{"id":"https://openalex.org/W4404914705","doi":"https://doi.org/10.1109/mnet.2024.3510113","title":"Trust-Based Authentication Aided Blockchain for Distributed Learning in AAV Swarms: Challenges and Solutions","display_name":"Trust-Based Authentication Aided Blockchain for Distributed Learning in AAV Swarms: Challenges and Solutions","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4404914705","doi":"https://doi.org/10.1109/mnet.2024.3510113"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.2024.3510113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2024.3510113","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082144617","display_name":"Daojing He","orcid":"https://orcid.org/0000-0002-3820-8128"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Daojing He","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034848804","display_name":"Yuxiao Song","orcid":"https://orcid.org/0000-0001-7631-5242"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxiao Song","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Minghui Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minghui Dai","raw_affiliation_strings":["School of Computer Science and Technologyy, Donghua University, Shanghai, China","School of Computer Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technologyy, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]},{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091879207","display_name":"Sammy Chan","orcid":"https://orcid.org/0000-0002-8524-229X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sammy Chan","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333503","display_name":"Lei Chen","orcid":"https://orcid.org/0000-0002-7558-1001"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["GuangDong Engineering Technology Research Center of Cryptographic Product and System Evaluation, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"GuangDong Engineering Technology Research Center of Cryptographic Product and System Evaluation, Shenzhen, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, United Arab Emirates","Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), UAE"],"affiliations":[{"raw_affiliation_string":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I4210113480"]},{"raw_affiliation_string":"Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5082144617"],"corresponding_institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":1.5588,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88260173,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"39","issue":"4","first_page":"262","last_page":"270"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9499266147613525},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784805178642273},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6230158805847168},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.473161518573761},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45099592208862305},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4329755902290344},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4113055169582367},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.348366916179657}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9499266147613525},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784805178642273},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6230158805847168},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.473161518573761},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45099592208862305},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4329755902290344},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4113055169582367},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.348366916179657}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.2024.3510113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2024.3510113","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W3092032905","https://openalex.org/W3194291390","https://openalex.org/W3199147997","https://openalex.org/W3202810279","https://openalex.org/W3204658005","https://openalex.org/W4212985030","https://openalex.org/W4280647927","https://openalex.org/W4284888196","https://openalex.org/W4295832061","https://openalex.org/W4312339971","https://openalex.org/W4321608239","https://openalex.org/W4386451563","https://openalex.org/W4391620886","https://openalex.org/W4393379602","https://openalex.org/W4402157033"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199"],"abstract_inverted_index":{"The":[0],"remarkable":[1],"characteristics":[2],"of":[3,62,94,104,147,237],"autonomous":[4],"aerial":[5,30,137],"vehicles":[6],"(AAVs),":[7],"such":[8],"as":[9],"high":[10],"flexibility":[11],"and":[12,24,29,59,64,74,88,128,139,167,181,191,226,240],"real-time":[13],"data":[14,27],"acquisition,":[15],"make":[16],"them":[17],"a":[18,108,121,133,140,207,223],"promising":[19],"platform":[20],"for":[21,76,113,170,215,254],"providing":[22],"services":[23,42],"applications":[25,51],"like":[26],"collection":[28],"computing.":[31],"Furthermore,":[32],"by":[33,101],"integrating":[34],"decentralized":[35,95,156,252],"learning":[36,78,85,115,157,217,238,253],"with":[37,120,162],"AAVs":[38,63,148],"in":[39,79,116,198,218,235],"emerging":[40],"intelligent":[41],"(urban":[43],"sensing,":[44],"natural":[45],"resource":[46],"exploration,":[47],"etc.),":[48],"related":[49,188],"smart":[50,163],"can":[52],"be":[53],"enhanced.":[54],"However,":[55],"the":[56,65,72,92,102,144,155,185,195,229,250],"limited":[57],"computation":[58],"communication":[60],"resources":[61],"potential":[66,186],"security":[67,75,190],"risks":[68],"pose":[69],"challenges":[70,187],"to":[71,125,189,228],"reliability":[73],"distributed":[77,114,216],"AAV":[80,117,171,219,255],"swarms.":[81,172,220,256],"This":[82,130,221],"necessitates":[83],"suitable":[84],"policy":[86],"design":[87],"continuous":[89],"supervision":[90],"throughout":[91],"process":[93],"learning.":[96],"In":[97],"this":[98,175],"article,":[99],"motivated":[100],"merits":[103],"blockchain,":[105],"we":[106,177,205],"propose":[107],"trust-based":[109,211],"authentication":[110,169,212],"aided":[111,213],"blockchain":[112,141,214],"swarms,":[118],"along":[119],"corresponding":[122],"layered":[123],"architecture":[124,131],"ensure":[126],"effectiveness":[127],"security.":[129,241],"includes":[132,222],"perception":[134],"layer,":[135,138],"an":[136],"layer.":[142],"Moreover,":[143,184],"trust":[145],"values":[146],"are":[149,201],"derived":[150],"from":[151],"their":[152],"behaviors":[153],"during":[154],"process.":[158],"These":[159],"values,":[160],"combined":[161],"contracts,":[164],"enable":[165],"dynamic":[166],"robust":[168],"Based":[173],"on":[174,210],"framework,":[176],"present":[178,206],"its":[179,233],"advantages":[180],"exemplified":[182],"applications.":[183],"efficiency":[192,239],"when":[193],"applying":[194],"proposed":[196],"framework":[197],"wireless":[199],"networks":[200],"also":[202],"discussed.":[203],"Additionally,":[204],"case":[208],"study":[209],"detailed":[224],"procedure":[225],"solutions":[227],"associated":[230],"challenges,":[231],"demonstrating":[232],"performance":[234],"terms":[236],"We":[242],"finally":[243],"discuss":[244],"some":[245],"open":[246],"research":[247],"directions":[248],"regarding":[249],"blockchain-assisted":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2024-12-03T00:00:00"}
