{"id":"https://openalex.org/W4390284839","doi":"https://doi.org/10.1109/tnse.2023.3347594","title":"Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications","display_name":"Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications","publication_year":2023,"publication_date":"2023-12-27","ids":{"openalex":"https://openalex.org/W4390284839","doi":"https://doi.org/10.1109/tnse.2023.3347594"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2023.3347594","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2023.3347594","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Anonymous_Blockchain-Assisted_Authentication_Protocols_for_Secure_Cross-Domain_IoD_Communications/25106165","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038281444","display_name":"Ali Shahidinejad","orcid":"https://orcid.org/0000-0003-4856-9119"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ali Shahidinejad","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019489166","display_name":"Jemal Abawajy","orcid":"https://orcid.org/0000-0001-8962-1222"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jemal H. Abawajy","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038281444"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":15.015,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.98982627,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"11","issue":"3","first_page":"2661","last_page":"2674"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9585000276565552,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7473347783088684},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7151895761489868},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.700520396232605},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6141890287399292},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5373669266700745},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5200133323669434},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5168254971504211},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.49114033579826355},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.48987382650375366},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4414568841457367},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4251115322113037},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41885173320770264},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1148594319820404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7473347783088684},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7151895761489868},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.700520396232605},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6141890287399292},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5373669266700745},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5200133323669434},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5168254971504211},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.49114033579826355},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.48987382650375366},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4414568841457367},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4251115322113037},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41885173320770264},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1148594319820404},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnse.2023.3347594","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2023.3347594","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/25106165","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Anonymous_Blockchain-Assisted_Authentication_Protocols_for_Secure_Cross-Domain_IoD_Communications/25106165","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/25106165","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Anonymous_Blockchain-Assisted_Authentication_Protocols_for_Secure_Cross-Domain_IoD_Communications/25106165","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2076392080","https://openalex.org/W2153281696","https://openalex.org/W2789827290","https://openalex.org/W2802483125","https://openalex.org/W2883088980","https://openalex.org/W2884189562","https://openalex.org/W2904779896","https://openalex.org/W2954321248","https://openalex.org/W3005527937","https://openalex.org/W3008565796","https://openalex.org/W3010858269","https://openalex.org/W3015913521","https://openalex.org/W3081564149","https://openalex.org/W3084387290","https://openalex.org/W3130714525","https://openalex.org/W3154832033","https://openalex.org/W3157894430","https://openalex.org/W3168682364","https://openalex.org/W3170192808","https://openalex.org/W3195539663","https://openalex.org/W3198650560","https://openalex.org/W3201410046","https://openalex.org/W3203516415","https://openalex.org/W3204694058","https://openalex.org/W3215217041","https://openalex.org/W4210268633","https://openalex.org/W4225851476","https://openalex.org/W4226398874","https://openalex.org/W4285158048","https://openalex.org/W4294915434","https://openalex.org/W4308113493"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W2358638783","https://openalex.org/W2252724828","https://openalex.org/W2379701766","https://openalex.org/W1498404765","https://openalex.org/W1533722674","https://openalex.org/W1530940119","https://openalex.org/W2766896269"],"abstract_inverted_index":{"Due":[0],"to":[1,53,76,86,195],"its":[2,203],"diverse":[3],"and":[4,11,26,33,90,93,135,153,166,182,189],"promising":[5],"use":[6,122],"cases,":[7],"including":[8],"civilian,":[9],"military,":[10],"commercial,":[12],"the":[13,39,51,55,59,83,94,120,124,133,136,140,144,163,173],"Internet":[14],"of":[15,61,96,123,143],"Drones":[16,42],"(IoD)":[17],"has":[18],"quickly":[19],"become":[20],"a":[21,110,148,196],"hot":[22],"issue":[23],"in":[24,50,72,147,151,193],"academic":[25],"industry":[27],"circles.":[28],"Concerns":[29],"about":[30],"drone":[31],"privacy":[32],"security":[34,98,175,191],"are":[35],"also":[36,171],"growing":[37],"at":[38],"same":[40,56],"rate.":[41],"from":[43],"different":[44,80],"flying":[45],"zones":[46],"frequently":[47],"work":[48],"together":[49],"IoD":[52,117],"accomplish":[54],"mission,":[57],"necessitating":[58],"development":[60],"trust":[62,78],"among":[63],"untrusted":[64],"domains.":[65,81],"Recently,":[66],"some":[67],"researchers":[68],"have":[69],"used":[70],"blockchain":[71],"their":[73],"authentication":[74],"scheme":[75],"establish":[77],"across":[79],"However,":[82],"integration":[84],"led":[85],"significant":[87,149],"communication,":[88],"computation":[89,154],"storage":[91,152],"overheads":[92],"loss":[95],"crucial":[97],"features":[99],"like":[100],"anonymity":[101,181],"or":[102],"unlinkability.":[103,183],"To":[104],"address":[105],"these":[106],"concerns,":[107],"we":[108,127],"develop":[109],"cost-effective":[111],"key":[112],"exchange":[113],"protocol":[114,158],"for":[115,177],"cross-domain":[116],"communications":[118],"through":[119],"judicious":[121],"blockchain.":[125],"Specifically,":[126],"employ":[128],"Chebyshev's":[129],"chaotic":[130],"map":[131],"as":[132,180],"crypto-system,":[134],"ledger":[137],"keeps":[138],"only":[139,160],"public":[141],"keys":[142],"drones,":[145],"resulting":[146],"decrease":[150],"overheads.":[155],"The":[156],"proposed":[157],"not":[159],"complies":[161],"with":[162],"stringent":[164],"Canetti":[165],"Krawczyk":[167],"adversary":[168],"model":[169],"but":[170],"satisfies":[172],"essential":[174],"requirements":[176],"IoD,":[178],"such":[179],"Using":[184],"informal":[185],"justification,":[186],"formal":[187],"proof,":[188],"automated":[190],"reasoning":[192],"addition":[194],"comparative":[197],"performance":[198],"evaluation,":[199],"this":[200],"research":[201],"substantiates":[202],"claims.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
