A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G

Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq, Nisreen Innab

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computing capability to perform complex cryptographic algorithms. Owing to the extensive real-time applications of drones and the ubiquitous wireless connection of beyond 5G (B5G) networks, efficient security measures are required to prevent unauthorized access to sensitive data. In this article, we proposed a resource-friendly proxy signcryption scheme in certificateless settings. The proposed scheme was based on elliptic curve cryptography (ECC), which has a reduced key size, i.e., 160 bits, and is, therefore, suitable for drones. Using the random oracle model (ROM), the security analysis of the proposed scheme was performed and shown to be secure against well-known attacks. The performance analysis of the proposed scheme was also compared to relevant existing schemes in terms of computation and communication costs. The findings validate the practicability of the proposed scheme.

Original languageEnglish
Article number321
JournalDrones
Volume7
Issue number5
DOIs
StatePublished - May 2023

Keywords

  • 5G
  • drones
  • hyperelliptic curve cryptography
  • proxy signcryption
  • random oracle model
  • security

Fingerprint

Dive into the research topics of 'A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G'. Together they form a unique fingerprint.

Cite this