Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2023 Jan 17;23(3):1063. doi: 10.3390/s23031063

An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones

Muhammad Asghar Khan 1,*, Insaf Ullah 1, Ako Muhammad Abdullah 2,3, Syed Agha Hassnain Mohsan 4, Fazal Noor 5
Editor: Andrey V Savkin
PMCID: PMC9920500  PMID: 36772107

Abstract

The Internet of Drones (IoD) is a network for drones that utilizes the existing Internet of Things (IoT) infrastructure to facilitate mission fulfilment through real-time data transfer and navigation services. IoD deployments, on the other hand, are often conducted in public wireless settings, which raises serious security and privacy concerns. A key source of these security and privacy concerns is the fact that drones often connect with one another through an unprotected wireless channel. Second, limits on the central processing unit (CPU), sensor, storage, and battery capacity make the execution of complicated cryptographic methods onboard a drone impossible. Signcryption is a promising method for overcoming these computational and security limitations. Additionally, in an IoD setting, drones and the ground station (GS) may employ various cryptosystems in a particular region. In this article, we offer a heterogeneous signcryption scheme with a conditional privacy-preservation option. In the proposed scheme, identity-based cryptography (IBC) was used by drones, while the public key infrastructure (PKI) belonged to the GS. The proposed scheme was constructed by using the hyperelliptic curve cryptosystem (HECC), and its security robustness was evaluated using the random oracle model (ROM). In addition, the proposed scheme was compared to the relevant existing schemes in terms of computation and communication costs. The results indicated that the proposed scheme was both efficient and secure, thereby proving its feasibility.

Keywords: Internet of Drones, security, privacy, signcryption, HECC

1. Introduction

The term “Internet of Drones” (IoD) refers to a network for interconnected drones and a ground station (GS) that allows the drones to enter low-altitude controlled airspace in a coordinated fashion. Drones in IoD networks typically have their sensors, software, and the technologies that connect them configured so that they may interact over the Internet using the same standard IoT protocols as other connected devices [1]. Historically, drones have been exploited for a large number of military applications and activities. However, due to substantial improvements in the design and manufacturing of inexpensive, highly reliable, and small-sized drones, drones are now being employed in a large array of civil and commercial applications. Moreover, the unique attributes of drones such as their ease of use, fast deployment to remote locations, high mobility, maneuverability, and capability to hover make them a suitable choice for commercial applications [2]. Despite their various benefits, there are still obstacles to overcome before IoD networks can be deployed successfully. Drones in IoD networks, for example, communicate through an unencrypted wireless channel; hence, it is essential to employ a cryptographic method with the highest level of security to enable their safe deployment in mission-critical situations [3]. Drones have limited onboard components such as CPUs, sensors, storage, and batteries [4]. Due to their small size, drones can only carry a limited number of supplies. Drones were designed for aerial surveillance with the primary goal of collecting data for transmission to the GS. Since drones often have small amounts of onboard storage and processing power, it can be difficult for them to perform complex computations. These restrictions may have a major impact on the privacy and security aspects of the IoD networks, which could lead to a catastrophic failure of the network’s information-exchange capacity [5].

In the absence of countermeasures against cyber-physical threats to preserve data security and privacy in IoD networks, it is possible for intruders to penetrate the network and disclose sensitive data. Examples of common privacy and security threats in the IoD ecosystem include drone position tracking, device tampering, unauthorized data access, message manipulation, and falsification. Global Positioning System (GPS) spoofing attacks [6,7,8] generally exploit GPS signals and pose a significant threat to the privacy of IoDs. By sending significantly more powerful fake GPS signals to a drone, an attacker can trick it into flying in the wrong direction during a GPS spoofing attack. Data integrity and confidentiality can be jeopardized when malicious actors introduce chaos into a network and steal sensitive information. To maximize the use of drones, it is vital to protect IoD networks with stronger security measures and a cryptographic algorithm that requires less computation.

The IoD must assure authenticity and confidentiality for it to be of the utmost importance. The digital signature and encryption methods address these security attributes respectively. When the need arises for both encryption and digital signatures, signcryption [9] can be employed. Due to the growing variety and density of drones, a given zone may contain drones and GSs that belong to different cryptosystems. Furthermore, drones have limited computational capacity and storage space. Consequently, an efficient and secure heterogeneous signcryption scheme in which the sender and recipient have independent security domains is a better option [10,11]. Consequently, identity-based cryptography (IBC) [12] and public key infrastructure (PKI) are the two main cryptosystems that can be implemented in the IoD system. In addition to a heterogeneous signcryption scheme, a conditional privacy-preservation feature can be introduced to ensure receiver and sender identity anonymity [13]. To prevent their real identity from being revealed to the sender and the receiver, each entity in the proposed scheme encrypts its identity using a secret key known only to the entity and the PKG throughout the key-generation process. In order to decipher the identification after the PKG has received it, it must first find the secret key and the real identity. The PKG then makes available the encrypted identities of all entities via signcryption and unsigncryption processing.

Typically, Rivest–Shamir–Adleman (RSA), bilinear pairing (BP), and elliptic curve cryptography (ECC) are employed to increase the security and efficiency of any security solution. RSA is based on a massive factorization problem and employs 1024-bit keys, parameters, certificates, and identities. RSA is inappropriate for resource-constrained networks such as IoD due to the lack of onboard processing capability on small drones. In addition, BP is inferior to RSA due to its extensive pairing and map-to-point function processing. ECC was developed to address the shortcomings of RSA and bilinear pairing. ECC typically uses 160-bit keys, which are again not suitable for IoD networks. Hyperelliptic curve cryptography (HECC), which is an improved variant of ECC, was developed to compete with ECC’s efficiency [14]. HECC offers the same amount of security as ECC, BP, and RSA with 80-bit keys. Therefore, HECC is the best choice for IoD systems, so we used it to construct the proposed scheme with the following main contributions.

  • We proposed a heterogeneous signcryption scheme in which the drone side utilized IBC and the GS side used PKI. The real identity of each entity was encrypted using a secret key that only the entity and the PKG knew during the key-generation process. This made the proposed scheme conditionally privacy-preserving.

  • In the proposed scheme, we introduced a new concept in IBC in which the PKGC sent the private key to drones in an encrypted format that did not require a secure channel. Moreover, the proposed scheme was constructed using the concept of the HECC and assessed using a random oracle model (ROM). The results verified that the proposed scheme was robust against cyberattacks.

  • Finally, we conducted a comparison study to evaluate the efficiency of the proposed scheme in terms of computation and communication costs. Comparing the proposed scheme to similar existing ones revealed that it had reduced computation and communication costs.

This manuscript is structured in a manner that includes the following sections: the related work on conditional privacy-preserving heterogeneous signcryption schemes is covered in Section 2, and the preliminary material is discussed in Section 3. In Section 4, we cover the construction of the proposed scheme. Security models are discussed in Section 5, and Section 6 provides a security analysis of the proposed scheme. We cover the performance analysis in Section 7, and the conclusions are contained in Section 8.

2. Related Work

Recent advancements in 5G technology have allowed the development of B5G cellular networks, which enable autonomous drone services. However, issues regarding the security and privacy of drones have increased rapidly [15]. The IoD’s wireless communications can be attacked in a number of ways using cryptographic techniques [16]. Therefore, an efficient and highly secure cryptographic scheme is required for the successful deployment of IoD networks. Sign-then-encrypt approaches meet network security standards; however, this strategy raises computation costs on both ends. One way to address this issue is signcryption, a sophisticated method that combines a digital signature and encryption in an operation that conducts them simultaneously. This method, which is both effective and well suited for devices with limited resources, is in contrast to the more standard practice of employing separate procedures for encryption and digital signatures [17]. Most existing signcryption solutions rely on PKI and IDC cryptosystems. However, these cryptosystems can only be functional in networks in which both the senders and receivers employ the same cryptographic mechanism for exchanging data. Heterogeneous signcryption is preferable due to the dynamic nature of IoD systems [18].

The first heterogeneous signcryption scheme between PKI and IBC was introduced by Sun and Li [19]. Huang et al. [20] highlighted the security shortcomings of [19] and offered a more robust security approach that was termed “insider security” before proposing a new scheme between PKI and IBC. Their schemes, however, did not enable batch unsigncryption. Ali et al. [21] developed a conditional privacy-preserving hybrid signcryption scheme that combined BP with heterogeneous communication. The protocol ensured that a message sent via the IBC method was delivered via a PKI method. Unfortunately, in this design, any entity was able to produce a pseudo-identity and a public key, whilst the recipient had no method to check its authenticity. In addition, their scheme failed to ensure inner unforgeability because a hostile receiver could easily intercept a valid ciphertext, produce a new random number, and forge a new valid ciphertext. Furthermore, the proposed method employed bilinear pairing, which is a costly process for drones to execute. Elkhalil et al. [22] developed an efficient signcryption of a heterogeneous system to offer high-level security properties such as confidentiality, key revocation, integrity, authentication, and nonrepudiation. The proposed scheme was based on ECC, a procedure that is slightly more expensive than HECC.

Jin et al. [23] presented a signcryption scheme that was provably secure and heterogenous for a smart grid system in which meters in the IBC environment communicated data to utilities in the PKI environment. The signcryption and unsigncryption algorithms in their method were computationally and communicatively inefficient due to the BP operations. In addition, the scheme did not support the decryption of numerous ciphertexts in bulk. Ting et al. [24] proposed an efficient online/offline heterogeneous signcryption scheme that met the security objectives of confidentiality, integrity, authentication, and nonrepudiation in a single logical step. In particular, its structure enabled a sensor node in an IBC configuration to send a message to an Internet host in a PKI, thereby reducing the rigorous verification demands on low-power devices. However, the proposed method was computationally expensive due to the ECC operation, which is difficult for a drone to execute. Ali et al. [25] introduced a hybrid signcryption technique that satisfied the security requirements for heterogeneous vehicle-to-infrastructure (V2I) communications in a single logical step. The scheme permitted the secure communication of safety messages from a vehicle to a roadside device using PKI. The basis of the proposed solution was ECC, which incurred lower communication and computation costs. Pan et al. [26] presented a heterogeneous signcryption system that enabled drones to communicate with a GS without a bilinear pairing operation. In the scheme proposed by Pan et al. [26], the drones belonged to IBC and the GS to PKI. The proposed scheme safeguarded the identity of drones and enabled the GS to verify batches. Due to its limited processing capabilities, bilinear pairing is computationally costly for drones to complete. In order to overcome these restrictions, we proposed a conditional privacy-preserving heterogeneous signcryption scheme for IoD that leveraged HECC operation, an improved version of ECC with short keys. The proposed method offered the same level of security as existing systems while incurring minimal computational and communication costs.

3. Preliminaries

This section provides the preliminaries, which included the network model, elliptic curve cryptography, the basics of the hyperelliptic curve (HEC) as well as the associated difficult problems (i.e., the hyperelliptic curve Diffie–Hellman problem (HECDHP) and the hyperelliptic curve discrete logarithm problem (HECDLP)), and the syntax of the proposed scheme. Table 1 illustrates the notations used in the construction of the proposed scheme.

Table 1.

Notation table.

S.No Notation Descriptions
1 PKGC The private key generation center
2 Ø A security parameter of HEC with a size of 80 bits
3 µPKGC The private key of PKGC
4 ΥPKGC The public key of PKGC
5 fn A finite field with order q=80 bits
6 Belongs to symbol
7 HEC Genus 2 hyperelliptic curve
8 P Devisor of genus 2
9 Ha1, Ha2,Ha3 Hash functions with sizes of 256 bits
10 DroneRID The real identity of the drone
11 DroneEID The encrypted identity of the drone
12 ESKsec The encryption function, which was used to encrypt the real identity of the Drone
13 DSKsec The decryption function, which was used to recover the real identity of the Drone
14 SKsec The secret key, which was used to encrypt and decrypt the messages between the Drone and the PKGC
15 PKDrone The private key of the Drone
16 λEVTG The private key of the device that belonged to EVTG
17 σEVTG The public key of the device that belonged to EVTG
18 k The secret key that was used to encrypt and decrypt the messages between the Drone and the EVTG
19 Ek The encryption function, which was used to encrypt the message of the Drone
20 Dk The decryption function, which was used to recover the message of the Drone

3.1. Network Model

Figure 1 depicts the network model for the proposed scheme, which consisted of three clusters: Drones, the PKGC, and Everything. The Drones were equipped with cameras, inertial measurement units (IMUs), sensors, and a Global Positioning System (GPS) that could be used in a variety of scenarios. When the Drones wanted to communicate with a device in Everything’s cluster, they sent a request to the PKGC along with their encrypted identity and public and private keys. Further, upon the request of a Drone’s device, the PKGC would generate the private and public keys and send them to the Drone’s device in an encrypted format. By using the received private and public messages, a Drone’s device would generate signcryption on some messages and send the signcrypted text to a device belonging to the Everything cluster. After receiving the signed encrypted text, the device joins the cluster and generated its public and private keys before sending a request for certification to the PKGC. When the PKGC received a request, it generated a certificate and sent it to the device that was shared by all devices in the Everything cluster. By using its private key and the Drone’s public key, a device belonging to the Everything cluster could verify a signature and recover a message. Note that all possible nodes such as GSs, APs, mobile phones, and vehicles on the ground could be included in the Everything cluster. Nonetheless, we only took the GSs into consideration in the proposed network model. The GSs could provide Internet access to the Drones. The Drones used 5G and Wi-Fi wireless technology to connect to the GSs. The drones could communicate with the GSs through 5G and with each other via Wi-Fi. Utilizing the best features of both technologies was important to the hybridization process.

Figure 1.

Figure 1

Network model of the proposed scheme.

3.2. Hyperelliptic Curve (HEC) and Difficult Mathematics Problems

In this subsection, we will cover the basics of the hyperelliptic curve (HEC) as well as the difficult problems; i.e., the hyperelliptic curve Diffie–Hellman problem (HECDHP) and the hyperelliptic curve discrete logarithm problem (HECDLP).

  • Hyperelliptic Curve (HEC): This is a special form of ECC with genus (g)  2 that employs 80-bit keys and parameters to generate ciphertext and signatures with the same level of security as ECC. A standard equation for HEC over a finite field (fn) is as follows: w2+h(a)w=f(a) mod n; h(a) F(a) represents a polynomial with degree h(a)  (g) and f(a)  F(a) represents a monic polynomial with degree f(a) 2(g)+1. Here, the central idea is to construct a Jacobian group and pick its generator, known as the devisor.

  • Hyperelliptic Curve Diffie–Hellman Problem (HECDHP): Assuming the primary parameters for the HECDHP are (,ν,(Z=·ν·P)), the attacker’s goal, with the help of the challenger, is to extract and ν from Z.

  • Hyperelliptic Curve Discrete Logarithm Problem (HECDLP): Assuming (,(Z=·P)) are the main parameters for the HECDLP, the attacker’s goal, with the help of the challenger, is to extract from Z.

3.3. Syntax

The syntax of the proposed scheme consisted of the five algorithms listed below:

  • Setup: When the private key generation center (PKGC) receives Ø as a security parameter, it sets µPKGC as its private key and ΥPKGC as a public key. Moreover, it makes ξPKGC a param.

  • IBC Key Generation for Drone : Here, first Drone computes (δDrone, SKsec,DroneEID) and sends (DroneEID,δDrone) to the PKGC through an insecure channel. The PKGC then computes the secret key SKsec, DroneRID, βDrone, and π1. The PKGC also computes the private key for Drone (PKDrone) and Ψ. PKGC sends Ψ to Drone in an open network. The Drone can recover (PKDrone,βDrone) from (Ψ) later.

  • PKI Key Generation for Everything (EVTG): A device that belongs to the EVTG can play the role of receiver and sets λEVTG as its private key and computes σEVTG as its public key.

  • Heterogeneous Signcryption (HS): This step is initiated by the Drone to generate and send (SDrone, χDrone, CDrone) to the EVTG.

  • Heterogeneous Unsigncryption (HUS): A device that belong to EVTG can play the role of receiver and can verify and decrypt (SDrone, χDrone, CDrone ).

4. Construction of the Proposed Scheme

The construction of the proposed scheme included the following steps.

  1. Setup: When the PKGC receives Ø as a security parameter, it then performs the following steps:
    • Selects µPKGC  randomly, where µPKGCfn  and sets it as its private key;
    • Computes ΥPKGC=µPKGC·P and sets it as its private key, where P is the devisor on HECC;
    • Chooses hash functions Ha1 , Ha2, and Ha3, with a 256-bit size;
    • Sets ξPKGC={Ha1, Ha2,Ha3,ΥPKGC,P,fn,HEC} as a param for further processing of the proposed scheme and the PKGC shares it openly.
  2. IBC Key Generation for Drone: Here, first Drone selects (DroneRID ) as its real identity and selects ζDronefn,  computes δDrone=ζDrone·P, SKsec=ζDrone·ΥPKGC, encrypts DroneRID as DroneEID=ESKsec(DroneRID), and sends (DroneEID,δDrone) to the PKGC through an insecure channel. When (DroneRID,δDrone) sends to the PKGC, it computes the secret key SKsec as SKsec=δDrone·µPKGC, recovers DroneRID as DroneRID=DSKsec(DroneEID), selects ηDronefn, computes βDrone=ηDrone·P, and π1=Ha1(βDrone,DroneRID). Then, the PKGC computes the private key for Drone as PKDrone=ηDrone+π1·µPKGC and encrypt (PKDrone,βDrone) as Ψ=ESKsec(PKDrone,βDrone). The PKGC sends Ψ to Drone in an open network, then Drone can recover (PKDrone,βDrone) as (PKDrone,βDrone)=DSKsec(Ψ).

  3. PKI Key Generation for Everything (EVTG): A device that belongs to the EVTG plays the role of receiver, selects λEVTGfn, and computes σEVTG=λEVTG·P.

  4. Heterogeneous Signcryption (HS): This step will be initiated by the Drone to generates HS using the following steps:
    • It selects ρDronefn at random and computes χDrone=ρDrone·P;
    • Computes K=ρDrone·σEVTG and k=Ha2(K, χDrone);
    • Computes CDrone=Ek(m,DroneEID) and π2=Ha3(m, χDrone,DroneEID);
    • Computes SDrone=ρDrone+π2·PKDrone and sends (SDrone,χDrone,CDrone) to the EVTG.
  5. Heterogeneous Unsigncryption (HUS): A device that belongs to the EVTG plays the role of receiver and can generate HUS using the following steps;

    • Computes K=χMUAV·λEVTG and k=Ha2(K, χDrone);

    • Computes (m,DroneEID)=Dk(CDrone) and compares if SDrone·P=χDrone+π2(σEVTG+π1·ΥPKGC) satisfies, where π2=Ha3(m, χDrone,DroneEID) and π1=Ha1(βDrone,DroneRID).

Correctness

The EVTG that plays the role of receiver can generate the secret key (K) for decryption as follows:

K=χDrone·λEVTG=ρDrone·P ·λEVTG=ρDrone ·λEVTG·P=ρDrone ·σEVTG

hence proved.

In addition, EVTG verifies the signature SMUAV=ρMUAV+π2·PKMUAV as follows:

SMUAV·P=χDrone+π2(βDrone+π1·ΥPKGC)=SDrone·P           =(ρDrone+π2·PKDrone)·P=(ρDrone·P+π2·P(PKDrone))           =(ρDrone·P+π2(ηDrone+π1· µPKGC)·P)           =(ρDrone·P+π2(ηDrone·P+π1· µPKGC·P)) )           =( χDrone+π2(βDrone+π1· ΥPKGC))

hence proved.

5. Security Models

In this section, we define the role of two adversary (outsider adversary (OUTADV) and forger (OUTFRGR)) that could break the proposed scheme security aspects such as confidentiality and forgeability. The following two games defined the basic preliminaries for confidentiality security defenses against OUTADV and unforgeability against OUTFRGR.

Game 1 Confidentiality: The proposed IBC-PKI-HS Indistinguishability Against Adaptive Chosen Cyphertext Attacks (IND-CCATK- IBC-PKI-HS) under HECDHP; whether the outsider adversary (OUTADV) with negligible advantages () can solve HECDHP using a challenger CHS was a subroutine.

Setup: By using Ø as a security parameter, the CHS secret key is µPKGC, ξPKGC, and the param ξPKGC is sent to OUTADV.

Phase 1: OUTADV can make the following queries with CHS:

QRYHaiQuery: CHS set the lists (LHai) with some initial values. Upon the query request from OUTADV, CHS checks the corresponding value in LHai; if it exists, then CHS sends the requested value to OUTADV. Otherwise, CHS picks the requested value randomly, updates LHai, and sends it to OUTADV.

Public Key Query (QRYPBK ): Here, we consider two cases for user key generation when OUTADV sends a request for a public key.

Case 1: Upon request of OUTADV for the keys, which belong to identity-based cryptography, CHS transmits βi to OUTADV.

Case 2: Upon request of OUTADV for the keys, which belong to public key infrastructure-based cryptography, CHS transmits σi to OUTADV.

Private Key Query (QRYPRK ): Here, we consider two cases for private key generation when OUTADV requests a private key.

Case 1: Upon request of OUTADV for the private key, which belongs to identity-based cryptography, CHS transmits PKi  to OUTADV.

Case 2: Upon request of OUTADV for the private key, which belongs to public key infrastructure-based cryptography, CHS transmits λi to OUTADV.

Heterogeneous Signcryption Query (QRYHS ): Upon request of OUTADV for the heterogeneous signcryption oracle, CHS transmits (Si,χi,Ci) to OUTADV.

Heterogeneous Unsigncryption Query (QRYHUS ): Upon request of OUTADV for the heterogeneous signcryption oracle, CHS either returns with plaintext or confirms (Si,  χi,Ci) is invalid.

Challenge: OUTADV sends the triple (m1, m1,DroneRID, IDEVTG) to CHS, which will respond with (Si*,χi*,Ci*) to OUTADV.

Phase 2: OUTADV represents the same nature of queries as made in Phase 1 except for using QRYPRK  for MUAVRID. In addition, OUTADV will not generate a request for plaintext that is related to (Si*,χi*,Ci*).

Guess: OUTADV produces τ/. If τ=τ/, CHS returns a true result; otherwise it returns a false result.

Game 2 Unforgeability (UU-ACMA- IBC-PKI-HS): The proposed IBC-PKI-HS Unforgeable Under Adaptive Chosen Message Attacks (UU-ACMA- IBC-PKI-HS) under HECDLP; whether the Forger (OUTFRGR) with advantages () can solve the HECDLP using a challenger CHS is a subroutine.

Setup: By using Ø as a security parameter, the CHS secret key is µPKGC, ξPKGC, and the param ξPKGC is sent to OUTFRGR.

Phase 1: OUTFRGR can make the following queries with CHS:

QRYHaiQuery: CHS set the lists (LHai) with some initial values. Upon the query request from OUTADV, CHS checks the corresponding value in LHai; if it exists, then CHS sends the requested value to OUTFRGR. Otherwise, CHS picks the requested value randomly, updates LHai, and sends it to OUTFRGR.

Public Key Query (QRYPBK ): Here, we consider two cases for user key generation when OUTFRGR sends a request for a public key.

Case 1: Upon request of OUTFRGR for the keys, which belong to identity-based cryptography, CHS transmits βi to OUTFRGR.

Case 2: Upon request of OUTFRGR for the keys that belong to public key infrastructure-based cryptography, CHS transmits σi to OUTFRGR.

Private Key Query (QRYPRK ): Here, we consider two cases for private key generation when OUTFRGR requests for a private key.

Case 1: Upon request of OUTFRGR for the private key, which belongs to identity-based cryptography, CHS transmits PKi  to OUTFRGR.

Case 2: Upon request of OUTFRGR for the private key, which belongs to public key infrastructure-based cryptography, CHS transmits λi to OUTFRGR.

Heterogeneous Signcryption Query (QRYHS ): Upon request of OUTFRGR for the heterogeneous signcryption oracle, CHS transmits (Si,χi,Ci) to OUTFRGR.

Forgery: OUTFRGR can generate a forge signcryption (Si*,χi*,Ci*) if the following steps are successfully completed:

  • Step 1: QRYPRK CHS succeeds.

  • Step 2: QRYHUS CHS succeeds.

  • Step 3: All the queries are successful in target identity.

6. Security Analysis

In this part, we demonstrate that the proposed scheme was secure against confidentiality and unforgeability breaches under the random oracle model (ROM).

Theorem 1. 

Confidentiality (IND-CCATK- IBC-PKI-HS).

The proposed IBC-PKI-HS Indistinguishability Against Adaptive Chosen Cyphertext Attacks (IND-CCATK- IBC-PKI-HS) was under the HECDHP. Whether the outsider adversary (OUTADV) with advantages () could solve the HECDHP using a challenger CHS was a subroutine. The following is the success advantage of CHS in which it can solve HECDHP for OUTADV:

Prob(CHS success)=(1QRYPRKQRYPBK)(112Ø )(1QRYPBKQRYPRK), 

where QRYPBK is the public key query and QRYPRK is the private key query.

Proof: 

Suppose (,ν,(Z=·ν·P)) is the HECDHP: the task of OUTADV with the help of CHS is to extract and ν from Z by using the following steps:

Setup: By using Ø as a security parameter, CHS secret key as µPKGC, public key ΥPKGC, ξPKGC, and send ΥPKGC and ξPKGC to OUTADV.

Phase 1: OUTADV can make the following queries with CHS.

QRYHa1Query: CHS sets a list (LHa1) with tuple (βi,DroneRIDi,π1i). Upon the query request from OUTADV, CHS checks the value π1i in LHa1; if π1i exists, then CHS sends π1i to OUTADV. Otherwise, CHS picks the value π1i randomly, updates LHa1, and sends π1i to OUTADV.

QRYHa2Query: CHS sets a list (LHa2) with tuple (Ki, χi,ki). Upon the query request from OUTADV, CHS checks the value ki in LHa2; if ki  exists, then CHS sends ki to OUTADV. Otherwise, CHS picks the value ki randomly, updates LHa2, and sends ki to OUTADV.

QRYHa3Query: CHS sets a list (LHa3) with tuple (mi, χi,DroneEIDi). Upon the query request from OUTADV, CHS checks the value π2i in LHa3; if π2i exists, then CHS sends π2i to OUTADV. Otherwise, CHS picks the value π2i randomly, updates LHa3, and sends π2i to OUTADV.

Public Key Query (QRYPBK ): Here, we consider two cases for user key generation when OUTADV asks for this query.

Case 1: Upon request of OUTADV for the keys that belong to identity-based cryptography, CHS checks the tuple (βi,DroneRIDi) in list Lpbk; if it is found, CHS transmits βi to OUTADV. Otherwise, at the jth query, CHS computes βi=·P. Further, CHS checks if i j, then computes βi=ηi·P, where ηi is randomly selected number. Then, CHS updates the list Lpbk and sends βi to OUTADV.Case 2: Upon request of OUTADV for the keys that belong to public key infrastructure-based cryptography, CHS checks the tuple (σi,IDi) in list Lcuk; if it is found, CHS transmits σi to OUTADV. Otherwise, CHS computes σi=·P, updates the list Lcuk, and sends σi to OUTADV.Private Key Query (QRYPRK ): Here, we consider two cases for private key generation when OUTADV asks for this query. Case 1: Upon request of OUTADV for the private key that belongs to identity-based cryptography, CHS checks if DroneRIDi=Dronetarget, then aborts this game. Otherwise, it finds the tuple (βi,DroneRIDi, PKi) in list Lprk and transmits PKi to OUTADV.

Case 2: Upon request of OUTADV for the private key that belongs to public key infrastructure-based cryptography, CHS checks if IDi=IDtarget, then aborts this game. Otherwise, it finds the tuple (σi,IDi, λi) in the list Lprk, and transmits λi to OUTADV.

Heterogeneous Signcryption Query (QRYHS ): Upon request of OUTADV for the heterogeneous signcryption oracle with tuple (DroneRID,m, IDEVTG), where RID is the identity of Drone, m is the plaintext, and IDEVTG is the identity of the EVTG. Then, CHS performs the following steps when DroneRIDiIDtarget:

  • Selects ρi,π2ifn at random and computes  χi=ρi·P;

  • Computes K=ρi·σi and extracts ki from LHa2;

  • Computes Ci=Eki(m,DroneEID) and selects Sifn;

  • Sends (Si,χi,Ci ) to OUTADV.

Heterogeneous Unsigncryption Query (QRYHUS ): Upon request of OUTADV for the heterogeneous signcryption oracle, CHS checks if IDEVTGIDtarget and performs the following steps:

  • Computes K=χDrone·λEVTG and π2=Ha2(K, χDrone);

  • Computes (m,DroneEID)=Dk(CDrone) and compares to determine if SDrone·P=χDrone+π2(σEVTG+π1·ΥPKGC) satisfied, where π2=Ha3(m, χDrone,DroneEID) and π1=Ha1(βDrone,DroneRID).

Otherwise, CHS confirms that (Si, χi, Ci) is invalid.

Challenge: OUTADV sends the triple (m1, m1,DroneRID, IDEVTG) to CHS, where (m1, m1) are the two messages with equal lengths but different contents, and (DroneRID, IDEVTG) is the identity of Drone and the EVTG. After this, CHS checks whether IDEVTGIDtarget and performs the following steps:

  • Selects τ {0, 1} and chooses ρi,ν,kfn;

  • Computes  χi=ν·P and K=ρi+Z;

  • Computes Ci=Ek(m) and π2=Ha3(m, χDrone,DroneEID);

  • Computes Si=ρi+ν+π2·PKDrone and sends (Si*,χi*,Ci*) to OUTADV.

Phase 2. OUTADV uses the same nature of queries as made in Phase 1 except using QRYPRK  for DroneRID. In addition, OUTADV will not generate a request for plaintext that is related to (Si*,χi*,Ci*).

Guess: OUTADV produced τ/. If τ=τ/, CHS returns a true result; otherwise it returns a false result. If Z=·ν·P, then (Si*,χi*,Ci*) is not valid.

Probability Analysis: The following are some events in which CHS will not fail:

  • Event 1 (1): QRYPRK CHS succeeds, and the probability as (1QRYPRKQRYPBK)

  • Event 2 (2): QRYHUS CHS succeeds, and the probability as (112Ø)

  • Event 3 (3): The challenge phase succeeds, and the probability is (1QRYPBKQRYPRK)

So, the following results can be obtained:

Prob(1)=(1QRYPRKQRYPBK), Prob(2)=(112Ø), Prob(3)=(1QRYPBKQRYPRK)
Prob(CHS success)=Prob(123)=Prob(1)·Prob(2)·Prob(3)
Prob(CHS success)=(1QRYPRKQRYPBK)(112Ø )(1QRYPBKQRYPRK)

Theorem 2. 

Unforgeability (UU-ACMA- IBC-PKI-HS).

The proposed IBC-PKI-HS Unforgeable Under Adaptive Chosen Message Attacks (UU-ACMA- IBC-PKI-HS) was under the HECDLP. Whether the Forger (OUTFRGR) with advantages () could solve the HECDLP using a challenger CHS was a subroutine. The following is the success advantage of CHS in which it could solve the HECDLP for OUTFRGR:

Prob(CHS success)=(1QRYPRKQRYPBK)(112Ø )(1QRYPBKQRYPRK), 

where QRYPBK is the public key query and QRYPRK is the private key query.

Proof: 

Suppose (,(Z=·P)) is the HECDLP: the task of OUTFRGR with the help of CHS is to extract from Z by using the following steps.

Setup: By using Ø as a security parameter, CHS secret key as µPKGC, public key ΥPKGC, ξPKGC, and send ΥPKGC and ξPKGC to OUTFRGR.

Queries:OUTFRGR can make the same queries with CHS as used in the confidentiality Game.

Forgery: OUTFRGR can generate a forge signcryption (Si*,χi*,Ci*) if the following computations are successfully done:

  • The CHS must be the original value for ρMUAV; this is only possible if it obtains the solution for Z=·P

  • In addition, CHS must be the original value for PKMUAV; this is only possible if it obtains the solution for Z=·P during the public key query (QRYPBK ) and the private key query (QRYPRK ) or it can access the exact value from list Lprk.

  • It can also extract the exact value as used in the heterogeneous signcryption algorithm for π2 from a list (LHa3).

  • It can extract the exact value as used in the heterogeneous signcryption algorithm for k from a list (LHa2).

Probability Analysis: The following are some events in which CHS will not fail:

  • Event 1 (1): QRYPRK CHS succeeds, and the probability is (1QRYPRKQRYPBK)

  • Event 2 (2): QRYHUS CHS succeeds, and the probability is (112Ø)

  • Event 3 (3): The challenge phase succeeds, and the probability is (1QRYPBKQRYPRK)

So, the following results can be obtained:

Prob(1)=(1QRYPRKQRYPBK), Prob(2)=(112Ø), Prob(3)=(1QRYPBKQRYPRK)
Prob(CHS success)=Prob(123)=Prob(1)·Prob(2)·Prob(3)
Prob(CHS success)=(1QRYPRKQRYPBK)(112Ø )(1QRYPBKQRYPRK)

Theorem 3. 

Sender Anonymity.

The proposed IBC-PKI-HS resists against the disclosure of the sender’s identity under the hardiness of the HECDLP.

Proof: 

In the proposed scheme, the Drone device selects (DroneRID) as its real identity, selects ζDronefn, computes δDrone=ζDrone·P, SKsec=ζDrone·ΥPKGC, encrypts DroneRID as DroneEID=ESKsec(DroneRID), and sends (DroneEID,δDrone) to the PKGC through an insecure channel. When (DroneRID,δDrone) sends to the PKGC, it computes the secret key SKsec as SKsec=δDrone·µPKGC, recovers DroneRID as DroneRID=DSKsec(DroneEID), selects ηDronefn, computes βDrone=ηDrone·P, and π1=Ha1(βDrone,DroneRID). Here, the Drone device acts as a sender and if OUTADV wants the real identity DroneRID of Drones, then it must reveal the secret key SKsec=ζDrone·ΥPKGC. To do so, it needs the value ζDrone from δDrone=ζDrone·P that is equal to solve the HECDLP, which is infeasible for OUTADV.□

Theorem 4. 

Receiver Anonymity.

The proposed IBC-PKI-HS resists against the disclosure of the receiver’s identity.

Proof: 

We did not use the receiver identity in any communication process, so our proposed scheme provided receiver anonymity.□

7. Performance Comparison

This section compares the performance of the proposed scheme with the relevant existing counterparts proposed by Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26] based on the security properties, computation cost, and communication cost.

7.1. Security Properties Comparison

In this section, we made a comparison regarding the security properties between the proposed scheme and those of Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26]. The comparison was made using Table 2, in which we included the security properties such as the confidentiality, unforgeability, sender’s anonymity, receiver’s anonymity, and needing a secure channel. Further, if a scheme obeyed the security properties, we indicated “Yes” or vice versa. Moreover, if the scheme security analysis section did not include an explanation of the security properties, we indicated “Not Mentioned.” The proposed scheme provided all the security requirements that are used in Table 1, while the schemes used in Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26] did not provide a secure-channel-free environment for the distribution of a private key between a user and the PKGC. In addition, the schemes used in Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26] did not explain the security requirements for sender and receiver anonymity.

Table 2.

Comparison of security properties.

Schemes Confidentiality Unforgeability Sender Anonymity Receiver Anonymity Needing Secure Channel
Ali et al. [21] Yes Yes Not Mentioned Not Mentioned No
Jin et al. [23] Yes Yes Not Mentioned Not Mentioned No
Ting et al. [24] Yes Yes Not Mentioned Not Mentioned No
Ali et al. [25] Yes Yes Not Mentioned Not Mentioned No
Pan et al. [26] Yes Yes Not Mentioned Not Mentioned No
Proposed Scheme Yes Yes Yes Yes Yes

7.2. Computation Costs

The computation costs represented the operational expenses consumed by each user during the proposed scheme and the existing comparable schemes proposed by Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26]. Table 3 lists the key operations of the proposed scheme, which included bilinear-pairing-based multiplication (BPM), exponentials (EX), elliptic curve point multiplication (EM), hyperelliptic curve point multiplication (HEM), and bilinear pairing operations (PR).

Table 3.

Comparison of computation costs with major operations.

Schemes Signcryption Unsigncryption Total
Ali et al. [21] 3 BPM + 1 EX 1 BPM + 2 PR 4 BPM + 1 EX + 2 PR
Jin et al. [23] 3 BPM 1 BPM + 3 PR 4 BPM + 3 PR
Ting et al. [24] 4 EM 4 EM 8 EM
Ali et al. [25] 3 EM 2 EM 5 EM
Pan et al. [26] 3 EM 3 EM 6 EM
Proposed scheme 3 HEM 4 HEM 7 HEM

Table 4 contains the operating expenses as measured in milliseconds (ms) for the proposed scheme as well as those of Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26]. The time requirements for a single BPM were 4.31 ms; EX, 1.25 ms; EM, 0.97 ms; HEM, 0.48 ms; and PR, 14.90. The Multi-Precision Integer and Rational Arithmetic C Library (MIRACL) [27] was used to assess the performance of the proposed scheme by testing the runtime of the core cryptographic operations up to 1000 times. Observations were made on a workstation with the following specifications: 8 GB RAM and the Windows 7 Home Basic 64-bit operating system [28]. As seen in Figure 2, the proposed scheme had a lower computation cost than the schemes proposed by Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26].

Table 4.

Comparison of computation costs (in ms).

Schemes Signcryption Unsigncryption Total
Ali et al. [21] 14.18 34.11 48.29
Jin et al. [23] 12.93 49.01 61.94
Ting et al. [24] 3.88 3.88 7.76
Ali et al. [25] 2.91 1.94 4.85
Pan et al. [26] 2.91 2.91 5.82
Proposed Scheme 1.44 1.92 3.36

Figure 2.

Figure 2

Comparison of computation costs (in ms).

7.3. Communication Costs

In this subsection, the proposed scheme is compared to the existing schemes; namely, those proposed by Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26] in terms of the communication costs. We listed the communication costs incurred based on the elliptic curve parameter size (|ECC q|), bilinear pairing parameter size (|BP G|), and a message size (|m|) for the proposed scheme and those of Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26]. We selected the bit values for the bilinear pairing group size (|G|=1024 bits), elliptic curve parameter size (|q| = 160 bits), hyperelliptic curve parameter size (|n| = 80 bits), and message size (|m| = 1024 bits).

In addition, the communication cost analysis between the schemes of Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], Pan et al. [26] and the proposed scheme are provided in Table 5. As seen in Figure 3, the proposed scheme had a lower communication cost than the schemes proposed by Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26].

Table 5.

Comparison of communication costs (in bits).

Schemes Signcrypted Text Tuple Signcrypted Text in Bits
Ali et al. [21] |m|+3|G| |1024|+3*|1024| = 4096
Jin et al. [23] |m|+2|G| |1024|+2*|1024| = 3072
Ting et al. [24] |m|+4|q| |1024|+4*|160| = 1664
Ali et al. [25] |m|+2|q| |1024|+2*|160| =1344
Pan et al. [26] |m|+2|q| |1024|+2*|160| = 1344
Proposed Scheme |m|+2|n| |1024|+2*|80| = 1184

Figure 3.

Figure 3

Comparison of communication costs (in bits).

8. Conclusions

In this article, we proposed a heterogeneous signcryption scheme with an option for conditional privacy. In the proposed scheme, drones employed identity-based cryptography (IBC) while the ground station (GS) used the public key infrastructure (PKI). The proposed scheme was built on the hyperelliptic curve cryptosystem (HECC), and its security robustness was assessed using the random oracle model (ROM). In addition, we introduced a new idea in IBC for the proposed method in which the PKGC communicated the private key to drones in an encrypted format that did not require a secure channel. A complete investigation of the ROM’s security revealed that the proposed scheme was resistant to a variety of threats. In terms of the computation and communication costs, when comparing the proposed scheme to comparable schemes described by Ali et al. [21], Jin et al. [23], Ting et al. [24], Ali et al. [25], and Pan et al. [26], the results indicated that the proposed scheme was more cost-effective than the existing options in terms of the computation and communication costs. In addition, the findings indicated that the proposed scheme was suitable for IoD systems due to the algorithm’s functionality and decreased computation and communication costs.

In future work, we intend to improve the proposed scheme so that it provides digital signatures and encryption not only simultaneously but also independently as based on application needs. In addition, we want to use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to double-check the security toughness of the proposed scheme.

Author Contributions

Conceptualization, M.A.K. and I.U; Methodology, I.U., M.A.K., S.A.H.M. and A.M.A.; Software, A.M.A., S.A.H.M. and F.N.; Validation, M.A.K., F.N. and I.U.; Formal analysis, I.U. and M.A.K.; Investigation, I.U. and M.A.K.; Resources, M.A.K., S.A.H.M. and A.M.A.; Data curation, M.A.K. and S.A.H.M.; Writing—original draft preparation, M.A.K., S.A.H.M., F.N. and A.M.A.; Writing—review and editing, F.N., M.A.K. and A.M.A.; Visualization, A.M.A.; Supervision, M.A.K. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

This research received no external funding.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Gharibi M., Boutaba R., Waslander S.L. Internet of drones. IEEE Access. 2016;4:1148–1162. doi: 10.1109/ACCESS.2016.2537208. [DOI] [Google Scholar]
  • 2.Huang H., Savkin A.V. Towards the internet of flying robots: A survey. Sensors. 2018;18:4038. doi: 10.3390/s18114038. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Abualigah L., Diabat A., Sumari P., Gandomi A.H. Applications, deployments, and integration of internet of drones (iod): A review. IEEE Sens. J. 2021;21:25532–25546. doi: 10.1109/JSEN.2021.3114266. [DOI] [Google Scholar]
  • 4.Khan M.A., Ullah I., Alsharif M.H., Alghtani A.H., Aly A.A., Chen C.M. An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones. Secur. Commun. Netw. 2022;2022:9718580. doi: 10.1155/2022/9718580. [DOI] [Google Scholar]
  • 5.Choudhary G., Sharma V., Gupta T., Kim J., You I. Internet of drones (IoD): Threats vulnerability and security perspectives. arXiv. 20181808.00203 [Google Scholar]
  • 6.Guo Y., Wu M., Tang K., Tie J., Li X. Covert Spoofing Algorithm of UAV Based on GPS/INS-Integrated Navigation. IEEE Trans. Veh. Technol. 2019;68:6557–6564. doi: 10.1109/TVT.2019.2914477. [DOI] [Google Scholar]
  • 7.Eldosouky A.R., Ferdowsi A., Saad W. Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing. IEEE Internet Things J. 2020;7:2840–2854. doi: 10.1109/JIOT.2019.2963337. [DOI] [Google Scholar]
  • 8.Arteaga S.P., Hernandez L.A.M., Perez G.S., Orozco A.L.S., Villalba L.J.G. Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo. IEEE Access. 2019;7:51782–51789. doi: 10.1109/ACCESS.2019.2911526. [DOI] [Google Scholar]
  • 9.Zheng Y. Annual International Cryptology Conference. Springer; Berlin/Heidelberg, Germany: 1997. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption) pp. 165–179. [Google Scholar]
  • 10.Han Y., Yang X., Wei P., Wang Y., Hu Y. ECGSC: Elliptic curve based generalized signcryption; Proceedings of the Third International Conference Ubiquitous Intelligence and Computing, Volume 4159 of Lecture Notes in Computer Science; Wuhan, China. 3–6 September 2006; Berlin/Heidelberg, Germany: Springer; 2006. pp. 956–965. [Google Scholar]
  • 11.Wang L., Zhang G., Ma C. A Secure Ring Signcryption Scheme for Private and Anonymous Communication; Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007); Dalian, China. 18–21 September 2007; pp. 107–111. [Google Scholar]
  • 12.Karati A., Islam S.H., Biswas G.P., Alam Bhuiyan Z., Vijayakumar P., Karuppiah M. Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments. IEEE Internet Things J. 2018;5:2904–2914. doi: 10.1109/JIOT.2017.2741580. [DOI] [Google Scholar]
  • 13.Xiong H., Hou Y., Huang X., Zhao Y., Chen C.-M. Heterogeneous Signcryption Scheme from IBC to PKI With Equality Test for WBANs. IEEE Syst. J. 2021;16:2391–2400. doi: 10.1109/JSYST.2020.3048972. [DOI] [Google Scholar]
  • 14.Khan M.A., Shah H., Rehman S.U., Kumar N., Ghazali R., Shehzad D., Ullah I. Securing Internet of Drones with Identity-Based Proxy Signcryption. IEEE Access. 2021;9:89133–89142. doi: 10.1109/ACCESS.2021.3089009. [DOI] [Google Scholar]
  • 15.Boccadoro P., Striccoli D., Grieco L.A. Internet of Drones: A Survey on Communications, Technologies, Protocols, Architectures and Services. arXiv. 20202007.12611 [Google Scholar]
  • 16.Yahuza M., Idris M.Y.I., Bin Ahmedy I., Wahab A.W.B.A., Nandy T., Noor N.M., Bala A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access. 2021;9:57243–57270. doi: 10.1109/ACCESS.2021.3072030. [DOI] [Google Scholar]
  • 17.Khan M.A., Ullah I., Nisar S., Noor F., Qureshi I.M., Khanzada F.U., Amin N.U. An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network. IEEE Access. 2020;8:36807–36828. doi: 10.1109/ACCESS.2020.2974381. [DOI] [Google Scholar]
  • 18.Elkhalil A., Zhang J. Practical heterogeneous signcryption system for vehicular communication in VANETs. Computing. 2022 doi: 10.1007/s00607-022-01114-0. [DOI] [Google Scholar]
  • 19.Sun Y., Li H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 2010;53:557–566. doi: 10.1007/s11432-010-0061-5. [DOI] [Google Scholar]
  • 20.Huang Q., Wong D.S., Yang G. Heterogeneous Signcryption with Key Privacy. Comput. J. 2011;54:525–536. doi: 10.1093/comjnl/bxq095. [DOI] [Google Scholar]
  • 21.Ali I., Lawrence T., Omala A.A., Li F. An Efficient Hybrid Signcryption Scheme with Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs. IEEE Trans. Veh. Technol. 2020;69:11266–11280. doi: 10.1109/TVT.2020.3008781. [DOI] [Google Scholar]
  • 22.Elkhalil A., Zhang J., Elhabob R., Eltayieb N. An efficient signcryption of heterogeneous systems for Internet of Vehicles. J. Syst. Arch. 2021;113:101885. doi: 10.1016/j.sysarc.2020.101885. [DOI] [Google Scholar]
  • 23.Jin C., Chen G., Yu C., Shan J., Zhao J., Jin Y. An efficient heterogeneous signcryption for smart grid. PLoS ONE. 2018;13:e0208311. doi: 10.1371/journal.pone.0208311. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24.Ting P., Tsai J., Wu T. Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network. IEEE Syst. J. 2018;12:2385–2394. doi: 10.1109/JSYST.2017.2730580. [DOI] [Google Scholar]
  • 25.Ali I., Chen Y., Pan C., Zhou A. ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications. IEEE Internet Things J. 2022;9:4435–4450. doi: 10.1109/JIOT.2021.3104010. [DOI] [Google Scholar]
  • 26.Pan X., Jin Y., Wang Z., Li F. A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles. IEEE Internet Things J. 2022;9:19426–19437. doi: 10.1109/JIOT.2022.3167102. [DOI] [Google Scholar]
  • 27.Shamus Sofware Ltd Miracl Library. [(accessed on 2 August 2022)]. Available online: http://github.com/miracl/MIRACL.
  • 28.Zhou C., Zhao Z., Zhou W., Mei Y. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Secur. Commun. Netw. 2017;2017:8405879. doi: 10.1155/2017/8405879. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES