{"id":"https://openalex.org/W4293428537","doi":"https://doi.org/10.1109/access.2022.3201815","title":"Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System","display_name":"Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4293428537","doi":"https://doi.org/10.1109/access.2022.3201815"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3201815","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3201815","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09867982.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09867982.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073583022","display_name":"Aqsa Rashid","orcid":"https://orcid.org/0000-0003-4151-6372"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Aqsa Rashid","raw_affiliation_strings":["Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077993621","display_name":"Atta ur Rehman Khan","orcid":"https://orcid.org/0000-0003-2930-6508"},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Atta Ur Rehman Khan","raw_affiliation_strings":["College of Engineering and Information Technology, Ajman University, Ajman, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Information Technology, Ajman University, Ajman, United Arab Emirates","institution_ids":["https://openalex.org/I182000528"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073583022"],"corresponding_institution_ids":["https://openalex.org/I929597975"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.1376,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.94608174,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"10","issue":null,"first_page":"91572","last_page":"91587"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8056901097297668},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.662160336971283},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6534973382949829},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6276766657829285},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6064162850379944},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6006342768669128},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.49028995633125305},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.48242053389549255},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4577944874763489},{"id":"https://openalex.org/keywords/battlefield","display_name":"Battlefield","score":0.43921029567718506},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.43627840280532837},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42589670419692993},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25788408517837524},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09073370695114136}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8056901097297668},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.662160336971283},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6534973382949829},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6276766657829285},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6064162850379944},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6006342768669128},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.49028995633125305},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.48242053389549255},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4577944874763489},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.43921029567718506},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.43627840280532837},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42589670419692993},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25788408517837524},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09073370695114136},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3201815","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3201815","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09867982.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:133b1cee5b804ae09c812fadfc0a9909","is_oa":true,"landing_page_url":"https://doaj.org/article/133b1cee5b804ae09c812fadfc0a9909","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 91572-91587 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3201815","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3201815","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09867982.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.7400000095367432}],"awards":[],"funders":[{"id":"https://openalex.org/F4320330328","display_name":"Ajman University","ror":"https://ror.org/01j1rma10"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4293428537.pdf","grobid_xml":"https://content.openalex.org/works/W4293428537.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1967399643","https://openalex.org/W1967531263","https://openalex.org/W1984685140","https://openalex.org/W2090911915","https://openalex.org/W2108558890","https://openalex.org/W2558465299","https://openalex.org/W2601292847","https://openalex.org/W2604096638","https://openalex.org/W2608549194","https://openalex.org/W2611626082","https://openalex.org/W2613748018","https://openalex.org/W2739177276","https://openalex.org/W2744532080","https://openalex.org/W2789746206","https://openalex.org/W2803371618","https://openalex.org/W2807736498","https://openalex.org/W2808182497","https://openalex.org/W2810652557","https://openalex.org/W2907369073","https://openalex.org/W2908495014","https://openalex.org/W2916475373","https://openalex.org/W2990530616","https://openalex.org/W3005560537","https://openalex.org/W3008042380","https://openalex.org/W3013052123","https://openalex.org/W3016231223","https://openalex.org/W3020830239","https://openalex.org/W3027938516","https://openalex.org/W3041547332","https://openalex.org/W3044672935","https://openalex.org/W3048663767","https://openalex.org/W3116506472","https://openalex.org/W3116630206","https://openalex.org/W3116635530","https://openalex.org/W3129921846","https://openalex.org/W3175758351","https://openalex.org/W4206438303","https://openalex.org/W4221096765","https://openalex.org/W4245272718","https://openalex.org/W4284711162","https://openalex.org/W4285305536","https://openalex.org/W4289544758","https://openalex.org/W4291910325"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2610693083","https://openalex.org/W2116285675","https://openalex.org/W3207673621","https://openalex.org/W1533309011","https://openalex.org/W75616540","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W1555715488","https://openalex.org/W4401270465"],"abstract_inverted_index":{"In":[0,87,138],"the":[1,15,21,45,58,77,101,108,122,131,136,154,168,185],"Internet":[2,102],"of":[3,27,70,103,124,171,184,187],"Battlefield":[4,104],"Things":[5,105],"(IoBT),":[6],"users":[7],"and":[8,25,73,98,144,151,166,199],"sensor-equipped":[9],"entities":[10,125],"send":[11],"multiple":[12],"messages":[13,29,188],"to":[14,66,190],"Command":[16],"Control":[17],"Center":[18],"(CCC)":[19],"over":[20],"network.":[22,157],"The":[23,111,158],"authentication":[24,52,119,123],"integrity":[26,143],"these":[28,43],"are":[30,54,64],"crucial":[31],"because":[32,61,126],"if":[33],"an":[34,117],"adversary":[35],"or":[36,41],"malicious":[37],"node":[38],"transmits,":[39],"alters,":[40],"replays":[42],"messages,":[44],"consequences":[46],"will":[47],"be":[48],"disasters.":[49],"Current":[50],"centralized":[51],"systems":[53],"not":[55,115],"suitable":[56],"for":[57,100,107,121,175],"distributed":[59,173],"environment":[60,174],"such":[62],"schemes":[63],"prone":[65],"a":[67,92,172,192],"single":[68],"point":[69],"failure,":[71],"privacy,":[72],"scalability":[74],"issues.":[75],"Moreover,":[76],"high":[78],"communication":[79,197],"overhead":[80,198],"caused":[81],"by":[82],"centralization":[83],"increases":[84],"energy":[85],"consumption.":[86,201],"this":[88],"work,":[89],"we":[90],"propose":[91],"technique":[93,113],"called":[94],"Blockchain-based":[95],"Autonomous":[96],"Authentication":[97],"Integrity":[99],"(BIoBT)":[106],"C3I":[109],"system.":[110],"proposed":[112],"does":[114],"require":[116],"explicit":[118],"channel":[120],"it":[127,140],"is":[128,148,163],"performed":[129],"on":[130,153],"blockchain":[132],"side":[133],"when":[134],"receiving":[135],"data.":[137],"addition,":[139],"provides":[141],"data":[142],"non-repudiation.":[145],"BIoBT":[146,162,177],"prototype":[147],"created,":[149],"deployed,":[150],"tested":[152],"Ethereum":[155],"test":[156],"results":[159],"prove":[160],"that":[161],"efficient,":[164],"cost-effective,":[165],"satisfies":[167],"security":[169],"requirements":[170],"IoBT.":[176],"also":[178],"outperforms":[179],"contemporary":[180],"mechanisms":[181],"in":[182],"terms":[183],"number":[186],"required":[189],"establish":[191],"secure":[193],"channel,":[194],"thereby":[195],"reducing":[196],"resource":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
