{"id":"https://openalex.org/W4416924963","doi":"https://doi.org/10.1109/wimob66857.2025.11257492","title":"SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks","display_name":"SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4416924963","doi":"https://doi.org/10.1109/wimob66857.2025.11257492"},"language":null,"primary_location":{"id":"doi:10.1109/wimob66857.2025.11257492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120536696","display_name":"Timoth\u00e9 Pitault","orcid":null},"institutions":[{"id":"https://openalex.org/I4210160189","display_name":"Institut Polytechnique de Bordeaux","ror":"https://ror.org/054qv7y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210160189"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Timoth\u00e9 Pitault","raw_affiliation_strings":["ENSEIRB-MATMECA, Bordeaux INP,France"],"affiliations":[{"raw_affiliation_string":"ENSEIRB-MATMECA, Bordeaux INP,France","institution_ids":["https://openalex.org/I4210160189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063847107","display_name":"Mauro Conti","orcid":"https://orcid.org/0000-0002-3612-1934"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Conti","raw_affiliation_strings":["University of Padua,Padua,Italy"],"affiliations":[{"raw_affiliation_string":"University of Padua,Padua,Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060913079","display_name":"Federico Cor\u00f2","orcid":"https://orcid.org/0000-0002-7321-3467"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Federico Cor\u00f2","raw_affiliation_strings":["University of Padua,Padua,Italy"],"affiliations":[{"raw_affiliation_string":"University of Padua,Padua,Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120536696"],"corresponding_institution_ids":["https://openalex.org/I4210160189"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50820312,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.968500018119812,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.968500018119812,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.007000000216066837,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6571000218391418},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6324999928474426},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6139000058174133},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.593500018119812},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5216000080108643},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4975999891757965},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46970000863075256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7757999897003174},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6571000218391418},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6324999928474426},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6139000058174133},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.593500018119812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5260999798774719},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5216000080108643},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4975999891757965},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48100000619888306},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46970000863075256},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.396699994802475},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.39160001277923584},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.323199987411499},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3183000087738037},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.29260000586509705},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.27810001373291016},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.2612000107765198}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob66857.2025.11257492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob66857.2025.11257492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2123482651","https://openalex.org/W2407885186","https://openalex.org/W2775542369","https://openalex.org/W2892271564","https://openalex.org/W2943373652","https://openalex.org/W3094603038","https://openalex.org/W4286656226","https://openalex.org/W4293731219","https://openalex.org/W4312305649","https://openalex.org/W4385269801","https://openalex.org/W4389480757","https://openalex.org/W4399704256"],"related_works":[],"abstract_inverted_index":{"Unmanned":[0],"Aerial":[1],"Vehicles":[2],"(UAVs)":[3],"operate":[4],"under":[5],"strict":[6],"Size,":[7],"Weight,":[8],"and":[9,32,80,93,104,114,124],"Power":[10],"(SWaP)":[11],"constraints,":[12],"making":[13,127],"traditional":[14],"security":[15,122],"mechanisms":[16],"impractical.":[17],"Many":[18],"existing":[19],"authentication":[20,56,70],"protocols":[21],"rely":[22],"on":[23,108],"centralized":[24],"infrastructure,":[25],"introducing":[26],"Single":[27],"Points":[28],"of":[29,46],"Failure":[30],"(SPoF)":[31],"requiring":[33],"continuous":[34],"connectivity-unsuitable":[35],"for":[36,59,132],"decentralized":[37],"UAV":[38,60,135],"swarms.":[39,61],"Moreover,":[40],"few":[41],"support":[42],"the":[43,101],"secure":[44],"addition":[45],"new":[47],"UAVs":[48],"post-deployment.":[49],"We":[50],"propose":[51],"SPARKS,":[52],"a":[53,129],"lightweight,":[54],"serverless":[55],"protocol":[57],"tailored":[58],"Unlike":[62],"prior":[63],"approaches,":[64],"SPARKS":[65,119],"enables":[66],"dynamic,":[67],"mutual":[68],"UAV-to-UAV":[69],"without":[71],"central":[72],"authorities,":[73],"using":[74,100],"only":[75],"XOR":[76],"operations,":[77],"cryptographic":[78],"hashes,":[79],"Physical":[81],"Unclonable":[82],"Functions":[83],"(PUFs).":[84],"It":[85],"provides":[86],"resilience":[87],"against":[88],"common":[89],"attacks,":[90],"including":[91],"impersonation":[92],"device":[94],"capture.":[95],"Security":[96],"is":[97,106],"formally":[98],"verified":[99],"Tamarin":[102],"Prover,":[103],"performance":[105],"validated":[107],"resourceconstrained":[109],"devices":[110],"(Raspberry":[111],"Pi":[112],"4":[113],"5).":[115],"Results":[116],"demonstrate":[117],"that":[118],"achieves":[120],"strong":[121],"guarantees":[123],"practical":[125],"efficiency,":[126],"it":[128],"compelling":[130],"solution":[131],"secure,":[133],"flexible":[134],"swarm":[136],"coordination.":[137]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-02T00:00:00"}
