A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks

  • Wang Hong
  • Li Jianhua
  • Lai ChengzheEmail author
  • Wang Zhe


Providing integrity, non-repudiation and validity for transmitted data is always very attractive in unmanned aerial vehicle cluster networks (UAVCN). Currently, “one by one” data authentication schemes with expensive computations can hardly be applied to a fast data transmission. In order to simultaneously resolve the security and efficiency issues, a novel data aggregate authentication scheme based on the ID-Based encryption, named IBE-AggAuth, is proposed for UAVCN. In the proposed scheme, all kinds of data from different UAVs can be checked by batch verification instead of “one-by-one” verification. In particular, it proves that IBE-AggAuth scheme is the existentially unforgeable security under adaptive chosen message and ID attacks (EUF-CMA), rigorously based on the elliptic curve computational Diffie-Hellman assumption in the random oracle model. The detailed performance evaluations demonstrate that IBE-AggAuth can not only guarantee data security, but also speed up the verification process with reducing computation and communication costs for UAVCN. Moreover, UAVs are allowed to join the data transmission dynamically at any moment, and IBE-AggAuth can be applicable to the de-centralized and self-organized environment of UAVCN.


Aggregate signature Identity-based encryption Unmanned aerial vehicle cluster De-centralized 



The authors acknowledge the support of the National Natural Science Foundation of China (No. 61872293, 61401499, 61174162), and the Innovation Ability Support Program in Shaanxi Province of China (2017KJXX-47).


  1. 1.
    Zhao S, Chen K, Lyu N, Zhao J (2017) Software defined airborne tactical network for aeronautic swarm. J Commun 38(8):140–155Google Scholar
  2. 2.
    He D, Chan S, Guizani M (2017) Communication security of unmanned aerial vehicles. IEEE Wirel Commun 24(4):134–139CrossRefGoogle Scholar
  3. 3.
    Liang Y, Cheng G, Guo X, Zhou A (2016) Research progress on architecture and protocol stack of the airborne network. J Soft 27(1):96–111MathSciNetGoogle Scholar
  4. 4.
    Maxa JA, Mahmoud MSB, Larrieu N (2017) Survey on UAANET routing protocols and network security challenges. Ad-Hoc and Sensor Wireless Netw 37(3):36–42Google Scholar
  5. 5.
    Ramaprasath A, Srinivasan A, Lung CH, St-Hilaire M (2017) Intelligent wireless ad hoc routing protocol and controller for uav networks, vol 184. Springer, BerlinGoogle Scholar
  6. 6.
    Siddiqui KTA, Feilseifer D, Jiang T, Jose S, Liu S, Louis S (2017) Development of a swarm UAV simulator integrating realistic motion control models for disaster operations. In: ASME 2017 dynamic systems and control conferenceGoogle Scholar
  7. 7.
    Zhu X, Liu Z, Yang J (2015) Model of collaborative UAV swarm toward coordination and control mechanisms study. Procedia Comput Sci 51(1):493–502CrossRefGoogle Scholar
  8. 8.
    Weaver JN (2014) Collaborative coordination and control for an implemented heterogeneous swarm of uavs and ugvs. Ph.D. thesis. University of FloridaGoogle Scholar
  9. 9.
    Arbanas B, Ivanovic A, Car M, Orsag M, Petrovic T, Bogdan S (2018) Decentralized planning and control for UAV-UGV cooperative teams. Auton Robot 42(1):1–18CrossRefGoogle Scholar
  10. 10.
    Ho DT, Sujit PB, Johansen TA (2015) Optimization of wireless sensor network and UAV data acquisition. J Intell Robot Syst 78(1):159–179CrossRefGoogle Scholar
  11. 11.
    Zhang T, Yue K, Yao J (2011) A distributed anonymous authentication scheme for Mobile ad hoc network from bilinear maps. In: International conference on mechatronic science, electric engineering and computer, pp 314–318Google Scholar
  12. 12.
    Zhu H, Pan W, Liu B, Li H (2012) A lightweight anonymous authentication scheme for VANET based on bilinear pairing. In: Fourth international conference on intelligent NETWORKING and collaborative systems, pp 222–228Google Scholar
  13. 13.
    Sen J (2013) Security and privacy issues in wireless mesh networks: a survey. Springer, BerlinCrossRefGoogle Scholar
  14. 14.
    Luo H, Zerfos P, Kong J, Lu S, Zhang L (2002) Self-securing ad hoc wireless networks. In: Proceedings of the international symposium on computers and communications, 2002. ISCC, pp 567–574Google Scholar
  15. 15.
    Qiao Z, Liu G, Li J, Dai Y (2013) survey on secure access technology in mobile ad-hoc network. Comput Sci 40(12):1–7Google Scholar
  16. 16.
    Yang T, Kong L, Hu J, Chen Z (2012) Survey on aggregate signature and its applications. J Comput Res Develop 49(2):192–198Google Scholar
  17. 17.
    Dan B, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. Lect Notes Comput Sci 2656(1):416–432MathSciNetzbMATHGoogle Scholar
  18. 18.
    Chen H, Wei S, Zhu C, Yang Y (2015) Secure certificateless aggregate signature scheme. J Soft 26 (5):1173–1179MathSciNetGoogle Scholar
  19. 19.
    Li Y, Nie H, Zhou Y, Yang B (2015) A novel and provably secure certificateless aggregate signature scheme. J Cryptol Res 2(6):526–534Google Scholar
  20. 20.
    Dan B, Franklin M (2003) Identity-based encryption from the weil pairing. Society for Industrial and Applied MathematicsGoogle Scholar
  21. 21.
    Shen L, Ma J, Liu X, Wei F, Miao M (2017) A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J 4(2):546–555CrossRefGoogle Scholar
  22. 22.
    Yanai N (2017) On the tightness of deterministic identity-based signatures. In: Fourth international symposium on computing and NETWORKING, pp 168–173Google Scholar
  23. 23.
    Zhang Y, Zhou D, Li C, Zhang Y, Wang C (2015) Certificateless-based efficient aggregate signature scheme with universal designated verifier. J Commun 36(2):48–55Google Scholar
  24. 24.
    Cheon J, Kim Y, Yoon H (2005) A new ID-based signature with batch verification. Trends Math Inf Center Math Sci 8(1):119–131Google Scholar
  25. 25.
    Gentry C, Ramzan Z (2006) Identity-based aggregate signatures. In: International conference on theory and practice of public-key cryptography, pp 257–273Google Scholar
  26. 26.
    Kar J (2012) Provably secure identity-based aggregate signature scheme. In: International conference on cyber-enabled distributed computing and knowledge discovery, pp 137–142Google Scholar
  27. 27.
    Herranz J (2006) Deterministic identity-based signatures for partial aggregation. Oxford University Press, LondonGoogle Scholar
  28. 28.
    Iwasaki T, Yanai N, Inamura M, Iwamura K (2016) Tightly-secure identity-based structured aggregate signature scheme under the computational diffie-hellman assumption. In: IEEE international conference on advanced information NETWORKING and applications, pp 669–676Google Scholar
  29. 29.
    Lu R, Lin X, Shi Z, Shen X (2013) EATH: an efficient aggregate authentication protocol for smart grid communications. In: 2013 IEEE wireless communications and networking conference (WCNC): NETWORKS, pp 1819–1824Google Scholar
  30. 30.
    Shamir Adi (1984) Identity-based cryptosystems and signature schemes. Lect Notes Comput Sci 196(2):47–53MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Information and Navigation CollegeAir Force Engineering UniversityXi’anChina
  2. 2.Information and Communication CollegeNational University of Defense TechnologyXi’anChina
  3. 3.Xi’an University of Posts and TelecommunicationsXi’anChina

Personalised recommendations