| With the rapid development of unmanned aerial vehicle-aidded remote sensing technology,unmanned aerial vehicles are widely used in various fields.Multiple single unmanned aerial vehicle nodes are connected to form a distributed unmanned aerial vehicle cluster network through communication technology,and the nodes cooperate to complete tedious and complex tasks.Unlike traditional communication modes,each node in a unmanned aerial vehicle cluster network can serve as a starting node and a relay node,directly communicating or collaborating with other nodes to form an autonomous,dynamic,and flexible interconnected network.In order to achieve rapid transmission and real-time response of information in unmanned aerial vehicle networks,efficient communication protocols and message transmission mechanisms need to be established between dynamic and random unmanned aerial vehicle nodes.However,the openness of wireless networks poses serious security threats to information transmission and sharing.Attackers disrupt normal communication connections between unmanned aerial vehicles by interfering with radio signals,eavesdropping and intercepting data packets to obtain unmanned aerial vehicle confidential messages,and sending false instructions by impersonating legal identities to disrupt normal communication in clusters.To ensure the secure transmission of unmanned aerial vehicle cluster data,the contributions of this paper are summarized as follows:(1)To address the security and privacy issues of data collection and transmission in unmanned aerial vehicle assisted data collection scenarios,this paper proposes a certificateless aggregate signcryption(CL-ASC)scheme for unmanned aerial vehicle clusters.The aggregated unmanned aerial vehicles in each cluster can batch verify the collection reports of all reconnaissance unmanned aerial vehicles in their management domain.If the verification is correct,add their own collection reports and transmit them to the ground control station after secondary aggregation.The ground control station can also verify the aggregation report generated by the aggregated unmanned aerial vehicles in each cluster,confirm the authenticity of the data source,obtain the original collected data by decrypting the data ciphertext,and process it in a timely.The scheme can effectively protect the privacy,authenticity,and integrity of collected data,and resist replay attacks and malicious key generation centers.Compared with other scheme,its computational efficiency has certain advantages,and is suitable for resource constrained unmanned aerial vehicles cluster networks.(2)To address the issues of data privacy and data transmission efficiency in traditional intelligent transportation networks,this paper proposes an unmanned aerial vehicle assisted road condition monitoring scheme(RCM)with privacy protection.Trusted agency monitors road traffic conditions with the assistance of relay unmanned aerial vehicles.The patrol unmanned aerial vehicles captures road traffic conditions and authenticates with roadside units in the road section to obtain authorized communication tokens.The relay unmanned aerial vehicles serves as an intermediate processing device for patrol unmanned aerial vehicles and trusted agency,verifying and classifying road condition reports sent by patrol unmanned aerial vehicles,and reporting to trusted institutions only when the number of road condition reports of the same type reaches the emergency warning threshold.This scheme can ensure that authentication requests generated by patrol unmanned aerial vehicles,authentication responses generated by relay unmanned aerial vehicles,and road condition reports are unforgeable,effectively protecting the privacy of road condition data,and resisting replay attacks.Moreover,its computational efficiency is high,and it can better meet practical application requirements. |