{"id":"https://openalex.org/W4417281857","doi":"https://doi.org/10.1109/pimrc62392.2025.11275401","title":"Lightweight and Trusted Authentication for Cross-Domain Operation of UAV Swarm","display_name":"Lightweight and Trusted Authentication for Cross-Domain Operation of UAV Swarm","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4417281857","doi":"https://doi.org/10.1109/pimrc62392.2025.11275401"},"language":null,"primary_location":{"id":"doi:10.1109/pimrc62392.2025.11275401","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030659419","display_name":"Mingyue Xie","orcid":"https://orcid.org/0000-0002-6997-7683"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingyue Xie","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022969241","display_name":"Lu Yu","orcid":"https://orcid.org/0000-0003-0506-7557"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Yu","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042441651","display_name":"Zheng Chang","orcid":"https://orcid.org/0000-0003-3766-820X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Chang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062212392","display_name":"Zhiwei Zhao","orcid":"https://orcid.org/0000-0001-5293-0558"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Zhao","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100357792","display_name":"Tao Chen","orcid":"https://orcid.org/0000-0003-1382-6242"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Chen","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering,Chengdu,China,611731","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030659419"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.52658745,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.7714999914169312,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.7714999914169312,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.11190000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.023399999365210533,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6771000027656555},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6121000051498413},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5787000060081482},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.4228000044822693},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.41269999742507935},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.41119998693466187},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.385699987411499}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7324000000953674},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6771000027656555},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6121000051498413},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5787000060081482},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5081999897956848},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.4228000044822693},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.41269999742507935},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.41119998693466187},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.385699987411499},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3488999903202057},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34389999508857727},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.33739998936653137},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2964000105857849},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.29089999198913574},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.25940001010894775},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc62392.2025.11275401","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275401","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2037107113","https://openalex.org/W3010858269","https://openalex.org/W3179283102","https://openalex.org/W3201410046","https://openalex.org/W3202810279","https://openalex.org/W4285110155","https://openalex.org/W4291805243","https://openalex.org/W4323896654","https://openalex.org/W4386446928","https://openalex.org/W4386736487","https://openalex.org/W4392910408","https://openalex.org/W4393033180","https://openalex.org/W4396753549"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,9,12,38,48,63,100,114,155,172,176],"high-speed":[2],"and":[3,29,54,92,102,128,147,159,179],"low-latency":[4],"connection":[5],"capabilities":[6],"brought":[7],"by":[8],"wireless":[10],"communications,":[11],"performance":[13],"of":[14,40,105,117,157,175],"unmanned":[15],"aerial":[16,30],"vehicle":[17],"(UAV)":[18],"swarm":[19],"for":[20,50,119,134,151],"executing":[21],"tasks":[22,68],"such":[23],"as":[24],"emergency":[25],"response,":[26],"smart":[27],"farming,":[28],"base":[31],"station":[32],"has":[33,112],"been":[34],"significantly":[35],"improved.":[36],"As":[37],"use":[39],"UAVs":[41,64,106,158],"becomes":[42],"more":[43],"prevalent":[44],"in":[45,75,87],"various":[46,96],"tasks,":[47],"demand":[49],"cross-domain":[51,110,131],"task":[52,60,77],"allocation":[53,61],"operations":[55,150],"continues":[56],"to":[57,65,85,98],"grow.":[58],"Cross-domain":[59],"enables":[62],"flexibly":[66],"execute":[67],"over":[69],"a":[70,126,139],"wider":[71],"range,":[72],"work":[73],"together":[74],"different":[76],"domains,":[78,97,109],"thereby":[79],"improving":[80],"operation":[81],"efficiency.":[82,184],"However,":[83],"due":[84],"variations":[86],"management":[88],"policies,":[89],"authentication":[90,111,132,141,146],"protocols,":[91],"security":[93,174],"standards":[94],"across":[95,107],"ensure":[99],"secure":[101],"reliable":[103],"interoperability":[104],"diverse":[108],"become":[113],"primary":[115],"line":[116],"defense":[118],"UAVs.":[120,153],"In":[121],"this":[122],"paper,":[123],"we":[124,143],"propose":[125],"lightweight":[127,140],"trusted":[129],"blockchain-based":[130],"scheme":[133],"UAV":[135],"swarm.":[136],"To":[137],"achieve":[138],"process,":[142],"apply":[144],"certificateless":[145],"avoid":[148],"costly":[149],"resource-constrained":[152],"Additionally,":[154],"trustworthiness":[156],"domains":[160],"is":[161,166],"evaluated":[162],"through":[163],"credibility,":[164],"which":[165],"stored":[167],"on":[168],"blockchain.":[169],"We":[170],"analyze":[171],"theoretical":[173],"proposed":[177],"scheme,":[178],"extensive":[180],"experiments":[181],"demonstrate":[182],"its":[183]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
