{"id":"https://openalex.org/W4393372087","doi":"https://doi.org/10.1109/tnse.2024.3381599","title":"Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach","display_name":"Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach","publication_year":2024,"publication_date":"2024-04-01","ids":{"openalex":"https://openalex.org/W4393372087","doi":"https://doi.org/10.1109/tnse.2024.3381599"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3381599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3381599","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027275085","display_name":"Gaurang Bansal","orcid":"https://orcid.org/0000-0003-2272-0941"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Gaurang Bansal","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041189303","display_name":"Biplab Sikdar","orcid":"https://orcid.org/0000-0002-0084-4647"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Biplab Sikdar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027275085"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":19.0391,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.98970552,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"4","first_page":"3598","last_page":"3610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9114999771118164,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7635965347290039},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6341931819915771},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6250852346420288},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6117072701454163},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5683287978172302},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.49544060230255127},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4603099822998047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45308366417884827},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4527374804019928},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4519306719303131},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44928431510925293},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.43182075023651123},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41051071882247925},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36257678270339966},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35201990604400635},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.128838449716568},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0956011712551117},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.09307563304901123}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7635965347290039},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6341931819915771},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6250852346420288},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6117072701454163},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5683287978172302},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.49544060230255127},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4603099822998047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45308366417884827},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4527374804019928},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4519306719303131},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44928431510925293},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.43182075023651123},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41051071882247925},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36257678270339966},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35201990604400635},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.128838449716568},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0956011712551117},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.09307563304901123},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3381599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3381599","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7451972932","display_name":null,"funder_award_id":"FCP-NUS-TG-2022-001","funder_id":"https://openalex.org/F4320325256","funder_display_name":"Info-communications Media Development Authority"}],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"},{"id":"https://openalex.org/F4320325256","display_name":"Info-communications Media Development Authority","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W22334361","https://openalex.org/W1717577101","https://openalex.org/W1967308747","https://openalex.org/W1982494235","https://openalex.org/W2043778996","https://openalex.org/W2106857693","https://openalex.org/W2131789459","https://openalex.org/W2141420453","https://openalex.org/W2174648984","https://openalex.org/W2514873781","https://openalex.org/W2566869048","https://openalex.org/W2612185149","https://openalex.org/W2748607880","https://openalex.org/W2775546117","https://openalex.org/W2804462675","https://openalex.org/W2808182497","https://openalex.org/W2889655092","https://openalex.org/W2905487115","https://openalex.org/W2905628336","https://openalex.org/W2937840480","https://openalex.org/W2951694401","https://openalex.org/W2962804513","https://openalex.org/W3009951551","https://openalex.org/W3010442032","https://openalex.org/W3033781796","https://openalex.org/W3034664369","https://openalex.org/W3045336918","https://openalex.org/W3046461380","https://openalex.org/W3048626609","https://openalex.org/W3094603038","https://openalex.org/W3113166045","https://openalex.org/W3203516415","https://openalex.org/W3204325268","https://openalex.org/W4248299552","https://openalex.org/W6605984345","https://openalex.org/W6754358166"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W2363629235","https://openalex.org/W2998215210","https://openalex.org/W3199385136","https://openalex.org/W2375034746","https://openalex.org/W3088939963","https://openalex.org/W1504170878","https://openalex.org/W2357761884","https://openalex.org/W2359757108"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,15,27,30,43,94,104,112,124],"rapid":[4],"development":[5],"of":[6,17,29,33,45,107,114,126,155],"wireless":[7],"communication-based":[8],"technologies":[9],"has":[10],"been":[11],"particularly":[12],"prominent":[13],"in":[14,97,111,120],"context":[16],"Unmanned":[18],"Aerial":[19],"Vehicle":[20],"(UAV)":[21],"applications.":[22,200],"However,":[23],"despite":[24],"significant":[25],"progress,":[26],"realization":[28],"full":[31],"potential":[32,95],"UAV-based":[34,199],"applications":[35],"is":[36],"hindered":[37],"by":[38,60],"inherent":[39],"security":[40,185],"vulnerabilities,":[41],"including":[42],"susceptibility":[44],"communication":[46,153,169],"between":[47],"drones":[48],"and":[49,88,136,173,186],"base":[50],"stations":[51],"to":[52,86],"intrusion.":[53],"This":[54,100],"research":[55,58],"addresses":[56],"critical":[57],"gaps":[59],"proposing":[61],"a":[62,195],"novel":[63],"authentication":[64,73,106],"method":[65],"that":[66,83,142],"leverages":[67],"Shamir's":[68],"secret":[69],"sharing.":[70],"Unlike":[71],"existing":[72,147],"protocols,":[74],"which":[75],"often":[76],"rely":[77],"on":[78,163],"Physically":[79],"Unclonable":[80],"Functions":[81],"(PUFs)":[82],"assume":[84],"resistance":[85],"noise":[87,119],"theoretical":[89],"ideals,":[90],"our":[91,127,143],"approach":[92,144],"acknowledges":[93],"errors":[96],"PUF":[98],"responses.":[99],"accommodation":[101],"allows":[102],"for":[103,198],"successful":[105],"legitimate":[108],"UAVs,":[109],"even":[110],"presence":[113],"external":[115],"environmental":[116],"factors":[117],"introducing":[118],"PUFs.":[121],"To":[122],"evaluate":[123],"effectiveness":[125],"proposed":[128],"method,":[129],"extensive":[130],"simulations":[131],"were":[132],"conducted":[133],"using":[134],"NodeMCU":[135],"Raspberry":[137],"Pi":[138],"devices.":[139],"We":[140],"show":[141],"outclasses":[145],"other":[146],"methods":[148],"across":[149],"multiple":[150],"dimensions":[151],"with":[152],"cost":[154],"mere":[156],"<inline-formula":[157],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[158],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[159],"notation=\"LaTeX\">$450":[160],"\\mu":[161],"s$</tex-math></inline-formula>":[162],"NodeMCU.":[164],"Additionally,":[165],"it":[166,182,194],"incurs":[167],"lower":[168],"costs":[170,175],"(1600":[171],"bits)":[172],"storage":[174],"(352":[176],"bits),":[177],"showcasing":[178],"superior":[179],"efficiency.":[180],"Moreover,":[181],"maintains":[183],"robust":[184],"scalability":[187],"while":[188],"consuming":[189],"reasonable":[190],"energy":[191],"levels,":[192],"making":[193],"comprehensive":[196],"solution":[197]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
