Abstract
Providing integrity, non-repudiation and validity for transmitted data is always very attractive in unmanned aerial vehicle cluster networks (UAVCN). Currently, “one by one” data authentication schemes with expensive computations can hardly be applied to a fast data transmission. In order to simultaneously resolve the security and efficiency issues, a novel data aggregate authentication scheme based on the ID-Based encryption, named IBE-AggAuth, is proposed for UAVCN. In the proposed scheme, all kinds of data from different UAVs can be checked by batch verification instead of “one-by-one” verification. In particular, it proves that IBE-AggAuth scheme is the existentially unforgeable security under adaptive chosen message and ID attacks (EUF-CMA), rigorously based on the elliptic curve computational Diffie-Hellman assumption in the random oracle model. The detailed performance evaluations demonstrate that IBE-AggAuth can not only guarantee data security, but also speed up the verification process with reducing computation and communication costs for UAVCN. Moreover, UAVs are allowed to join the data transmission dynamically at any moment, and IBE-AggAuth can be applicable to the de-centralized and self-organized environment of UAVCN.
Similar content being viewed by others
References
Zhao S, Chen K, Lyu N, Zhao J (2017) Software defined airborne tactical network for aeronautic swarm. J Commun 38(8):140–155
He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun 24(4):134–139
Liang Y, Cheng G, Guo X, Zhou A (2016) Research progress on architecture and protocol stack of the airborne network. J Soft 27(1):96–111
Maxa JA, Mahmoud MSB, Larrieu N (2017) Survey on UAANET routing protocols and network security challenges. Ad-Hoc and Sensor Wireless Netw 37(3):36–42
Ramaprasath A, Srinivasan A, Lung CH, St-Hilaire M (2017) Intelligent wireless ad hoc routing protocol and controller for uav networks, vol 184. Springer, Berlin
Siddiqui KTA, Feilseifer D, Jiang T, Jose S, Liu S, Louis S (2017) Development of a swarm UAV simulator integrating realistic motion control models for disaster operations. In: ASME 2017 dynamic systems and control conference
Zhu X, Liu Z, Yang J (2015) Model of collaborative UAV swarm toward coordination and control mechanisms study. Procedia Comput Sci 51(1):493–502
Weaver JN (2014) Collaborative coordination and control for an implemented heterogeneous swarm of uavs and ugvs. Ph.D. thesis. University of Florida
Arbanas B, Ivanovic A, Car M, Orsag M, Petrovic T, Bogdan S (2018) Decentralized planning and control for UAV-UGV cooperative teams. Auton Robot 42(1):1–18
Ho DT, Sujit PB, Johansen TA (2015) Optimization of wireless sensor network and UAV data acquisition. J Intell Robot Syst 78(1):159–179
Zhang T, Yue K, Yao J (2011) A distributed anonymous authentication scheme for Mobile ad hoc network from bilinear maps. In: International conference on mechatronic science, electric engineering and computer, pp 314–318
Zhu H, Pan W, Liu B, Li H (2012) A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In: Fourth international conference on intelligent NETWORKING and collaborative systems, pp 222–228
Sen J (2013) Security and privacy issues in wireless mesh networks: a survey. Springer, Berlin
Luo H, Zerfos P, Kong J, Lu S, Zhang L (2002) Self-securing ad hoc wireless networks. In: Proceedings of the international symposium on computers and communications, 2002. ISCC, pp 567–574
Qiao Z, Liu G, Li J, Dai Y (2013) survey on secure access technology in mobile ad-hoc network. Comput Sci 40(12):1–7
Yang T, Kong L, Hu J, Chen Z (2012) Survey on aggregate signature and its applications. J Comput Res Develop 49(2):192–198
Dan B, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. Lect Notes Comput Sci 2656(1):416–432
Chen H, Wei S, Zhu C, Yang Y (2015) Secure certificateless aggregate signature scheme. J Soft 26 (5):1173–1179
Li Y, Nie H, Zhou Y, Yang B (2015) A novel and provably secure certificateless aggregate signature scheme. J Cryptol Res 2(6):526–534
Dan B, Franklin M (2003) Identity-based encryption from the weil pairing. Society for Industrial and Applied Mathematics
Shen L, Ma J, Liu X, Wei F, Miao M (2017) A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J 4(2):546–555
Yanai N (2017) On the tightness of deterministic identity-based signatures. In: Fourth international symposium on computing and NETWORKING, pp 168–173
Zhang Y, Zhou D, Li C, Zhang Y, Wang C (2015) Certificateless-based efficient aggregate signature scheme with universal designated verifier. J Commun 36(2):48–55
Cheon J, Kim Y, Yoon H (2005) A new ID-based signature with batch verification. Trends Math Inf Center Math Sci 8(1):119–131
Gentry C, Ramzan Z (2006) Identity-based aggregate signatures. In: International conference on theory and practice of public-key cryptography, pp 257–273
Kar J (2012) Provably secure identity-based aggregate signature scheme. In: International conference on cyber-enabled distributed computing and knowledge discovery, pp 137–142
Herranz J (2006) Deterministic identity-based signatures for partial aggregation. Oxford University Press, London
Iwasaki T, Yanai N, Inamura M, Iwamura K (2016) Tightly-secure identity-based structured aggregate signature scheme under the computational diffie-hellman assumption. In: IEEE international conference on advanced information NETWORKING and applications, pp 669–676
Lu R, Lin X, Shi Z, Shen X (2013) EATH: an efficient aggregate authentication protocol for smart grid communications. In: 2013 IEEE wireless communications and networking conference (WCNC): NETWORKS, pp 1819–1824
Shamir Adi (1984) Identity-based cryptosystems and signature schemes. Lect Notes Comput Sci 196(2):47–53
Acknowledgements
The authors acknowledge the support of the National Natural Science Foundation of China (No. 61872293, 61401499, 61174162), and the Innovation Ability Support Program in Shaanxi Province of China (2017KJXX-47).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hong, W., Jianhua, L., Chengzhe, L. et al. A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks. Peer-to-Peer Netw. Appl. 13, 53–63 (2020). https://doi.org/10.1007/s12083-019-0718-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-0718-9