{"id":"https://openalex.org/W7126119371","doi":"https://doi.org/10.3991/ijim.v20i02.58623","title":"AI-Driven Hybrid Batch Authentication for UAV-Assisted Mobile IoT Networks","display_name":"AI-Driven Hybrid Batch Authentication for UAV-Assisted Mobile IoT Networks","publication_year":2026,"publication_date":"2026-01-29","ids":{"openalex":"https://openalex.org/W7126119371","doi":"https://doi.org/10.3991/ijim.v20i02.58623"},"language":null,"primary_location":{"id":"doi:10.3991/ijim.v20i02.58623","is_oa":true,"landing_page_url":"https://doi.org/10.3991/ijim.v20i02.58623","pdf_url":"https://online-journals.org/index.php/i-jim/article/download/58623/16979","source":{"id":"https://openalex.org/S4210177413","display_name":"International Journal of Interactive Mobile Technologies (iJIM)","issn_l":"1865-7923","issn":["1865-7923"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313744","host_organization_name":"kassel university press","host_organization_lineage":["https://openalex.org/P4310313744"],"host_organization_lineage_names":["kassel university press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Interactive Mobile Technologies (iJIM)","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://online-journals.org/index.php/i-jim/article/download/58623/16979","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124284636","display_name":"Soukaina Essafi","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Soukaina Essafi","raw_affiliation_strings":["Mohammed V University in Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mohammed V University in Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039896677","display_name":"Ahmed El-Yahyaoui","orcid":"https://orcid.org/0000-0002-9385-7315"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Ahmed El-Yahyaoui","raw_affiliation_strings":["Mohammed V University in Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mohammed V University in Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015877646","display_name":"Ali Ouacha","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Ali Ouacha","raw_affiliation_strings":["Mohammed V University in Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mohammed V University in Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013490584","display_name":"Iyad Lahsen-Cherif","orcid":"https://orcid.org/0000-0001-5743-377X"},"institutions":[{"id":"https://openalex.org/I4210153527","display_name":"Institut National des Postes et T\u00e9l\u00e9communications","ror":"https://ror.org/052bnvt46","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210153527","https://openalex.org/I4210167103"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Iyad Lahsen-Cherif","raw_affiliation_strings":["INPT, CS department, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"INPT, CS department, Rabat, Morocco","institution_ids":["https://openalex.org/I4210153527"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124284636"],"corresponding_institution_ids":["https://openalex.org/I126477371"],"apc_list":{"value":260,"currency":"EUR","value_usd":280},"apc_paid":{"value":260,"currency":"EUR","value_usd":280},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27076329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":"02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.879800021648407,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.879800021648407,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.0142000000923872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.007600000128149986,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6990000009536743},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5741999745368958},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5656999945640564},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49300000071525574},{"id":"https://openalex.org/keywords/batch-processing","display_name":"Batch processing","score":0.461899995803833},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.43849998712539673},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3725999891757965}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8224999904632568},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6990000009536743},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5741999745368958},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5656999945640564},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49300000071525574},{"id":"https://openalex.org/C172658912","wikidata":"https://www.wikidata.org/wiki/Q661613","display_name":"Batch processing","level":2,"score":0.461899995803833},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.43849998712539673},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43799999356269836},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3725999891757965},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3630000054836273},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2928999960422516},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.27639999985694885},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.27410000562667847},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2623000144958496},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3991/ijim.v20i02.58623","is_oa":true,"landing_page_url":"https://doi.org/10.3991/ijim.v20i02.58623","pdf_url":"https://online-journals.org/index.php/i-jim/article/download/58623/16979","source":{"id":"https://openalex.org/S4210177413","display_name":"International Journal of Interactive Mobile Technologies (iJIM)","issn_l":"1865-7923","issn":["1865-7923"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313744","host_organization_name":"kassel university press","host_organization_lineage":["https://openalex.org/P4310313744"],"host_organization_lineage_names":["kassel university press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Interactive Mobile Technologies (iJIM)","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3991/ijim.v20i02.58623","is_oa":true,"landing_page_url":"https://doi.org/10.3991/ijim.v20i02.58623","pdf_url":"https://online-journals.org/index.php/i-jim/article/download/58623/16979","source":{"id":"https://openalex.org/S4210177413","display_name":"International Journal of Interactive Mobile Technologies (iJIM)","issn_l":"1865-7923","issn":["1865-7923"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313744","host_organization_name":"kassel university press","host_organization_lineage":["https://openalex.org/P4310313744"],"host_organization_lineage_names":["kassel university press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Interactive Mobile Technologies (iJIM)","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6380912661552429}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7126119371.pdf","grobid_xml":"https://content.openalex.org/works/W7126119371.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,132],"rapid":[1],"evolution":[2],"of":[3,6,18,49],"the":[4,16,45,90,122,142,152],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9],"led":[10],"to":[11,27,43,53,68,114,128],"a":[12,79,98],"dramatic":[13],"increase":[14],"in":[15,126],"number":[17],"connected":[19],"devices.":[20],"Consequently,":[21],"it":[22],"is":[23,82],"no":[24],"longer":[25],"feasible":[26],"deliver":[28],"high-quality":[29],"services":[30],"using":[31,137],"terrestrial":[32],"infrastructure":[33],"alone.":[34],"Unmanned":[35],"aerial":[36],"vehicles":[37],"(UAVs)":[38],"are":[39],"increasingly":[40],"being":[41],"used":[42],"improve":[44,147],"capacity":[46],"and":[47,57,70,93,150],"efficiency":[48,149],"IoT":[50,61],"networks":[51],"due":[52],"their":[54],"maneuverability,":[55],"economy,":[56],"flexibility.":[58],"In":[59],"resource-constrained":[60],"environments,":[62],"UAVs":[63],"typically":[64],"employ":[65],"batch":[66,84,106,123,143],"authentication":[67,85],"securely":[69],"efficiently":[71],"manage":[72],"simultaneous":[73],"access":[74,101],"requests.":[75],"However,":[76],"if":[77],"even":[78],"single":[80],"signature":[81],"invalid,":[83],"will":[86],"fail,":[87],"which":[88],"compromises":[89],"system\u2019s":[91],"availability":[92],"reliability.":[94],"This":[95],"paper":[96],"introduces":[97],"hybrid":[99],"dynamic":[100],"control":[102],"architecture":[103],"that":[104,136],"combines":[105],"verification":[107,124,144],"techniques":[108],"with":[109],"machine":[110],"learning":[111],"(ML)":[112],"algorithms":[113],"detect":[115],"fraud":[116],"(i.e.,":[117],"identify":[118],"invalid":[119],"signatures)":[120],"before":[121,141],"process":[125,145],"order":[127],"enhance":[129],"its":[130,148],"efficiency.":[131],"experiment\u2019s":[133],"findings":[134],"show":[135],"artificial":[138],"intelligence":[139],"(AI)":[140],"can":[146],"reduces":[151],"computational":[153],"load.":[154]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-30T00:00:00"}
