{"id":"https://openalex.org/W4401163664","doi":"https://doi.org/10.1109/jiot.2024.3431879","title":"BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks","display_name":"BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks","publication_year":2024,"publication_date":"2024-07-31","ids":{"openalex":"https://openalex.org/W4401163664","doi":"https://doi.org/10.1109/jiot.2024.3431879"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3431879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3431879","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103226071","display_name":"Keke Huang","orcid":"https://orcid.org/0000-0002-2543-9568"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Keke Huang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-2543-9568","affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014636927","display_name":"Huidan Hu","orcid":"https://orcid.org/0000-0003-2601-9976"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huidan Hu","raw_affiliation_strings":["School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications, Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0003-2601-9976","affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications, Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079564012","display_name":"Changlu Lin","orcid":"https://orcid.org/0000-0002-2868-3398"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changlu Lin","raw_affiliation_strings":["School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications, Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0002-2868-3398","affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications, Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103226071"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":14.4024,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.988504,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"22","first_page":"36858","last_page":"36883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9528999924659729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7505345344543457},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.683627188205719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6132003664970398},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5444286465644836},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5353397130966187},{"id":"https://openalex.org/keywords/aka","display_name":"AKA","score":0.5290659666061401},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5277945399284363},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5185142755508423},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47587934136390686}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7505345344543457},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.683627188205719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6132003664970398},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5444286465644836},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5353397130966187},{"id":"https://openalex.org/C121158502","wikidata":"https://www.wikidata.org/wiki/Q4652161","display_name":"AKA","level":2,"score":0.5290659666061401},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5277945399284363},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5185142755508423},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47587934136390686},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3431879","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3431879","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4830868275","display_name":null,"funder_award_id":"2023H6012","funder_id":"https://openalex.org/F4320323190","funder_display_name":"Fujian Provincial Department of Science and Technology"},{"id":"https://openalex.org/G5408607608","display_name":null,"funder_award_id":"KX202039","funder_id":"https://openalex.org/F4320327656","funder_display_name":"Fujian Key Laboratory of Statistical Science"}],"funders":[{"id":"https://openalex.org/F4320323190","display_name":"Fujian Provincial Department of Science and Technology","ror":"https://ror.org/00rgzpv08"},{"id":"https://openalex.org/F4320327656","display_name":"Fujian Key Laboratory of Statistical Science","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1526070463","https://openalex.org/W1561441787","https://openalex.org/W2029693536","https://openalex.org/W2059472991","https://openalex.org/W2088455835","https://openalex.org/W2782556342","https://openalex.org/W2783861674","https://openalex.org/W2963874768","https://openalex.org/W2977524887","https://openalex.org/W3007112828","https://openalex.org/W3012182806","https://openalex.org/W3046461380","https://openalex.org/W3048859271","https://openalex.org/W3080962733","https://openalex.org/W3089893234","https://openalex.org/W3090278870","https://openalex.org/W3094603038","https://openalex.org/W3113166045","https://openalex.org/W3120193246","https://openalex.org/W3130731369","https://openalex.org/W3136108810","https://openalex.org/W3197591327","https://openalex.org/W3201909053","https://openalex.org/W3202150210","https://openalex.org/W3213700687","https://openalex.org/W4207001703","https://openalex.org/W4210268633","https://openalex.org/W4226398874","https://openalex.org/W4252478173","https://openalex.org/W4286656226","https://openalex.org/W4310062079","https://openalex.org/W4321608321","https://openalex.org/W4362582226","https://openalex.org/W4362716538","https://openalex.org/W4379803627","https://openalex.org/W4380607096"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W2242172122","https://openalex.org/W2898483019","https://openalex.org/W2389999793","https://openalex.org/W2535440197","https://openalex.org/W2365081032","https://openalex.org/W2517088709"],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"vehicles":[2],"(UAVs,":[3],"also":[4,176,214],"known":[5],"as":[6,19,87,117,181],"Drones)":[7],"have":[8],"been":[9],"widely":[10],"employed":[11],"in":[12,67,102,111,154,195],"military":[13],"defense":[14],"and":[15,30,44,92,95,99,121,139,185,213,231,253,260],"civilian":[16],"service.":[17],"However,":[18],"UAVs":[20,49,82,168,205,252],"communicate":[21],"over":[22],"insecure":[23],"open":[24],"wireless":[25],"channels,":[26],"the":[27,53,68,103,113,123,130,146,155,162,166,170,182,186,190,204,227,232,237,240,251],"security":[28,91,221,242],"challenges":[29],"privacy":[31,93],"concerns":[32,94],"are":[33,50,60,141],"becoming":[34],"increasingly":[35],"prominent.":[36],"Moreover,":[37],"some":[38],"existing":[39],"schemes":[40],"to":[41,64,86,207,215],"achieve":[42],"authentication":[43,183],"key":[45],"agreement":[46],"(AKA)":[47],"among":[48],"spliced":[51],"with":[52,173,256,264],"assistance":[54],"of":[55,70,135,157,192,266],"two":[56,167],"UAV-2-GCS":[57,138],"mechanisms,":[58,137],"which":[59,89,112,125],"not":[61,152],"flexible":[62],"enough":[63],"be":[65],"applied":[66],"Internet":[69],"Drones":[71],"(IoD)":[72],"scenarios.":[73],"This":[74],"article":[75],"proposes":[76],"a":[77,178],"blockchain-assisted":[78],"AKA":[79,136,156,217],"scheme":[80,194,238],"for":[81],"networks":[83],"(BAKAS-UAV)":[84],"referred":[85],"BAKAS-UAV,":[88],"addresses":[90],"overcomes":[96],"high":[97,277],"computational":[98],"communication":[100],"costs":[101],"IoD.":[104,196],"A":[105],"blockchain-based":[106],"network":[107,131],"model":[108],"is":[109,164,201,222,247],"presented":[110],"ground":[114,147],"station":[115,149],"acts":[116],"an":[118],"edge":[119],"node":[120],"manages":[122],"blockchain,":[124],"assists":[126],"AKA.":[127],"Based":[128],"on":[129,203,226],"model,":[132,230],"both":[133],"types":[134],"UAV-2-UAV,":[140],"proposed,":[142],"respectively.":[143],"In":[144],"particular,":[145],"control":[148],"(GCS)":[150],"does":[151],"participate":[153],"UAV-2-UAV":[158],"process;":[159],"only":[160],"upon":[161],"process":[163],"completed":[165],"synchronize":[169],"updated":[171],"information":[172],"GCS.":[174],"We":[175],"implement":[177,216],"smart":[179],"contract":[180],"service,":[184],"experimental":[187,271],"implementation":[188,265],"demonstrates":[189],"availability":[191],"our":[193],"Physical":[197],"unclonable":[198],"functions":[199],"(PUFs)":[200],"introduced":[202],"side":[206],"defend":[208],"against":[209],"physical":[210],"capture":[211],"attacks":[212],"mechanisms.":[218],"The":[219,244,270],"semantic":[220],"proved":[223],"formally":[224],"based":[225],"real-or-random":[228],"(ROR)":[229],"informal":[233],"analysis":[234],"shows":[235],"that":[236,274],"satisfies":[239],"demanded":[241],"requirements.":[243],"scheme\u2019s":[245],"performance":[246],"evaluated":[248],"by":[249],"simulating":[250],"GCS":[254],"settings":[255],"Raspberry":[257],"Pi":[258],"4B":[259],"MacOS":[261],"platforms,":[262],"respectively,":[263],"several":[267],"cryptographic":[268],"primitives.":[269],"results":[272],"show":[273],"BAKAS-UAV":[275],"achieves":[276],"efficiency.":[278]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":17}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-10T00:00:00"}
