An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones
Abstract
:1. Introduction
- We proposed a heterogeneous signcryption scheme in which the drone side utilized IBC and the GS side used PKI. The real identity of each entity was encrypted using a secret key that only the entity and the PKG knew during the key-generation process. This made the proposed scheme conditionally privacy-preserving.
- In the proposed scheme, we introduced a new concept in IBC in which the PKGC sent the private key to drones in an encrypted format that did not require a secure channel. Moreover, the proposed scheme was constructed using the concept of the HECC and assessed using a random oracle model (ROM). The results verified that the proposed scheme was robust against cyberattacks.
- Finally, we conducted a comparison study to evaluate the efficiency of the proposed scheme in terms of computation and communication costs. Comparing the proposed scheme to similar existing ones revealed that it had reduced computation and communication costs.
2. Related Work
3. Preliminaries
3.1. Network Model
3.2. Hyperelliptic Curve (HEC) and Difficult Mathematics Problems
- Hyperelliptic Curve (HEC): This is a special form of ECC with genus that employs 80-bit keys and parameters to generate ciphertext and signatures with the same level of security as ECC. A standard equation for HEC over a finite field ( is as follows: mod ; represents a polynomial with degree and represents a monic polynomial with degree . Here, the central idea is to construct a Jacobian group and pick its generator, known as the devisor.
- Hyperelliptic Curve Diffie–Hellman Problem (HECDHP): Assuming the primary parameters for the HECDHP are , the attacker’s goal, with the help of the challenger, is to extract and from .
- Hyperelliptic Curve Discrete Logarithm Problem (HECDLP): Assuming are the main parameters for the HECDLP, the attacker’s goal, with the help of the challenger, is to extract from .
3.3. Syntax
- Setup: When the private key generation center (PKGC) receives as a security parameter, it sets as its private key and as a public key. Moreover, it makes a param.
- IBC Key Generation for : Here, first computes , and sends () to the PKGC through an insecure channel. The PKGC then computes the secret key , , and . The PKGC also computes the private key for ( and . PKGC sends to in an open network. The can recover later.
- PKI Key Generation for Everything (EVTG): A device that belongs to the EVTG can play the role of receiver and sets as its private key and computes as its public key.
- Heterogeneous Signcryption (HS): This step is initiated by the to generate and send () to the EVTG.
- Heterogeneous Unsigncryption (HUS): A device that belong to EVTG can play the role of receiver and can verify and decrypt ( ).
4. Construction of the Proposed Scheme
- Setup: When the PKGC receives as a security parameter, it then performs the following steps:
- Selects randomly, where and sets it as its private key;
- Computes and sets it as its private key, where is the devisor on HECC;
- Chooses hash functions , , and , with a 256-bit size;
- Sets , as a param for further processing of the proposed scheme and the PKGC shares it openly.
- IBC Key Generation for Drone: Here, first Drone selects ( ) as its real identity and selects computes , , encrypts as , and sends () to the PKGC through an insecure channel. When () sends to the PKGC, it computes the secret key as , recovers as , selects , computes , and . Then, the PKGC computes the private key for Drone as and encrypt () as . The PKGC sends to in an open network, then can recover as .
- PKI Key Generation for Everything (EVTG): A device that belongs to the EVTG plays the role of receiver, selects , and computes .
- Heterogeneous Signcryption (HS): This step will be initiated by the to generates HS using the following steps:
- It selects at random and computes ;
- Computes and ;
- Computes and ;
- Computes and sends () to the EVTG.
- Heterogeneous Unsigncryption (HUS): A device that belongs to the EVTG plays the role of receiver and can generate HUS using the following steps;
- Computes and ;
- Computes and compares if satisfies, where and .
Correctness
5. Security Models
- Step 1: succeeds.
- Step 2: succeeds.
- Step 3: All the queries are successful in target identity.
6. Security Analysis
- Selects at random and computes ;
- Computes and extracts from ;
- Computes and selects ;
- Sends ( ) to .
- Computes and ;
- Computes and compares to determine if satisfied, where and .
- Selects and chooses ,;
- Computes and ;
- Computes and ;
- Computes and sends () to .
- Event 1 (): succeeds, and the probability as
- Event 2 (): succeeds, and the probability as
- Event 3 (): The challenge phase succeeds, and the probability is
- The must be the original value for ; this is only possible if it obtains the solution for
- In addition, must be the original value for ; this is only possible if it obtains the solution for during the public key query () and the private key query () or it can access the exact value from list .
- It can also extract the exact value as used in the heterogeneous signcryption algorithm for from a list ().
- It can extract the exact value as used in the heterogeneous signcryption algorithm for from a list ().
- Event 1 (): succeeds, and the probability is
- Event 2 (): succeeds, and the probability is
- Event 3 (): The challenge phase succeeds, and the probability is
7. Performance Comparison
7.1. Security Properties Comparison
7.2. Computation Costs
7.3. Communication Costs
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Gharibi, M.; Boutaba, R.; Waslander, S.L. Internet of drones. IEEE Access 2016, 4, 1148–1162. [Google Scholar] [CrossRef]
- Huang, H.; Savkin, A.V. Towards the internet of flying robots: A survey. Sensors 2018, 18, 4038. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Abualigah, L.; Diabat, A.; Sumari, P.; Gandomi, A.H. Applications, deployments, and integration of internet of drones (iod): A review. IEEE Sens. J. 2021, 21, 25532–25546. [Google Scholar] [CrossRef]
- Khan, M.A.; Ullah, I.; Alsharif, M.H.; Alghtani, A.H.; Aly, A.A.; Chen, C.M. An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones. Secur. Commun. Netw. 2022, 2022, 9718580. [Google Scholar] [CrossRef]
- Choudhary, G.; Sharma, V.; Gupta, T.; Kim, J.; You, I. Internet of drones (IoD): Threats vulnerability and security perspectives. arXiv 2018, arXiv:1808.00203. [Google Scholar]
- Guo, Y.; Wu, M.; Tang, K.; Tie, J.; Li, X. Covert Spoofing Algorithm of UAV Based on GPS/INS-Integrated Navigation. IEEE Trans. Veh. Technol. 2019, 68, 6557–6564. [Google Scholar] [CrossRef]
- Eldosouky, A.R.; Ferdowsi, A.; Saad, W. Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. IEEE Internet Things J. 2020, 7, 2840–2854. [Google Scholar] [CrossRef] [Green Version]
- Arteaga, S.P.; Hernandez, L.A.M.; Perez, G.S.; Orozco, A.L.S.; Villalba, L.J.G. Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo. IEEE Access 2019, 7, 51782–51789. [Google Scholar] [CrossRef]
- Zheng, Y. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 1997; pp. 165–179. [Google Scholar]
- Han, Y.; Yang, X.; Wei, P.; Wang, Y.; Hu, Y. ECGSC: Elliptic curve based generalized signcryption. In Proceedings of the Third International Conference Ubiquitous Intelligence and Computing, Volume 4159 of Lecture Notes in Computer Science, Wuhan, China, 3–6 September 2006; Springer: Berlin/Heidelberg, Germany, 2006; pp. 956–965. [Google Scholar]
- Wang, L.; Zhang, G.; Ma, C. A Secure Ring Signcryption Scheme for Private and Anonymous Communication. In Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007), Dalian, China, 18–21 September 2007; pp. 107–111. [Google Scholar]
- Karati, A.; Islam, S.H.; Biswas, G.P.; Alam Bhuiyan, Z.; Vijayakumar, P.; Karuppiah, M. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments. IEEE Internet Things J. 2018, 5, 2904–2914. [Google Scholar] [CrossRef]
- Xiong, H.; Hou, Y.; Huang, X.; Zhao, Y.; Chen, C.-M. Heterogeneous Signcryption Scheme from IBC to PKI With Equality Test for WBANs. IEEE Syst. J. 2021, 16, 2391–2400. [Google Scholar] [CrossRef]
- Khan, M.A.; Shah, H.; Rehman, S.U.; Kumar, N.; Ghazali, R.; Shehzad, D.; Ullah, I. Securing Internet of Drones with Identity-Based Proxy Signcryption. IEEE Access 2021, 9, 89133–89142. [Google Scholar] [CrossRef]
- Boccadoro, P.; Striccoli, D.; Grieco, L.A. Internet of Drones: A Survey on Communications, Technologies, Protocols, Architectures and Services. arXiv 2020, arXiv:2007.12611. [Google Scholar]
- Yahuza, M.; Idris, M.Y.I.; Bin Ahmedy, I.; Wahab, A.W.B.A.; Nandy, T.; Noor, N.M.; Bala, A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar] [CrossRef]
- Khan, M.A.; Ullah, I.; Nisar, S.; Noor, F.; Qureshi, I.M.; Khanzada, F.U.; Amin, N.U. An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network. IEEE Access 2020, 8, 36807–36828. [Google Scholar] [CrossRef]
- Elkhalil, A.; Zhang, J. Practical heterogeneous signcryption system for vehicular communication in VANETs. Computing 2022. [Google Scholar] [CrossRef]
- Sun, Y.; Li, H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 2010, 53, 557–566. [Google Scholar] [CrossRef] [Green Version]
- Huang, Q.; Wong, D.S.; Yang, G. Heterogeneous Signcryption with Key Privacy. Comput. J. 2011, 54, 525–536. [Google Scholar] [CrossRef]
- Ali, I.; Lawrence, T.; Omala, A.A.; Li, F. An Efficient Hybrid Signcryption Scheme with Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs. IEEE Trans. Veh. Technol. 2020, 69, 11266–11280. [Google Scholar] [CrossRef]
- Elkhalil, A.; Zhang, J.; Elhabob, R.; Eltayieb, N. An efficient signcryption of heterogeneous systems for Internet of Vehicles. J. Syst. Arch. 2021, 113, 101885. [Google Scholar] [CrossRef]
- Jin, C.; Chen, G.; Yu, C.; Shan, J.; Zhao, J.; Jin, Y. An efficient heterogeneous signcryption for smart grid. PLoS ONE 2018, 13, e0208311. [Google Scholar] [CrossRef] [Green Version]
- Ting, P.; Tsai, J.; Wu, T. Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network. IEEE Syst. J. 2018, 12, 2385–2394. [Google Scholar] [CrossRef]
- Ali, I.; Chen, Y.; Pan, C.; Zhou, A. ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications. IEEE Internet Things J. 2022, 9, 4435–4450. [Google Scholar] [CrossRef]
- Pan, X.; Jin, Y.; Wang, Z.; Li, F. A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles. IEEE Internet Things J. 2022, 9, 19426–19437. [Google Scholar] [CrossRef]
- Shamus Sofware Ltd. Miracl Library. Available online: http://github.com/miracl/MIRACL (accessed on 2 August 2022).
- Zhou, C.; Zhao, Z.; Zhou, W.; Mei, Y. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Secur. Commun. Netw. 2017, 2017, 8405879. [Google Scholar] [CrossRef]
S.No | Notation | Descriptions |
---|---|---|
1 | PKGC | The private key generation center |
2 | A security parameter of HEC with a size of bits | |
3 | The private key of PKGC | |
4 | The public key of PKGC | |
5 | A finite field with order bits | |
6 | Belongs to symbol | |
7 | HEC | Genus 2 hyperelliptic curve |
8 | Devisor of genus 2 | |
9 | , | Hash functions with sizes of 256 bits |
10 | The real identity of the drone | |
11 | The encrypted identity of the drone | |
12 | The encryption function, which was used to encrypt the real identity of the | |
13 | The decryption function, which was used to recover the real identity of the Drone | |
14 | The secret key, which was used to encrypt and decrypt the messages between the Drone and the PKGC | |
15 | The private key of the Drone | |
16 | The private key of the device that belonged to EVTG | |
17 | The public key of the device that belonged to EVTG | |
18 | The secret key that was used to encrypt and decrypt the messages between the Drone and the EVTG | |
19 | The encryption function, which was used to encrypt the message of the Drone | |
20 | The decryption function, which was used to recover the message of the Drone |
Schemes | Confidentiality | Unforgeability | Sender Anonymity | Receiver Anonymity | Needing Secure Channel |
---|---|---|---|---|---|
Ali et al. [21] | Yes | Yes | Not Mentioned | Not Mentioned | No |
Jin et al. [23] | Yes | Yes | Not Mentioned | Not Mentioned | No |
Ting et al. [24] | Yes | Yes | Not Mentioned | Not Mentioned | No |
Ali et al. [25] | Yes | Yes | Not Mentioned | Not Mentioned | No |
Pan et al. [26] | Yes | Yes | Not Mentioned | Not Mentioned | No |
Proposed Scheme | Yes | Yes | Yes | Yes | Yes |
Schemes | Signcryption | Unsigncryption | Total |
---|---|---|---|
Ali et al. [21] | 3 BPM + 1 EX | 1 BPM + 2 PR | 4 BPM + 1 EX + 2 PR |
Jin et al. [23] | 3 BPM | 1 BPM + 3 PR | 4 BPM + 3 PR |
Ting et al. [24] | 4 EM | 4 EM | 8 EM |
Ali et al. [25] | 3 EM | 2 EM | 5 EM |
Pan et al. [26] | 3 EM | 3 EM | 6 EM |
Proposed scheme | 3 HEM | 4 HEM | 7 HEM |
Schemes | Signcryption | Unsigncryption | Total |
---|---|---|---|
Ali et al. [21] | 14.18 | 34.11 | 48.29 |
Jin et al. [23] | 12.93 | 49.01 | 61.94 |
Ting et al. [24] | 3.88 | 3.88 | 7.76 |
Ali et al. [25] | 2.91 | 1.94 | 4.85 |
Pan et al. [26] | 2.91 | 2.91 | 5.82 |
Proposed Scheme | 1.44 | 1.92 | 3.36 |
Schemes | Signcrypted Text Tuple | Signcrypted Text in Bits |
---|---|---|
Ali et al. [21] | |m|+3|G| | |1024|+3*|1024| = 4096 |
Jin et al. [23] | |m|+2|G| | |1024|+2*|1024| = 3072 |
Ting et al. [24] | |m|+4|q| | |1024|+4*|160| = 1664 |
Ali et al. [25] | |m|+2|q| | |1024|+2*|160| =1344 |
Pan et al. [26] | |m|+2|q| | |1024|+2*|160| = 1344 |
Proposed Scheme | |m|+2|n| | |1024|+2*|80| = 1184 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, M.A.; Ullah, I.; Abdullah, A.M.; Mohsan, S.A.H.; Noor, F. An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones. Sensors 2023, 23, 1063. https://doi.org/10.3390/s23031063
Khan MA, Ullah I, Abdullah AM, Mohsan SAH, Noor F. An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones. Sensors. 2023; 23(3):1063. https://doi.org/10.3390/s23031063
Chicago/Turabian StyleKhan, Muhammad Asghar, Insaf Ullah, Ako Muhammad Abdullah, Syed Agha Hassnain Mohsan, and Fazal Noor. 2023. "An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones" Sensors 23, no. 3: 1063. https://doi.org/10.3390/s23031063
APA StyleKhan, M. A., Ullah, I., Abdullah, A. M., Mohsan, S. A. H., & Noor, F. (2023). An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones. Sensors, 23(3), 1063. https://doi.org/10.3390/s23031063