{"title":"HCCAS: A hierarchical consensus-based certificateless aggregate signcryption scheme for drone networks","authors":"Junfeng Tian, Zhengping Jiang, Yilun Jin","doi":"10.1016/j.jisa.2025.104260","DOIUrl":null,"url":null,"abstract":"<div><div>Drone networks are dynamic and cooperative networks composed of multiple drones through wireless communication, which are widely used in search and rescue, patrol, and monitoring missions. Although multi-drone collaboration alleviates the limitations of individual drones in terms of computational and communication capabilities, large-scale deployments still face dual challenges of data security and communication efficiency. To address these issues, we propose a hierarchical consensus-based certificateless aggregate signcryption called the HCCAS scheme. Within each local airspace, a drone with superior computational and communication capabilities is elected as a local leader using the PBFT consensus algorithm. This local leader is responsible for aggregating the signcryption from all drones within its region. Subsequently, local leaders elect a global leader via the RAFT consensus algorithm, which transmits the total aggregated signcryption to the ground control station. In addition, HCCAS incorporates a pseudonym validity mechanism to provide conditional identity privacy protection. An efficient forgery localization mechanism based on a two-dimensional array is also designed, significantly reducing the computational overhead during verification. Compared with existing schemes, HCCAS achieves multiple security goals while reducing average computational cost and communication overhead by 52.09% and 39.69%, respectively. These results indicate enhanced adaptability and practicality in resource-constrained environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104260"},"PeriodicalIF":3.7000,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002972","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Drone networks are dynamic and cooperative networks composed of multiple drones through wireless communication, which are widely used in search and rescue, patrol, and monitoring missions. Although multi-drone collaboration alleviates the limitations of individual drones in terms of computational and communication capabilities, large-scale deployments still face dual challenges of data security and communication efficiency. To address these issues, we propose a hierarchical consensus-based certificateless aggregate signcryption called the HCCAS scheme. Within each local airspace, a drone with superior computational and communication capabilities is elected as a local leader using the PBFT consensus algorithm. This local leader is responsible for aggregating the signcryption from all drones within its region. Subsequently, local leaders elect a global leader via the RAFT consensus algorithm, which transmits the total aggregated signcryption to the ground control station. In addition, HCCAS incorporates a pseudonym validity mechanism to provide conditional identity privacy protection. An efficient forgery localization mechanism based on a two-dimensional array is also designed, significantly reducing the computational overhead during verification. Compared with existing schemes, HCCAS achieves multiple security goals while reducing average computational cost and communication overhead by 52.09% and 39.69%, respectively. These results indicate enhanced adaptability and practicality in resource-constrained environments.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.