{"id":"https://openalex.org/W4396506228","doi":"https://doi.org/10.1109/access.2024.3395494","title":"An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion","display_name":"An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396506228","doi":"https://doi.org/10.1109/access.2024.3395494"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3395494","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3395494","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510437.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510437.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042127764","display_name":"Khaista Rahman","orcid":null},"institutions":[{"id":"https://openalex.org/I196431481","display_name":"Isra University","ror":"https://ror.org/04rmz8121","country_code":"PK","type":"education","lineage":["https://openalex.org/I196431481"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Khaista Rahman","raw_affiliation_strings":["Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I196431481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014348689","display_name":"Muhammad Asghar Khan","orcid":"https://orcid.org/0000-0002-1351-898X"},"institutions":[{"id":"https://openalex.org/I191365509","display_name":"Hamdard University","ror":"https://ror.org/01zrv0z61","country_code":"PK","type":"education","lineage":["https://openalex.org/I191365509"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Asghar Khan","raw_affiliation_strings":["Faculty of Engineering Sciences and Technology, Hamdard University, Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-1351-898X","affiliations":[{"raw_affiliation_string":"Faculty of Engineering Sciences and Technology, Hamdard University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I191365509"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035395012","display_name":"Fatemeh Afghah","orcid":"https://orcid.org/0000-0002-2315-1173"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fatemeh Afghah","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"raw_orcid":"https://orcid.org/0000-0002-2315-1173","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045364683","display_name":"Gordana Barb","orcid":"https://orcid.org/0009-0001-4016-4830"},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Gordana Barb","raw_affiliation_strings":["Department of Communications, Politehnica University of Timisoara, Timisoara, Romania"],"raw_orcid":"https://orcid.org/0009-0001-4016-4830","affiliations":[{"raw_affiliation_string":"Department of Communications, Politehnica University of Timisoara, Timisoara, Romania","institution_ids":["https://openalex.org/I3122695212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050280602","display_name":"Nisreen Innab","orcid":"https://orcid.org/0000-0003-4412-7727"},"institutions":[{"id":"https://openalex.org/I134359838","display_name":"Alfaisal University","ror":"https://ror.org/00cdrtq48","country_code":"SA","type":"education","lineage":["https://openalex.org/I134359838"]},{"id":"https://openalex.org/I4391767729","display_name":"Almaarefa University","ror":"https://ror.org/00s3s5518","country_code":null,"type":"education","lineage":["https://openalex.org/I4391767729"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nisreen Innab","raw_affiliation_strings":["Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Riyadh, Saudi Arabia","Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-4412-7727","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I134359838"]},{"raw_affiliation_string":"Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I134359838","https://openalex.org/I4391767729"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113193418","display_name":"Tanveer Ahmed Cheema","orcid":null},"institutions":[{"id":"https://openalex.org/I196431481","display_name":"Isra University","ror":"https://ror.org/04rmz8121","country_code":"PK","type":"education","lineage":["https://openalex.org/I196431481"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Tanveer Ahmed Cheema","raw_affiliation_strings":["Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, School of Engineering and Applied Sciences, Isra University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I196431481"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042127764"],"corresponding_institution_ids":["https://openalex.org/I196431481"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.1781,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77857566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"62750","last_page":"62764"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8392658233642578},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6440639495849609},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5846169590950012},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46707940101623535},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45334482192993164},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4314419627189636},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4160038232803345},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38965290784835815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38743364810943604},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33638960123062134},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25518158078193665}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8392658233642578},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6440639495849609},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5846169590950012},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46707940101623535},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45334482192993164},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4314419627189636},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4160038232803345},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38965290784835815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38743364810943604},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33638960123062134},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25518158078193665}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3395494","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3395494","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510437.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1d80355d969c4c9d9ab25354afe00a33","is_oa":true,"landing_page_url":"https://doaj.org/article/1d80355d969c4c9d9ab25354afe00a33","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 62750-62764 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3395494","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3395494","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510437.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396506228.pdf"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W108218230","https://openalex.org/W149420927","https://openalex.org/W1567573409","https://openalex.org/W2063531831","https://openalex.org/W2132544882","https://openalex.org/W2251608823","https://openalex.org/W2523144375","https://openalex.org/W2566763967","https://openalex.org/W2729223247","https://openalex.org/W2766764374","https://openalex.org/W2768791030","https://openalex.org/W2769996503","https://openalex.org/W2776809775","https://openalex.org/W2799364218","https://openalex.org/W2806378942","https://openalex.org/W2891042463","https://openalex.org/W2937840480","https://openalex.org/W2963874768","https://openalex.org/W3004044421","https://openalex.org/W3005527937","https://openalex.org/W3008017767","https://openalex.org/W3009951551","https://openalex.org/W3015560102","https://openalex.org/W3023178162","https://openalex.org/W3034664369","https://openalex.org/W3097700561","https://openalex.org/W3109853405","https://openalex.org/W3113166045","https://openalex.org/W3114164046","https://openalex.org/W3134720613","https://openalex.org/W3137452861","https://openalex.org/W3170466613","https://openalex.org/W3174306128","https://openalex.org/W3201272818","https://openalex.org/W3211241118","https://openalex.org/W4205176168","https://openalex.org/W4220797620","https://openalex.org/W4224862610","https://openalex.org/W4282970004","https://openalex.org/W4296466707","https://openalex.org/W4297549402","https://openalex.org/W4312427442","https://openalex.org/W4312576847","https://openalex.org/W4312914415","https://openalex.org/W4323059284","https://openalex.org/W4380051865","https://openalex.org/W4390152039"],"related_works":["https://openalex.org/W1534616950","https://openalex.org/W4322486674","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W1988007309"],"abstract_inverted_index":{"UAV":[0,72,140],"networks":[1,73],"have":[2],"gained":[3],"widespread":[4],"recognition":[5],"across":[6],"multiple":[7],"industries":[8],"due":[9],"to":[10,55,82,125,169],"their":[11,53],"remarkable":[12],"adaptability,":[13],"prompting":[14],"a":[15,36,68,102],"fundamental":[16],"transformation":[17],"in":[18,180,228],"operational":[19],"procedures.":[20],"However,":[21],"utilizing":[22],"the":[23,84,111,150,171,174,181,192,205,217],"open":[24],"wireless":[25],"communication":[26,233],"channel":[27],"has":[28],"consistently":[29],"brought":[30],"about":[31],"significant":[32],"privacy":[33],"concerns":[34],"as":[35,129],"prominent":[37],"aspect":[38],"within":[39],"these":[40,63],"networks.":[41,141],"Moreover,":[42],"UAVs":[43],"are":[44],"typically":[45],"equipped":[46],"with":[47,221],"limited":[48],"computing":[49],"capabilities":[50],"that":[51,74],"hinder":[52],"ability":[54],"execute":[56],"complex":[57],"cryptographic":[58],"algorithms.":[59],"In":[60],"light":[61],"of":[62,86,106,110,159,173,216,230],"considerations,":[64],"this":[65],"paper":[66],"proposes":[67],"security":[69,88,124,148,161,172,194],"protocol":[70,144],"for":[71,139,147],"uses":[75],"an":[76],"authentication":[77],"and":[78,135,163,185,208,232],"access":[79],"control":[80],"mechanism":[81],"eliminate":[83],"possibility":[85],"any":[87],"breaches.":[89],"The":[90,142,156,213],"proposed":[91,143,175,218],"scheme":[92,176],"is":[93,145,167],"based":[94,203],"on":[95,204],"hyperelliptic":[96],"curve":[97,117],"cryptography":[98,118],"(HECC),":[99],"which":[100],"employs":[101],"smaller":[103],"key":[104],"size":[105],"80":[107],"bits":[108,113],"instead":[109],"160":[112],"required":[114],"by":[115],"elliptic":[116],"(ECC).":[119],"Remarkably,":[120],"HECC":[121],"offers":[122],"equivalent":[123],"other":[126,222],"methods":[127,224],"such":[128],"RSA,":[130],"ECC,":[131],"bilinear":[132],"pairing,":[133],"etc.,":[134],"is,":[136],"therefore,":[137],"suitable":[138],"evaluated":[146],"using":[149],"well-known":[151],"Real-Or-Random":[152],"(ROR)":[153],"Oracle":[154],"model.":[155],"automated":[157],"validation":[158],"internet":[160],"protocols":[162],"applications":[164],"(AVISPA)":[165],"tool":[166],"employed":[168],"illustrate":[170],"against":[177,200],"adversarial":[178,211],"scenarios":[179],"on-the-fly":[182],"model-checker":[183],"(OFMC)":[184],"constraint-logic-based":[186],"attack":[187],"searcher":[188],"(Cl-AtSe)":[189],"models.":[190,212],"Furthermore,":[191],"informal":[193],"analysis":[195,215],"guarantees":[196],"our":[197],"scheme\u2019s":[198],"robustness":[199],"possible":[201],"attacks":[202],"Canetti-Krawczyk":[206],"(CK)":[207],"Dolev-yao":[209],"(DY)":[210],"comparative":[214],"protocol\u2019s":[219],"performance":[220],"existing":[223],"demonstrates":[225],"its":[226],"strength":[227],"terms":[229],"computation":[231],"costs.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
