{"id":"https://openalex.org/W3092287850","doi":"https://doi.org/10.1145/3414045.3415941","title":"Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services","display_name":"Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services","publication_year":2020,"publication_date":"2020-09-25","ids":{"openalex":"https://openalex.org/W3092287850","doi":"https://doi.org/10.1145/3414045.3415941","mag":"3092287850"},"language":"en","primary_location":{"id":"doi:10.1145/3414045.3415941","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3414045.3415941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004320904","display_name":"Mohammad Wazid","orcid":"https://orcid.org/0000-0001-9898-0921"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mohammad Wazid","raw_affiliation_strings":["Graphic Era Deemed to be University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University, Dehradun, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039046844","display_name":"Basudeb Bera","orcid":"https://orcid.org/0000-0002-0872-0331"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Basudeb Bera","raw_affiliation_strings":["International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040610947","display_name":"Ankush Mitra","orcid":null},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankush Mitra","raw_affiliation_strings":["International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061788935","display_name":"Rashid Ali","orcid":"https://orcid.org/0000-0002-9756-1909"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rashid Ali","raw_affiliation_strings":["Engineering, Sejong University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Engineering, Sejong University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I28777354"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004320904"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":15.5759,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.99017697,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.955299973487854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9538000226020813,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8868346214294434},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7078648209571838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6786535978317261},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5487353801727295},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5336699485778809},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5043245553970337},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44440534710884094},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1675659716129303}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8868346214294434},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7078648209571838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6786535978317261},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5487353801727295},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5336699485778809},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5043245553970337},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44440534710884094},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1675659716129303},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3414045.3415941","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3414045.3415941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1561441787","https://openalex.org/W2013613544","https://openalex.org/W2029693536","https://openalex.org/W2105114022","https://openalex.org/W2114579022","https://openalex.org/W2229747717","https://openalex.org/W2288353948","https://openalex.org/W2519361213","https://openalex.org/W2605251097","https://openalex.org/W2729021829","https://openalex.org/W2774423163","https://openalex.org/W2782556342","https://openalex.org/W2806422435","https://openalex.org/W2806526175","https://openalex.org/W2883246807","https://openalex.org/W2905628336","https://openalex.org/W2921698889","https://openalex.org/W2937840480","https://openalex.org/W2942437319","https://openalex.org/W2977433423","https://openalex.org/W2982615157","https://openalex.org/W3005527937","https://openalex.org/W3008565796","https://openalex.org/W3010401056","https://openalex.org/W3023617420","https://openalex.org/W3023711887","https://openalex.org/W3034664369"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2989851257"],"abstract_inverted_index":{"Internet":[0,41],"of":[1,42,59,74,82,88,122,153,177],"Drones":[2],"(IoD)":[3],"architecture":[4],"is":[5,28,48],"designed":[6],"to":[7,85,185],"support":[8],"a":[9,49,161],"co-ordinated":[10],"access":[11,125],"for":[12,31,56,61,71,165],"the":[13,16,72,79,91,120,135,140,178],"airspace":[14],"using":[15],"unmanned":[17],"aerial":[18],"vehicles":[19],"(UAVs)":[20],"known":[21],"as":[22],"drones.":[23],"Recently,":[24],"IoD":[25,136],"communication":[26,89,167],"environment":[27,51],"extremely":[29,132],"useful":[30],"various":[32,151,190],"applications":[33],"in":[34,134,168],"our":[35],"daily":[36],"activities.":[37],"Artificial":[38],"intelligence":[39],"(AI)-enabled":[40],"Things":[43],"(IoT)-based":[44],"drone-aided":[45,171],"healthcare":[46,172],"service":[47],"specialized":[50],"which":[52],"can":[53,109],"be":[54,110],"used":[55],"different":[57],"types":[58,152],"tasks,":[60],"instance,":[62],"blood":[63],"and":[64,70,94,106,127],"urine":[65],"samples":[66],"collections,":[67],"medicine":[68],"delivery":[69,73],"other":[75],"medical":[76],"needs":[77],"including":[78],"current":[80],"pandemic":[81],"COVID-19.":[83],"Due":[84],"wireless":[86],"nature":[87],"among":[90],"deployed":[92,144],"drones":[93],"their":[95],"ground":[96],"station":[97],"server,":[98],"several":[99],"attacks":[100],"(for":[101],"example,":[102],"replay,":[103],"man-in-the-middle,":[104],"impersonation":[105],"privileged-insider":[107],"attacks)":[108],"easily":[111],"mounted":[112],"by":[113],"malicious":[114],"attackers.":[115],"To":[116,155],"protect":[117],"such":[118,157],"attacks,":[119],"deployment":[121],"effective":[123],"authentication,":[124],"control":[126],"key":[128],"management":[129],"schemes":[130],"are":[131],"important":[133],"environment.":[137,173],"Furthermore,":[138],"combining":[139],"blockchain":[141],"mechanism":[142],"with":[143],"authentication":[145],"make":[146],"it":[147],"more":[148],"robust":[149],"against":[150],"attacks.":[154],"mitigate":[156],"issues,":[158],"we":[159],"propose":[160],"private-blockchain":[162],"based":[163],"framework":[164,180],"secure":[166],"an":[169],"IoT-enabled":[170],"The":[174],"blockchain-based":[175],"simulation":[176],"proposed":[179],"has":[181],"been":[182],"carried":[183],"out":[184],"measure":[186],"its":[187],"impact":[188],"on":[189],"performance":[191],"parameters.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":14}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
