Skip to main content
Log in

A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Providing integrity, non-repudiation and validity for transmitted data is always very attractive in unmanned aerial vehicle cluster networks (UAVCN). Currently, “one by one” data authentication schemes with expensive computations can hardly be applied to a fast data transmission. In order to simultaneously resolve the security and efficiency issues, a novel data aggregate authentication scheme based on the ID-Based encryption, named IBE-AggAuth, is proposed for UAVCN. In the proposed scheme, all kinds of data from different UAVs can be checked by batch verification instead of “one-by-one” verification. In particular, it proves that IBE-AggAuth scheme is the existentially unforgeable security under adaptive chosen message and ID attacks (EUF-CMA), rigorously based on the elliptic curve computational Diffie-Hellman assumption in the random oracle model. The detailed performance evaluations demonstrate that IBE-AggAuth can not only guarantee data security, but also speed up the verification process with reducing computation and communication costs for UAVCN. Moreover, UAVs are allowed to join the data transmission dynamically at any moment, and IBE-AggAuth can be applicable to the de-centralized and self-organized environment of UAVCN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Zhao S, Chen K, Lyu N, Zhao J (2017) Software defined airborne tactical network for aeronautic swarm. J Commun 38(8):140–155

    Google Scholar 

  2. He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun 24(4):134–139

    Article  Google Scholar 

  3. Liang Y, Cheng G, Guo X, Zhou A (2016) Research progress on architecture and protocol stack of the airborne network. J Soft 27(1):96–111

    MathSciNet  Google Scholar 

  4. Maxa JA, Mahmoud MSB, Larrieu N (2017) Survey on UAANET routing protocols and network security challenges. Ad-Hoc and Sensor Wireless Netw 37(3):36–42

    Google Scholar 

  5. Ramaprasath A, Srinivasan A, Lung CH, St-Hilaire M (2017) Intelligent wireless ad hoc routing protocol and controller for uav networks, vol 184. Springer, Berlin

    Google Scholar 

  6. Siddiqui KTA, Feilseifer D, Jiang T, Jose S, Liu S, Louis S (2017) Development of a swarm UAV simulator integrating realistic motion control models for disaster operations. In: ASME 2017 dynamic systems and control conference

  7. Zhu X, Liu Z, Yang J (2015) Model of collaborative UAV swarm toward coordination and control mechanisms study. Procedia Comput Sci 51(1):493–502

    Article  Google Scholar 

  8. Weaver JN (2014) Collaborative coordination and control for an implemented heterogeneous swarm of uavs and ugvs. Ph.D. thesis. University of Florida

  9. Arbanas B, Ivanovic A, Car M, Orsag M, Petrovic T, Bogdan S (2018) Decentralized planning and control for UAV-UGV cooperative teams. Auton Robot 42(1):1–18

    Article  Google Scholar 

  10. Ho DT, Sujit PB, Johansen TA (2015) Optimization of wireless sensor network and UAV data acquisition. J Intell Robot Syst 78(1):159–179

    Article  Google Scholar 

  11. Zhang T, Yue K, Yao J (2011) A distributed anonymous authentication scheme for Mobile ad hoc network from bilinear maps. In: International conference on mechatronic science, electric engineering and computer, pp 314–318

  12. Zhu H, Pan W, Liu B, Li H (2012) A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In: Fourth international conference on intelligent NETWORKING and collaborative systems, pp 222–228

  13. Sen J (2013) Security and privacy issues in wireless mesh networks: a survey. Springer, Berlin

    Book  Google Scholar 

  14. Luo H, Zerfos P, Kong J, Lu S, Zhang L (2002) Self-securing ad hoc wireless networks. In: Proceedings of the international symposium on computers and communications, 2002. ISCC, pp 567–574

  15. Qiao Z, Liu G, Li J, Dai Y (2013) survey on secure access technology in mobile ad-hoc network. Comput Sci 40(12):1–7

    Google Scholar 

  16. Yang T, Kong L, Hu J, Chen Z (2012) Survey on aggregate signature and its applications. J Comput Res Develop 49(2):192–198

    Google Scholar 

  17. Dan B, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. Lect Notes Comput Sci 2656(1):416–432

    MathSciNet  MATH  Google Scholar 

  18. Chen H, Wei S, Zhu C, Yang Y (2015) Secure certificateless aggregate signature scheme. J Soft 26 (5):1173–1179

    MathSciNet  Google Scholar 

  19. Li Y, Nie H, Zhou Y, Yang B (2015) A novel and provably secure certificateless aggregate signature scheme. J Cryptol Res 2(6):526–534

    Google Scholar 

  20. Dan B, Franklin M (2003) Identity-based encryption from the weil pairing. Society for Industrial and Applied Mathematics

  21. Shen L, Ma J, Liu X, Wei F, Miao M (2017) A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J 4(2):546–555

    Article  Google Scholar 

  22. Yanai N (2017) On the tightness of deterministic identity-based signatures. In: Fourth international symposium on computing and NETWORKING, pp 168–173

  23. Zhang Y, Zhou D, Li C, Zhang Y, Wang C (2015) Certificateless-based efficient aggregate signature scheme with universal designated verifier. J Commun 36(2):48–55

    Google Scholar 

  24. Cheon J, Kim Y, Yoon H (2005) A new ID-based signature with batch verification. Trends Math Inf Center Math Sci 8(1):119–131

    Google Scholar 

  25. Gentry C, Ramzan Z (2006) Identity-based aggregate signatures. In: International conference on theory and practice of public-key cryptography, pp 257–273

    Chapter  Google Scholar 

  26. Kar J (2012) Provably secure identity-based aggregate signature scheme. In: International conference on cyber-enabled distributed computing and knowledge discovery, pp 137–142

  27. Herranz J (2006) Deterministic identity-based signatures for partial aggregation. Oxford University Press, London

    Google Scholar 

  28. Iwasaki T, Yanai N, Inamura M, Iwamura K (2016) Tightly-secure identity-based structured aggregate signature scheme under the computational diffie-hellman assumption. In: IEEE international conference on advanced information NETWORKING and applications, pp 669–676

  29. Lu R, Lin X, Shi Z, Shen X (2013) EATH: an efficient aggregate authentication protocol for smart grid communications. In: 2013 IEEE wireless communications and networking conference (WCNC): NETWORKS, pp 1819–1824

  30. Shamir Adi (1984) Identity-based cryptosystems and signature schemes. Lect Notes Comput Sci 196(2):47–53

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors acknowledge the support of the National Natural Science Foundation of China (No. 61872293, 61401499, 61174162), and the Innovation Ability Support Program in Shaanxi Province of China (2017KJXX-47).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lai Chengzhe.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, W., Jianhua, L., Chengzhe, L. et al. A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks. Peer-to-Peer Netw. Appl. 13, 53–63 (2020). https://doi.org/10.1007/s12083-019-0718-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-0718-9

Keywords

Navigation