{"id":"https://openalex.org/W4416650014","doi":"https://doi.org/10.1109/tnsm.2025.3636562","title":"Blockchain-Based Lightweight Key Management Scheme for Secure UAV Swarm Task Allocation","display_name":"Blockchain-Based Lightweight Key Management Scheme for Secure UAV Swarm Task Allocation","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W4416650014","doi":"https://doi.org/10.1109/tnsm.2025.3636562"},"language":null,"primary_location":{"id":"doi:10.1109/tnsm.2025.3636562","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3636562","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070600267","display_name":"Yaqing Zhu","orcid":"https://orcid.org/0009-0007-0681-5787"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaqing Zhu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030223441","display_name":"Liquan Chen","orcid":"https://orcid.org/0000-0002-7202-4939"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liquan Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075264566","display_name":"Suhui Liu","orcid":"https://orcid.org/0000-0001-7698-8914"},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Suhui Liu","raw_affiliation_strings":["School of Computer and Electronic Information, Nanjing Normal University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Electronic Information, Nanjing Normal University, Nanjing, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101738313","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0003-0576-9364"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Yang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076028438","display_name":"Shang Gao","orcid":"https://orcid.org/0000-0003-2692-057X"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shang Gao","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070600267"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40531714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"1201","last_page":"1216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.5742999911308289,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.5742999911308289,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.24130000174045563,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.051600001752376556,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7577000260353088},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6115000247955322},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5990999937057495},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5679000020027161},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.5655999779701233},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.49149999022483826},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48669999837875366},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4228000044822693},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.4059999883174896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8439000248908997},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7577000260353088},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6115000247955322},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5990999937057495},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.579800009727478},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5679000020027161},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.5655999779701233},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5238999724388123},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.49149999022483826},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48669999837875366},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4228000044822693},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.4059999883174896},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3564000129699707},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33820000290870667},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3206999897956848},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31709998846054077},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2985000014305115},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C2780070844","wikidata":"https://www.wikidata.org/wiki/Q857815","display_name":"Plug and play","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C2777679929","wikidata":"https://www.wikidata.org/wiki/Q7883709","display_name":"Underlay","level":3,"score":0.2583000063896179},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2572999894618988},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3636562","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3636562","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2259478128","display_name":null,"funder_award_id":"U22B2026","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W189397779","https://openalex.org/W209883168","https://openalex.org/W1492902541","https://openalex.org/W1537090015","https://openalex.org/W1596144702","https://openalex.org/W1603356866","https://openalex.org/W1978122865","https://openalex.org/W1996876766","https://openalex.org/W2015454706","https://openalex.org/W2068425466","https://openalex.org/W2346415545","https://openalex.org/W2464507173","https://openalex.org/W2622367729","https://openalex.org/W2791023486","https://openalex.org/W2920555465","https://openalex.org/W3049643261","https://openalex.org/W3120215141","https://openalex.org/W3135801859","https://openalex.org/W3179573929","https://openalex.org/W3200916264","https://openalex.org/W3208178655","https://openalex.org/W3214918934","https://openalex.org/W4206637344","https://openalex.org/W4238634196","https://openalex.org/W4280573026","https://openalex.org/W4293195563","https://openalex.org/W4317892558","https://openalex.org/W4366828635","https://openalex.org/W4381163370","https://openalex.org/W4381232946","https://openalex.org/W4381328149","https://openalex.org/W4391093140","https://openalex.org/W4391697032","https://openalex.org/W4392449621","https://openalex.org/W4394862859","https://openalex.org/W4399346636","https://openalex.org/W4401907589","https://openalex.org/W4402187332","https://openalex.org/W4402915120","https://openalex.org/W4403277038","https://openalex.org/W4403332121","https://openalex.org/W4404133935","https://openalex.org/W4404339724","https://openalex.org/W4407638771","https://openalex.org/W4408951637"],"related_works":[],"abstract_inverted_index":{"Unmanned":[0],"Aerial":[1],"Vehicle":[2],"(UAV)":[3],"swarms":[4],"are":[5,43],"a":[6,54,111,172,178],"cornerstone":[7],"technology":[8],"in":[9,18,32,57,61,204],"the":[10,213,226,230,241],"rapidly":[11],"growing":[12],"low-altitude":[13],"economy,":[14],"with":[15,151,175,253],"significant":[16],"applications":[17],"logistics,":[19],"smart":[20],"cities,":[21],"and":[22,38,48,71,92,143,168,177,185,195,224,249],"emergency":[23],"response.":[24],"However,":[25],"their":[26,82],"deployment":[27],"is":[28,124,161,193],"constrained":[29],"by":[30,147,219,233],"challenges":[31,79],"secure":[33,58,194],"communication,":[34],"dynamic":[35,140],"group":[36,50,65,216,255],"coordination,":[37],"resource":[39],"constraints.":[40],"Although":[41],"there":[42],"various":[44],"cryptographic":[45],"techniques,":[46],"efficient":[47,133],"scalable":[49],"key":[51,66,114,145,158,217],"management":[52,115],"plays":[53],"critical":[55],"role":[56],"task":[59,121,137,183],"allocation":[60],"UAV":[62,119],"swarms.":[63],"Existing":[64],"agreement":[67],"schemes,":[68],"both":[69],"symmetric":[70],"asymmetric,":[72],"often":[73],"fail":[74],"to":[75,81,163,197,222,228],"adequately":[76],"address":[77,99],"these":[78,100],"due":[80],"reliance":[83],"on":[84],"centralized":[85],"control,":[86],"high":[87],"computational":[88],"overhead,":[89],"sender":[90],"restrictions,":[91],"insufficient":[93],"protection":[94],"against":[95],"physical":[96],"attacks.":[97,199],"To":[98],"issues,":[101],"we":[102],"propose":[103],"PCDCB":[104,123,192,211,239],"(Pairing-free":[105],"Certificateless":[106],"Dynamic":[107],"Contributory":[108],"Broadcast":[109],"encryption),":[110],"blockchain-assisted":[112],"lightweight":[113],"scheme":[116],"designed":[117],"for":[118,127,156],"swarm":[120,128,206],"allocation.":[122],"particularly":[125],"suitable":[126],"operations":[129],"as":[130],"it":[131],"supports":[132],"one-to-many":[134],"broadcast":[135],"of":[136,215],"commands,":[138],"enables":[139],"node":[141],"join/leave,":[142],"eliminates":[144],"escrow":[146],"combining":[148],"certificateless":[149],"cryptography":[150],"Physical":[152],"Unclonable":[153],"Functions":[154],"(PUFs)":[155],"hardware-bound":[157],"regeneration.":[159],"Blockchain":[160],"used":[162],"maintain":[164],"tamper-resistant":[165],"update":[166],"tables":[167],"ensure":[169],"auditability,":[170],"while":[171],"privacy-preserving":[173],"mechanism":[174],"pseudonyms":[176],"round":[179],"mapping":[180],"table":[181],"provides":[182],"anonymity":[184],"unlinkability.":[186],"Comprehensive":[187],"security":[188],"analysis":[189],"confirms":[190],"that":[191],"resistant":[196],"multiple":[198],"Performance":[200],"evaluation":[201],"shows":[202],"that,":[203],"large-scale":[205],"scenarios":[207],"(n":[208],"=":[209],"100),":[210],"reduces":[212,225],"cost":[214,244],"computation":[218],"54.4%":[220],"(up":[221],"96.9%)":[223],"time":[227],"generate":[229],"decryption":[231],"keys":[232],"at":[234],"least":[235],"29.7%.":[236],"In":[237],"addition,":[238],"achieves":[240],"lowest":[242],"communication":[243],"among":[245],"all":[246],"compared":[247],"schemes":[248],"demonstrates":[250],"strong":[251],"scalability":[252],"increasing":[254],"size.":[256]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-25T00:00:00"}
