{"id":"https://openalex.org/W4387068050","doi":"https://doi.org/10.1109/tmc.2023.3319544","title":"A Blockchain-Based Distributed and Intelligent Clustering-Enabled Authentication Protocol for UAV Swarms","display_name":"A Blockchain-Based Distributed and Intelligent Clustering-Enabled Authentication Protocol for UAV Swarms","publication_year":2023,"publication_date":"2023-09-26","ids":{"openalex":"https://openalex.org/W4387068050","doi":"https://doi.org/10.1109/tmc.2023.3319544"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2023.3319544","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2023.3319544","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025251681","display_name":"Raja Karmakar","orcid":"https://orcid.org/0000-0003-1916-7743"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Raja Karmakar","raw_affiliation_strings":["Department of Computer Science and Engineering, Heritage Institute of Technology, Kolkata, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Heritage Institute of Technology, Kolkata, West Bengal, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032243366","display_name":"Georges Kaddoum","orcid":"https://orcid.org/0000-0002-5025-6624"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]},{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]},{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]}],"countries":["CA","LB"],"is_corresponding":false,"raw_author_name":"Georges Kaddoum","raw_affiliation_strings":["Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","Cyber Security Systems, and with Applied AI Research Center, Lebanese American University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]},{"raw_affiliation_string":"Cyber Security Systems, and with Applied AI Research Center, Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033298817","display_name":"Ouassima Akhrif","orcid":null},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]},{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ouassima Akhrif","raw_affiliation_strings":["Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, ETS, University of Quebec, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025251681"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":24.3035,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.99410406,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"23","issue":"5","first_page":"6178","last_page":"6195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8252619504928589},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7394241094589233},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6076899766921997},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.5940327644348145},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5918644666671753},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.547566831111908},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4404262602329254},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43367087841033936},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4097744822502136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33416748046875},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09195393323898315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8252619504928589},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7394241094589233},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6076899766921997},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.5940327644348145},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5918644666671753},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.547566831111908},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4404262602329254},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43367087841033936},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4097744822502136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33416748046875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09195393323898315},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tmc.2023.3319544","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2023.3319544","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:espace2.etsmtl.ca:27950","is_oa":false,"landing_page_url":"https://espace2.etsmtl.ca/id/eprint/27950/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article publi\u00e9 dans une revue, r\u00e9vis\u00e9 par les pairs"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1967308747","https://openalex.org/W1991784512","https://openalex.org/W2099340692","https://openalex.org/W2106857693","https://openalex.org/W2130398181","https://openalex.org/W2137775453","https://openalex.org/W2153268908","https://openalex.org/W2229747717","https://openalex.org/W2512365016","https://openalex.org/W2894786170","https://openalex.org/W2904779896","https://openalex.org/W2937840480","https://openalex.org/W2967569187","https://openalex.org/W2995975985","https://openalex.org/W3007112828","https://openalex.org/W3081564149","https://openalex.org/W3094603038","https://openalex.org/W3132327631","https://openalex.org/W3132769745","https://openalex.org/W3139173940","https://openalex.org/W3147822227","https://openalex.org/W3152826679","https://openalex.org/W3155383670","https://openalex.org/W3164155579","https://openalex.org/W3173014225","https://openalex.org/W3201410046","https://openalex.org/W3203516415","https://openalex.org/W3204325268","https://openalex.org/W3209492610","https://openalex.org/W3210453541","https://openalex.org/W3212040537","https://openalex.org/W3212159955","https://openalex.org/W4206382927","https://openalex.org/W4210268633","https://openalex.org/W4210796835","https://openalex.org/W4213147678","https://openalex.org/W4301026737","https://openalex.org/W6802841515"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2547137208","https://openalex.org/W2061637199","https://openalex.org/W2040161614"],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"vehicles":[2],"(UAVs)":[3],"are":[4,37],"operated":[5],"remotely":[6],"without":[7],"the":[8,25,66,80,84,87,95,98,122,137,161,199],"presence":[9],"of":[10,14,27,46,77,83,89,97,174],"a":[11,43,61,72,107,127,166],"unified":[12],"system":[13],"identity":[15],"authentication,":[16],"and":[17,49,71,124,136,160,182,197],"wireless":[18],"communications":[19,196],"in":[20,75,156],"untrusted":[21],"environments":[22],"can":[23,193],"cause":[24],"loss":[26],"valuable":[28],"data":[29],"carried":[30,177],"by":[31],"UAVs.":[32],"Traditional":[33],"UAV":[34,78,90,99,119],"authentication":[35,63,100,110,129,154],"mechanisms":[36],"centralized":[38],"approaches,":[39],"which":[40,92],"suffer":[41],"from":[42],"single":[44],"point":[45],"failure":[47],"problem":[48],"may":[50],"incur":[51],"high":[52,81],"complexity":[53],"computations.":[54],"Therefore,":[55],"it":[56],"is":[57,142,176],"crucial":[58],"to":[59,94,144],"establish":[60],"distributed":[62,109],"mechanism":[64],"between":[65],"ground":[67],"station":[68],"controller":[69],"(GSC)":[70],"UAV.":[73],"Moreover,":[74],"case":[76],"swarms,":[79,120],"mobility":[82],"UAVs":[85,125],"affects":[86],"stability":[88],"communications,":[91],"leads":[93],"degradation":[96],"performance.":[101,201],"Addressing":[102],"these":[103],"challenges,":[104],"we":[105],"design":[106],"blockchain-based":[108],"mechanism,":[111],"known":[112],"as":[113],"<italic":[114],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SwarmAuth</i>":[116],",":[117],"for":[118],"where":[121],"GSC":[123],"follow":[126],"mutual":[128],"approach":[130,141],"using":[131],"physical":[132],"unclonable":[133],"functions":[134],"(PUFs),":[135],"K-means":[138],"clustering-based":[139],"intelligent":[140],"used":[143],"dynamically":[145],"create":[146],"location-based":[147],"clusters.":[148],"The":[149,171],"blockchain":[150],"helps":[151],"store":[152],"UAVs\u2019":[153],"information":[155],"an":[157],"immutable":[158],"storage":[159],"associated":[162],"smart":[163],"contracts":[164],"provide":[165],"convenient":[167],"access":[168],"control":[169],"model.":[170],"security":[172],"analysis":[173],"SwarmAuth":[175,192],"out":[178],"through":[179],"both":[180],"formal":[181],"informal":[183],"proofs":[184],"considering":[185],"general":[186],"attacks.":[187],"Experimental":[188],"evaluation":[189],"shows":[190],"that":[191],"assure":[194],"trustworthy":[195],"improve":[198],"network":[200]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
