scholarly journals Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Muhammad Asghar Khan ◽  
Insaf Ullah ◽  
Shibli Nisar ◽  
Fazal Noor ◽  
Ijaz Mansoor Qureshi ◽  
...  

A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentication on part of small UAV remains a far-fetched goal. We aim to address such an issue by proposing an identity-based generalized signcryption scheme. The lightweight security scheme employs multiaccess edge computing (MEC) whereby the primary UAV, as a MEC node, provides offloading to the computationally fragile member UAVs. The scheme is based on the concept of the hyperelliptic curve (HEC), which is characterized by a smaller key size and is, therefore, suitable for small UAVs. The scheme is robust since it offers confidentiality and authentication simultaneously as well as singly. Formal as well as informal security analyses and the validation results, using the Automated Validation for Internet Security Validation and Application (AVISPA) tool, second such notion. Comparative analysis with the existing schemes further authenticates the sturdiness of the proposed scheme. As a case study, the scheme is applied for monitoring crops in an agricultural field. It has been found out that the scheme promises higher security and incurs lower computational and communication costs.

2021 ◽  
pp. 1-12
Author(s):  
Ermioni Qafzezi ◽  
Kevin Bylykbashi ◽  
Phudit Ampririt ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
...  

Vehicular Ad hoc Networks (VANETs) aim to improve the efficiency and safety of transportation systems by enabling communication between vehicles and roadside units, without relying on a central infrastructure. However, since there is a tremendous amount of data and significant number of resources to be dealt with, data and resource management become their major issues. Cloud, Fog and Edge computing, together with Software Defined Networking (SDN) are anticipated to provide flexibility, scalability and intelligence in VANETs while leveraging distributed processing environment. In this paper, we consider this architecture and implement and compare two Fuzzy-based Systems for Assessment of Neighboring Vehicles Processing Capability (FS-ANVPC1 and FS-ANVPC2) to determine the processing capability of neighboring vehicles in Software Defined Vehicular Ad hoc Networks (SDN-VANETs). The computational, networking and storage resources of vehicles comprise the Edge Computing resources in a layered Cloud-Fog-Edge architecture. A vehicle which needs additional resources to complete certain tasks and process various data can use the resources of the neighboring vehicles if the requirements to realize such operations are fulfilled. The proposed systems are used to assess the processing capability of each neighboring vehicle and based on the final value, it can be determined whether the edge layer can be used by the vehicles in need. FS-ANVPC1 takes into consideration the available resources of the neighboring vehicles and the predicted contact duration between them and the present vehicle, while FS-ANVPC2 includes in addition the vehicles trustworthiness value. Our systems take also into account the neighboring vehicles’ willingness to share their resources and determine the processing capability for each neighbor. We evaluate the proposed systems by computer simulations. The evaluation results show that FS-ANVPC1 decides that helpful neighboring vehicles are the ones that are predicted to be within the vehicle communication range for a while and have medium/large amount of available resources. FS-ANVPC2 considers the same neighboring vehicles as helpful neighbors only if they have at least a moderate trustworthiness value ( VT = 0.5). When VT is higher, FS-ANVPC2 takes into consideration also neighbors with less available resources.


2012 ◽  
Vol 6-7 ◽  
pp. 913-918 ◽  
Author(s):  
Ji Zhi Wang ◽  
Ying Long Wang ◽  
Shu Jiang Xu

Many authentication protocols in ad hoc networks are identity based, which means that in order for one node to trust another, it needs to know the other node’s identity. Hence there exists an inherent trade-off between trust and anonymity. We propose an anonymous authentication scheme, where each node, instead of using its real identity, generates a dynamic pseudonym using a one-way hash function. With the help of a CA offline, the scheme can realize the authentication procedure based on discrete logarithms problem. We analyze the security and the anonymity in the scheme, which shows that it is very valid.


Sign in / Sign up

Export Citation Format

Share Document