{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:54:11Z","timestamp":1732042451179},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","award":["2020R1I1A3058605"],"id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003696","name":"Electronics and Telecommunications Research Institute","doi-asserted-by":"publisher","award":["20ZR1300"],"id":[{"id":"10.13039\/501100003696","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1016\/j.comnet.2023.109612","type":"journal-article","created":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T07:20:26Z","timestamp":1675668026000},"page":"109612","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":15,"special_numbering":"C","title":["LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks"],"prefix":"10.1016","volume":"224","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3245-781X","authenticated-orcid":false,"given":"Sungjin","family":"Yu","sequence":"first","affiliation":[]},{"given":"Joonyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Anil Kumar","family":"Sutrala","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0406-6547","authenticated-orcid":false,"given":"Youngho","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.comnet.2023.109612_b1","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/JIOT.2016.2612119","article-title":"Low-altitude unmanned aerial vehicles-based internet of things services: Comprehensive survey and future perspectives","volume":"3","author":"Motlagh","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2023.109612_b2","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2022.3171791","article-title":"A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions","author":"Yu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2023.109612_b3","doi-asserted-by":"crossref","first-page":"128125","DOI":"10.1109\/ACCESS.2019.2934998","article-title":"Survey on collaborative smart drones and internet of things for improving smartness of smart cities","volume":"7","author":"Alsamhi","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2023.109612_b4","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/ACCESS.2016.2537208","article-title":"Internet of drones","volume":"4","author":"Gharibi","year":"2016","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b5","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","article-title":"Security and privacy for the internet of drones:Challenges and solutions","volume":"56","author":"Lin","year":"2018","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"10.1016\/j.comnet.2023.109612_b6","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/JIOT.2018.2875065","article-title":"Privacy protection for internet of drones: A network coding approach","volume":"6","author":"Chen","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b7","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.comcom.2020.10.023","article-title":"Internet of flying things (IoFT): A survey","volume":"165","author":"Zaidi","year":"2021","journal-title":"Comput. Commun."},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b8","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.comcom.2020.01.023","article-title":"Blockchain envisioned UAV networks: Challenges, solutions, and comparisons","volume":"151","author":"Mehta","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2023.109612_b9","first-page":"100249","article-title":"Applications of blockchain in unmanned aerial vehicles: A review","volume":"23","author":"Alladi","year":"2020","journal-title":"Veh. Commun."},{"key":"10.1016\/j.comnet.2023.109612_b10","article-title":"A drone-aided blockchain-based smart vehicular network","author":"Cheema","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2023.109612_b11","series-title":"Public Key Cryptography","first-page":"65","article-title":"Password-based authentication key exchange in the three-party setting","author":"Abdalla","year":"2005"},{"key":"10.1016\/j.comnet.2023.109612_b12","series-title":"Automated validation of internet security protocols and applications","author":"AVISPA","year":"2020"},{"key":"10.1016\/j.comnet.2023.109612_b13","series-title":"SPAN: A Security protocol animator for AVISPA","year":"2020"},{"key":"10.1016\/j.comnet.2023.109612_b14","series-title":"MIRACL cryptographic SDK: multiprecision integer and rational arithmetic cryptographic library","year":"2020"},{"key":"10.1016\/j.comnet.2023.109612_b15","series-title":"Hyperledger sawtooth architecture guide","year":"2020"},{"issue":"15","key":"10.1016\/j.comnet.2023.109612_b16","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.comcom.2020.02.067","article-title":"A lightweight authentication and key agreement scheme for internet of drones","volume":"154","author":"Zhang","year":"2020","journal-title":"Comput. Commun."},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b17","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.comcom.2020.08.016","article-title":"A smart lightweight privacy preservation scheme for IoT-based UAV communication systems","volume":"162","author":"Deebak","year":"2020","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.comnet.2023.109612_b18","doi-asserted-by":"crossref","first-page":"3572","DOI":"10.1109\/JIOT.2018.2888821","article-title":"Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment","volume":"6","author":"Wazid","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b19","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.comcom.2020.05.025","article-title":"PARTH: A two-state lightweight mutual authentication protocol for UAV surveillance networks","volume":"160","author":"Alladi","year":"2020","journal-title":"Comput. Commun."},{"issue":"7","key":"10.1016\/j.comnet.2023.109612_b20","doi-asserted-by":"crossref","first-page":"6903","DOI":"10.1109\/TVT.2019.2911672","article-title":"TCALAS: Temporal credential-based anonymous lightweight authentication scheme for internet of drones environment","volume":"68","author":"Srinivas","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2023.109612_b21","doi-asserted-by":"crossref","first-page":"43711","DOI":"10.1109\/ACCESS.2020.2977817","article-title":"Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2023.109612_b22","first-page":"102","article-title":"A smart lightweight privacy preservation scheme for IoT-based UAV communication systems","volume":"162","author":"Deebak","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2023.109612_b23","doi-asserted-by":"crossref","first-page":"13810","DOI":"10.1109\/ACCESS.2018.2811762","article-title":"DroneTrack: Cloud-based real-time object tracking using unmanned aerial vehicles over the internet","volume":"6","author":"Koubaa","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2023.109612_b24","doi-asserted-by":"crossref","unstructured":"C. Hong, D. Shi, A Cloud-based Control System Architecture for Multi-UAV, in: ICRCA\u201918: Proceedings of the 3rd International Conference on Robotics, Control and Automation, New York, United States, 2018, pp. 25\u201330.","DOI":"10.1145\/3265639.3265652"},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b25","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.adhoc.2018.09.013","article-title":"Dronemap planner: A service-oriented cloud-based management system for the internet-of-drones","volume":"86","author":"Koubaa","year":"2019","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"10.1016\/j.comnet.2023.109612_b26","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.comcom.2020.01.023","article-title":"Blockchain envisioned UAV networks: Challenges, solutions, and comparisons","volume":"151","author":"Mehta","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2023.109612_b27","first-page":"102670","article-title":"Security and privacy of UAV data using blockchain technology","volume":"55","author":"Ch","year":"2020","journal-title":"J. Inform. Secur. Appl."},{"key":"10.1016\/j.comnet.2023.109612_b28","article-title":"Enabling drones in the internet of things with decentralized blockchain-based security","author":"Yazdinejad","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2023.109612_b29","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/j.comnet.2023.109612_b30","doi-asserted-by":"crossref","unstructured":"P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Advances in Cryptology, CRYPTO, Berlin, Germany, 1999, pp. 388\u2013397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"10.1016\/j.comnet.2023.109612_b31","doi-asserted-by":"crossref","unstructured":"R. Canetti, H. Krawczyk, Universally Composable Notions of Key Exchange and Secure Channels, in: International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT\u201902, Amsterdam, Netherlands, 2002, pp. 337\u2013351.","DOI":"10.1007\/3-540-46035-7_22"},{"key":"10.1016\/j.comnet.2023.109612_b32","doi-asserted-by":"crossref","first-page":"2412","DOI":"10.1109\/TNSE.2021.3093435","article-title":"Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks","volume":"8","author":"Lee","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.comnet.2023.109612_b33","series-title":"Hyperledger: open source blockchain technologies","year":"2020"},{"key":"10.1016\/j.comnet.2023.109612_b34","doi-asserted-by":"crossref","first-page":"2913","DOI":"10.3390\/s20102913","article-title":"Design of secure protocol for cloud-assisted electronic health record system using blockchain","volume":"20","author":"Kim","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.comnet.2023.109612_b35","doi-asserted-by":"crossref","first-page":"101741","DOI":"10.1016\/j.cose.2020.101741","article-title":"A secure and scalable data integrity auditing scheme based on hyperledger fabric","volume":"92","author":"Lu","year":"2020","journal-title":"Comput. Secur."},{"issue":"4","key":"10.1016\/j.comnet.2023.109612_b36","doi-asserted-by":"crossref","first-page":"2802","DOI":"10.1109\/COMST.2021.3097916","article-title":"Fast, reliable, and secure drone communication: A comprehensive survey","volume":"23","author":"Hassija","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"10","key":"10.1016\/j.comnet.2023.109612_b37","doi-asserted-by":"crossref","first-page":"10374","DOI":"10.1109\/TVT.2022.3188769","article-title":"Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments","volume":"71","author":"Yu","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"177","key":"10.1016\/j.comnet.2023.109612_b38","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"issue":"11","key":"10.1016\/j.comnet.2023.109612_b39","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","article-title":"Zipf\u2019s law in passwords","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2023.109612_b40","doi-asserted-by":"crossref","unstructured":"V. Boyko, P. Mackenzie, S. Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie\u2013Hellman, in: Proc. Int. Conf. Theory Appl. Crypto. Tech. Adv. Cryptol, EUROCRYPT, Bruges, Belgium, 2000, pp. 156\u2013171.","DOI":"10.1007\/3-540-45539-6_12"},{"key":"10.1016\/j.comnet.2023.109612_b41","unstructured":"D.V. Oheimb, The High-Level Protocol Specification Lanuage HLPSL Developed in the EU Project AVISPA, in: Proc. of the APPSEM 2005 Workshop, Tallinn, Finland, 2005, pp. 1\u201317."},{"key":"10.1016\/j.comnet.2023.109612_b42","article-title":"Design of a password authentication and key agreement scheme to access E-healthcare services","author":"Kumari","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2023.109612_b43","series-title":"FIPS PUB 180-1","author":"Secure Hash\u00a0Standard","year":"1995"},{"key":"10.1016\/j.comnet.2023.109612_b44","series-title":"Proceedings of the Advances in Cryptology","first-page":"523","article-title":"Fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"vol. 3027","author":"Dodis","year":"2004"},{"key":"10.1016\/j.comnet.2023.109612_b45","series-title":"Advanced Encryption Standard (AES)","year":"2001"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128623000579?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128623000579?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T19:02:54Z","timestamp":1716231774000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128623000579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":45,"alternative-id":["S1389128623000579"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2023.109612","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"LAKA-UAV: Lightweight authentication and key agreement scheme for cloud-assisted Unmanned Aerial Vehicle using blockchain in flying ad-hoc networks","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2023.109612","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109612"}}