{"id":"https://openalex.org/W3201410046","doi":"https://doi.org/10.1109/jiot.2021.3113321","title":"Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones","display_name":"Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones","publication_year":2021,"publication_date":"2021-09-17","ids":{"openalex":"https://openalex.org/W3201410046","doi":"https://doi.org/10.1109/jiot.2021.3113321","mag":"3201410046"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3113321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3113321","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103021127","display_name":"Chaosheng Feng","orcid":"https://orcid.org/0000-0002-1797-5280"},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chaosheng Feng","raw_affiliation_strings":["College of Computer Science, Sichuan Normal University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan Normal University, Chengdu, China","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101922000","display_name":"Bin Liu","orcid":"https://orcid.org/0000-0002-2949-832X"},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liu","raw_affiliation_strings":["College of Computer Science, Sichuan Normal University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan Normal University, Chengdu, China","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029286793","display_name":"Zhen Guo","orcid":"https://orcid.org/0000-0001-6100-8856"},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Guo","raw_affiliation_strings":["College of Computer Science, Sichuan Normal University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Sichuan Normal University, Chengdu, China","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076994242","display_name":"Keping Yu","orcid":"https://orcid.org/0000-0001-5735-2507"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keping Yu","raw_affiliation_strings":["Global Information and Telecommunication Institute, Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Global Information and Telecommunication Institute, Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103021127"],"corresponding_institution_ids":["https://openalex.org/I63354593"],"apc_list":null,"apc_paid":null,"fwci":44.2681,"has_fulltext":false,"cited_by_count":226,"citation_normalized_percentile":{"value":0.99890534,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"9","issue":"8","first_page":"6224","last_page":"6238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8131060004234314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7997550964355469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6550210118293762},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6412596106529236},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5579657554626465},{"id":"https://openalex.org/keywords/inter-domain","display_name":"Inter-domain","score":0.5269287824630737},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5227011442184448},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5195755958557129},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.48988717794418335},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.41379544138908386},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.10549640655517578},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0850321352481842}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8131060004234314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7997550964355469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6550210118293762},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6412596106529236},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5579657554626465},{"id":"https://openalex.org/C5111613","wikidata":"https://www.wikidata.org/wiki/Q3799443","display_name":"Inter-domain","level":4,"score":0.5269287824630737},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5227011442184448},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5195755958557129},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.48988717794418335},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41379544138908386},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.10549640655517578},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0850321352481842},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3113321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3113321","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G191450489","display_name":null,"funder_award_id":"JP21K17736","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4728296191","display_name":null,"funder_award_id":"61373163","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G757852221","display_name":null,"funder_award_id":"JP18K18044","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1940397557","https://openalex.org/W2104340336","https://openalex.org/W2466821819","https://openalex.org/W2566527471","https://openalex.org/W2601260651","https://openalex.org/W2626437913","https://openalex.org/W2758604054","https://openalex.org/W2889655092","https://openalex.org/W2902160827","https://openalex.org/W2912207205","https://openalex.org/W2966119905","https://openalex.org/W2966404652","https://openalex.org/W3010858269","https://openalex.org/W3013894142","https://openalex.org/W3037361310","https://openalex.org/W3049051774","https://openalex.org/W3082337779","https://openalex.org/W3084382518","https://openalex.org/W3109531627","https://openalex.org/W3119569744","https://openalex.org/W3147822227","https://openalex.org/W3171954485","https://openalex.org/W3189313199","https://openalex.org/W3210498457","https://openalex.org/W6736702253"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W4386215303","https://openalex.org/W2517088709"],"abstract_inverted_index":{"While":[0],"5G":[1],"can":[2],"facilitate":[3],"high-speed":[4],"Internet":[5,76,151],"access":[6],"and":[7,27,108,137,164],"make":[8],"over-the-horizon":[9],"control":[10],"a":[11,42,68],"reality":[12],"for":[13,30,73,98,121],"unmanned":[14],"aerial":[15],"vehicles":[16],"(UAVs;":[17],"also":[18,24,50],"known":[19],"as":[20,158,160],"drones),":[21,157],"there":[22],"are":[23,49,126],"potential":[25],"security":[26,136],"privacy":[28],"considerations,":[29],"example,":[31],"authentication":[32,36,71],"among":[33],"drones.":[34],"Centralized":[35],"approaches":[37],"not":[38],"only":[39],"suffer":[40],"from":[41,61],"single":[43],"point":[44],"of":[45,52,59,77,152],"failure":[46],"but":[47],"they":[48],"incapable":[51],"cross-domain":[53,70,113],"authentication.":[54,122],"This":[55,101],"complicates":[56],"the":[57,142],"cooperation":[58],"drones":[60,78],"different":[62],"domains.":[63,100],"To":[64],"address":[65],"these":[66],"limitations,":[67],"blockchain-based":[69],"scheme":[72,144],"intelligent":[74],"5G-enabled":[75],"is":[79,115,145],"proposed":[80,143],"in":[81],"this":[82],"article.":[83],"Our":[84,135],"approach":[85],"employs":[86],"multiple":[87],"signatures":[88],"based":[89],"on":[90],"threshold":[91],"sharing":[92],"to":[93,104,128,147],"build":[94],"an":[95],"identity":[96],"federation":[97],"collaborative":[99],"allows":[102],"us":[103],"support":[105],"domain":[106],"joining":[107],"exiting.":[109],"Reliable":[110],"communication":[111,131],"between":[112,132],"devices":[114,155],"achieved":[116],"by":[117],"utilizing":[118],"smart":[119],"contract":[120],"The":[123],"session":[124],"keys":[125],"negotiated":[127],"secure":[129],"subsequent":[130],"two":[133],"parties.":[134],"performance":[138],"evaluations":[139],"show":[140],"that":[141],"resistant":[146],"common":[148],"attacks":[149],"targeting":[150],"Things":[153],"(IoT)":[154],"(including":[156],"well":[159],"demonstrating":[161],"its":[162],"effectiveness":[163],"efficiency.":[165]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":64},{"year":2024,"cited_by_count":46},{"year":2023,"cited_by_count":38},{"year":2022,"cited_by_count":63},{"year":2021,"cited_by_count":9}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
