{"id":"https://openalex.org/W4413278117","doi":"https://doi.org/10.1109/tifs.2025.3599678","title":"CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones","display_name":"CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413278117","doi":"https://doi.org/10.1109/tifs.2025.3599678"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3599678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3599678","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074377788","display_name":"Jintian Zhang","orcid":"https://orcid.org/0000-0003-0107-7459"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jintian Zhang","raw_affiliation_strings":["School of Cyber Science and Technology, PLA Information Engineering University, Zhengzhou, China","School of Cyber Science and Technology, Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, PLA Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071194455","display_name":"Qingfeng Cheng","orcid":"https://orcid.org/0000-0001-6149-4807"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingfeng Cheng","raw_affiliation_strings":["School of Cyber Science and Technology, PLA Information Engineering University, Zhengzhou, China","School of Cyber Science and Technology, Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, PLA Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["Xidian University, Xi&#x2019;an, China","Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102018721","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0001-6062-2950"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074377788"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":5.1063,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.95174066,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"20","issue":null,"first_page":"8848","last_page":"8862"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8358049392700195},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6779239177703857},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6158669590950012},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5802286863327026},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5674240589141846},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5509310960769653},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5340278148651123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4913746416568756},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.43172669410705566},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22087931632995605},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22029215097427368}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8358049392700195},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6779239177703857},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6158669590950012},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5802286863327026},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5674240589141846},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5509310960769653},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5340278148651123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4913746416568756},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.43172669410705566},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22087931632995605},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22029215097427368},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3599678","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3599678","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4112753200","display_name":null,"funder_award_id":"242300421414","funder_id":"https://openalex.org/F4320323845","funder_display_name":"Natural Science Foundation of Henan Province"},{"id":"https://openalex.org/G4169049969","display_name":null,"funder_award_id":"2022YFB3102900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5617106953","display_name":null,"funder_award_id":"254000510007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7798291704","display_name":null,"funder_award_id":"62172435","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G781479681","display_name":null,"funder_award_id":"62472438","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7817342302","display_name":null,"funder_award_id":"U23A20305","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7953164384","display_name":null,"funder_award_id":"U23A20305,","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8138847444","display_name":null,"funder_award_id":"62172435,","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323845","display_name":"Natural Science Foundation of Henan Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W170020907","https://openalex.org/W1603878273","https://openalex.org/W2124926080","https://openalex.org/W2153281696","https://openalex.org/W2514873781","https://openalex.org/W2519160529","https://openalex.org/W2566763967","https://openalex.org/W2766764374","https://openalex.org/W2889655092","https://openalex.org/W2904947504","https://openalex.org/W2937840480","https://openalex.org/W3034664369","https://openalex.org/W3094603038","https://openalex.org/W3120193246","https://openalex.org/W3121056417","https://openalex.org/W3166675588","https://openalex.org/W3194459689","https://openalex.org/W3201410046","https://openalex.org/W3205172848","https://openalex.org/W4205760526","https://openalex.org/W4206233083","https://openalex.org/W4212824653","https://openalex.org/W4226398874","https://openalex.org/W4285226905","https://openalex.org/W4312305649","https://openalex.org/W4313461186","https://openalex.org/W4321380781","https://openalex.org/W4378191955","https://openalex.org/W4382370124","https://openalex.org/W4383428305","https://openalex.org/W4386124188","https://openalex.org/W4389169240","https://openalex.org/W4390152039","https://openalex.org/W4390203985","https://openalex.org/W4390284839","https://openalex.org/W4391164054","https://openalex.org/W4391547478","https://openalex.org/W4391958997","https://openalex.org/W4392405520","https://openalex.org/W4392667083","https://openalex.org/W4393033180","https://openalex.org/W4393034872","https://openalex.org/W4393372087","https://openalex.org/W4395469341","https://openalex.org/W4399282748","https://openalex.org/W4401055692","https://openalex.org/W4401568007","https://openalex.org/W4402743278","https://openalex.org/W4409257574"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W2054202867","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2109882692","https://openalex.org/W2547137208","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Internet":[0],"of":[1,8,17,68,84,109,133,166,183,213],"Drones":[2],"(IoD)":[3],"provides":[4],"a":[5,92,164,173,205],"new":[6],"mode":[7],"information":[9,211],"collection":[10],"and":[11,22,39,50,63,106,121,125,141,155,172,190],"data":[12],"transmission.":[13],"With":[14],"the":[15,26,43,46,59,69,76,85,102,129,142,149,195,201,210],"assistance":[16],"6G":[18],"mobile":[19],"communication":[20,32,52,95,179,188],"facilities":[21],"artificial":[23],"intelligence":[24],"technology,":[25],"IoD":[27,60,70,178,214],"system":[28,71,215],"progressively":[29],"enables":[30],"real-time":[31],"among":[33,128],"remote":[34],"users,":[35],"ground":[36],"control":[37],"centers":[38],"drone":[40],"clusters.":[41],"At":[42],"same":[44],"time,":[45],"dynamically":[47],"updated,":[48],"open,":[49],"interoperable":[51],"environment":[53],"also":[54],"poses":[55],"some":[56],"risks":[57],"to":[58,117,147,208],"system\u2019s":[61],"security":[62,66,120,139,151,184,197,212],"privacy.":[64],"The":[65],"attributes":[67],"are":[72,145],"insufficiently":[73],"met":[74],"by":[75],"authentication":[77,124],"schemes":[78],"currently":[79],"in":[80,152,181],"use.":[81],"In":[82],"light":[83],"aforementioned":[86],"factors,":[87],"this":[88],"paper":[89],"suggests":[90],"CSAP-IoD,":[91],"lightweight":[93],"secure":[94],"protocol":[96],"for":[97],"anonymous":[98],"interactions":[99],"that":[100,160],"uses":[101],"initial":[103],"value":[104],"sensitivity":[105],"orbital":[107],"unpredictability":[108],"chaotic":[110],"map.":[111],"It":[112],"utilizes":[113],"fuzzy":[114],"verifier":[115],"technology":[116],"achieve":[118],"three-factor":[119],"facilitates":[122],"mutual":[123],"key":[126],"agreement":[127],"three-party":[130],"communicating":[131],"entities":[132],"IoD.":[134],"Real-or-Random":[135],"(ROR)":[136],"model,":[137],"informal":[138],"analysis,":[140],"Scyther":[143],"tool":[144],"used":[146],"assess":[148],"protocol\u2019s":[150],"multiple":[153],"dimensions,":[154],"it":[156],"has":[157],"been":[158],"demonstrated":[159],"CSAP-IoD":[161,193],"can":[162],"withstand":[163],"variety":[165],"attacks.":[167],"Based":[168],"on":[169],"simulation":[170],"results":[171],"detailed":[174],"comparison":[175],"with":[176],"state-of-the-art":[177],"protocols":[180],"terms":[182],"features,":[185],"computation":[186],"cost,":[187,189],"energy":[191],"consumption,":[192],"shows":[194],"optimal":[196],"performance":[198],"while":[199],"emphasizing":[200],"efficiency":[202],"advantage,":[203],"offering":[204],"dependable":[206],"solution":[207],"guarantee":[209],"communication.":[216]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
