{"id":"https://openalex.org/W4312836987","doi":"https://doi.org/10.1145/3545729.3545784","title":"Security Analysis of Authentication and Key Agreement for Internet of Drones","display_name":"Security Analysis of Authentication and Key Agreement for Internet of Drones","publication_year":2022,"publication_date":"2022-05-13","ids":{"openalex":"https://openalex.org/W4312836987","doi":"https://doi.org/10.1145/3545729.3545784"},"language":"en","primary_location":{"id":"doi:10.1145/3545729.3545784","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3545729.3545784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 6th International Conference on Medical and Health Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044902642","display_name":"Tian\u2010Fu Lee","orcid":"https://orcid.org/0000-0002-8454-5803"},"institutions":[{"id":"https://openalex.org/I189772984","display_name":"Tzu Chi University","ror":"https://ror.org/04ss1bw11","country_code":"TW","type":"education","lineage":["https://openalex.org/I189772984"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"TIAN-FU LEE","raw_affiliation_strings":["Department of Medical Informatics, TZU Chi University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Medical Informatics, TZU Chi University, Taiwan","institution_ids":["https://openalex.org/I189772984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103084470","display_name":"Wei-Jie Huang","orcid":"https://orcid.org/0009-0004-8832-2481"},"institutions":[{"id":"https://openalex.org/I189772984","display_name":"Tzu Chi University","ror":"https://ror.org/04ss1bw11","country_code":"TW","type":"education","lineage":["https://openalex.org/I189772984"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"WEI-JIE HUANG","raw_affiliation_strings":["Department of Medical Informatics, TZU Chi University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Medical Informatics, TZU Chi University, Taiwan","institution_ids":["https://openalex.org/I189772984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044902642"],"corresponding_institution_ids":["https://openalex.org/I189772984"],"apc_list":null,"apc_paid":null,"fwci":0.9239,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82159535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"271","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7367628812789917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6913437247276306},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.6799906492233276},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6622273325920105},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.609200656414032},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5860650539398193},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5135698318481445},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.48558419942855835},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4815147817134857},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.44531139731407166},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4421897530555725},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.42050594091415405},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4115928113460541},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15856078267097473},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.09275594353675842},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07453405857086182}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7367628812789917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6913437247276306},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.6799906492233276},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6622273325920105},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.609200656414032},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5860650539398193},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5135698318481445},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.48558419942855835},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4815147817134857},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.44531139731407166},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4421897530555725},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.42050594091415405},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4115928113460541},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15856078267097473},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.09275594353675842},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07453405857086182},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3545729.3545784","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3545729.3545784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 6th International Conference on Medical and Health Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G2769831046","display_name":null,"funder_award_id":"MOST 110-2221-E-320-005-MY2","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"}],"funders":[{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1996597289","https://openalex.org/W2002106332","https://openalex.org/W2514623318","https://openalex.org/W2530881536","https://openalex.org/W2558465299","https://openalex.org/W2884455160","https://openalex.org/W2884658035","https://openalex.org/W2898047674","https://openalex.org/W2900395215","https://openalex.org/W2905628336","https://openalex.org/W2981460880","https://openalex.org/W2986502858","https://openalex.org/W2989540564","https://openalex.org/W2995842712","https://openalex.org/W3008017767"],"related_works":["https://openalex.org/W2410215724","https://openalex.org/W2146652056","https://openalex.org/W2890728273","https://openalex.org/W2946324241","https://openalex.org/W53870421","https://openalex.org/W2296459145","https://openalex.org/W2953410103","https://openalex.org/W2765617399","https://openalex.org/W4309263283","https://openalex.org/W4297008398"],"abstract_inverted_index":{"Drones":[0,5],"in":[1,11,50],"the":[2,112,134],"Internet":[3],"of":[4,79,114],"(IoD)":[6],"have":[7],"been":[8],"widely":[9],"used":[10],"various":[12],"fields,":[13],"such":[14],"as":[15],"military":[16],"reconnaissance,":[17],"climate":[18],"and":[19,23,25,28,39,44,60,76,81,87,102,131,138],"environmental":[20],"detection,":[21],"logistics":[22],"transportation,":[24],"disaster":[26],"relief":[27],"so":[29],"on.":[30],"There":[31],"are":[32],"many":[33],"challenges":[34],"related":[35,106],"to":[36,66,121,127],"security,":[37],"privacy":[38],"energy":[40],"consumption":[41],"when":[42],"collecting":[43],"transferring":[45],"data":[46],"between":[47],"sensors":[48],"embedded":[49],"drones.":[51],"Recently,":[52],"Zhang":[53,115],"et":[54,116],"al.":[55],"developed":[56,71],"a":[57],"lightweight":[58,85],"authentication":[59,75],"key":[61,77,136],"agreement":[62,78],"scheme":[63,72,97,123],"for":[64],"IoD":[65],"address":[67],"these":[68],"issues.":[69],"Their":[70],"realized":[73],"mutual":[74],"drones":[80],"users":[82],"by":[83],"adopting":[84],"hash":[86],"bitwise":[88],"XOR":[89],"operations.":[90],"The":[91],"authors":[92],"demonstrate":[93],"that":[94],"their":[95,122],"proposed":[96],"provides":[98],"better":[99],"security":[100,137],"requirements":[101],"more":[103],"efficient":[104],"than":[105],"schemes.":[107],"However,":[108],"this":[109],"study":[110],"shows":[111],"limitations":[113],"al.'s":[117],"scheme,":[118],"which":[119],"leads":[120],"may":[124],"be":[125],"subject":[126],"some":[128],"potential":[129],"attacks":[130],"cannot":[132],"satisfy":[133],"session":[135],"untraceability":[139],"properties.":[140]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
