{"id":"https://openalex.org/W4414079673","doi":"https://doi.org/10.1109/tmc.2025.3607316","title":"An Efficient iTreeKEM-Based Group Key Agreement Protocol for Flying Ad-Hoc Networks","display_name":"An Efficient iTreeKEM-Based Group Key Agreement Protocol for Flying Ad-Hoc Networks","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414079673","doi":"https://doi.org/10.1109/tmc.2025.3607316"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3607316","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3607316","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039491470","display_name":"Tianqi Zhou","orcid":"https://orcid.org/0000-0001-7638-4512"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]},{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianqi Zhou","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China","School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524","https://openalex.org/I168879160"]},{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075135160","display_name":"Seongmin Hong","orcid":"https://orcid.org/0000-0001-6904-8094"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijia Hong","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103232490","display_name":"Md Zakirul Alam Bhuiyan","orcid":null},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zakirul Alam Bhuiyan","raw_affiliation_strings":["Department of Computer and Information Sciences, Fordham University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Fordham University, New York, NY, USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pandi Vijayakumar","raw_affiliation_strings":["Professor and Dean, Department of Computer Science and Engineering, JJ College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India","Department of Computer Science and Engineering, JJ College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Professor and Dean, Department of Computer Science and Engineering, JJ College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India","institution_ids":["https://openalex.org/I122964287"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, JJ College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5039491470"],"corresponding_institution_ids":["https://openalex.org/I1328775524","https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29052457,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":"2125","last_page":"2140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9685999751091003,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9571999907493591,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.6786999702453613},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.597100019454956},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4943000078201294},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4681999981403351},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.4553999900817871},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.453900009393692},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.43560001254081726},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4323999881744385}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8137999773025513},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.6786999702453613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.598800003528595},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.597100019454956},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5924999713897705},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4943000078201294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4681999981403351},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.4553999900817871},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.453900009393692},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.43560001254081726},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4323999881744385},{"id":"https://openalex.org/C111009948","wikidata":"https://www.wikidata.org/wiki/Q1067690","display_name":"Two-phase commit protocol","level":5,"score":0.40959998965263367},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.3962000012397766},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.3944000005722046},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.34450000524520874},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C162571340","wikidata":"https://www.wikidata.org/wiki/Q1667988","display_name":"Internet Protocol Control Protocol","level":5,"score":0.3075999915599823},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27709999680519104},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.27559998631477356},{"id":"https://openalex.org/C71065454","wikidata":"https://www.wikidata.org/wiki/Q721869","display_name":"Reverse Address Resolution Protocol","level":4,"score":0.2630000114440918}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3607316","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3607316","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2043711803","https://openalex.org/W2099631081","https://openalex.org/W2724149932","https://openalex.org/W2734490561","https://openalex.org/W2741014554","https://openalex.org/W2904779896","https://openalex.org/W2913205665","https://openalex.org/W2976695157","https://openalex.org/W2982482325","https://openalex.org/W3011589233","https://openalex.org/W3097042790","https://openalex.org/W3114307879","https://openalex.org/W3120193246","https://openalex.org/W3152882632","https://openalex.org/W3198349909","https://openalex.org/W3201410046","https://openalex.org/W3201902064","https://openalex.org/W3213664522","https://openalex.org/W3214918934","https://openalex.org/W3215844258","https://openalex.org/W4210268633","https://openalex.org/W4285120091","https://openalex.org/W4312452252","https://openalex.org/W4312580023","https://openalex.org/W4376481172","https://openalex.org/W4381328149","https://openalex.org/W4385834257","https://openalex.org/W4391305772","https://openalex.org/W4391848436","https://openalex.org/W4393140585","https://openalex.org/W4399666390","https://openalex.org/W4399743511","https://openalex.org/W4401568040","https://openalex.org/W4402743278"],"related_works":["https://openalex.org/W2123795845","https://openalex.org/W1123412569","https://openalex.org/W3013627169","https://openalex.org/W988902895","https://openalex.org/W26370491","https://openalex.org/W2385083787","https://openalex.org/W2102995717","https://openalex.org/W2153238122","https://openalex.org/W3026259535","https://openalex.org/W2749079590"],"abstract_inverted_index":{"As":[0],"Flying":[1],"Ad-hoc":[2],"Network":[3],"(FANET)":[4],"evolves":[5],"toward":[6],"larger":[7],"scales":[8],"and":[9,18,69,86,184],"higher":[10],"levels":[11],"of":[12,16,43,75,159],"autonomy,":[13],"the":[14,40,123,134,144,160,166,170,179,185],"importance":[15],"secure":[17],"efficient":[19],"group":[20,67,128,135],"communication":[21,51],"continues":[22],"to":[23,38,64,72,112,191],"grow.":[24],"However,":[25],"resource-constrained":[26],"unmanned":[27],"aerial":[28],"vehicles":[29],"(UAVs)":[30],"face":[31],"dual":[32],"challenges:":[33],"limited":[34],"computational":[35,124],"power":[36],"struggles":[37],"meet":[39],"high":[41],"demands":[42],"complex":[44],"cryptographic":[45],"algorithms,":[46],"while":[47],"bandwidth":[48],"constraints":[49],"exacerbate":[50],"overhead":[52],"caused":[53],"by":[54,130,165],"multi-round":[55],"interaction":[56],"mechanisms.":[57],"Moreover,":[58],"existing":[59],"solutions":[60],"find":[61],"it":[62],"hard":[63],"support":[65,113],"dynamic":[66,119],"environments":[68],"are":[70],"prone":[71],"single":[73],"point":[74],"failure":[76],"(SPoF)":[77],"in":[78,117,181],"centralized":[79],"architectures,":[80],"which":[81],"significantly":[82],"compromises":[83],"system":[84,142],"reliability":[85],"scalability.":[87],"To":[88,139],"address":[89],"these":[90],"issues,":[91],"this":[92],"paper":[93],"proposes":[94],"a":[95,147],"novel":[96],"key":[97,108,115],"agreement":[98],"protocol":[99,103,145,162,180],"for":[100,126],"FANET.":[101,192],"The":[102,157],"employs":[104],"an":[105],"improved":[106],"tree-based":[107],"encapsulation":[109],"mechanism":[110],"(iTreeKEM)":[111],"rapid":[114],"updates":[116],"highly":[118],"environments.":[120],"It":[121],"reduces":[122],"cost":[125],"each":[127],"member":[129],"90.08%":[131],"even":[132],"when":[133],"size":[136],"reaches":[137],"128.":[138],"further":[140],"enhance":[141],"robustness,":[143],"introduces":[146],"smart":[148],"contract-based":[149],"distributed":[150],"leader":[151],"election":[152],"mechanism,":[153],"effectively":[154],"eliminating":[155],"SPoF.":[156],"security":[158],"proposed":[161],"is":[163],"guaranteed":[164],"CDH":[167],"problem":[168],"under":[169],"generalized":[171],"selective":[172],"decryption":[173],"(GSD)":[174],"model.":[175],"Finally,":[176],"we":[177],"implement":[178],"NS-3":[182],"simulations,":[183],"results":[186],"demonstrate":[187],"its":[188],"effective":[189],"applicability":[190]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
