission commands issued by a CC to drones. Occasionally, a drone conducts remote duties beyond the CC’s range, preventing direct communication between the CC and the drones. In this scenario, the CC identifies a nearby GCS as an agent, and the GCS transmits commands directly to the drone. The proposed scheme operates under the assumption that HAPs function as the Key Generation Center (KGC).
4. Construction of the Proposed Scheme
The proposed scheme is comprised of seven algorithms: Setup, Partial Key Generation (PCGU), Public and Private Key Generation (PBCGU), Delegation Generation (DG), Delegation Verification (DV), CL-Proxy Signcryption Generation (CL-PSG), and CL-Proxy Un-Signcryption (CL-PU-S). The subsequent sub-phases further define the constructions of the seven algorithms listed above. The symbols used in the proposed scheme are listed in Table 1.
Table 1.
Symbol table.
Setup: Here, the network provider () assumes the role of KGC; when it receives the security parameter , executes the steps outlined below.
- Selects the group of order and , which will be the generator of ;
- Selects four hash functions ;
- Sets is the plaintext length and will be the length of selected parameter;
- Selects the system private key as and computes the public key ;
- can made as the public parameter and distributes it throughout a network.
Partial Key Generation (PCGU): If a participant (), where , desires a partial private key () from , it first selects , computes , computes calculates , and then, sends through insecure network to . Alternatively, when receives , it executes the following calculations: Computes , recovers identity as , and then, selects and computes . In addition, computes , calculates , and sends as an encrypted partial private and public key to over an insecure network.
Public and Private Key Generation (PBCGU): When receives , it computes , sets () to his public key and sets ( to his private key.
Delegation Generation (DG): This phase is run by the CC and when it receives (), where and are the identities of CC and GCS, respectively, is CC’s private key pair, and () is GCS’s public key pair.
Consequently, CC will execute the subsequent steps to generate a delegation signature for warrant .
- It selects , computes , and ;
- Computes and sends the triple as a delegation to the GCS through an open network.
Delegation Verification (DV): When is received by the GCS, the following verification procedures are carried out.
- Computes and ;
- If , then accept otherwise, an error message is returned.
CL-Proxy Signcryption Generation (CL-PSG): This phase is executed by the GCS, which generates a certificateless proxy signcryption using the procedures below.
- It selects , computes ;
- Computes ;
- Computes and ;
- Computes and ;
- Finally, it sends the triple ( as a proxy signcryption to drone via an open network.
CL-Proxy Un-Signcryption (CL-PU-S): When is received by the drone, it performs the following verifications steps.
- Computes and ;
- Computes and ;
- If , then accept otherwise, an error message is returned.
Correctness
The can compute the secret key by using the following computations.
The recovers/ decrypts the user identity by using the following computations.
The recovers/decrypts the partial public and partial private key by using the following computations.
The GCS can verify the delegated text by using the following computations.
The drone can compute the secret key by using the following computations.
The drone can recover/decrypts the message by using the following computations.
The drone can verify the proxy signcrypted text by using the following computations.
5. Security Analysis
In order to carry out the provable security analysis of the proposed scheme, which makes use of a well-known method of formal security analysis called as the random oracle model, the proposed scheme is secured against Type 1 () and Type 2 () adversaries. When these adversaries attempted to violate the confidentiality and forge the original signature, the subsequent sub-steps elucidated the role of (Type 1 () and Type 2 () and the security hard problems upon which our scheme’s security is based.
Elliptic Curve Diffie–Hellman Problem (ECDHP): Given (), finding the values of from is hard and is reported to ECDHP.
Elliptic Curve Discrete Logarithm Problem (ECDLP): Given (), finding the value of from is hard and is reported to ECDLP.
By utilizing the following theorems, we will elucidate how the proposed scheme withstands against Type 1 () and Type 2 ().
Theorem 1.
In this theorem, we are going to perform the IND-SFCPS-CCA2 game between and to break the confidentiality of the proposed scheme, in which performs the role helper for to obtain the solution of ECDHP. Suppose wins with the non-ignorable advantage () in the game IND-SFCPS-CCA2 and get the solution for ECDHP with the advantage of . Where, and represent a query for and , and represents a proxy signcryption query.
Proof.
Given (), the task of is to extract the value from with the help of . The following is the process in which with the help of could solve the above problem.
Setup: Here, selects computes , makes a param , and sends to Then, can ask for the following queries.
Find Stage: Here, in this section, can ask for the following polynomial bounded queries.
Query: If receives as a query from , checks for in the list , if it is available, it sends to otherwise, choose , here, its probability as . Then, it checks, if , and then chooses sends to and adds into . If , sets , and returns to .
Query: If receives as a query from , checks for in the list , if it is available, it sends to otherwise, chooses sends to and adds into .
Query: If receives as a query from , checks for in the list , if it is available, it sends to otherwise, chooses sends to and adds into .
Query: If receives as a query from , checks for in the list , if it is available, it sends to otherwise, chooses sends to and adds into .
PCGU Query If receives as a query from checks for in the list , if it is available, it sends to otherwise, chooses computes , sends to , and adds into .
Private Key Query If receives as a query from checks for in the list , if it is available, it sends to Otherwise, chooses obtained from sends to , and add into .
Public Key Query If receives as a query from checks for in the list , if it is available, it sends to Otherwise, searches and finds from and , and then computes , sends to , and adds into .
Replace Public Key Query: sends ( to and can replace on ( for the identity
Delegation Generation Query: sends two identity () and a warrant to it then checks the tuple in . If , it can abort further processing. Otherwise, it extracts from , from , chooses , generates , and sends it to .
CL-Proxy Signcryption Query: sends two identities () and a message to it then checks the tuple in ; if , it can abort further processing. Otherwise, it extracts from , from , chooses , generates ( and sends it to .
CL-Proxy Un-Signcryption Query: sends two identities () and ( to it then checks the tuple in , the response is then provided in the subsequent methods.
- If , can obtain from according to identity , from , performs the algorithm and sends to .
- If , can get from and computes perform the algorithm. can further obtains from , from , from the list , and can verify the equation . If the condition is met, the output is (m); otherwise, the procedure is repeated with new parameters.
Challenge Stage: Suppose and is adaptively generated two distinct messages by and sends () and two challenged identities () to . Then, checks for the tuple in , if , stop; otherwise, it chooses ( randomly and sends it to as a challenge ciphertext.
Guess Stage: can make sure Query Query, Query Query, PCGU Query, Private Key Query, Public Key Query, Replace Public Key Query, Delegation Generation Query, CL-Proxy Signcryption Query, CL-Proxy Un-Signcryption Query is performed as same as above in Find Stage. So, returns , can made Query with . In this situation, the valid answer for ECDHP is included to . The second situation is that can ignore the randomly selected/guessed value of , then randomly selects from and computes , where already knows the value , and . Otherwise, failed to solve ECDHP.
So, we are going to evaluate the above process with success probability. The success probability will be when made PCGU Query and Private Key Query for The success probability will be when successfully selects from . The success probability will when is not halting this game’s simulation. We can say that can obtain the solution for ECDHP with the advantage as follows: □
Theorem 2.
In this theorem, we are going to perform the IND-SFCPS-CCA2 game between and to breaks the confidentiality of the proposed Scheme, in which performs the role of helper for to obtain the solution of ECDHP. Suppose wins with the non-ignorable advantage () in the game IND-SFCPS-CCA2 and gets the solution for ECDHP with the advantage of . Where and represents a query for and , and represents a proxy signcryption query.
Proof.
Given (), the task of is to extract the value from with the help of . The following is the process in which with the help of could solve the above problem.
Setup: Here, selects computes , make a param , and sends and to Then, can ask for the following queries.
Find Stage: Here, in this section, can ask for the following polynomial bounded queries.
The queries such as Query, Query, Query, Query are identical to those performed in Theorem 1.
PCGU Query If receives as a query from checks for in the list . If it is available, it sends to Otherwise, chooses computes , sends to , and adds into .
Private Key Query If receives as a query from checks for in the list . If it is available, it sends to Otherwise, chooses obtained from sends to , and adds into .
Public Key Query If receives as a query from checks for in the list , if it is available, it sends to Otherwise, searches and finds from and , and then computes , sends to and adds into .
Delegation Generation Query: sends two identity () and a warrant to it then checks the tuple in ; if , it can abort further processing. Otherwise, it extracts from , from , chooses , generates , and sends it to .
CL-Proxy Signcryption Query: sends two identities () and a message to it then checks the tuple in ; if , it can abort further processing. Otherwise, it extracts from , from , chooses , generates ( and sends it to .
CL-Proxy Un-Signcryption Query: sends two identities () and ( to it then checks the tuple in , and it gives the response in the following ways.
- If , can obtain from according to identity , from , perform the algorithm, and sends to .
- If , can obtain from , compute , and perform the algorithm. further can get from , from , from the list , and can verify the equation ; if it is satisfied, its output will be otherwise, it repeats this process again with new parameters.
Challenge Stage: Suppose and adaptively generated two distinct messages by and send () and two challenged identities () to . Then, checks for the tuple in , if , stop; otherwise, it chooses ( randomly and sends it to as a challenge ciphertext.
Guess Stage: can ensure Query Query, Query Query, PCGU Query, Private Key Query, Delegation Generation Query, CL-Proxy Signcryption Query, CL-Proxy Un-Signcryption Query is performed as same as above in Find Stage of Theorem 1 and Public Key Query of Theorem 2. So, returns , can make Query with ; in this situation, the valid answer for ECDHP includes . The second situation is that can ignore the randomly selected/guessed value of , then randomly selects from and computes , where already knows the value , and . Otherwise, failed to solve ECDHP.
Therefore, we will evaluate the preceding procedure based on its success probability. The success probability will be when made PCGU Query and Private Key Query for The success probability will be when successfully selects from . The success probability will when is not stopped in the simulation of this game. So, we can say that can obtain the solution for ECDHP with the following advantages: □
Theorem 3.
In this theorem, we are going to perform the EUF-SFCPS-CMA game between and to forge the signature of the proposed scheme, in which perform the role helper for to get the solution of ECDLP. Suppose wins with the non-ignorable advantage () in the game EUF-SFCPS-CMA and get the solution for ECDLP with the advantage of . Where and represents a query for and , and represents a proxy Signcryption query.
Proof.
Given (, the task of is to extract the value from with the help of . The following are the processes in which with the help of , could solve the above problem.
Setup: Here, selects computes , makes a param , and sends to Then, can ask for the following queries.
Find Stage: Here, in this section, can ask for the following polynomial bounded queries.
Query Query, Query Query, PCGU Query, Private Key Query, Public Key Query, Replace Public Key Query, Delegation Generation Query, CL-Proxy Signcryption Query, CL-Proxy Un-Signcryption Query is performed in the same way as above in Find Stage of Theorem 1.
Forgery: As can ask for the following polynomial-bounded queries: Query Query, Query Query, PCGU Query, Private Key Query, Public Key Query, Replace Public Key Query, Delegation Generation Query, CL-Proxy Signcryption Query, CL-Proxy Un-Signcryption Query is performed as same as above in Find Stage of Theorem 1 and generates a forged proxy signcryption triple ( with the help of . Note that can only solve the ECDLP if it accessed the actual value for and from .
So, we are going to evaluate the above process with success probability. The success probability will be when made PCGU Query and Private Key Query for The success probability will be when successfully selects from . The success probability will when does not stop the simulation of this game. So, we can say that can obtain solution for ECDHP with the followed advantages: . □
Theorem 4.
In this theorem, we are going to perform the EUF-SFCPS-CMA game between and to forge the signature of the proposed scheme, in which performs the role helper for to get the solution of ECDHP. Suppose wins with the non-ignorable advantage () in the game EUF-SFCPS-CMA and get the solution for ECDLP with the advantage of , where and represents a query for and , and represents a proxy signcryption query.
Proof.
Given (, the task of is to extract the value from with the help of . The following are the processes in which with the help of , could solve the above problem.
Setup: Here, selects computes , makes a param , and sends and to Then, can ask for the following queries.
Find Stage: Here, in this section, can ask for the following polynomial-bounded queries: Query Query, Query Query, PCGU Query, Private Key Query, Delegation Generation Query, CL-Proxy Signcryption Query, CL-Proxy Un-Signcryption Query is performed in the same way as above in Find Stage of Theorem 1 and Public Key Query of Theorem 2.
Forgery: As can ask for the following polynomial-bounded queries: Query Query, Query Query, PCGU Query, Private Key Query, Delegation Generation Query, CL-Proxy Signcryption Query, CL-Proxy Un-Signcryption Query is performed as same as above in Find Stage of Theorem 1 and Public Key Query of Theorem 2. Furthermore, it generates a forged proxy signcryption triple ( with the help of . Note that can only solve the ECDLP if it accessed the actual value for and from .
So, we are going to evaluate the above process with success probability. The success probability will be when made PCGU Query and Private Key Query for The success probability will be when successfully selects from . The success probability will when does not stop the simulation of this game. So, we can say that can obtain solution for ECDHP with the following advantages: □
6. Performance Comparison
This section is devoted to the performance comparison of the proposed scheme with existing equivalents schemes, such as those of which were proposed by Yanfeng et al. [25], Bhatia and Verma [26], Li et al. [27], and Qu and Zeng [28] in terms of computation and communication costs. The proposed scheme is presented in a clear and organized manner through figures and tables, which will help to better understand its viability.
6.1. Computational Cost
Table 2 and Table 3 present a comparison of the computational cost. The tables present a performance comparison of the proposed scheme and the methods introduced by Yanfeng et al. [25], Bhatia and Verma [26], Li et al. [27], and Qu and Zeng [28], based on computation cost expressed in major operations and in milliseconds. The computation cost was evaluated utilizing the Raspberry board. Despite the availability of alternative replacements for RPI, which boast advanced hardware configurations such as LattePanda 4G/64 GB, Qualcomm Dragon board, ODROID-XU4, and ASUS Tinker Board, among others, RPI remains widely regarded as the most economical and power-efficient choice. Additional compelling attributes of the RPI 4 that reinforce its choice include its integrated wireless network capabilities; specifically, dual-band 802.11 b/g/n/ac Wi-Fi and Bluetooth 5.0 BLE. In the present scheme implementation, the model and hardware specifications were delineated as follows: the Raspberry PI 4B (2019) is equipped with a 64-bit CPU architecture and a 1.5 GHz quad-core processor. It operates on the Ubuntu 20.04.2 LTS operating system and has a memory capacity of 8 GB, as reported in reference [29]. represents elliptic curve scalar multiplications and represents pairing operation. It was observed, with respect to average time, that a single takes 2.848 ms and 18.294 ms [29].
Table 2.
Comparison of computation cost with major operations.
Table 3.
Comparison of computation cost (in ms).
As shown in Figure 2, it was demonstrated that the proposed scheme had a lower computation cost in comparison to the extant schemes proposed by Yanfeng et al. [25], Li et al. [27], and Qu and Zeng [28]. The computation cost of the proposed scheme and that of Bhatia and Verma [18]’s scheme were identical; however, Bhatia and Verma [26]’s scheme had several serious flaws, such as requiring a secure channel for the distributions of partial private key, sending the identity in an open channel to , which can compromise the anonymity of the sender and receiver, and being susceptible if a Type 1 adversary replaced the user public key.
Figure 2.
Comparison of the computational cost (in ms) of the proposed scheme and those proposed by Yanfeng et al. [25], Li et al. [27], and Qu and Zeng [28].
6.2. Communication Cost
In Table 4, we compare the primary operations of communication cost for the proposed scheme and other schemes that were proposed, including those proposed by Yanfeng et al. [25], Bhatia and Verma [26], Li et al. [27], and Qu and Zeng [28]. As shown in Table 4, represents the message size, which we assume was 2048 bits, represents the parameter size, which belongs to elliptic curve and was equal to 160 bits [30,31], represents the identity size, which belongs to elliptic curve and was equal to 160 bits, and represents the parameter size, which is part of the bilinear group, and its value was 1024 bits. As detailed in Table 4 and depicted in Figure 3, the proposed scheme had lower communication costs than its counterparts.
Table 4.
Comparison of communication cost with major operations.
Figure 3.
Comparison of the communication cost (in bits) of the proposed scheme and those proposed by Yanfeng et al. [25], Li et al. [27], and Qu and Zeng [28].
7. Conclusions
There is a growing trend toward integrating drones with B5G networks to meet the autonomy and pervasiveness requirements of future applications. Drones, however, have limited onboard storage and computational capabilities. Such restrictions make it difficult for a drone to execute cryptographic operations with a high level of complexity. Using the concept of elliptic curve cryptography (EEC) to resolve this shortcoming, we proposed a certificateless proxy signcryption scheme in this article. We performed a security analysis of the proposed scheme using the random oracle model (ROM) and demonstrated its resistance to well-known attacks. The proposed scheme had a significant advantage in that the partial private key can be disseminated over an open network without the risk of unauthorized disclosure. In terms of computational and communication costs, the proposed scheme’s performance analysis was compared to existing schemes on the same topic. According to the findings of both studies, the proposed scheme outperformed its competitors in terms of security rigor and had a better security-to-efficiency tradeoff.
Author Contributions
Conceptualization, M.A.K., N.I. and I.U.; methodology., M.A.K., H.A., N.I. and S.A.H.M.; software, S.A.H.M., U.T. and W.A.; validation, M.A.K., H.A. and I.U.; formal analysis, I.U. and M.A.K.; investigation, H.A., N.I., I.U. and W.A.; resources, M.A.K., W.A. and S.A.H.M.; data curation, W.A., N.I. and U.T.; writing—original draft preparation, M.A.K., I.U., W.A., N.I. and S.A.H.M.; writing—review and editing, M.A.K., H.A, U.T, W.A. and S.A.H.M.; visualization, U.T, W.A. and S.A.H.M.; supervision, M.A.K. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Khan, M.A.; Kumar, N.; Mohsan, S.A.H.; Khan, W.U.; Nasralla, M.M.; Alsharif, M.H.; Żywiołek, J.; Ullah, I. Swarm of DRONEs for Network Management in 6G: A Technical Review. IEEE Trans. Netw. Serv. Manag. 2022, 20, 741–761. [Google Scholar] [CrossRef]
- Vergouw, B.; Nagel, H.; Bondt, G.; Custers, B. Drone Technology: Types, Payloads, Applications, Frequency Spectrum Issues and Future Developments. In The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives; Custers, B., Ed.; T.M.C. Asser Press: Hague, The Netherlands, 2016; pp. 21–45. [Google Scholar]
- Li, B.; Li, Q.; Zeng, Y.; Rong, Y.; Zhang, R. 3D Trajectory Optimization for Energy-Efficient UAV Communication: A Control Design Perspective. IEEE Trans. Wirel. Commun. 2021, 21, 4579–4593. [Google Scholar] [CrossRef]
- Dai, X.; Xiao, Z.; Jiang, H.; Lui, J.C.S. UAV-Assisted Task Offloading in Vehicular Edge Computing Networks. In IEEE Transactions on Mobile Computing; IEEE: Piscataway, NJ, USA, 2023. [Google Scholar] [CrossRef]
- Lv, Z.; Chen, D.; Feng, H.; Zhu, H.; Lv, H. Digital Twins in Unmanned Aerial Vehicles for Rapid Medical Resource Delivery in Epidemics. IEEE Trans. Intell. Transp. Syst. 2021, 23, 25106–25114. [Google Scholar] [CrossRef] [PubMed]
- Amponis, G.; Lagkas, T.; Zevgara, M.; Katsikas, G.; Xirofotos, T.; Moscholios, I.; Sarigiannidis, P. Drones in B5G/6G Networks as Flying Base Stations. Drones 2022, 6, 39. [Google Scholar] [CrossRef]
- Liu, L.; Zhang, S.; Zhang, L.; Pan, G.; Yu, J. Multi-UUV Maneuvering Counter-Game for Dynamic Target Scenario Based on Fractional-Order Recurrent Neural Network. In IEEE Transactions on Cybernetics; IEEE: Piscataway, NJ, USA, 2022; pp. 1–14. [Google Scholar] [CrossRef]
- Yang, Z.; Yu, X.; Dedman, S.; Rosso, M.; Zhu, J.; Yang, J.; Xia, Y.; Tian, Y.; Zhang, G.; Wang, J. UAV remote sensing applications in marine monitoring: Knowledge visualization and review. Sci. Total. Environ. 2022, 838, 155939. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
- Zhang, J.; Peng, S.; Gao, Y.; Zhang, Z.; Hong, Q. APMSA: Adversarial Perturbation Against Model Stealing Attacks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1667–1679. [Google Scholar] [CrossRef]
- Li, B.; Zhou, X.; Ning, Z.; Guan, X.; Yiu, K.-F.C. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 2022, 612, 384–398. [Google Scholar] [CrossRef]
- Cao, B.; Sun, Z.; Zhang, J.; Gu, Y. Resource Allocation in 5G IoV Architecture Based on SDN and Fog-Cloud Computing. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3832–3840. [Google Scholar] [CrossRef]
- Wu, T.; Guo, X.; Chen, Y.; Kumari, S.; Chen, C. Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks. Drones 2021, 6, 10. [Google Scholar] [CrossRef]
- He, D.; Chan, S.; Guizani, M. Communication Security of Unmanned Aerial Vehicles. IEEE Wirel. Commun. 2016, 24, 134–139. [Google Scholar] [CrossRef]
- Hooper, M.; Tian, Y.; Zhou, R.; Cao, B.; Lauf, A.P.; Watkins, L.; Robinson, W.H.; Alexis, W. Securing commercial wifi-based drones from common security attacks. In Proceedings of the MILCOM 2016—2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016; pp. 1213–1218. [Google Scholar]
- Meng, L.; Yang, L.; Yang, W.; Zhang, L. A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens. 2022, 14, 4826. [Google Scholar] [CrossRef]
- Khan, M.A.; Alzahrani, B.A.; Barnawi, A.; Al-Barakati, A.; Irshad, A.; Chaudhry, S.A. A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network. Ocean. Eng. 2022, 250, 110894. [Google Scholar] [CrossRef]
- Ullah, U.; Marcenaro, L.; Rinner, B. Secure smart cameras by aggregate-signcryption with decryption fairness for multi receiver IoT applications. Sensors 2019, 19, 327. [Google Scholar] [CrossRef] [PubMed]
- Bansal, U.; Kar, J.; Ali, I.; Naik, K. ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications. J. Syst. Arch. 2022, 123, 102387. [Google Scholar] [CrossRef]
- Al-Riyami, S.S.; Paterson, K.G. Certificateless public key cryptography. In Advances in Cryptology ASIACRYPT of Lecture Notes in Computer Science; Springer: Berlin, Germany, 2003; Volume 2894, pp. 452–473. [Google Scholar]
- Mambo, M.; Usuda, K.; Okamoto, K. Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 1996, 79, 1338–1354. [Google Scholar]
- Gamage, C.; Leiwo, J.; Zheng, Y. An efficient scheme for secure message transmission using proxy-signcryption. In Proceedings of the 22nd Australasian Computer Science Conference, Auckland, New Zealand, 18–21 January 1999; pp. 420–431. [Google Scholar]
- Yu, H.; Wang, Z. Construction of Certificateless Proxy Signcryption Scheme From CMGs. IEEE Access 2019, 7, 141910–141919. [Google Scholar] [CrossRef]
- Abdelfatah, R.I. A novel proxy signcryption scheme and its elliptic curve variant. Int. J. Comput. Appl. 2017, 165, 36–43. [Google Scholar]
- Yanfeng, Q.; Chunming, T.; Yu, L.; Maozhi, X.; Baoan, G. Certificateless proxy identity-based signcryption scheme without bilinear pairings. China Commun. 2013, 10, 37–41. [Google Scholar] [CrossRef]
- Bhatia, T.; Verma, A.K. Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing. Ann. Telecommun. 2017, 72, 563–576. [Google Scholar] [CrossRef]
- Li, L.; Zhou, S.; Choo, K.-K.R.; Li, X.; He, D. An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. Secur. Commun. Netw. 2018, 2018, 7524102. [Google Scholar] [CrossRef]
- Qu, Y.; Zeng, J. Certificateless Proxy Signcryption in the Standard Model for a DRONE Network. IEEE Internet Things J. 2022, 9, 15116–15127. [Google Scholar] [CrossRef]
- Yu, S.; Das, A.K.; Park, Y.; Lorenz, P. SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments. IEEE Trans. Veh. Technol. 2022, 71, 10374–10388. [Google Scholar] [CrossRef]
- Ullah, I.; Zeadally, S.; Amin, N.U.; Khan, M.A.; Khattak, H. Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsyst. 2020, 81, 103477. [Google Scholar] [CrossRef]
- Ullah, I.; Khan, M.A.; Alsharif, M.H.; Nordin, R. An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles. Sustainability 2021, 13, 10891. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).