{"id":"https://openalex.org/W4403390918","doi":"https://doi.org/10.1109/iotsms62296.2024.10710297","title":"Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones","display_name":"Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4403390918","doi":"https://doi.org/10.1109/iotsms62296.2024.10710297"},"language":"en","primary_location":{"id":"doi:10.1109/iotsms62296.2024.10710297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073993990","display_name":"Burak T\u00fcfek\u00e7i","orcid":"https://orcid.org/0000-0001-6266-5081"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Burak Tufekci","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047016848","display_name":"Atakan Arslan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145181","display_name":"Advanced Materials and Technologies (Slovenia)","ror":"https://ror.org/03ft27t79","country_code":"SI","type":"company","lineage":["https://openalex.org/I4210145181"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Atakan Arslan","raw_affiliation_strings":["Information Security, Center of Research for Advanced Technologies,Gebze,Turkiye"],"affiliations":[{"raw_affiliation_string":"Information Security, Center of Research for Advanced Technologies,Gebze,Turkiye","institution_ids":["https://openalex.org/I4210145181"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007796269","display_name":"Cihan Tunc","orcid":"https://orcid.org/0000-0001-5200-1097"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cihan Tunc","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076022836","display_name":"Kirill Morozov","orcid":"https://orcid.org/0009-0006-4443-083X"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kirill Morozov","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073993990"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":3.1143,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.91349693,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"58","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9715999960899353,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9358999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.7774358987808228},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6988762617111206},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6740753650665283},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6565002202987671},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6112502813339233},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32763007283210754}],"concepts":[{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.7774358987808228},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6988762617111206},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6740753650665283},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6565002202987671},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6112502813339233},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32763007283210754},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iotsms62296.2024.10710297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1548701190","https://openalex.org/W1802259427","https://openalex.org/W1996182770","https://openalex.org/W2257504697","https://openalex.org/W2262479410","https://openalex.org/W2508004687","https://openalex.org/W2964266016","https://openalex.org/W3178013794","https://openalex.org/W4210248528","https://openalex.org/W4293767903","https://openalex.org/W4389617149","https://openalex.org/W4391408674","https://openalex.org/W6674890545","https://openalex.org/W6797891939"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W4212885606"],"abstract_inverted_index":{"The":[0,62,87,117],"Micro":[1],"Air":[2],"Vehicle":[3],"Link":[4],"(MAVLink)":[5],"protocol":[6,33,72,84],"plays":[7],"a":[8,75],"crucial":[9],"role":[10],"in":[11,127,139],"enabling":[12],"communication":[13],"between":[14],"drones":[15],"and":[16,29,51,73,98,111,137,160],"Ground":[17],"Control":[18],"Stations":[19],"(GCS).":[20],"With":[21],"the":[22,27,42,67,70,82,102,107,120,123,130,134,146,150,169],"increasing":[23],"adoption":[24],"of":[25,31,45,69,104,109,122,141],"drones,":[26],"security":[28,49],"integrity":[30,167],"MAVLink":[32,71,83,151,165],"have":[34],"also":[35,163],"become":[36],"paramount.":[37],"This":[38],"paper":[39,88],"delves":[40],"into":[41,149],"fundamental":[43],"aspects":[44],"MAVLink,":[46,105],"highlighting":[47],"its":[48,57],"challenges":[50],"proposing":[52],"potential":[53],"solutions":[54],"to":[55,78,168],"enhance":[56],"resilience":[58],"against":[59],"cyber":[60],"threats.":[61],"study":[63],"presents":[64],"findings":[65],"on":[66,81,101],"vulnerabilities":[68],"introduces":[74],"novel":[76],"approach":[77],"securing":[79],"communications":[80],"for":[85,113],"drones.":[86],"evaluates":[89],"different":[90],"Authenticated":[91],"Encryption":[92],"with":[93],"Associated":[94],"Data":[95],"(AEAD)":[96],"schemes":[97],"their":[99],"impact":[100],"performance":[103],"emphasizing":[106],"importance":[108],"encryption":[110,125],"authentication":[112],"ensuring":[114],"data":[115],"security.":[116],"results":[118],"demonstrate":[119],"efficiency":[121],"Chacha20Poly1305":[124],"mechanism":[126],"execution":[128],"time,":[129],"AES-OCB3":[131],"scheme":[132,148],"as":[133],"least":[135],"CPU-intensive,":[136],"AES-CCM":[138],"terms":[140],"memory":[142],"usage.":[143],"By":[144],"adding":[145],"AEAD":[147],"payload,":[152],"we":[153],"not":[154],"only":[155],"provide":[156,164],"message":[157],"confidentiality,":[158],"integrity,":[159],"authenticity":[161],"but":[162],"header":[166],"drone":[170],"environment.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
