{"id":"https://openalex.org/W7124484330","doi":"https://doi.org/10.1109/jiot.2026.3654126","title":"Blockchain-Assisted Lightweight Broadcast Encryption With Revocation Support for Secure ADS-B in IoT Aviation","display_name":"Blockchain-Assisted Lightweight Broadcast Encryption With Revocation Support for Secure ADS-B in IoT Aviation","publication_year":2026,"publication_date":"2026-01-15","ids":{"openalex":"https://openalex.org/W7124484330","doi":"https://doi.org/10.1109/jiot.2026.3654126"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2026.3654126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3654126","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123219052","display_name":"Xuejun Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuejun Zhang","raw_affiliation_strings":["Hefei Innovation Research Institute, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Hefei Innovation Research Institute, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021067862","display_name":"Chong Yao","orcid":"https://orcid.org/0000-0003-2827-273X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chong Yao","raw_affiliation_strings":["Hefei Innovation Research Institute, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Hefei Innovation Research Institute, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018335177","display_name":"Yizhong Liu","orcid":"https://orcid.org/0000-0002-6129-3260"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yizhong Liu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079046940","display_name":"Bihe Zhao","orcid":"https://orcid.org/0000-0001-8349-4533"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Boyu Zhao","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123200928","display_name":"Cheng Chi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130112","display_name":"China Academy of Information and Communications Technology","ror":"https://ror.org/038dte259","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210130112","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Chi","raw_affiliation_strings":["Research Institute of Industrial Internet of Things, China Academy of Information and Communications Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Research Institute of Industrial Internet of Things, China Academy of Information and Communications Technology, Beijing, China","institution_ids":["https://openalex.org/I4210130112"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5099566184","display_name":"Haohua Du","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haohua Du","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123219052"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12487587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"7","first_page":"13406","last_page":"13425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.6596999764442444,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.6596999764442444,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.20160000026226044,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.015599999576807022,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5558000206947327},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.5192000269889832},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4767000079154968},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.4702000021934509},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.4348999857902527},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.41839998960494995},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4138999879360199},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.38679999113082886},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.38359999656677246}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8104000091552734},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6097999811172485},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5558000206947327},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.5192000269889832},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4767000079154968},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.4702000021934509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45320001244544983},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.4348999857902527},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.41839998960494995},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4138999879360199},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.38679999113082886},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.38359999656677246},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3765999972820282},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3617999851703644},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.35499998927116394},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.3452000021934509},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.34459999203681946},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.323199987411499},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.3075999915599823},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.3028999865055084},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.302700012922287},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.30140000581741333},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.30070000886917114},{"id":"https://openalex.org/C83529365","wikidata":"https://www.wikidata.org/wiki/Q4972103","display_name":"Broadcast communication network","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.28049999475479126},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C512918668","wikidata":"https://www.wikidata.org/wiki/Q206814","display_name":"Civil aviation","level":3,"score":0.27900001406669617},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27810001373291016}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2026.3654126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3654126","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6407521367073059,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Automatic":[0],"Dependent":[1],"Surveillance\u2013Broadcast":[2],"(ADS-B)":[3],"is":[4],"widely":[5],"deployed":[6],"in":[7,75,202],"both":[8],"civil":[9],"and":[10,25,39,65,122,158,185,198],"unmanned":[11],"aviation":[12,54],"networks,":[13],"yet":[14],"its":[15],"plaintext":[16],"broadcast":[17,44,73],"design":[18],"leaves":[19],"it":[20],"vulnerable":[21],"to":[22,41,88,164],"eavesdropping,":[23],"spoofing,":[24],"message":[26,108],"forgery.":[27],"Existing":[28],"cryptographic":[29],"solutions":[30],"incur":[31],"excessive":[32],"overhead,":[33],"depend":[34],"on":[35],"complex":[36],"key":[37,91,124],"infrastructures,":[38],"fail":[40],"accommodate":[42],"the":[43,62,107,146,165,173,179,191],"nature":[45],"of":[46,175,182,193],"ADS-B,":[47],"making":[48],"them":[49],"unsuitable":[50],"for":[51,70,118,196],"real-time":[52],"IoT":[53],"scenarios.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59],"propose":[60],"ADSB-IBBE,":[61],"first":[63],"lightweight":[64],"scalable":[66],"security":[67,144],"scheme":[68,195],"tailored":[69],"confidential":[71],"ADS-B":[72,103,200],"communication":[74,161,201],"IoT-enabled":[76,204],"aerial":[77],"networks.":[78],"ADSB-IBBE":[79],"integrates":[80],"a":[81,95,113,127],"novel":[82],"Identity-based":[83],"Broadcast":[84],"Encryption":[85],"(IBBE)":[86],"construction":[87],"enable":[89],"efficient":[90,199],"distribution,":[92],"together":[93],"with":[94,169],"purpose-built,":[96],"format-preserving":[97],"stream":[98],"cipher":[99],"that":[100],"secures":[101],"critical":[102],"fields":[104],"without":[105],"extending":[106],"size.":[109],"It":[110],"further":[111],"incorporates":[112],"customized":[114],"sharding":[115],"consortium":[116],"blockchain":[117],"decentralized":[119],"identity":[120],"management":[121,207],"rapid":[123],"revocation,":[125],"while":[126],"header":[128,184],"compression":[129],"mechanism":[130],"reduces":[131],"transmission":[132],"overhead.":[133],"Security":[134],"analysis":[135],"confirms":[136],"Indistinguishability":[137],"against":[138],"Selective-Identity":[139],"Chosen":[140],"Ciphertext":[141],"Attacks":[142],"(IND-sID-CCA)":[143],"under":[145],"Random":[147],"Oracle":[148],"Model":[149],"(ROM).":[150],"Experiments":[151],"show":[152],"over":[153],"80%":[154],"lower":[155],"computational":[156],"cost":[157],"90%":[159],"reduced":[160],"overhead":[162,181],"compared":[163],"most":[166],"demanding":[167],"baseline,":[168],"increasing":[170],"advantages":[171],"as":[172],"number":[174],"receivers":[176],"grows,":[177],"achieving":[178],"lowest":[180],"510bit":[183],"80bit":[186],"ciphertext.":[187],"These":[188],"results":[189],"demonstrate":[190],"suitability":[192],"our":[194],"secure":[197],"next-generation":[203],"air":[205],"traffic":[206],"(ATM)":[208],"systems.":[209]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2026-01-17T00:00:00"}
