{"id":"https://openalex.org/W3134720613","doi":"https://doi.org/10.1109/jsyst.2021.3057047","title":"Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones","display_name":"Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones","publication_year":2021,"publication_date":"2021-03-01","ids":{"openalex":"https://openalex.org/W3134720613","doi":"https://doi.org/10.1109/jsyst.2021.3057047","mag":"3134720613"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2021.3057047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2021.3057047","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079488995","display_name":"Sajid Hussain","orcid":"https://orcid.org/0000-0003-1540-4940"},"institutions":[{"id":"https://openalex.org/I121243025","display_name":"International Islamic University, Islamabad","ror":"https://ror.org/047w75g40","country_code":"PK","type":"education","lineage":["https://openalex.org/I121243025"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Sajid Hussain","raw_affiliation_strings":["Department of Computer Science and Software Engineering, International Islamic University Islamabad, Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-1540-4940","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, International Islamic University Islamabad, Islamabad, Pakistan","institution_ids":["https://openalex.org/I121243025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047048551","display_name":"Shehzad Ashraf Chaudhry","orcid":"https://orcid.org/0000-0002-9321-6956"},"institutions":[{"id":"https://openalex.org/I4210091267","display_name":"\u0130stanbul Geli\u015fim \u00dcniversitesi","ror":"https://ror.org/0188hvh39","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210091267"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Shehzad Ashraf Chaudhry","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey"],"raw_orcid":"https://orcid.org/0000-0002-9321-6956","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey","institution_ids":["https://openalex.org/I4210091267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058957048","display_name":"Osama Ahmad Alomari","orcid":"https://orcid.org/0000-0002-1135-5750"},"institutions":[{"id":"https://openalex.org/I4210091267","display_name":"\u0130stanbul Geli\u015fim \u00dcniversitesi","ror":"https://ror.org/0188hvh39","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210091267"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Osama Ahmad Alomari","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University, Istanbul, Turkey","institution_ids":["https://openalex.org/I4210091267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030998001","display_name":"Mohammed H. Alsharif","orcid":"https://orcid.org/0000-0001-8579-5444"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Mohammed H. Alsharif","raw_affiliation_strings":["Department of Electrical Engineering, College of Electronics and Information Engineering, Sejong University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-8579-5444","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, College of Electronics and Information Engineering, Sejong University, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6636-0533","affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]},{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]},{"id":"https://openalex.org/I4210111472","display_name":"King Abdul Aziz University Hospital","ror":"https://ror.org/01vv03303","country_code":"SA","type":"healthcare","lineage":["https://openalex.org/I4210111472"]},{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN","SA","TW"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of CSED, Thapar Institute of Engineering and Technology, Punjab, India","Department of Computer Science and Information Engineering, Asia University, Taichung City, Taiwan","King Abdul Aziz University, Jeddah, Saudi Arabia","School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India"],"raw_orcid":"https://orcid.org/0000-0002-3020-3947","affiliations":[{"raw_affiliation_string":"Department of CSED, Thapar Institute of Engineering and Technology, Punjab, India","institution_ids":["https://openalex.org/I162030827"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Asia University, Taichung City, Taiwan","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"King Abdul Aziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210111472"]},{"raw_affiliation_string":"School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]}],"institutions":[],"countries_distinct_count":6,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079488995"],"corresponding_institution_ids":["https://openalex.org/I121243025"],"apc_list":null,"apc_paid":null,"fwci":15.3785,"has_fulltext":false,"cited_by_count":126,"citation_normalized_percentile":{"value":0.99349548,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"15","issue":"3","first_page":"4431","last_page":"4438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.7090047597885132},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6750087738037109},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.670626163482666},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6341000199317932},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6296169757843018},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5579005479812622},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5474735498428345},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5426609516143799},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4743061065673828},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.4505385756492615},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.353895366191864},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16241773962974548},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13691222667694092},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12351968884468079},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07184535264968872}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.7090047597885132},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6750087738037109},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.670626163482666},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6341000199317932},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6296169757843018},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5579005479812622},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5474735498428345},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5426609516143799},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4743061065673828},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.4505385756492615},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.353895366191864},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16241773962974548},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13691222667694092},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12351968884468079},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07184535264968872},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2021.3057047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2021.3057047","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6700000166893005}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W766082629","https://openalex.org/W1526070463","https://openalex.org/W2029693536","https://openalex.org/W2068849277","https://openalex.org/W2095054754","https://openalex.org/W2105114022","https://openalex.org/W2127451689","https://openalex.org/W2134295053","https://openalex.org/W2135654420","https://openalex.org/W2144342348","https://openalex.org/W2229747717","https://openalex.org/W2281830773","https://openalex.org/W2343874908","https://openalex.org/W2401625836","https://openalex.org/W2592056285","https://openalex.org/W2602198036","https://openalex.org/W2725337021","https://openalex.org/W2737205874","https://openalex.org/W2770141764","https://openalex.org/W2782556342","https://openalex.org/W2795655063","https://openalex.org/W2801912887","https://openalex.org/W2886042531","https://openalex.org/W2896075375","https://openalex.org/W2898274421","https://openalex.org/W2905628336","https://openalex.org/W2922770218","https://openalex.org/W2937840480","https://openalex.org/W2954347865","https://openalex.org/W2969139182","https://openalex.org/W3005527937","https://openalex.org/W3005819255","https://openalex.org/W3009951551","https://openalex.org/W3012182806","https://openalex.org/W3034804175","https://openalex.org/W3092188219","https://openalex.org/W3123330558","https://openalex.org/W4377007801","https://openalex.org/W6753856720"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W4212885606"],"abstract_inverted_index":{"The":[0,126],"continuous":[1],"innovation":[2],"and":[3,8,14,29,33,47,66,92,117,157],"progression":[4],"in":[5,17,40,50,56,121],"hardware,":[6],"software":[7],"communication":[9,113],"technologies":[10],"helped":[11],"the":[12,26,67,95,112,129,152],"expansion":[13],"accelerated":[15],"growth":[16,55],"Internet":[18],"of":[19,86,128],"Things":[20],"based":[21],"drone":[22,119],"networks":[23],"(IoD),":[24],"for":[25,73],"devices,":[27],"applications":[28,42],"people":[30],"to":[31,62,77,110],"communicate":[32],"share":[34],"data.":[35],"IoD":[36,79],"can":[37],"enhance":[38],"comfort":[39],"many":[41],"including,":[43],"daily":[44],"life,":[45],"commercial,":[46],"military/rescue":[48],"operations":[49],"smart":[51],"cities.":[52],"However,":[53],"this":[54,98],"infrastructure":[57],"smartness":[58],"is":[59,132,160],"also":[60],"subject":[61],"new":[63,70,107],"security":[64,127,145],"threats":[65],"countermeasures":[68],"require":[69],"customized":[71],"solutions":[72],"IoD.":[74],"Many":[75],"schemes":[76,159],"secure":[78,111],"environments":[80],"are":[81],"proposed":[82,105,130,149],"recently;":[83],"however,":[84],"some":[85,93,122,155],"those":[87],"were":[88],"proved":[89],"as":[90],"insecure":[91],"degrades":[94],"efficiency.":[96],"In":[97],"article,":[99],"using":[100,134],"elliptic":[101],"curve":[102],"cryptography,":[103],"we":[104],"a":[106,115,118,141],"authentication":[108],"scheme":[109,131],"between":[114],"user":[116],"flying":[120,124],"specific":[123],"zone.":[125],"solicited":[133],"formal":[135],"Random":[136],"oracle":[137],"method":[138],"along":[139],"with":[140,154],"brief":[142],"discussion":[143],"on":[144],"aspects":[146],"provided":[147],"by":[148],"scheme.":[150],"Finally,":[151],"comparisons":[153],"related":[156],"latest":[158],"illustrated.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":26},{"year":2024,"cited_by_count":29},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":27},{"year":2021,"cited_by_count":14}],"updated_date":"2026-05-12T08:28:47.272897","created_date":"2025-10-10T00:00:00"}
