{"id":"https://openalex.org/W4391958997","doi":"https://doi.org/10.1109/jiot.2024.3367799","title":"A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones","display_name":"A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones","publication_year":2024,"publication_date":"2024-02-20","ids":{"openalex":"https://openalex.org/W4391958997","doi":"https://doi.org/10.1109/jiot.2024.3367799"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3367799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3367799","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093961721","display_name":"Image Bhattarai","orcid":"https://orcid.org/0009-0003-1466-6460"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Image Bhattarai","raw_affiliation_strings":["Department of Computer Science, Oklahoma State University, Stillwater, OK, USA"],"raw_orcid":"https://orcid.org/0009-0003-1466-6460","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Oklahoma State University, Stillwater, OK, USA","institution_ids":["https://openalex.org/I115475287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085539430","display_name":"Cong Pu","orcid":"https://orcid.org/0000-0002-7952-0038"},"institutions":[{"id":"https://openalex.org/I115475287","display_name":"Oklahoma State University","ror":"https://ror.org/01g9vbr38","country_code":"US","type":"education","lineage":["https://openalex.org/I115475287"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cong Pu","raw_affiliation_strings":["Department of Computer Science, Oklahoma State University, Stillwater, OK, USA"],"raw_orcid":"https://orcid.org/0000-0002-7952-0038","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Oklahoma State University, Stillwater, OK, USA","institution_ids":["https://openalex.org/I115475287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"raw_orcid":"https://orcid.org/0000-0001-9208-5336","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063403713","display_name":"Dragan Kora\u0107","orcid":"https://orcid.org/0000-0001-7798-5950"},"institutions":[{"id":"https://openalex.org/I173887773","display_name":"University of Banja Luka","ror":"https://ror.org/0282m7c06","country_code":"BA","type":"education","lineage":["https://openalex.org/I173887773"]}],"countries":["BA"],"is_corresponding":false,"raw_author_name":"Dragan Kora\u0107","raw_affiliation_strings":["Department of Mathematics and Informatics, University of Banja Luka, Banja Luka, Bosnia and Herzegovina"],"raw_orcid":"https://orcid.org/0000-0001-7798-5950","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Informatics, University of Banja Luka, Banja Luka, Bosnia and Herzegovina","institution_ids":["https://openalex.org/I173887773"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093961721"],"corresponding_institution_ids":["https://openalex.org/I115475287"],"apc_list":null,"apc_paid":null,"fwci":7.8112,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.97963614,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"11","issue":"11","first_page":"19790","last_page":"19803"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7636958360671997},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6196140050888062},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6051744222640991},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5919747948646545},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5845449566841125},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5729840993881226},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.567047119140625},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5660789608955383},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.512514591217041},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4912511706352234},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4737948775291443},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.420034259557724},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.29820388555526733},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.27173668146133423},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16628605127334595},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.12353134155273438},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09427163004875183}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7636958360671997},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6196140050888062},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6051744222640991},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5919747948646545},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5845449566841125},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5729840993881226},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.567047119140625},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5660789608955383},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.512514591217041},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4912511706352234},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4737948775291443},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.420034259557724},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.29820388555526733},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27173668146133423},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16628605127334595},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.12353134155273438},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09427163004875183},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3367799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3367799","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1606480398","https://openalex.org/W2106857693","https://openalex.org/W2254700249","https://openalex.org/W2316996846","https://openalex.org/W2474348401","https://openalex.org/W2526954041","https://openalex.org/W2801678809","https://openalex.org/W2904756156","https://openalex.org/W2971630422","https://openalex.org/W3008017767","https://openalex.org/W3013543200","https://openalex.org/W3132951757","https://openalex.org/W3134720613","https://openalex.org/W3138234917","https://openalex.org/W3142723417","https://openalex.org/W3156232590","https://openalex.org/W4200249994","https://openalex.org/W4226002536","https://openalex.org/W4226185981","https://openalex.org/W4285115265","https://openalex.org/W4285267891","https://openalex.org/W4286656226","https://openalex.org/W4291805243","https://openalex.org/W4294915434","https://openalex.org/W4307186887","https://openalex.org/W4310986227","https://openalex.org/W4312305649","https://openalex.org/W4312667278","https://openalex.org/W4320015873","https://openalex.org/W4322723781","https://openalex.org/W4327574208","https://openalex.org/W4362716538","https://openalex.org/W4378422035","https://openalex.org/W4386124188","https://openalex.org/W4388040450","https://openalex.org/W6632414769","https://openalex.org/W6676995458"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2166668397","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W1965515427","https://openalex.org/W2109882692","https://openalex.org/W2116285675","https://openalex.org/W2061637199"],"abstract_inverted_index":{"The":[0,164,203],"drone":[1,176,194],"technology":[2],"has":[3,42],"continuously":[4],"been":[5],"evolving":[6],"since":[7],"the":[8,11,15,22,28,36,66,103,114,136,142,171,175,193,196,200,224,237,242,260,279],"beginning":[9],"of":[10,14,38,49,78,111,167,190,227,239,262,293],"first":[12],"decade":[13],"21st":[16],"century":[17],"with":[18,85],"exceptional":[19],"growth":[20],"over":[21],"last":[23],"several":[24],"years.":[25],"To":[26,134],"pave":[27],"way":[29],"for":[30,161,187],"an":[31],"interoperable":[32],"aerial-ground":[33],"communication":[34,294],"platform,":[35],"Internet":[37,228],"Drones":[39],"(IoD)":[40],"framework":[41,251],"emerged":[43],"to":[44,51,60,95,107,122,199,219,235,258],"systematically":[45],"organize":[46],"a":[47,61,148,249,273],"batch":[48],"drones":[50],"collect":[52],"multiple":[53],"application-specific":[54],"data":[55,68,79,98,112,123,127,137,178,191,198],"simultaneously":[56],"and":[57,81,89,116,140,150,154,174,182,212,231,252,255,275],"report":[58],"them":[59],"close":[62],"ground":[63,172,201],"station.":[64,202],"As":[65],"collected":[67,197],"might":[69],"contain":[70],"sensitive":[71,126],"information,":[72],"people":[73],"become":[74],"more":[75],"critically":[76],"aware":[77],"security":[80,238],"privacy":[82],"issues":[83],"associated":[84],"IoD":[86,97,162],"applications.":[87],"Authentication":[88],"key":[90,117,155],"agreement":[91,156],"protocols":[92],"are":[93,128,217],"able":[94],"protect":[96],"from":[99],"unauthorized":[100,132],"access.":[101],"However,":[102],"recent":[104],"schemes":[105],"fail":[106],"distinguish":[108],"between":[109],"types":[110,189],"during":[113],"authentication":[115,153,181],"establishment":[118],"process,":[119],"which":[120],"leads":[121],"leakage":[124,138],"that":[125,170,268],"being":[129],"accessed":[130],"by":[131],"entities.":[133],"address":[135],"issue":[139],"fill":[141],"research":[143],"gap,":[144],"this":[145],"paper":[146],"proposes":[147],"lightweight":[149],"anonymous":[151],"application-aware":[152],"protocol":[157,277],"(also":[158],"called":[159],"liteA4)":[160],"systems.":[163],"fundamental":[165],"idea":[166],"liteA4":[168,240,269],"is":[169,272],"station":[173],"perform":[177],"type-aware":[179],"mutual":[180],"establish":[183],"separate":[184],"session":[185],"keys":[186],"different":[188],"before":[192],"delivers":[195],"major":[204],"techniques":[205],"such":[206],"as":[207,300,302],"hash":[208],"function,":[209],"bitwise":[210],"XOR,":[211],"physical":[213],"unclonable":[214],"function":[215],"(PUF)":[216],"used":[218],"implement":[220],"liteA4.":[221,263],"We":[222,245],"select":[223],"Automated":[225],"Validation":[226],"Security":[229],"Protocols":[230],"Applications":[232],"(AVISPA)":[233],"tool":[234],"verify":[236],"in":[241,278,291],"cyber-threat":[243],"environment.":[244],"also":[246,283],"set":[247],"up":[248],"simulation":[250],"conduct":[253],"comprehensive":[254],"comparative":[256],"experiments":[257],"validate":[259],"performance":[261],"Extensive":[264],"experimental":[265],"results":[266,286],"demonstrate":[267],"not":[270],"only":[271],"safe":[274],"reliable":[276],"adversarial":[280],"setting,":[281],"but":[282],"provides":[284],"better":[285],"than":[287],"its":[288],"counterpart":[289],"approaches":[290],"terms":[292],"overhead,":[295],"computational":[296],"time,":[297],"storage":[298],"cost,":[299],"well":[301],"energy":[303],"consumption.":[304]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
