Research Article

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Table 8

Comparison with relevant existing schemes.

SchemesSecurity functionalities
InformalFormal
UICRAFA

Yu et al.’s scheme [13]
Kushwah et al.’s scheme [35]
Wei et al.’s scheme [36]
Shen et al.’s scheme [37]
Zhou et al.’s scheme [39]
Proposed

U: unforgeability, I: integrity, RA: replay attack, FA: formal analysis. The symbol ✓ satisfies the security functionality; ✗ does not satisfy the security functionality.