{"id":"https://openalex.org/W4387219734","doi":"https://doi.org/10.1007/s40747-023-01232-y","title":"A blockchain authentication scheme for UAV-aided fog computing","display_name":"A blockchain authentication scheme for UAV-aided fog computing","publication_year":2023,"publication_date":"2023-09-30","ids":{"openalex":"https://openalex.org/W4387219734","doi":"https://doi.org/10.1007/s40747-023-01232-y"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-023-01232-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-023-01232-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01232-y.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01232-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061437189","display_name":"Xiaoyu Du","orcid":"https://orcid.org/0000-0001-7314-7642"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyu Du","raw_affiliation_strings":["School of Computer and Information Engineering, Henan University, KaiFeng, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Henan University, KaiFeng, Henan, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062258123","display_name":"Song Tao","orcid":"https://orcid.org/0000-0001-8067-0554"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Tao","raw_affiliation_strings":["Henan Engineering Laboratory of Spatial Information Processing, Henan University, KaiFeng, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Henan Engineering Laboratory of Spatial Information Processing, Henan University, KaiFeng, Henan, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079760696","display_name":"Ke Yuan","orcid":"https://orcid.org/0000-0002-9388-5690"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Yuan","raw_affiliation_strings":["School of Computer and Information Engineering, Henan University, KaiFeng, Henan, China"],"raw_orcid":"https://orcid.org/0000-0002-9388-5690","affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Henan University, KaiFeng, Henan, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102728466","display_name":"Yinyin Li","orcid":"https://orcid.org/0000-0002-3273-1372"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinyin Li","raw_affiliation_strings":["Henan Engineering Laboratory of Spatial Information Processing, Henan University, KaiFeng, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Henan Engineering Laboratory of Spatial Information Processing, Henan University, KaiFeng, Henan, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065562660","display_name":"Yi Zhou","orcid":"https://orcid.org/0000-0001-7657-6100"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zhou","raw_affiliation_strings":["School of Artificial Intelligence Henan University, Henan University, ZhengZhou, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence Henan University, Henan University, ZhengZhou, Henan, China","institution_ids":["https://openalex.org/I173899330"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061437189"],"corresponding_institution_ids":["https://openalex.org/I173899330"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":4.9326,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95560205,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"2","first_page":"1689","last_page":"1702"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8014528751373291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7371369004249573},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6435163617134094},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6057416200637817},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5796241760253906},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5753098130226135},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5683425664901733},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5538182258605957},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5385988354682922},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5203779935836792},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.45158088207244873},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4403287172317505},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4056321978569031},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.39526867866516113},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12143632769584656},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11435875296592712},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08666807413101196}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8014528751373291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7371369004249573},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6435163617134094},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6057416200637817},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5796241760253906},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5753098130226135},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5683425664901733},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5538182258605957},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5385988354682922},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5203779935836792},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.45158088207244873},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4403287172317505},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4056321978569031},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.39526867866516113},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12143632769584656},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11435875296592712},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08666807413101196},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-023-01232-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-023-01232-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01232-y.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:83ebc0739f424765b0d83133e4016c14","is_oa":true,"landing_page_url":"https://doaj.org/article/83ebc0739f424765b0d83133e4016c14","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 10, Iss 2, Pp 1689-1702 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-023-01232-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-023-01232-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01232-y.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4382693246","display_name":null,"funder_award_id":"62176088","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6227727146","display_name":null,"funder_award_id":"222102210007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8697432055","display_name":null,"funder_award_id":"222102210062","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4387219734.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W2003167758","https://openalex.org/W2117806953","https://openalex.org/W2123649966","https://openalex.org/W2190296320","https://openalex.org/W2566763967","https://openalex.org/W2605955588","https://openalex.org/W2738412532","https://openalex.org/W2766496241","https://openalex.org/W2782556342","https://openalex.org/W2786193123","https://openalex.org/W2809215955","https://openalex.org/W2898673200","https://openalex.org/W2901618220","https://openalex.org/W2904779896","https://openalex.org/W2913840322","https://openalex.org/W2937840480","https://openalex.org/W2977433423","https://openalex.org/W3006020290","https://openalex.org/W3008017767","https://openalex.org/W3010401056","https://openalex.org/W3019423257","https://openalex.org/W3034804175","https://openalex.org/W3134498674","https://openalex.org/W3215519659","https://openalex.org/W4210268633","https://openalex.org/W4281718108"],"related_works":["https://openalex.org/W4405734587","https://openalex.org/W2885657717","https://openalex.org/W2892869641","https://openalex.org/W4328007012","https://openalex.org/W4403116621","https://openalex.org/W4365515314","https://openalex.org/W3183865553","https://openalex.org/W3158188878","https://openalex.org/W4205392332","https://openalex.org/W2805260971"],"abstract_inverted_index":{"Abstract":[0],"Unmanned":[1],"Aerial":[2],"Vehicle":[3],"(UAV)":[4],"swarms":[5],"not":[6],"only":[7],"expanded":[8],"the":[9,23,50,57,61,81,115,136,141,150,165,171,175,187,211,214,217,220,227,243],"application":[10],"areas":[11],"of":[12,52,60,65,138,146,152,177,189,198,213,230],"UAVs":[13,27,29,88,102,166,178],"but":[14],"also":[15],"brought":[16],"more":[17],"complex":[18],"challenges":[19],"to":[20,84,97,100,124,161],"security.":[21],"Both":[22],"data":[24],"collected":[25],"by":[26],"and":[28,54,131,163,223],"themselves":[30],"are":[31],"easy":[32],"targets":[33],"for":[34,133,210],"hackers.":[35],"Once":[36],"a":[37,45,109,193],"hacker":[38],"has":[39],"intercepted":[40],"communication":[41],"information":[42,53],"or":[43],"hijacked":[44],"UAV,":[46],"it":[47],"can":[48],"cause":[49],"disclosure":[51],"even":[55],"affect":[56],"normal":[58],"flight":[59],"UAV.":[62],"In":[63,135,184],"terms":[64],"authentication,":[66],"existing":[67],"research":[68],"focuses":[69],"on":[70,114,170],"building":[71],"peer-to-peer":[72],"networks":[73],"through":[74],"devices":[75],"that":[76],"support":[77],"blockchain":[78,86],"deployments":[79],"at":[80,149],"edge":[82,151],"nodes":[83,95,148,157],"form":[85],"networks.":[87],"cannot":[89],"run":[90],"blockchains":[91],"directly,":[92],"so":[93],"fog":[94,116,147,156,181],"need":[96],"be":[98],"introduced":[99],"assist":[101],"in":[103,167,179],"achieving":[104],"authentication.":[105],"This":[106],"paper":[107,218],"proposes":[108],"UAV":[110],"authentication":[111,132,176],"solution":[112,120],"based":[113],"node-assisted":[117],"blockchain.":[118],"The":[119,155],"incorporates":[121],"smart":[122],"contracts":[123],"ensure":[125],"trust,":[126],"along":[127],"with":[128],"on-chain":[129],"registration":[130],"UAVs.":[134,215],"design":[137],"this":[139,185,231],"paper,":[140,186],"main":[142],"use":[143],"is":[144,208,233,239],"made":[145],"each":[153],"block.":[154],"serve":[158],"as":[159],"agents":[160],"register":[162],"authenticate":[164],"their":[168],"area":[169],"blockchain,":[172],"thus":[173],"enabling":[174],"different":[180],"node":[182],"areas.":[183],"analysis":[188],"gas":[190],"consumption":[191],"yields":[192],"total":[194],"economic":[195],"benefit":[196],"cost":[197],"about":[199],"$$\\yen":[200],"$$":[201],"<mml:math":[202],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[203],"<mml:mo>\u00a5</mml:mo>":[204],"</mml:math>":[205],"12.77,":[206],"which":[207,238],"negligible":[209],"safety":[212],"Meanwhile,":[216],"compares":[219],"computational":[221,228],"overheads,":[222],"within":[224],"10":[225],"UAVs,":[226],"overhead":[229],"scheme":[232],"less":[234],"than":[235,242],"50":[236],"ms,":[237],"significantly":[240],"lower":[241],"other":[244],"two":[245],"schemes.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4}],"updated_date":"2026-01-22T23:29:09.771500","created_date":"2025-10-10T00:00:00"}
