{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:53:34Z","timestamp":1773248014712,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030249069","type":"print"},{"value":"9783030249076","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_32","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"427-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Secure Communication in UAV Assisted HetNets: A Proposed Model"],"prefix":"10.1007","author":[{"given":"Aabid","family":"Rashid","sequence":"first","affiliation":[]},{"given":"Diwankshi","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Tufail A.","family":"Lone","sequence":"additional","affiliation":[]},{"given":"Sumeet","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Sachin Kumar","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2013.10.002","volume":"41","author":"G Tuna","year":"2014","unstructured":"Tuna, G., Nefzi, B., Conte, G.: Unmanned aerial vehicles-aided communication system for disaster recovery. J. Netw. Comput. Appl. 41, 27\u201336 (2014). \n                    https:\/\/doi.org\/10.1016\/j.jnca.2013.10.002","journal-title":"J. Netw. Comput. Appl."},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/MCOM.2018.1700874","volume":"56","author":"G Yang","year":"2018","unstructured":"Yang, G., Xiao, M., Alam, M., Huang, Y.: Low-latency heterogeneous networks millimeter-wave communications. IEEE Commun. Mag. 56, 124\u2013129 (2018). \n                    https:\/\/doi.org\/10.1109\/MCOM.2018.1700874","journal-title":"IEEE Commun. Mag."},{"key":"32_CR3","doi-asserted-by":"publisher","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002. ACM, October 2002. \n                    https:\/\/doi.org\/10.1145\/586110.586117","DOI":"10.1145\/586110.586117"},{"key":"32_CR4","doi-asserted-by":"publisher","unstructured":"Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure wireless sensor networks. In: Ist ACM Workshop on Security of Ad-Hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, pp. 62\u201371, January 2003. \n                    https:\/\/doi.org\/10.1145\/986858.986868","DOI":"10.1145\/986858.986868"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du, X., Xiao, Y., Chen, H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5, 24\u201334 (2007). \n                    https:\/\/doi.org\/10.1016\/j.adhoc.2006.05.012","journal-title":"Ad Hoc Netw."},{"key":"32_CR6","doi-asserted-by":"publisher","unstructured":"Pietrowicz, S., Shim, H., Di Crescenzo, G., Zhang, T.: VDTLS - Providing secure communications in vehicle networks. In: INFOCOM Workshops 2008, Phoenix, AZ, USA. IEEE (2008). \n                    https:\/\/doi.org\/10.1109\/infocom.2008.4544651","DOI":"10.1109\/infocom.2008.4544651"},{"key":"32_CR7","doi-asserted-by":"publisher","unstructured":"Stading, T.: Secure Communication in a Distributed System Using Identity Based Encryption. In: CCGRID Third IEEE\/ACM International Symposium on Cluster Computing and the Grid, Tokyo, Japan. IEEE (2003). \n                    https:\/\/doi.org\/10.1109\/ccgrid.2003.1199395","DOI":"10.1109\/ccgrid.2003.1199395"},{"key":"32_CR8","doi-asserted-by":"publisher","unstructured":"Li, L., et al.: A networking identity authentication scheme combining fingerprint coding and identity based encryption. In: Intelligence and Security Informatics, New Brunswick, USA, pp. 129\u2013132. IEEE (2007). \n                    https:\/\/doi.org\/10.1109\/isi.2007.379545","DOI":"10.1109\/isi.2007.379545"},{"key":"32_CR9","doi-asserted-by":"publisher","unstructured":"Jia, C., Liao, Y., Chen, K.: Secure encryption in wireless sensor network. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, China, pp. 1\u20134. IEEE, October 2008. \n                    https:\/\/doi.org\/10.1109\/wicom.2008.870","DOI":"10.1109\/wicom.2008.870"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/s1005-8885(07)60034-x","volume":"13","author":"G Yang","year":"2006","unstructured":"Yang, G., Rong, C., Veigner, C., Wang, J., Cheng, H.: Identity-based key agreement and encryption for wireless sensor network. IJCSNS Int. J. Comput. Sci. Netw. Secur. 13, 54\u201360 (2006). \n                    https:\/\/doi.org\/10.1016\/s1005-8885(07)60034-x","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.13052\/jicts2245-800x.514","volume":"5","author":"M Khan","year":"2017","unstructured":"Khan, M., Niemi, V.: Privacy enhanced fast mutual authentication in 5G network using identity based encryption. J. ICT 5, 69\u201390 (2017). \n                    https:\/\/doi.org\/10.13052\/jicts2245-800x.514","journal-title":"J. ICT"},{"key":"32_CR12","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-78816-6_9","volume-title":"Security and Privacy in Communication Networks","author":"MS Haque","year":"2018","unstructured":"Haque, M.S., Chowdhury, M.U.: A new cyber security framework towards secure data communication for Unmanned Aerial Vehicle (UAV). In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 239, pp. 113\u2013122. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-78816-6_9"},{"key":"32_CR13","doi-asserted-by":"publisher","unstructured":"Szczechowiak, P., Collier, M.: Tiny IBE: identity-based encryption for heterogeneous sensor networks. In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, VIC, Australia, pp. 349\u2013354, 7\u201310 December 2009. \n                    https:\/\/doi.org\/10.1109\/issnip.2009.5416743","DOI":"10.1109\/issnip.2009.5416743"},{"key":"32_CR14","doi-asserted-by":"publisher","unstructured":"Adiga, B.S., Balamuralidhar, P., Rajan, M.A., Shastry, R., Shivraj, V.L.: An identity based encryption using elliptic curve cryptography for secure M2M communication. In: SecurIT 12 Proceedings of the First International Conference on Security of Internet of Things, Kollam, India, pp. 68\u201374, August 2012. \n                    https:\/\/doi.org\/10.1145\/2490428.2490438","DOI":"10.1145\/2490428.2490438"},{"key":"32_CR15","doi-asserted-by":"publisher","unstructured":"Anggorojati, B., Prasad, R.: Securing communication in inter domains Internet of Things using identity-based cryptography. In: 2017 International Workshop on Big Data and Information Security (IWBIS), Jakarta, Indonesia, pp. 137\u2013142. IEEE, September 2017. \n                    https:\/\/doi.org\/10.1109\/iwbis.2017.8275115","DOI":"10.1109\/iwbis.2017.8275115"},{"key":"32_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). \n                    https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Martin, L., Appenzeller, G., Schertler, M.: RFC5408 - Identity-Based Encryption Architecture and Supporting, Network Working Group (2009)","DOI":"10.17487\/rfc5408"},{"key":"32_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45455-1_26","volume-title":"Algorithmic Number Theory","author":"SD Galbraith","year":"2002","unstructured":"Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324\u2013337. Springer, Heidelberg (2002). \n                    https:\/\/doi.org\/10.1007\/3-540-45455-1_26"},{"key":"32_CR19","unstructured":"Challener, D., Yoder, K., Catherman, R., et al.: A practical Guide to Trusted Computing. IBM Press (2008)"},{"key":"32_CR20","unstructured":"AVISPA. Automated validation of internet security protocols and applications. \n                    http:\/\/www.avispa-project.org\/\n                    \n                  . Accessed Nov 2015"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:07:49Z","timestamp":1562771269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}