{"id":"https://openalex.org/W4404562778","doi":"https://doi.org/10.1109/ojcoms.2024.3504353","title":"Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme","display_name":"Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404562778","doi":"https://doi.org/10.1109/ojcoms.2024.3504353"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2024.3504353","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3504353","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2024.3504353","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055643069","display_name":"Eman Abouelkheir","orcid":"https://orcid.org/0000-0002-9204-7193"},"institutions":[{"id":"https://openalex.org/I156216236","display_name":"Qassim University","ror":"https://ror.org/01wsfe280","country_code":"SA","type":"education","lineage":["https://openalex.org/I156216236"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Eman Abouelkheir","raw_affiliation_strings":["Department of Computer Engineering, College of Computer, Qassim University, Buraidah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer, Qassim University, Buraidah, Saudi Arabia","institution_ids":["https://openalex.org/I156216236"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055643069"],"corresponding_institution_ids":["https://openalex.org/I156216236"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":1.3453,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84679481,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"5","issue":null,"first_page":"7552","last_page":"7566"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.8214182257652283},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7478735446929932},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.6843841075897217},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.6604998707771301},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5550009608268738},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.538362979888916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40026944875717163},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13865122199058533},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1202453076839447},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11234551668167114},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08330285549163818},{"id":"https://openalex.org/keywords/nanotechnology","display_name":"Nanotechnology","score":0.06190034747123718}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.8214182257652283},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7478735446929932},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.6843841075897217},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.6604998707771301},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5550009608268738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.538362979888916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40026944875717163},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13865122199058533},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1202453076839447},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11234551668167114},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08330285549163818},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.06190034747123718},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcoms.2024.3504353","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3504353","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c7d6a28390354e4da3803664b9845b5b","is_oa":true,"landing_page_url":"https://doaj.org/article/c7d6a28390354e4da3803664b9845b5b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 5, Pp 7552-7566 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2024.3504353","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3504353","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1522266554","https://openalex.org/W1588678293","https://openalex.org/W2140480956","https://openalex.org/W2149093588","https://openalex.org/W2166690231","https://openalex.org/W2296371806","https://openalex.org/W2319037262","https://openalex.org/W2563829615","https://openalex.org/W2592158815","https://openalex.org/W2608727628","https://openalex.org/W2905628336","https://openalex.org/W2946079998","https://openalex.org/W2949595272","https://openalex.org/W2966302923","https://openalex.org/W2985420787","https://openalex.org/W3017021688","https://openalex.org/W3034606981","https://openalex.org/W3045323300","https://openalex.org/W3096000766","https://openalex.org/W3114164046","https://openalex.org/W3124995269","https://openalex.org/W3132769745","https://openalex.org/W3144404977","https://openalex.org/W3184660798","https://openalex.org/W3188903343","https://openalex.org/W3193710536","https://openalex.org/W4200071594","https://openalex.org/W4200518910","https://openalex.org/W4225879957","https://openalex.org/W4281286669","https://openalex.org/W4312602835","https://openalex.org/W4319878479","https://openalex.org/W4321484167","https://openalex.org/W4378008993","https://openalex.org/W4384831342","https://openalex.org/W4387079215","https://openalex.org/W4390343183","https://openalex.org/W4391719903","https://openalex.org/W4392560103","https://openalex.org/W4394566129","https://openalex.org/W4399282748","https://openalex.org/W4399399490","https://openalex.org/W6764156403","https://openalex.org/W6837872115","https://openalex.org/W6849826546","https://openalex.org/W6986272746"],"related_works":["https://openalex.org/W2384216712","https://openalex.org/W54013283","https://openalex.org/W4247729863","https://openalex.org/W2361261002","https://openalex.org/W2003570966","https://openalex.org/W2030294917","https://openalex.org/W2162823500","https://openalex.org/W2952984876","https://openalex.org/W3029801869","https://openalex.org/W2015242147"],"abstract_inverted_index":{"Unmanned":[0,22],"aerial":[1],"vehicles":[2],"(UAVs)":[3,25],"have":[4,60],"gained":[5],"significant":[6],"attention":[7],"in":[8,69,126],"robotics":[9],"research":[10,154],"during":[11],"the":[12,41,64,172,187,196,203,213,217,226,258],"past":[13],"decade,":[14],"despite":[15],"their":[16,115,151],"presence":[17],"dating":[18],"back":[19],"to":[20,46,149,181,245],"1915.":[21],"Aerial":[23],"Vehicles":[24],"are":[26,87],"capable":[27],"of":[28,36,43,57,66,97,112,216,247],"efficiently":[29],"and":[30,82,85,102,114,119,135,202,232,239,242,253,264],"successfully":[31],"carrying":[32,91],"out":[33,92],"a":[34,39,48,54,131,136,158,184,190,221],"range":[35],"tasks.":[37],"As":[38],"result,":[40],"use":[42,65],"many":[44],"UAVs":[45,68,113,180,197],"fulfill":[47],"specific":[49],"mission":[50],"has":[51],"grown":[52],"into":[53],"popular":[55],"area":[56],"research.":[58],"Researchers":[59],"conducted":[61],"investigations":[62],"on":[63,117],"numerous":[67],"various":[70],"fields":[71],"such":[72],"as":[73,198,207],"remote":[74],"sensing,":[75],"disaster":[76],"relief,":[77],"force":[78],"protection,":[79],"military":[80],"warfare,":[81],"surveillance.":[83],"Efficiency":[84],"robustness":[86],"crucial":[88],"factors":[89],"for":[90,189],"key":[93],"operations.":[94],"Multiple":[95],"groups":[96],"UAVs,":[98],"through":[99],"appropriate":[100],"interaction":[101],"concerted":[103],"procedures,":[104],"can":[105],"achieve":[106],"these":[107],"objectives.":[108],"The":[109,176,251],"unpredictable":[110],"features":[111,215],"reliance":[116],"unprotected":[118],"widely":[120],"available":[121],"wireless":[122],"networks":[123,141],"create":[124],"challenges":[125],"establishing":[127],"secure":[128],"communication":[129,238],"between":[130],"private":[132],"edge":[133,144],"cloud":[134],"UAV.":[137],"Consequently,":[138],"secret":[139],"UAV":[140],"that":[142,257],"utilize":[143],"computing":[145],"necessitate":[146],"supplementary":[147],"precautions":[148],"safeguard":[150],"networks.":[152],"This":[153],"paper":[155],"talks":[156],"about":[157],"simple,":[159],"lightweight,":[160],"certificate-free,":[161],"heterogeneous":[162],"online/offline":[163],"aggregate":[164],"signing":[165],"scheme":[166,178,219],"called":[167],"CL-PFASC.":[168],"It":[169],"comes":[170],"from":[171],"discrete":[173],"logarithm":[174],"problem.":[175],"concert":[177],"enables":[179],"communicate":[182],"with":[183],"GS":[185,206],"without":[186],"need":[188],"bilinear":[191],"coupling":[192],"operation.":[193],"We":[194,211,234],"classify":[195],"identity-based":[199],"cryptography":[200],"(IBC)":[201],"ground":[204],"station":[205],"public-key":[208],"infrastructure":[209],"(PKI).":[210],"verify":[212],"security":[214,223,254],"suggested":[218,259],"using":[220],"formal":[222],"evaluation":[224],"method,":[225],"random":[227],"oracle":[228],"model,":[229],"under":[230],"confidentiality":[231],"unforgeability.":[233],"also":[235],"evaluate":[236],"its":[237],"computation":[240],"costs":[241],"compare":[243],"them":[244],"those":[246],"similar":[248],"existing":[249],"schemes.":[250],"performance":[252],"study":[255],"indicate":[256],"approach":[260],"improves":[261],"both":[262],"efficiency":[263],"security.":[265]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
