{"id":"https://openalex.org/W4389543493","doi":"https://doi.org/10.1109/bcca58897.2023.10338915","title":"Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks","display_name":"Blockchain-Based Heuristic Study to Secure UAVs From GPS Spoofing Signals and External Attacks","publication_year":2023,"publication_date":"2023-10-24","ids":{"openalex":"https://openalex.org/W4389543493","doi":"https://doi.org/10.1109/bcca58897.2023.10338915"},"language":"en","primary_location":{"id":"doi:10.1109/bcca58897.2023.10338915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcca58897.2023.10338915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060876284","display_name":"Abdullatif Baba","orcid":"https://orcid.org/0000-0001-5165-4205"},"institutions":[{"id":"https://openalex.org/I4210111408","display_name":"Kuwait College of Science and Technology","ror":"https://ror.org/01vjvsj67","country_code":"KW","type":"education","lineage":["https://openalex.org/I4210111408"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Abdullatif Baba","raw_affiliation_strings":["Kuwait College of Science and Technology (KCST),Computer Science and Engineering Department,Kuwait","Computer Science and Engineering Department, Kuwait College of Science and Technology (KCST), Kuwait"],"affiliations":[{"raw_affiliation_string":"Kuwait College of Science and Technology (KCST),Computer Science and Engineering Department,Kuwait","institution_ids":["https://openalex.org/I4210111408"]},{"raw_affiliation_string":"Computer Science and Engineering Department, Kuwait College of Science and Technology (KCST), Kuwait","institution_ids":["https://openalex.org/I4210111408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005550537","display_name":"Basil Alothman","orcid":"https://orcid.org/0000-0002-2752-4811"},"institutions":[{"id":"https://openalex.org/I4210111408","display_name":"Kuwait College of Science and Technology","ror":"https://ror.org/01vjvsj67","country_code":"KW","type":"education","lineage":["https://openalex.org/I4210111408"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Basil Alothman","raw_affiliation_strings":["Kuwait College of Science and Technology (KCST),Computer Science and Engineering Department,Kuwait","Computer Science and Engineering Department, Kuwait College of Science and Technology (KCST), Kuwait"],"affiliations":[{"raw_affiliation_string":"Kuwait College of Science and Technology (KCST),Computer Science and Engineering Department,Kuwait","institution_ids":["https://openalex.org/I4210111408"]},{"raw_affiliation_string":"Computer Science and Engineering Department, Kuwait College of Science and Technology (KCST), Kuwait","institution_ids":["https://openalex.org/I4210111408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025749793","display_name":"Omar Khattab","orcid":null},"institutions":[{"id":"https://openalex.org/I4210111408","display_name":"Kuwait College of Science and Technology","ror":"https://ror.org/01vjvsj67","country_code":"KW","type":"education","lineage":["https://openalex.org/I4210111408"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Omar Khattab","raw_affiliation_strings":["Kuwait College of Science and Technology (KCST),Computer Science and Engineering Department,Kuwait","Computer Science and Engineering Department, Kuwait College of Science and Technology (KCST), Kuwait"],"affiliations":[{"raw_affiliation_string":"Kuwait College of Science and Technology (KCST),Computer Science and Engineering Department,Kuwait","institution_ids":["https://openalex.org/I4210111408"]},{"raw_affiliation_string":"Computer Science and Engineering Department, Kuwait College of Science and Technology (KCST), Kuwait","institution_ids":["https://openalex.org/I4210111408"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060876284"],"corresponding_institution_ids":["https://openalex.org/I4210111408"],"apc_list":null,"apc_paid":null,"fwci":1.833,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.89043732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"377","last_page":"379"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8692922592163086},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8050220012664795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6812291145324707},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.6604232788085938},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.6205921769142151},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5902965664863586},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38527098298072815},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17466431856155396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09160226583480835}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8692922592163086},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8050220012664795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6812291145324707},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.6604232788085938},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.6205921769142151},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5902965664863586},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38527098298072815},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17466431856155396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09160226583480835}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bcca58897.2023.10338915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcca58897.2023.10338915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.5,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1831208843","https://openalex.org/W2744673713","https://openalex.org/W4229042719","https://openalex.org/W4283466900","https://openalex.org/W4311102453"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2945504560"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,36,51],"heuristic":[4],"study":[5,79],"to":[6,49,108],"introduce":[7],"the":[8,59,83,88],"use":[9],"of":[10,39,61,100,103],"blockchain":[11],"technology":[12],"for":[13,23],"securing":[14],"Unmanned":[15],"Aerial":[16],"Vehicle":[17],"Systems":[18],"(UAVs)":[19],"against":[20,72],"security":[21,53],"threats,":[22],"example":[24],"Global":[25],"Positioning":[26],"System":[27],"(GPS)":[28],"spoofing":[29,113],"and":[30,45,75,105,115],"improving":[31],"their":[32],"efficiency.":[33],"We":[34],"leverage":[35],"unique":[37],"combination":[38],"\u201cWrite":[40],"Once,":[41],"Read":[42],"Many":[43],"(WORM),\u201d":[44],"\u201cMulti-Factor":[46],"Authentication":[47],"(MFA)\u201d":[48],"create":[50],"fortified":[52],"infrastructure.":[54],"Our":[55],"code":[56],"results":[57],"validate":[58],"robustness":[60],"this":[62],"combined":[63],"approach,":[64],"demonstrating":[65],"its":[66],"superiority":[67],"in":[68],"providing":[69],"enhanced":[70],"protection":[71],"data":[73],"tampering":[74],"unauthorised":[76],"access.":[77],"The":[78],"concludes":[80],"by":[81],"contrasting":[82],"stand-alone":[84],"WORM":[85],"technique":[86],"with":[87],"synergistic":[89],"WORM+MFA":[90],"method,":[91],"evaluating":[92],"them":[93],"on":[94],"key":[95],"metrics":[96],"such":[97],"as":[98],"level":[99],"security,":[101],"cost":[102],"implementation,":[104],"user":[106],"convenience":[107],"secure":[109],"UAVs":[110],"from":[111],"GPS":[112],"signals":[114],"external":[116],"attacks.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
