Department of Computer Science of Engineering, Nitte Meenakshi Institute of Technology (NMIT), Nitte (Deemed to be University), Yelahanka, Bangalore, Karnataka, India.
Unmanned Aerial Vehicle (UAV) is playing an important role in various and diverse applications. UAV networks are designed with the support of efficient communication, secure, and privacy-preserved data exchange particularly for sensitive and mission-critical applications, like defensive surveillance, disaster response, civilian support, and smart city infrastructure. This paper presents an efficient and novel approach for establishing a secure session sharing in UAV networks through a Lattice-based Ring Signature Scheme (LRS). This paper presents a secure and privacy-preserved authentication scheme for large-scale UAV connection network using an Lattice-based Ring Signature Scheme. This technique offers a scalable and efficient solution for drone communication network. The proposed architecture incorporates a layered approach for establishing a strong connection between UAV devices and ground stations for ensuring streamlined data collection and processing. The proposed method has been designed with a strong ring signature scheme based on lattice cryptography. This technique is guaranty to achieve anonymity and authenticity by enabling any drone to sign data without exposing the signer's identity, thereby protecting device privacy. Ground controlling station and UAV operators can verified by using these signatures. The security analysis for the proposed ring signature scheme has been conducted through formal security analysis and this security analysis shows that the proposed scheme resilient to various attacks. The formal security analysis has been conducted by using formal security analysis with the help of game theory concepts by using correctness analysis, unforgeability, and unconditional anonymity. Performance analysis for the proposed technique has been conducted by using execution time analysis making it well-suited for resource-constrained devices, like UAV or Drones, supporting both scalability and security in real-world healthcare scenarios.
Keywords
Unmanned Aerial Vehicles, Session Sharing, Lattice, Ring Signature Scheme, Random Oracle Model, Cyber Defensive System.
J. K. Liu, V. K. Wei, and D. S. Wong, “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Information Security and Privacy, pp. 325–335, 2004, doi: 10.1007/978-3-540-27800-9_28.
X. Li, Y. Mei, J. Gong, F. Xiang, and Z. Sun, “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access, vol. 8, pp. 76765–76772, 2020, doi: 10.1109/access.2020.2987831.
F. Tang, J. Pang, K. Cheng, and Q. Gong, “Multiauthority Traceable Ring Signature Scheme for Smart Grid Based on Blockchain,” Wireless Communications and Mobile Computing, vol. 2021, no. 1, Jan. 2021, doi: 10.1155/2021/5566430.
J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, “Linkable Ring Signature with Unconditional Anonymity,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 157–165, Jan. 2014, doi: 10.1109/tkde.2013.17.
T. Ta et al., “Efficient Unique Ring Signature for Blockchain Privacy Protection,” Information Security and Privacy, pp. 391–407, 2021, doi: 10.1007/978-3-030-90567-5_20.
M. A. Rezazadeh Baee, L. Simpson, X. Boyen, E. Foo, and J. Pieprzyk, “Authentication strategies in vehicular communications: a taxonomy and framework,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, May 2021, doi: 10.1186/s13638-021-01968-6.
P. W. Shor, “Polynomial time algorithms for discrete logarithms and factoring on a quantum computer,” Algorithmic Number Theory, pp. 289–289, 1994, doi: 10.1007/3-540-58691-1_68.
Zhang, J., Bai, W., & Jiang, Z. (2020). On the security of a practical constant-size ring signature scheme.International Journal of Network Security, 22(3), 394–398.
D. Hoang Duong, W. Susilo, and H. T. N. Tran, “A Multivariate Blind Ring Signature Scheme,” The Computer Journal, vol. 63, no. 8, pp. 1194–1202, Nov. 2019, doi: 10.1093/comjnl/bxz128.
C. Baum, H. Lin, and S. Oechsner, “Towards Practical Lattice-Based One-Time Linkable Ring Signatures,” Information and Communications Security, pp. 303–322, 2018, doi: 10.1007/978-3-030-01950-1_18.
W. A. Alberto Torres et al., “Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0),” Information Security and Privacy, pp. 558–576, 2018, doi: 10.1007/978-3-319-93638-3_32.
H. Zhang, F. Zhang, H. Tian, and M. H. Au, “Anonymous Post-Quantum Cryptocash,” Financial Cryptography and Data Security, pp. 461–479, 2018, doi: 10.1007/978-3-662-58387-6_25.
Z. Liu, K. Nguyen, G. Yang, H. Wang, and D. S. Wong, “A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses,” Computer Security – ESORICS 2019, pp. 726–746, 2019, doi: 10.1007/978-3-030-29959-0_35.
W. Beullens, S. Katsumata, and F. Pintore, “Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices,” Advances in Cryptology – ASIACRYPT 2020, pp. 464–492, 2020, doi: 10.1007/978-3-030-64834-3_16.
S. Bouakkaz and F. Semchedine, “A certificateless ring signature scheme with batch verification for applications in VANET,” Journal of Information Security and Applications, vol. 55, p. 102669, Dec. 2020, doi: 10.1016/j.jisa.2020.102669.
J. Liang, J. Huang, Q. Huang, L. Lan, and M. H. A. Au, “A Lattice-Based Certificateless Traceable Ring Signature Scheme,” Information, vol. 14, no. 3, p. 160, Mar. 2023, doi: 10.3390/info14030160.
Z. Zhao, C. Hsu, L. Harn, Z. Xia, X. Jiang, and L. Liu, “Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones,” Cybersecurity, vol. 7, no. 1, Aug. 2024, doi: 10.1186/s42400-024-00247-3.
H. Yu and Z. Lv, “Lattice-based ring signcryption for consortium blockchain,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 7, p. 101602, Jul. 2023, doi: 10.1016/j.jksuci.2023.101602.
Yang, G., Liu, Z., Wong, D. S., Wang, H., & Zhang, F. (2022). Anti-quantum lattice-based ring signature scheme and applications in VANETs. Cluster Computing, 25, 2177–2191. https://doi.org/10.1007/s10586-021-03529-4.
Peng, X., Guo, Y., & Wang, Z. (2022). Efficient lattice-based ring signature scheme without trapdoors for machine learning.Journal of Low Power Electronics and Applications, 12(3), Article 61. https://doi.org/10.3390/jlpea12030061.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani;
Methodology: Hemalatha S, Sugirtha Thayalan and Sudha P;
Software: Medikonda Swapna and Tamilarasi Rajamani;
Data Curation: Hemalatha S, Sugirtha Thayalan and Sudha P;
Writing-Original Draft Preparation: Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani;
Visualization: Hemalatha S, Sugirtha Thayalan and Sudha P;
Investigation: Medikonda Swapna and Tamilarasi Rajamani;
Supervision: Hemalatha S, Sugirtha Thayalan and Sudha P;
Validation: Medikonda Swapna and Tamilarasi Rajamani;
Writing- Reviewing and Editing: Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
Authors thank Reviewers for taking the time and effort necessary to review the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Hemalatha S
School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani, “An Efficient and Privacy Preserved Session Sharing for Unmanned Aerial Vehicle Communication Using Lattice Based Ring Signature Scheme”, Journal of Machine and Computing, vol.6, no.1, pp. 232-241, 2026, doi: 10.53759/7669/jmc202606017.