{"id":"https://openalex.org/W4389332378","doi":"https://doi.org/10.1109/icumt61075.2023.10333095","title":"Continuous Authentication in a UAVs Swarm","display_name":"Continuous Authentication in a UAVs Swarm","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4389332378","doi":"https://doi.org/10.1109/icumt61075.2023.10333095"},"language":"en","primary_location":{"id":"doi:10.1109/icumt61075.2023.10333095","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icumt61075.2023.10333095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087480596","display_name":"Sergey Bezzateev","orcid":"https://orcid.org/0000-0002-0924-6221"},"institutions":[{"id":"https://openalex.org/I130523015","display_name":"Saint Petersburg State University of Aerospace and Instrumentation","ror":"https://ror.org/02rsxaa93","country_code":"RU","type":"education","lineage":["https://openalex.org/I130523015"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Sergey Bezzateev","raw_affiliation_strings":["Saint Petersburg University of Aerospace Instrumentations,Department of information security,Saint Petersburg,Russia","Department of information security, Saint Petersburg University of Aerospace Instrumentations, Saint Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Saint Petersburg University of Aerospace Instrumentations,Department of information security,Saint Petersburg,Russia","institution_ids":["https://openalex.org/I130523015"]},{"raw_affiliation_string":"Department of information security, Saint Petersburg University of Aerospace Instrumentations, Saint Petersburg, Russia","institution_ids":["https://openalex.org/I130523015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025812815","display_name":"S. G. Fomicheva","orcid":"https://orcid.org/0000-0003-1284-0915"},"institutions":[{"id":"https://openalex.org/I130523015","display_name":"Saint Petersburg State University of Aerospace and Instrumentation","ror":"https://ror.org/02rsxaa93","country_code":"RU","type":"education","lineage":["https://openalex.org/I130523015"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Svetlana Fomicheva","raw_affiliation_strings":["Saint Petersburg University of Aerospace Instrumentations,Department of information security,Saint Petersburg,Russia","Department of information security, Saint Petersburg University of Aerospace Instrumentations, Saint Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Saint Petersburg University of Aerospace Instrumentations,Department of information security,Saint Petersburg,Russia","institution_ids":["https://openalex.org/I130523015"]},{"raw_affiliation_string":"Department of information security, Saint Petersburg University of Aerospace Instrumentations, Saint Petersburg, Russia","institution_ids":["https://openalex.org/I130523015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087480596"],"corresponding_institution_ids":["https://openalex.org/I130523015"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24161575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"abs/1812. 11794","issue":null,"first_page":"235","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9455999732017517,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9448000192642212,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.8922131061553955},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7234250903129578},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6148974895477295},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5311112999916077},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5243889689445496},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.4462064802646637},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4290086030960083},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4193084239959717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3701924979686737},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32342082262039185},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17197823524475098},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08421778678894043}],"concepts":[{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.8922131061553955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7234250903129578},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6148974895477295},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5311112999916077},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5243889689445496},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.4462064802646637},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4290086030960083},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4193084239959717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3701924979686737},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32342082262039185},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17197823524475098},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08421778678894043},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt61075.2023.10333095","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icumt61075.2023.10333095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2143373157","https://openalex.org/W2296005727","https://openalex.org/W2740546450","https://openalex.org/W2765763442","https://openalex.org/W2908261578","https://openalex.org/W2975048949","https://openalex.org/W3039956227","https://openalex.org/W3040652553","https://openalex.org/W4288057805","https://openalex.org/W4300716190","https://openalex.org/W4310494122","https://openalex.org/W4311898313","https://openalex.org/W4318606177","https://openalex.org/W4380681464","https://openalex.org/W6757214667"],"related_works":["https://openalex.org/W4288714711","https://openalex.org/W3200708550","https://openalex.org/W2736680465","https://openalex.org/W2771637876","https://openalex.org/W4294093918","https://openalex.org/W4240853094","https://openalex.org/W2810496283","https://openalex.org/W2170656329","https://openalex.org/W3131977017","https://openalex.org/W3205823858"],"abstract_inverted_index":{"The":[0,103],"coordinating":[1],"interaction":[2],"allows":[3],"the":[4,9,13,26,29,33,36,47,53,62,85,89,100,107,116,125,131],"UAVs":[5,37],"swarm":[6,31,48,56,69,122,143],"to":[7,24,71,146],"distribute":[8],"workload":[10],"and":[11,52],"increase":[12],"efficiency":[14],"of":[15,28,35,43,55,61,68,76,109,113,118,128,133,142],"performing":[16],"target":[17],"tasks.":[18],"However,":[19],"if":[20],"it":[21],"is":[22,40],"necessary":[23],"change":[25],"composition":[27],"UAV":[30],"and/or":[32],"structure":[34],"subordination,":[38],"there":[39],"a":[41,73,111,139],"problem":[42],"timely":[44],"correction":[45],"for":[46,66,121],"security":[49],"policies":[50],"rules":[51],"authentication":[54,67,97],"objects.":[57],"We":[58],"propose,":[59],"instead":[60],"widespread":[63],"RSA":[64],"schemes":[65],"objects,":[70,123,144],"use":[72],"hierarchical":[74],"scheme":[75],"McEliece":[77],"based":[78],"on":[79,88],"alternate":[80],"codes,":[81],"which":[82],"significantly":[83],"reduces":[84],"time":[86],"spent":[87],"key":[90,134],"exchange":[91],"process,":[92],"providing":[93],"several":[94],"additional":[95],"important":[96],"advantages":[98,105],"at":[99],"same":[101],"time.":[102],"achieved":[104],"are":[106],"possibility":[108],"building":[110],"hierarchy":[112],"subordination":[114],"with":[115,138],"equality":[117],"secret":[119],"keys":[120],"ensuring":[124],"required":[126],"levels":[127],"protection,":[129],"reducing":[130],"effect":[132],"multiplication":[135],"in":[136],"swarms":[137],"large":[140],"number":[141],"resistance":[145],"quantum":[147],"attacks.":[148]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
