{"id":"https://openalex.org/W4407690551","doi":"https://doi.org/10.1109/jiot.2025.3543199","title":"Secure Data Delivery With Certificateless Homomorphic Network Coding Signature Scheme for Autonomous Aerial Vehicle Networks","display_name":"Secure Data Delivery With Certificateless Homomorphic Network Coding Signature Scheme for Autonomous Aerial Vehicle Networks","publication_year":2025,"publication_date":"2025-02-18","ids":{"openalex":"https://openalex.org/W4407690551","doi":"https://doi.org/10.1109/jiot.2025.3543199"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3543199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3543199","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071545055","display_name":"Hao Huang","orcid":"https://orcid.org/0009-0003-6641-6842"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Huang","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101738239","display_name":"Xiaofen Wang","orcid":"https://orcid.org/0000-0002-6744-4752"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofen Wang","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["Department of Computer Science, Hong Kong Baptist University, Hong Kong, China","Hong Kong Baptist University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong Baptist University, Hong Kong, China","institution_ids":["https://openalex.org/I141568987"]},{"raw_affiliation_string":"Hong Kong Baptist University, Hong Kong, China","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101425388","display_name":"Sheng Cao","orcid":"https://orcid.org/0000-0002-0929-9067"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Cao","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365698","display_name":"Ke Zhang","orcid":"https://orcid.org/0000-0001-9696-4944"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Zhang","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027786039","display_name":"Man Ho Au","orcid":"https://orcid.org/0000-0003-2068-9530"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Man Ho Au","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020244842","display_name":"Rang Zhou","orcid":"https://orcid.org/0000-0002-4613-0025"},"institutions":[{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rang Zhou","raw_affiliation_strings":["College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I31595395"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5071545055"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":1.5458,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8029238,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"8","first_page":"9604","last_page":"9613"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9323999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9006999731063843,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8166631460189819},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7936927676200867},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.588312029838562},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.5551024675369263},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5480052828788757},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.48888081312179565},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.42646223306655884},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42389047145843506},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18076229095458984},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.12772482633590698}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8166631460189819},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7936927676200867},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.588312029838562},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5551024675369263},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5480052828788757},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.48888081312179565},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.42646223306655884},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42389047145843506},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18076229095458984},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.12772482633590698},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3543199","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3543199","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1521680667","https://openalex.org/W1525576396","https://openalex.org/W1566153410","https://openalex.org/W1569083856","https://openalex.org/W1621100081","https://openalex.org/W1743877615","https://openalex.org/W1970353287","https://openalex.org/W1998783337","https://openalex.org/W2026892462","https://openalex.org/W2048235391","https://openalex.org/W2052267638","https://openalex.org/W2100278608","https://openalex.org/W2105831729","https://openalex.org/W2106403318","https://openalex.org/W2304578911","https://openalex.org/W2314810977","https://openalex.org/W2586992378","https://openalex.org/W2618159768","https://openalex.org/W2791289577","https://openalex.org/W2807802008","https://openalex.org/W2886300999","https://openalex.org/W2962691117","https://openalex.org/W3010256394","https://openalex.org/W3049602551","https://openalex.org/W3087854657","https://openalex.org/W3089865507","https://openalex.org/W3108373336","https://openalex.org/W3117496197","https://openalex.org/W3119165438","https://openalex.org/W3152856964","https://openalex.org/W3163366489","https://openalex.org/W4285227795","https://openalex.org/W4288062306","https://openalex.org/W4294071811","https://openalex.org/W4376878836","https://openalex.org/W4408325456"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4406779505","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W4407007798","https://openalex.org/W2601739120"],"abstract_inverted_index":{"With":[0],"highly":[1],"mobile":[2],"and":[3,19,103,132,147,150,156],"flexible-configurable,":[4],"autonomous":[5],"aerial":[6],"vehicles":[7],"(AAVs)":[8],"are":[9,63],"becoming":[10],"crucial":[11],"wireless":[12,25],"communication":[13],"infrastructures.":[14],"To":[15],"improve":[16],"the":[17,74,104,121,144,154,165],"reliability":[18],"throughput":[20],"of":[21,95,158],"data":[22,130,173],"delivery":[23],"for":[24,49,66,92,143,161,170],"networks,":[26,97],"network":[27,40,54,88],"coding,":[28],"as":[29],"a":[30,43,140,171],"progressive":[31],"technology,":[32],"can":[33,57,99,128],"be":[34,113],"applied":[35],"in":[36,120],"AAV":[37,50,67,96],"networks.":[38,51],"However,":[39],"coding":[41,55,89],"incurs":[42],"security":[44],"problem":[45],"called":[46],"pollution":[47,59,136],"attacks":[48,119],"Although":[52],"homomorphic":[53,87],"signature":[56,90],"prevent":[58],"attacks,":[60],"existing":[61],"schemes":[62],"not":[64],"suitable":[65],"networks":[68],"due":[69],"to":[70,112,134],"cumbersome":[71],"certificate":[72,101],"management,":[73],"key-escrow":[75,105],"issue,":[76],"or":[77],"insecurity.":[78],"In":[79],"this":[80],"article,":[81],"we":[82],"propose":[83],"an":[84],"efficient":[85],"certificateless":[86],"scheme":[91,109,127,146,160],"secure":[93,114],"transmission":[94],"which":[98],"avoid":[100],"management":[102],"issue.":[106],"Then":[107],"our":[108,126,159],"is":[110],"proven":[111],"against":[115],"adaptive":[116],"chosen":[117],"identity-and-subspace":[118],"random":[122],"oracle":[123],"model,":[124],"thus":[125],"guarantee":[129],"integrity":[131],"authenticity":[133],"resist":[135],"attacks.":[137],"We":[138],"provide":[139],"performance":[141],"evaluation":[142],"proposed":[145],"prior":[148],"research,":[149],"experimental":[151],"results":[152],"illustrate":[153],"efficiency":[155],"feasibility":[157],"practical":[162],"application,":[163],"reducing":[164],"verification":[166],"overhead":[167],"by":[168],"42.918%":[169],"72-dimensional":[172],"vector.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-02-19T00:00:00"}
