{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:45:39Z","timestamp":1763451939734,"version":"3.45.0"},"reference-count":40,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":12,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Security and privacy in unmanned aerial vehicle (UAV)\/drone communication are critical. This paper proposes a secure, lightweight authentication scheme for UAV\u2010to\u2010ground station communication, using a physical unclonable function (PUF) to ensure encrypted and tamper\u2010resistant channels. The scheme achieves a communication cost of 2176 bits and a computation cost of 1565.76\u2009\u03bcs, balancing efficiency with strong security. It maintains an authentication success rate of 99.2% at 1% bit error rate (BER) and 98.4% at 2% BER, ensuring reliability in noisy environments. NS\u20103.35 simulations show a throughput of 21.75% lower, with packet loss reduced by 5.82% and end\u2010to\u2010end delay lowered by 8.6% compared to existing methods. Formal verification using the Scyther tool confirms resistance to various attacks like replay, impersonation, physical attacks, and so on. Overall, PUF is an effective and robust solution for UAV\u2010assisted ground network communication.<\/jats:p>","DOI":"10.1002\/spy2.70139","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T16:24:53Z","timestamp":1763051093000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing\n                    <scp>UAVs<\/scp>\n                    Assisted Ground Network Using\n                    <scp>PUF<\/scp>\n                    \u2010Based Lightweight Authentication Protocol"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0196-0489","authenticated-orcid":false,"given":"Mohd","family":"Najim","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronic Engineering, College of Engineering University of Jeddah  Jeddah Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"e_1_2_13_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113713"},{"key":"e_1_2_13_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"e_1_2_13_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"e_1_2_13_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4603"},{"key":"e_1_2_13_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2921798"},{"key":"e_1_2_13_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"e_1_2_13_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_28"},{"key":"e_1_2_13_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.018"},{"issue":"12","key":"e_1_2_13_10_1","first-page":"10061","article-title":"Energy\u2010Efficient and Secure Communication Toward UAV Networks","volume":"9","author":"Teng L.","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_2_13_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3033060"},{"key":"e_1_2_13_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.025"},{"key":"e_1_2_13_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3163367"},{"issue":"7","key":"e_1_2_13_14_1","first-page":"1887","article-title":"Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses","volume":"14","author":"Yansong G.","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_2_13_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3116163"},{"key":"e_1_2_13_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113321"},{"key":"e_1_2_13_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8061"},{"key":"e_1_2_13_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/jee-2023-0060"},{"key":"e_1_2_13_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7602"},{"key":"e_1_2_13_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.03.022"},{"key":"e_1_2_13_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"e_1_2_13_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_2_13_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_20"},{"key":"e_1_2_13_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_13_25_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS\u2010235275"},{"key":"e_1_2_13_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4867"},{"issue":"1","key":"e_1_2_13_27_1","first-page":"96","article-title":"Role of Mathematical Modelling and Learning Techniques for Privacy Preservation","volume":"17","author":"Kumar S.","year":"2023","journal-title":"GMSARN International Journal"},{"key":"e_1_2_13_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638\u2010020\u201001759\u20105"},{"key":"e_1_2_13_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/systems11080400"},{"key":"e_1_2_13_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8206"},{"key":"e_1_2_13_31_1","unstructured":"C.Cremers \u201cThe Scyther Tool \u201d2016 www.cs.ox.ac.uk\/people\/cas.cremers\/scyther\/."},{"key":"e_1_2_13_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4858"},{"key":"e_1_2_13_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.034"},{"key":"e_1_2_13_34_1","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12271"},{"key":"e_1_2_13_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4114"},{"key":"e_1_2_13_36_1","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v24i3.2136"},{"key":"e_1_2_13_37_1","doi-asserted-by":"publisher","DOI":"10.2478\/jee-2022-0015"},{"key":"e_1_2_13_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.009"},{"key":"e_1_2_13_39_1","first-page":"937","article-title":"End\u2010To\u2010End Design of a PUF\u2010Based Privacy Preserving Authentication Protocol","author":"Aydin A.","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_13_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109421"},{"key":"e_1_2_13_41_1","unstructured":"\u201cNs\u20103.35\u2010nsnam \u201dhttps:\/\/www.nsnam.org\/releases\/ns\u20103\u201035."}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:42:09Z","timestamp":1763451729000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70139"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70139","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"2024-01-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70139"}}