{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:46:52Z","timestamp":1751431612662,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493417"},{"type":"electronic","value":"9783030493424"}],"license":[{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49342-4_20","type":"book-chapter","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:49:30Z","timestamp":1597405770000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Drone Authentication Using ID-Based Signcryption in LoRaWAN Network"],"prefix":"10.1007","author":[{"given":"Sana","family":"Benzarti","sequence":"first","affiliation":[]},{"given":"Bayrem","family":"Triki","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,15]]},"reference":[{"key":"20_CR1","unstructured":"What is LoRa? February 2019. \nhttps:\/\/www.semtech.com\/technology\/lora\/what-is-lora"},{"issue":"99","key":"20_CR2","first-page":"1","volume":"PP","author":"M Rizzi","year":"2017","unstructured":"Rizzi, M., Ferrari, P., Flammini, A., Sisinni, E.: Evaluation of the IoT LoRaWAN solution for distributed measurement applications. IEEE Trans. Instrum. Measur. PP(99), 1\u201310 (2017)","journal-title":"IEEE Trans. Instrum. Measur."},{"key":"20_CR3","unstructured":"Yang, X.: LoRaWAN: vulnerability analysis and practical exploitation, Ph.D. thesis, Delft University of Technology (2017)"},{"key":"20_CR4","unstructured":"LoRaWAN Security, February 2019. \nhttps:\/\/www.thethingsnetwork.org\/docs\/lorawan\/security.html#metadata"},{"issue":"6","key":"20_CR5","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1109\/JIOT.2016.2612119","volume":"3","author":"NH Motlagh","year":"2016","unstructured":"Motlagh, N.H., Taleb, T., Arouk, O.: Low-altitude unmanned aerial vehicles-based Internet of Things services: comprehensive survey and future perspectives. IEEE Internet Things J. 3(6), 899\u2013922 (2016)","journal-title":"IEEE Internet Things J."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Vasconcelos, G., Carrijo, G., Miani, R., Souza, J., Guizilini, V.: The impact of DoS attacks on the AR.Drone 2.0. In: XIII Latin- American Robotics Symposium and IV Brazilian Robotics Symposium (LARS\/SBR), pp: 127\u2013132 (2016)","DOI":"10.1109\/LARS-SBR.2016.28"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Hooper, M., Tian, Y., Zhou, R., Cao, B., Lauf, A.P., Watkins, L., Robinson, W.H., Alexis, W.: Securing commercial WiFi-based UAVs from common security attacks. In: Military Communications Conference, MILCOM, pp. 1213\u20131218 (2016)","DOI":"10.1109\/MILCOM.2016.7795496"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Rodday, N.M., Schmidt, R.D.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: Network Operations and Management Symposium (NOMS), pp. 993\u2013994 (2016)","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Yoon, K., Park, D., Yim, Y., Kim, K., Yang, S.K., Robinson, M.: Security authentication system using encrypted channel on UAV network (2017)","DOI":"10.1109\/IRC.2017.56"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Habibi, J., Gupta, A., Carlson, S., Panicker, A., Bertino, E.: MAVR: code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In: IEEE 35th International Conference on Distributed Computing Systems, pp 642-652 (2015)","DOI":"10.1109\/ICDCS.2015.71"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: IEEE Conference on Technologies for Homeland Security (HST) (2012)","DOI":"10.1109\/THS.2012.6459914"},{"issue":"4","key":"20_CR12","first-page":"171","volume":"6","author":"WG Voss","year":"2013","unstructured":"Voss, W.G.: Privacy law implications of the use of drones for security and justice purposes. Int. J. Liabil. Sci. Enq. IJLSE 6(4), 171\u2013192 (2013)","journal-title":"Int. J. Liabil. Sci. Enq. IJLSE"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Purwar, A., Joshi, D., Chaubey, V.: GPS signal jamming and antijamming strategy a theoretical analysis. In: India Conference (INDICON), Annual, At IISC (2016)","DOI":"10.1109\/INDICON.2016.7838933"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Rodday, N.M., Schmidt, R.O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS, IEEE\/IFIP Network Operations and Management Symposium (2016)","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"20_CR15","unstructured":"Sasi, R.: Maldrone the First Backdoor for drones, February 2019. \nhttp:\/\/garage4hackers.com\/entry.php?b=3105"},{"key":"20_CR16","unstructured":"Shashok, N.: Analysis of Vulnerabilities in Modern Unmanned Aircraft Systems (2017)"},{"key":"20_CR17","unstructured":"Drones: A security tool, threat and challenge benefits, risks, challenges and advice for drones in enterprises in 2018, February 2019. \nhttps:\/\/www.securitymagazine.com\/articles\/88803-drones-asecurity- tool-threat-and-challenge"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Gemalto, Actility AND Semtech, \u201cLoRaWA SECURITY A WHITE PAPER PREPARED FOR THE LoRa ALLIANCE, February 2019. \nhttps:\/\/lora-alliance.org\/sites\/default\/files\/2018- 04\/lora_alliance_security_whitepaper.pdf","DOI":"10.1016\/S1361-3723(18)30070-8"},{"issue":"6","key":"20_CR19","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.3390\/s18061888","volume":"18","author":"I You","year":"2018","unstructured":"You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.T.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors (Basel) 18(6), 1888 (2018)","journal-title":"Sensors (Basel)"},{"key":"20_CR20","unstructured":"Lee, J.M.: Identity-based signcryption, Cryptology ePrint Archive, Report 2002\/098 (2002). \nhttp:\/\/eprint.iacr.org\/"},{"key":"20_CR21","unstructured":"What is DDOS attack? March 2019. \nhttps:\/\/www.kaspersky.fr\/resource-center\/threats\/ddos-attacks"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Bozic, N., Pujolle, G., Secci, S.: A tutorial on blockchain and applications to secure network control-planes. In: Smart Cloud Networks & Systems (SCNS) (2016)","DOI":"10.1109\/SCNS.2016.7870552"},{"key":"20_CR23","unstructured":"Park, J., Go, J., Kim, K.: Wireless authentication protocol preserving user anonymity. In: Proceedings of WirelessAP (2001)"},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Buchegger, S., Boudec, J-Y.L.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 226\u2013236 (2002). \nhttps:\/\/doi.org\/10.1145\/513800.513828","DOI":"10.1145\/513800.513828"},{"key":"20_CR25","doi-asserted-by":"publisher","unstructured":"Deng, H.M., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 70\u201375 (2002). \nhttps:\/\/doi.org\/10.1109\/MCOM.2002.1039859","DOI":"10.1109\/MCOM.2002.1039859"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49342-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T11:54:58Z","timestamp":1597406098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49342-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,15]]},"ISBN":["9783030493417","9783030493424"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49342-4_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,15]]},"assertion":[{"value":"15 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auburn, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}