Research Article

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Table 7

Percentage reduction in communication cost.

SchemeEquation for evaluating reductionResulting reduction in communication cost (%)

Yu et al.’s scheme [13](|S| + |m|) − (3|Zn| + |m|)/(|S| + |m|)38.28
Kushwah et al.’s scheme [35](|S| + |m|) − (3|Zn| + |m|)/(|S| + |m|)38.28
Wei et al.’s scheme [36](7|S| + |m|) − (3|Zn| + |m|)/(|S| + |m|)84.57
Shen et al.’s scheme [37](4|S| + |m|) − (3|Zn| + |m|)/(|S| + |m|)75.31
Zhou et al.’s scheme [39](|S| + |m|) − (3|Zn| + |m|)/(|S| + |m|)38.28