Research Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
Table 8
Comparison with relevant existing schemes.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
U: unforgeability, I: integrity, RA: replay attack, FA: formal analysis. The symbol ✓ satisfies the security functionality; ✗ does not satisfy the security functionality. |