| UAVs have been widely used in film shooting,weather monitoring,traffic control,cargo transport,emergency search and rescue and many other fields.They have the characteristics of agility,versatility,low cost,easy-to-deploy and so on.In order to expand the application range of UAVs,the use of multiple drones to perform tasks in coordination has gradually become a research hotspot and application trend.However,since drone networks are vulnerable to passive eavesdropping,data tampering,identity forgery,denial of service,physical capture and other security threats and attacks.Therefore,ensuring the safety of UAV network communication is particularly important for the smooth execution of collaborative tasks.The security requirements that UAV network communication should meet include confidentiality,integrity,authentication,non-repudiation and user revocation.In addition,considering the limited resources of UAV network computing,storage and communication,the security protocol should meet the lightweight requirements.Aiming at the security and efficiency issues in UAV network unicast communication,data distribution and aggregation scenarios,this paper designs a suite of lightweight secure communication protocols,including self-certified unicast secure communication scheme,self-certified secure data distribution and aggregation scheme.The specific work is as follows:Firstly,in order to meet the security and efficiency requirements of UAV network unicast communication scenarios,this paper proposes a self-certified unicast secure communication scheme.The solution uses self-certified signcryption technology and BPV precomputation techniques to reduce the communication and computational overhead of the UAV network.Specifically,this scheme is based on a self-certified public key cryptography,which avoids the problems of certificate management and key escrow,and because there is no need to pass a certificate to verify the authenticity of the public key,it can reduce the communication overhead of the UAV network.In order to reduce the computational cost of UAVs,this paper proposes a scheme based on Four Q and uses BPV precomputation techniques.Under the random oracle model,based on the computational Diffie-Hellman problem and the elliptic curve discrete logarithm problem,the confidentiality and unforgeability of the scheme are securely proved.Security analysis shows that the solution meets the security requirements of this communication scenario;performance analysis and test results show that the solution has obvious advantages in computing efficiency.Secondly,in order to meet the security and efficiency requirements of UAV network data distribution and aggregation communication scenarios,this paper proposes a self-certified secure data distribution and aggregation scheme.The scheme utilizes a random re-use technique to reduce the computational overhead in the data distribution process of the control station and batch verification signature algorithm to speed up the signature verification speed in the UAV data aggregation process.Specifically,in the data distribution process of the control station,the random re-use technique is used to reduce the calculation overhead of the control station and the communication overhead of the drone network;in the process of drone data aggregation,the batch verification signature algorithm is used to speed up the signature verification speed of the control station.Under the random oracle model,based on the computational Diffie-Hellman problem,the deterministic Diffie-Hellman problem and the elliptic curve discrete logarithm problem,the confidentiality and unforgeability of the scheme are securely proved.Security analysis shows that the solution meets the security requirements of this communication scenario;performance analysis and test results show that the random re-use technique can reduce the calculation and communication overhead in the data distribution process of the control station,the batch verification signature algorithm can reduce the computational overhead in the UAV data aggregation process,speed up the signature verification by the control station and shorten the system response time. |