{"id":"https://openalex.org/W3121056417","doi":"https://doi.org/10.1109/jiot.2020.3049003","title":"Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment","display_name":"Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment","publication_year":2021,"publication_date":"2021-01-04","ids":{"openalex":"https://openalex.org/W3121056417","doi":"https://doi.org/10.1109/jiot.2020.3049003","mag":"3121056417"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3049003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3049003","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039046844","display_name":"Basudeb Bera","orcid":"https://orcid.org/0000-0002-0872-0331"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Basudeb Bera","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005877741","display_name":"Sahil Garg","orcid":"https://orcid.org/0000-0003-0229-608X"},"institutions":[{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]},{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sahil Garg","raw_affiliation_strings":["Electrical Engineering Department, \u00c9cole de Technologie Sup\u00e9rieure, Universit\u00e9 du Qu\u00e9bec, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, \u00c9cole de Technologie Sup\u00e9rieure, Universit\u00e9 du Qu\u00e9bec, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047578139","display_name":"Md. Jalil Piran","orcid":"https://orcid.org/0000-0003-3229-6785"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Md. Jalil Piran","raw_affiliation_strings":["Department of Computer Science and Engineering, Sejong University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sejong University, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037865550","display_name":"M. Shamim Hossain","orcid":"https://orcid.org/0000-0001-5906-9422"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"M. Shamim Hossain","raw_affiliation_strings":["Chair of Pervasive and Mobile Computing, Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Chair of Pervasive and Mobile Computing, Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5039046844"],"corresponding_institution_ids":["https://openalex.org/I64189192"],"apc_list":null,"apc_paid":null,"fwci":71.4343,"has_fulltext":false,"cited_by_count":98,"citation_normalized_percentile":{"value":0.99875419,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"9","issue":"4","first_page":"2708","last_page":"2721"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8805857300758362},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8475890755653381},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7086144089698792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6953670978546143},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6186431646347046},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5520237684249878},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5314793586730957},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49648910760879517},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4961484372615814},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.47737571597099304},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4663986563682556},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43165647983551025},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.2997329831123352},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.286005437374115}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8805857300758362},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8475890755653381},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7086144089698792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6953670978546143},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6186431646347046},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5520237684249878},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5314793586730957},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49648910760879517},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4961484372615814},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.47737571597099304},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4663986563682556},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43165647983551025},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2997329831123352},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.286005437374115},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.3049003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3049003","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1526070463","https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2105114022","https://openalex.org/W2243569459","https://openalex.org/W2327622231","https://openalex.org/W2332825519","https://openalex.org/W2395541925","https://openalex.org/W2509426339","https://openalex.org/W2603893109","https://openalex.org/W2726662365","https://openalex.org/W2739692078","https://openalex.org/W2766472919","https://openalex.org/W2767082455","https://openalex.org/W2772594442","https://openalex.org/W2776809775","https://openalex.org/W2799341537","https://openalex.org/W2804900363","https://openalex.org/W2806883046","https://openalex.org/W2884658035","https://openalex.org/W2898274421","https://openalex.org/W2906140151","https://openalex.org/W2914062206","https://openalex.org/W2953707968","https://openalex.org/W2968891443","https://openalex.org/W2998117442","https://openalex.org/W2999472659","https://openalex.org/W2999924839","https://openalex.org/W3004044421","https://openalex.org/W3004171232","https://openalex.org/W3004595536","https://openalex.org/W3005206852","https://openalex.org/W3012182806","https://openalex.org/W3015560102","https://openalex.org/W3023178162","https://openalex.org/W3028313229","https://openalex.org/W3092407777","https://openalex.org/W3094603038","https://openalex.org/W4232668698","https://openalex.org/W4244562965","https://openalex.org/W6711845211"],"related_works":["https://openalex.org/W2082942584","https://openalex.org/W2114566185","https://openalex.org/W2400096882","https://openalex.org/W2347425392","https://openalex.org/W2109952796","https://openalex.org/W1512010809","https://openalex.org/W2358638783","https://openalex.org/W4200505899","https://openalex.org/W2160113534","https://openalex.org/W2943967608"],"abstract_inverted_index":{"Surveillance":[0],"drones,":[1],"called":[2,122],"as":[3,26,70,190,192],"unmanned":[4],"aerial":[5],"vehicles":[6],"(UAVs),":[7],"are":[8,11,82],"aircrafts":[9],"that":[10,87,147,196],"utilized":[12],"to":[13,61,89],"collect":[14],"video":[15,21],"recordings,":[16],"still":[17],"images,":[18],"or":[19,29,44,209],"live":[20],"of":[22,40,118],"the":[23,46,51,125,136,148,163,175,197],"targets,":[24],"such":[25,69,100],"vehicles,":[27],"people":[28],"specific":[30],"areas.":[31],"Particularly":[32],"in":[33,92,115,157],"battlefield":[34,93,113,159],"surveillance,":[35],"there":[36],"is":[37],"high":[38],"possibility":[39],"eavesdropping,":[41],"inserting,":[42],"modifying":[43],"deleting":[45],"messages":[47],"during":[48],"communications":[49],"among":[50],"deployed":[52],"drones":[53,73],"and":[54,80,131,134,185,188,203,207],"ground":[55],"station":[56],"server":[57],"(GSS).":[58],"This":[59],"leads":[60],"launch":[62],"several":[63,153],"potential":[64,154],"attacks":[65,155],"by":[66],"an":[67],"adversary,":[68],"main-in-middle,":[71],"impersonation,":[72],"hijacking,":[74],"replay":[75],"attacks,":[76],"etc.":[77],"Moreover,":[78],"anonymity":[79],"untraceability":[81],"two":[83],"crucial":[84,102],"security":[85,103,127,138,202],"properties":[86],"need":[88],"be":[90],"maintained":[91],"surveillance":[94,114,160],"communication":[95,184],"environment.":[96],"To":[97],"deal":[98],"with":[99],"a":[101,107,158,179],"problem,":[104],"we":[105,145],"propose":[106],"new":[108],"access":[109,216],"control":[110,217],"protocol":[111],"for":[112,166,173],"drone-assisted":[116],"Internet":[117],"Things":[119],"(IoT)":[120],"environment,":[121],"ACPBS-IoT.":[123],"Through":[124],"detailed":[126,180],"analysis":[128],"using":[129],"formal":[130,137],"informal":[132],"(nonmathematical),":[133],"also":[135],"verification":[139],"under":[140],"automated":[141],"software":[142],"simulation":[143],"tool,":[144],"show":[146],"proposed":[149,198],"ACPBS-IoT":[150,199],"can":[151],"resist":[152],"needed":[156],"scenario.":[161],"Furthermore,":[162],"testbed":[164],"experiments":[165],"various":[167],"cryptographic":[168],"primitives":[169],"have":[170],"been":[171],"performed":[172],"measuring":[174],"execution":[176],"time.":[177],"Finally,":[178],"comparative":[181],"study":[182],"on":[183],"computational":[186],"overheads,":[187],"security,":[189],"well":[191],"functionality":[193,205],"features,":[194,206],"reveals":[195],"provides":[200],"superior":[201],"more":[204],"better":[208],"comparable":[210],"overheads":[211],"than":[212],"other":[213],"existing":[214],"competing":[215],"schemes.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":24},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":9}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
